<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:snf="http://www.smartnews.be/snf"
     xmlns:media="http://search.yahoo.com/mrss/" >

    <channel>
        <title>The Intercept</title>
        <atom:link href="https://theintercept.com/people/julian-assange/feed/" rel="self" type="application/rss+xml" />
        <link>https://theintercept.com/people/julian-assange/</link>
        <description></description>
        <lastBuildDate>Wed, 29 Apr 2026 17:05:09 +0000</lastBuildDate>
        <language>en-US</language>
                <sy:updatePeriod>hourly</sy:updatePeriod>
        <sy:updateFrequency>1</sy:updateFrequency>
        <generator>https://wordpress.org/?v=6.9.4</generator>
<site xmlns="com-wordpress:feed-additions:1">220955519</site>
            <item>
                <title><![CDATA[Ecuador’s Ex-President Rafael Correa Denounces Treatment of Julian Assange as "Torture"]]></title>
                <link>https://theintercept.com/2018/05/16/ecuadors-ex-president-rafael-correa-denounces-treatment-of-julian-assange-as-torture/</link>
                <comments>https://theintercept.com/2018/05/16/ecuadors-ex-president-rafael-correa-denounces-treatment-of-julian-assange-as-torture/#respond</comments>
                <pubDate>Wed, 16 May 2018 16:20:06 +0000</pubDate>
                                    <dc:creator><![CDATA[Glenn Greenwald]]></dc:creator>
                                		<category><![CDATA[Julian Assange]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Voices]]></category>
		<category><![CDATA[WikiLeaks]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=188348</guid>
                                    <description><![CDATA[<p>In an exclusive interview, the former Ecuadorian leader speaks about Assange, allegations from The Guardian, and the “submissive” posture of his successor to the U.S.</p>
<p>The post <a href="https://theintercept.com/2018/05/16/ecuadors-ex-president-rafael-correa-denounces-treatment-of-julian-assange-as-torture/">Ecuador’s Ex-President Rafael Correa Denounces Treatment of Julian Assange as &#8220;Torture&#8221;</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>Former Ecuadorian President</u> Rafael Correa, in an exclusive interview with The Intercept on Wednesday morning, denounced his country&#8217;s current government for blocking Julian Assange from receiving visitors in its embassy in London as a form of &#8220;torture&#8221; and a violation of Ecuador&#8217;s duties to protect Assange&#8217;s safety and well-being. Correa said this took place in the context of Ecuador no longer maintaining &#8220;normal sovereign relations with the American government &#8212; just submission.&#8221;</p>
<p>Correa also responded to a <a href="https://www.theguardian.com/world/2018/may/15/revealed-ecuador-spent-millions-julian-assange-spy-operation-embassy-london?CMP=share_btn_tw">widely discussed Guardian article</a> yesterday, which claimed that &#8220;Ecuador bankrolled a multimillion-dollar spy operation to protect and support Julian Assange in its central London embassy.&#8221; The former president mocked the story as highly &#8220;sensationalistic,&#8221; accusing The Guardian of seeking to depict routine and modest embassy security measures as something scandalous or unusual.</p>
<p>On March 27, Assange&#8217;s internet access at the Ecuadorian Embassy in London <a href="https://www.washingtonpost.com/world/ecuadoran-embassy-in-london-cuts-off-julian-assanges-internet/2018/03/28/10322e9c-32ae-11e8-b6bd-0084a1666987_story.html?utm_term=.cb1fd68c976d">was cut off</a> by Ecuadorian officials, who also installed jamming devices to prevent Assange from accessing the internet using other means of connection. Assange&#8217;s previously active Twitter account has had no activity since then, nor have any journalists been able to communicate with him. All visitors to the embassy have also been denied access to Assange, who was formally <a href="https://www.theguardian.com/media/2018/jan/11/julian-assange-is-made-ecuadorian-citizen-in-effort-to-resolve-impasse">made a citizen of Ecuador</a> earlier this year.</p>
<!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[0] --> <a href="https://theintercept.com/wp-content/uploads/2018/05/AP_490685803999-1526486337.jpg"><img data-recalc-dims="1" height="1024" width="1024" decoding="async" class="aligncenter size-large wp-image-188368" src="https://theintercept.com/wp-content/uploads/2018/05/AP_490685803999-1526486337.jpg?fit=1024%2C1024" alt="Ecuador's President and candidate for re-election Rafael Correa, top right, and vice presidential candidate Jorge Glass, top left, accompanied by relatives, celebrate after presidential elections in Quito, Ecuador, Sunday, Feb. 17, 2013. Although official results had still not been released, Correa celebrated his second re-election as Ecuador's president after an exit poll showed him leading by a wide margin. (AP Photo/Martin Jaramillo)" /></a>
<figcaption class="caption source">Rafeal Correa celebrates his overwhelming re-election win as Ecuador&#8217;s president in 2013, with his Vice President Jorge Glas.<br/>Photo: Martin Jaramillo/AP</figcaption><!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] -->
<p>Assange has been confined to the embassy for almost six years, when Ecuador granted him asylum in August 2012. The grant of asylum was made on the grounds that Assange&#8217;s extradition to Sweden for a sexual assault investigation would likely result in being sent to the U.S. for prosecution, where he could face the death penalty.</p>
<p>From the start, Ecuador told both the U.K. and Swedish governments that it would immediately send Assange to Stockholm in exchange for a pledge from Sweden not to use that as a pretext to extradite him to the U.S., something the Swedish government <a href="https://www.theguardian.com/commentisfree/2012/aug/24/new-statesman-error-assange-swedish-extradition">had the power to do</a> but refused.</p>
<p>Correa also emphasized that Ecuador, from the start, told Swedish investigators that they were welcome to interrogate Assange in their embassy, but almost five years elapsed before Swedish prosecutors &#8212; in 2016 &#8212; <a href="http://www.abc.net.au/news/2016-11-14/julian-assange-questioned-by-prosecutors-at-ecuadors-embassy/8025082">finally did so</a>. Citing those facts, a United Nations panel <a href="https://www.theguardian.com/media/2016/feb/04/julian-assange-wikileaks-arrest-friday-un-investigation">ruled in 2016</a> that the actions of the U.K. government constituted &#8220;arbitrary detention&#8221; and a violation of Assange&#8217;s fundamental human rights, a decision British officials quickly said they intended to ignore.</p>
<p>Despite the fact that Swedish prosecutors <a href="https://theintercept.com/2017/05/19/sweden-withdraws-arrest-warrant-for-julian-assange-but-he-still-faces-serious-legal-jeopardy/">dropped its sex crimes investigation</a> last May (not because they concluded Assange was innocent, but because they believed further efforts to bring him to Sweden were futile), U.K. authorities have vowed to arrest him on what it claims are bail violations.</p>

<p>The danger for Assange thus remains high if were to leave the embassy, particularly in light of a <a href="https://theintercept.com/2017/04/14/trumps-cia-director-pompeo-targeting-wikileaks-explicitly-threatens-speech-and-press-freedoms/">highly threatening speech</a> given last year by Mike Pompeo, then U.S. President Donald Trump&#8217;s CIA director and now his secretary of state, in which he labeled WikiLeaks a &#8220;non-state hostile intelligence service,&#8221; denied that its publication of documents is protected by the First Amendment, and vowed that &#8220;to give them the space to crush us with misappropriated secrets is a perversion of what our great Constitution stands for. It ends now.”</p>
<p>In January, doctors who examined Assange inside the embassy <a href="https://www.theguardian.com/commentisfree/2018/jan/24/julian-assange-care-wikileaks-ecuadorian-embassy">warned that continued confinement</a> posed grave threats to both his physical and mental health. Assange&#8217;s mother <a href="http://www.heraldsun.com.au/news/world/the-mother-of-julian-assange-christine-has-told-sky-news-that-the-wikileaks-founders-health-is-ailing-in-the-confines-of-the-ecuadorian-embassy-london/video/c70dd46408847310d98274c85c7a9960">said earlier this week</a> that his health was &#8220;rapidly deteriorating&#8221; and had become &#8220;extremely dangerous.&#8221;</p>
<p><u>Correa cited</u> those facts, as well as Ecuador&#8217;s legal obligations under international law to asylees, to denounce Ecuador&#8217;s denial of visitors to Assange as &#8220;basically torture.&#8221; Denial of visitors is, Correa said, &#8220;a clear v<span class="s1">iolation of his rights. Once we give asylum to someone, we are responsible for his safety, for ensuring humane living conditions.&#8221; But &#8220;without communications to the outside world and visits from anyone, the government is basically attacking Julian’s mental health.&#8221;</span></p>
<p>The ex-president said he believed it could be appropriate to limit Assange&#8217;s communications if he were acting &#8220;irresponsibly&#8221; by interfering in another country&#8217;s politics. During the 2016 U.S. election, Correa said, his own government told Assange that it thought his attacks on Hillary Clinton were becoming excessive and briefly suspended his internet connection to underline its concerns.</p>
<p>&#8220;But that was just temporary,&#8221; said Correa. &#8220;We never intended to take away his internet for an extended period of time. That is going way too far.&#8221; Correa&#8217;s Foreign Affairs Minister Guillaume Long similarly said in <a href="https://www.theguardian.com/world/2018/may/16/julian-assange-treatment-irresponsible-ecuador-foreign-minister-guillaume-long">an interview</a> with The Guardian earlier this morning that he, too, believed that the denial of visitors to Assange and the blocking of his internet access for this long &#8212; believed to be due to Assange&#8217;s frequent tweeting over the Catalan independence movement in Spain &#8212; was unjust.</p>
<p>As for reports that Ecuador is negotiating with the U.K. government to turn over Assange, Correa said that he had no knowledge of those discussions, but said it would be &#8220;unthinkable&#8221; for Ecuador to do so without first obtaining enforceable protections for Assange&#8217;s rights, including not having the U.K. government use the bail violations as a pretext to hand over Assange to the U.S.</p>
<p>Emphasizing that the U.S. government has made clear that it wants to prosecute Assange for publishing newsworthy material under statutes that allow for the death penalty, Correa said any such deal that did not include protections against extradition to the U.S. would be &#8220;a terrible b<span class="s1">etrayal, a violation of the rules of asylum, and a breach of Ecuador’s responsibility to protect the safety and welfare of Julian Assange.&#8221;</span></p>
<p>During his presidency, Correa was particularly assertive about defending the sovereignty of his country from intrusions by more powerful states, particularly the U.S. In 2007, he <a href="https://uk.reuters.com/article/ecuador-base/ecuador-wants-military-base-in-miami-idUKADD25267520071022">ordered a U.S. military base</a> on Ecuadorian soil closed unless the U.S. was willing to allow Ecuador the reciprocal right to establish a military base in Miami.</p>
<p>But earlier this month, Correa&#8217;s successor, the current Ecuadorian President Lenín Moreno, <a href="https://www.andes.info.ec/es/noticias/politics/1/ecuador-revives-agreement-with-the-us-no-military-base-involved">announced that</a> it had &#8220;recently signed an agreement focused on security cooperation [with the U.S.] which implies sharing information, intelligence topics and experiences in the fight against illegal drug trafficking and fighting transnational organized crime.&#8221; Many in Ecuador viewed that as a prelude to a return to the days when the U.S. dominated Ecuador, including with new military bases, a suspicion Moreno&#8217;s government denies.</p>
<p>But to Correa, Moreno is returning Ecuador to the days when it was subservient to the dictates of the U.S. government. &#8220;<span class="s1">Everyone in Latin America knows what this agreement with the U.S. means control, intervention, spying,&#8221; he said. Given the submissive posture of the current Ecuadorian president, Correa said it would not shock him if they submitted to American and British demands regarding Assange. Correa also cited the Moreno government&#8217;s recent decision to <a href="https://www.reuters.com/article/us-ecuador-colombia-rebels/ecuador-pulls-support-for-talks-between-colombia-eln-new-venue-sought-idUSKBN1HP2VP">terminate peace talks</a> between the Colombian government and rebels on Ecuadorian soil, which the ex-president believes was done at the behest of the U.S.</span></p>
<p>As for the &#8220;spying&#8221; allegations in the Guardian article, Correa said that the newspaper took a customary and standard security arrangement, and tried to make it appear sinister and scandalous. &#8220;Of course we provided security to Assange in the embassy,&#8221; Correa said. &#8220;It was our duty under the law to do so. We had the <a href="https://www.theguardian.com/media/2012/aug/16/julian-assange-ecuador-embassy-asylum">U.K. government threatening to break into the embassy</a>. We spent what amounts to a small amount of money to provide security.&#8221;</p>
<p>Correa said that unlike the U.S., which surrounds its embassies with massive military protection, Ecuador does not have the means to do that. &#8220;So, when we have special security needs, we hire private firms to provide it. There is nothing unusual about this. It would have been a violation of our duties if we did not.&#8221; Correa said his government hired a well-known security firm based in Spain, <a href="https://www.uc-global.com/?lang=en">UC Global</a>, to provide those services, but the current government replaced it with an Israeli firm. &#8220;But those services are still being provided by the current government,&#8221; Correa said.</p>
<p>As for The Guardian&#8217;s claim that Assange himself breached Ecuadorian cybersecurity systems to read emails and documents from Ecuadorian officials, Correa said the claim seemed &#8220;absurd,&#8221; adding that The Guardian &#8220;presented no evidence for this, just an anonymous source.&#8221; Conceding that it was possible that Assange had managed to hack into various government systems, he emphasized that he had no knowledge that any such spying by Assange had taken place nor has he seen any evidence for this claim.</p>
<p>The former president stressed that he had been given virtually no chance to respond to The Guardian&#8217;s allegations before publication of its article. &#8220;They sent it to some email address in Ecuador very shortly before they published the story,&#8221; said Correa, who is currently in Belgium. &#8220;I did not see the email until after the story was published. They seemed to want to make a sensationalized story, not any serious report to find out the truth.&#8221; Correa said he would provide The Intercept with the email sent by The Guardian; upon receipt from Correa, this article will be updated to include it.</p>
<p>Correa continues to believe that asylum for Assange is not only legally valid, but also obligatory. &#8220;We don&#8217;t agree with everything Assange has done or what he says,&#8221; Correa said. &#8220;And we never wanted to impede the Swedish investigation. We said all along that he would go to Sweden immediately in exchange for a promise not to extradite him to the U.S., but they would never give that. And we knew they could have questioned him in our embassy, but they refused for years to do so.&#8221; The fault for the investigation not proceeding lies, he insists, with the Swedish and British governments.</p>
<p>But now that Assange has asylum, Correa is adamant that the current government is bound by domestic and international law to protect his well-being and safety. Correa was scathing in his denunciation of the treatment Assange is currently receiving, viewing it as a byproduct of Moreno&#8217;s inability or unwillingness to have Ecuador act like a sovereign and independent country.</p>
<p class="caption">Top photo: Julian Assange, founder of WikiLeaks, makes a statement from a balcony of the Equador Embassy in London on Aug. 19, 2012.</p>
<p>The post <a href="https://theintercept.com/2018/05/16/ecuadors-ex-president-rafael-correa-denounces-treatment-of-julian-assange-as-torture/">Ecuador’s Ex-President Rafael Correa Denounces Treatment of Julian Assange as &#8220;Torture&#8221;</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2018/05/16/ecuadors-ex-president-rafael-correa-denounces-treatment-of-julian-assange-as-torture/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2018/05/AP_283779314748-1526486174-e1526488017298.jpg?fit=3527%2C1753' width='3527' height='1753' /><post-id xmlns="com-wordpress:feed-additions:1">188348</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/05/AP_490685803999-1526486337.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2018/05/AP_490685803999-1526486337.jpg?fit=3594%2C2424" medium="image">
			<media:title type="html">Rafael Correa, Jorge Glass</media:title>
			<media:description type="html">Rafeal Correa celebrates his overwhelming re-election win as Ecuador&#039;s President in 2013, with his Vice President Jorge Glass</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/05/AP_490685803999-1526486337.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[Four Viral Claims Spread by Journalists on Twitter in the Last Week Alone That Are False]]></title>
                <link>https://theintercept.com/2017/11/05/four-viral-claims-spread-by-journalists-on-twitter-in-the-last-week-alone-that-are-false/</link>
                <comments>https://theintercept.com/2017/11/05/four-viral-claims-spread-by-journalists-on-twitter-in-the-last-week-alone-that-are-false/#comments</comments>
                <pubDate>Sun, 05 Nov 2017 14:30:03 +0000</pubDate>
                                    <dc:creator><![CDATA[Glenn Greenwald]]></dc:creator>
                                		<category><![CDATA[Democrats]]></category>
		<category><![CDATA[Hillary Clinton]]></category>
		<category><![CDATA[Julian Assange]]></category>
		<category><![CDATA[Media critique]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Voices]]></category>
		<category><![CDATA[WikiLeaks]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=155971</guid>
                                    <description><![CDATA[<p>Factually false assertions about Donna Brazile, the DNC, and WikiLeaks documents were widely spread this week by U.S. journalists.</p>
<p>The post <a href="https://theintercept.com/2017/11/05/four-viral-claims-spread-by-journalists-on-twitter-in-the-last-week-alone-that-are-false/">Four Viral Claims Spread by Journalists on Twitter in the Last Week Alone That Are False</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>There is ample</u> talk, particularly of late, about the threats posed by social media to democracy and political discourse. Yet one of the primary ways that democracy is degraded by platforms such as Facebook and Twitter is, for obvious reasons, typically ignored in such discussions: the way they are used by American journalists to endorse factually false claims that quickly spread and become viral, entrenched into narratives, and thus, can never be adequately corrected.</p>
<p>The design of Twitter, where many political journalists spend their time, is in large part responsible for this damage. Its space constraints mean that tweeted headlines or tiny summaries of reporting are often assumed to be true with no critical analysis of their accuracy and are easily spread. Claims from journalists that people want to believe are shared like wildfire, while less popular subsequent corrections or nuanced debunking are easily ignored. Whatever one&#8217;s views are on the actual impact of Twitter Russian bots, surely the propensity of journalistic falsehoods to spread far and wide is at least as significant.</p>
<p>Just in the last week alone, there have been four major factually false claims that have gone viral because journalists on Twitter endorsed and spread them: three about the controversy involving Donna Brazile and the Democratic National Committee, and one about documents and emails published by WikiLeaks during the 2016 campaign. It&#8217;s well worth examining them, both to document what the actual truth is, as well as to understand how often and easily this online journalistic misleading occurs.</p>
<h3>Viral Falsehood #1</h3>
<p><strong>The Clinton/DNC agreement cited by Brazile only applied to the general election, not the primary.</strong></p>
<p>On Wednesday, Politico <a href="https://www.politico.com/magazine/story/2017/11/02/clinton-brazile-hacks-2016-215774">published a blockbuster accusation</a> from Brazile&#8217;s new book: that the DNC had &#8220;rigged&#8221; the 2016 primary election for Hillary Clinton through an agreement that gave Clinton control over key aspects of the DNC, a claim that Sen. Elizabeth Warren, D-Mass., endorsed on CNN. The Clinton camp refused to comment publicly but instead contacted their favorite reporters to publish their response as news.</p>
<p>The following day, NBC <a href="https://www.nbcnews.com/politics/elections/memo-reveals-details-hillary-clinton-dnc-deal-n817411">published an article</a> by Alex Seitz-Wald that recited and endorsed the Clinton camp&#8217;s primary defense: Brazile was wrong because the agreement in question (a copy of which they provided to Seitz-Wald) applied &#8220;only to preparations for the general election&#8221; and had nothing to do with the primary season. That defense, if true, would be fatal to Brazile&#8217;s claims, and so DNC-loyal journalists all over Twitter instantly declared it to be true, thus pronouncing Brazile&#8217;s accusation to have been fully debunked. <a href="https://medium.com/@caityjohnstone/dem-pundits-spent-yesterday-lying-about-dnc-primary-rigging-document-d60019c59c3e">This post</a> documents how quickly this claim was endorsed on Twitter by journalists and Democratic operatives, and how far and wide it therefore spread.</p>
<p>The problem with this claim is that it is blatantly and obviously false. All one has to do to know this is <em>read the agreement</em>. Unlike the journalists spreading this DNC defense, Campaign Legal Center&#8217;s Brendan Fischer bothered to read it, and immediately saw <a href="https://twitter.com/brendan_fischer/status/926640107909713920">and documented</a> how obviously false this claim is:</p>
<!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22540px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 540px;"><!-- CONTENT(photo)[0] --> <a href="https://theintercept.com/wp-content/uploads/2017/11/fischer-1509885375.png"><img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-155984" src="https://theintercept.com/wp-content/uploads/2017/11/fischer-1509885375.png?fit=540%2C99999" alt="" /></a> <!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] -->
<p>The NBC article that was originally used to spread this claim now includes what amounts to a serious walk-back, if not outright retraction, of the DNC&#8217;s principal defense:</p>
<!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22540px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 540px;"><!-- CONTENT(photo)[1] --> <a href="https://theintercept.com/wp-content/uploads/2017/11/stillit-1509884775.png"><img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-155981" src="https://theintercept.com/wp-content/uploads/2017/11/stillit-1509884775.png?fit=540%2C99999" alt="" /></a> <!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] -->
<p>DNC and Clinton allies pointed to the fact that the agreement contained self-justifying lawyer language claiming that it is &#8220;focused exclusively on preparations for the General,&#8221; but, <a href="https://twitter.com/brendan_fischer/status/926641560061726720">as Fischer noted</a>, that passage &#8220;is contradicted by the rest of the agreement.&#8221; This would be like creating a contract to explicitly bribe an elected official (&#8220;A will pay Politician B to vote YES on Bill X&#8221;), then adding a throwaway paragraph with a legalistic disclaimer that &#8220;nothing in this agreement is intended to constitute a bribe,&#8221; and then have journalists cite that paragraph to proclaim that no bribe happened even though the agreement on its face explicitly says the opposite.</p>
<p>The Clinton/DNC agreement explicitly vested the Clinton campaign with control over key matters during the primary season: the exact opposite of what journalists on Twitter caused hundreds of thousands, if not millions, of people to believe. Nonetheless, DNC-loyal commentators continue to cite headlines and tweets citing the legalistic language to convince huge numbers of people that the truth is the exact opposite of what it actually is:</p>
<!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22540px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 540px;"><!-- CONTENT(photo)[2] --> <a href="https://theintercept.com/wp-content/uploads/2017/11/duca-1509885321.png"><img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-155982" src="https://theintercept.com/wp-content/uploads/2017/11/duca-1509885321.png?fit=540%2C99999" alt="" /></a> <!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] -->
<h3>Viral Falsehood #2</h3>
<p><strong>Sanders signed the same agreement with the DNC that Clinton did.</strong></p>
<p>To make the Clinton/DNC agreement appear benign and normal, the claim was quickly and widely circulated that Bernie Sanders had also signed the same agreement with the DNC as Clinton had. This, too, was false &#8212; in the most fundamental way possible.</p>
<p>Simply put, the agreement Sanders signed with the DNC &#8212; which the Sanders camp appears to have provided ABC News in order to debunk the claim &#8212; <em>did not contain any of the provisions vesting control over the DNC</em> that made the Clinton agreement cited by Brazile so controversial. As <a href="http://abcnews.go.com/Politics/sanders-campaign-document-reveals-fundraising-relationship-dnc/story?id=50926505">ABC News put it</a> (emphasis added):</p>
<blockquote><p>A joint fundraising agreement between the Bernie Sanders campaign and the Democratic National Committee &#8212; obtained Friday by ABC News and signed at the start of the primary campaign for the 2016 presidential election &#8212; <strong>does not include any language about coordinating on strategic decisions over hiring or budget, unlike a fundraising memo between the Hillary Clinton team and the DNC.</strong></p></blockquote>
<p>It&#8217;s possible that had Sanders wanted to invoke his funding arrangement with the DNC, and then signed a second agreement, it might have included similar control provisions. But it&#8217;s also possible that it would not have. We&#8217;ll never know, because it never happened. What we actually know for certain &#8212; what exists in reality &#8212; is that Sanders never signed any agreement with the DNC that contained the control provisions that were <a href="http://www.npr.org/2017/11/03/561976645/clinton-campaign-had-additional-signed-agreement-with-dnc-in-2015">given in 2015</a> to the Clinton campaign. In other words, the provisions cited by Brazile in her &#8220;rigging&#8221; allegation did not exist in any contract signed with the DNC by the Sanders campaign.</p>
<p>Needless to say, a tiny fraction of those who were exposed to the original falsehood (Sanders signed the same agreement as Clinton) ended up seeing this fundamental reversal, because the journalists who promoted the original falsehood felt no compunction, as usual, to provide the less pleasing correction.</p>
<h3>Viral Falsehood #3</h3>
<p><strong> Brazile stupidly thought she could unilaterally remove Clinton as the nominee.</strong></p>
<p>Yesterday, the Washington Post published an article reporting on various claims made in Brazile&#8217;s new book. The headline, which <a href="https://twitter.com/washingtonpost/status/926872325655494656">was widely tweeted</a>, made it seem as though Brazile delusionally believed she had a power which, obviously, she did not in fact possess: &#8220;Donna Brazile: I considered replacing Clinton with Biden as 2016 Democratic nominee.&#8221; The article said Brazile considered exercising this power after Clinton&#8217;s fainting spell made her worry that Clinton was physically debilitated, and her campaign was “anemic” and had taken on &#8220;the odor of failure.&#8221;</p>
<p>Brazile &#8212; as a result of her stinging criticisms and accusations of Clinton, Obama, and the DNC &#8212; is currently Public Enemy No. 1 among Democrats in the media. So they seized on this headline to pretend that she claimed the power to <em>unilaterally remove Clinton on a whim</em> and <a href="https://twitter.com/nycsouthpaw/status/926880699671556097">then used</a> this claim <a href="http://talkingpointsmemo.com/edblog/the-dnchfa-agreement-donna-braziles-growing-pile-of-nonsense">to mercilessly vilify her</a> &#8212; the chair of Al Gore&#8217;s 2000 campaign, last year&#8217;s interim head of the DNC, and a long-time Democratic Party operative &#8212; as a deluded, insane, dishonest, profiteering, ignorant fabulist who lacks all credibility.</p>
<p>But the entire attack on Brazile was false. She did not claim, at least according to the Post article being cited, that she had the power to unilaterally remove Clinton. The original Post article, buried deep down in the article, well after the headline, made clear that she was <a href="https://twitter.com/ggreenwald/status/926882388906561536">referencing a complicated process</a> in the DNC charter that allowed for removal of a nominee who had become incapacitated.</p>
<p>The Post then <a href="https://twitter.com/studentactivism/status/926908657786384386">amended its story</a> to reflect that she made no such absurd claim in her book, but rather noted that &#8220;the DNC charter empowered her to initiate replacement of the nominee&#8221; and that &#8220;if a nominee became disabled, she explains, the party chair would oversee a complicated process of filling the vacancy that would include a meeting of the full DNC.&#8221; The Post then added this note to the top of the article:</p>
<!-- BLOCK(photo)[3](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22540px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 540px;"><!-- CONTENT(photo)[3] --> <a href="https://theintercept.com/wp-content/uploads/2017/11/clarifwp-1509888098.png"><img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-155988" src="https://theintercept.com/wp-content/uploads/2017/11/clarifwp-1509888098.png?fit=540%2C99999" alt="" /></a> <!-- END-CONTENT(photo)[3] --></figure><!-- END-BLOCK(photo)[3] -->
<p>Journalists on Twitter spent hours yesterday mocking, maligning, and attacking the reputation of Brazile for a claim that she simply never made &#8212; all because a tweeted headline, which they never bothered to read past or evaluate, made them think they were justified in doing so in order to malign someone who has, quickly and bizarrely, become one of the Democrats&#8217; primary enemies.</p>
<h3>Viral Falsehood #4</h3>
<p><strong>Evidence has emerged proving that the content of WikiLeaks documents and emails was doctored. </strong></p>
<p>Last year, from the time WikiLeaks began publishing emails and documents from the DNC and John Podesta&#8217;s email inbox, Clinton officials and their media supporters have constantly insinuated, and sometimes outright stated, that the WikiLeaks documents were frauds because they had been altered. What was most notable about this accusation was how easily it would have been proven had it really been true. All anyone had to do was show the actual, original email that they sent or received, and then compare it to the altered WikiLeaks version, and that would have been proof that the WikiLeaks archive was unreliable.</p>
<p>But that never happened. Never once did any of the dozens of Democratic Party operatives who sent or received the emails published by WikiLeaks point to a single specific case of an alteration &#8212; something that, <em>obviously,</em> they would have eagerly done had they been able to. As <a href="https://www.politico.com/story/2016/10/wikileaks-russia-hillary-clinton-campaign-democrats-229707">Politico noted</a> last year (emphasis added):</p>
<blockquote><p>Clinton&#8217;s team hasn’t challenged the accuracy of even the most salacious emails released in the past four days, including those featuring aides making snarky references to Catholicism or a Bill Clinton protégé describing Chelsea Clinton as a “spoiled brat.” And numerous digital forensic firms told POLITICO that they haven’t seen any proof of tampering in the emails they’ve examined — adding that<strong> only the hacked Democrats themselves could offer that kind of conclusive evidence.</strong></p></blockquote>
<p>Similarly, when PolitiFact tried last year to fact-check the Clinton campaign&#8217;s claims that the documents were doctored, <a href="http://www.politifact.com/truth-o-meter/article/2016/oct/23/are-clinton-wikileaks-emails-doctored-or-are-they-/">they noted</a>: &#8220;The Clinton campaign, however, has yet to produce any evidence that any specific emails in the latest leak were fraudulent.&#8221;</p>
<p>Nonetheless, the desire to believe this persisted. And this week, Associated Press <a href="https://www.apnews.com/dea73efc01594839957c3c9a6c962b8a">published a report</a> that countless journalists seized upon to claim that proof finally had emerged that the WikiLeaks documents had been altered. The claim in the AP report is incredibly simple and limited. It does not involve any claim that WikiLeaks altered any documents, or that any of the emails it published were frauds; rather, the claim is that Guccifer, on one of the documents that <em>he</em> published, placed a &#8220;confidential&#8221; watermark that did not appear on another version:</p>
<blockquote><p>The <a href="https://guccifer2.wordpress.com/2016/06/15/dnc/">first document</a> Guccifer 2.0 published on June 15 came not from the DNC as advertised but from <a href="https://wikileaks.org/podesta-emails/emailid/26562">Podesta’s inbox</a>, according to a former DNC official who spoke on condition of anonymity because he was not authorized to speak to the press.</p>
<p>The official said the word “CONFIDENTIAL” was not in the <a href="https://wikileaks.org/podesta-emails/fileid/26562/7365">original document</a> .</p>
<p>Guccifer 2.0 had airbrushed it to catch reporters’ attention.</p></blockquote>
<p>There are so many reasons to question whether this actually happened. To begin with, the fact that one version of the document is without a &#8220;confidential&#8221; watermark doesn&#8217;t mean no version has one; it&#8217;s common to add watermarks of that sort for different purposes and different recipients. Moreover, AP&#8217;s only basis is an anonymous source claiming the document had been altered, along with the version that lacks the watermark. This is very far from proof that Guccifer &#8220;airbrushed it to catch reporters’ attention.&#8221;</p>
<p>But let&#8217;s assume for the sake of argument that Guccifer did, in fact, add a &#8220;confidential&#8221; watermark to this document to entice journalists to view the document as more appetizing. This does not remotely justify the claim that any of the documents and emails published <em>by WikiLeaks </em>were materially altered and were thus unreliable.</p>
<p>First, Guccifer adding a watermark to a document he circulated does not mean that any of the emails published <em>by WikiLeaks</em> in its archive was altered. It&#8217;s <a href="http://www.politifact.com/truth-o-meter/article/2016/oct/23/are-clinton-wikileaks-emails-doctored-or-are-they-/">long been known</a> that Guccifer <a href="https://twitter.com/pwnallthethings/status/927004972503437312">altered the documents&#8217; metadata</a> to hide its path, but nobody ever tried to cite that as proof that anything published by WikiLeaks was fraudulent (indeed, PolitiFact cited Guccifer&#8217;s alteration of metadata when concluding there was no evidence that the WikiLeaks documents themselves had been altered).</p>
<p>Second, this has no bearing on the <i>content</i> of the emails or documents themselves published by WikiLeaks, which, to date, nobody has demonstrated have been altered in the slightest. Third, if it were the case that any of the emails or documents published by WikiLeaks were fraudulent, it would still be incredibly easy to prove: All anyone would have to do is produce the original and show how the WikiLeaks version was altered. Why &#8212; a full year after WikiLeaks began publishing these documents &#8212; has nobody done this, despite the overwhelming incentive that exists to expose this?</p>
<p>In sum, evidence that the content of any of the WikiLeaks emails was altered is nonexistent, while there is overwhelming reason to believe none has been (beginning with the fact that, as easy it would be to do so, no proof has been provided after all this time). Nonetheless, as a result of journalists&#8217; conduct on Twitter this week, the false claim that emails and documents in the WikiLeaks archive were proven to be altered is now viral and will remain fixed in people&#8217;s belief system forever:</p>
<!-- BLOCK(photo)[4](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22540px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 540px;"><!-- CONTENT(photo)[4] --> <a href="https://theintercept.com/wp-content/uploads/2017/11/brianwiki-1509890743.png"><img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-155994" src="https://theintercept.com/wp-content/uploads/2017/11/brianwiki-1509890743.png?fit=540%2C99999" alt="" /></a> <!-- END-CONTENT(photo)[4] --></figure><!-- END-BLOCK(photo)[4] -->
<p>There&#8217;s no way to prove the negative, that no emails or documents published by WikiLeaks were altered. But one should demand actual evidence before affirming this claim. And despite the ease of providing that proof, and the long period of time that has elapsed, none has been provided. But, unsurprisingly, that did not stop the claim that it had been proven from going viral this week on Twitter &#8212; all based on the tenuous claim that Guccifer added a &#8220;confidential&#8221; watermark to one of the documents he circulated.</p>
<p>It can certainly be menacing for Russian bots to disseminate divisive messaging on Twitter. But it&#8217;s at least equally menacing if journalists with the loudest claim to authoritative credibility are using that platform constantly to entrench falsehoods in the public&#8217;s mind.</p>
<p>The post <a href="https://theintercept.com/2017/11/05/four-viral-claims-spread-by-journalists-on-twitter-in-the-last-week-alone-that-are-false/">Four Viral Claims Spread by Journalists on Twitter in the Last Week Alone That Are False</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2017/11/05/four-viral-claims-spread-by-journalists-on-twitter-in-the-last-week-alone-that-are-false/feed/</wfw:commentRss>
                <slash:comments>570</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2017/11/AP_16279019236818-1509892305.jpg?fit=2922%2C1947' width='2922' height='1947' /><post-id xmlns="com-wordpress:feed-additions:1">155971</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/11/fischer-1509885375.png?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2017/11/fischer-1509885375.png?fit=603%2C612" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/11/fischer-1509885375.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/11/stillit-1509884775.png?fit=613%2C216" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/11/stillit-1509884775.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/11/duca-1509885321.png?fit=608%2C497" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/11/duca-1509885321.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/11/clarifwp-1509888098.png?fit=748%2C116" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/11/clarifwp-1509888098.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/11/brianwiki-1509890743.png?fit=604%2C506" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/11/brianwiki-1509890743.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[What Julian Assange's War on Hillary Clinton Says About WikiLeaks]]></title>
                <link>https://theintercept.com/2016/08/06/accusing-wikileaks-bias-beside-point/</link>
                <comments>https://theintercept.com/2016/08/06/accusing-wikileaks-bias-beside-point/#comments</comments>
                <pubDate>Sat, 06 Aug 2016 19:04:25 +0000</pubDate>
                                    <dc:creator><![CDATA[Robert Mackey]]></dc:creator>
                                		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Hillary Clinton]]></category>
		<category><![CDATA[Julian Assange]]></category>
		<category><![CDATA[Robert Mackey]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Transparency]]></category>
		<category><![CDATA[WikiLeaks]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=77366</guid>
                                    <description><![CDATA[<p>Assange’s project has always been about opposition research. WikiLeaks exists to find dirt in the servers of the powerful and bring them down by exposing it.</p>
<p>The post <a href="https://theintercept.com/2016/08/06/accusing-wikileaks-bias-beside-point/">What Julian Assange&#8217;s War on Hillary Clinton Says About WikiLeaks</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>In recent months</u>, the <a href="https://twitter.com/wikileaks">WikiLeaks Twitter feed</a> has started to look more like the stream of an opposition research firm working mainly to undermine Hillary Clinton than the updates of a non-partisan platform for whistleblowers.</p>
<p><!-- BLOCK(oembed)[0](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EClinton%20celebrates%20her%20role%20in%20killing%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fhashtag%5C%2FLibya%3Fsrc%3Dhash%26amp%3Bref_src%3Dtwsrc%255Etfw%5C%22%3E%23Libya%3C%5C%2Fa%3E%26%2339%3Bs%20head%20of%20state%20which%20led%20to%20ISIS%20takeover%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2FE2oAtKJ4ei%5C%22%3Ehttps%3A%5C%2F%5C%2Ft.co%5C%2FE2oAtKJ4ei%3C%5C%2Fa%3E%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2F6ESnLhsQtV%5C%22%3Epic.twitter.com%5C%2F6ESnLhsQtV%3C%5C%2Fa%3E%3C%5C%2Fp%3E%26mdash%3B%20WikiLeaks%20%28%40wikileaks%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F760225209358114816%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EAugust%201%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F760225209358114816%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Clinton celebrates her role in killing <a href="https://twitter.com/hashtag/Libya?src=hash&amp;ref_src=twsrc%5Etfw">#Libya</a>&#39;s head of state which led to ISIS takeover <a href="https://t.co/E2oAtKJ4ei">https://t.co/E2oAtKJ4ei</a> <a href="https://t.co/6ESnLhsQtV">pic.twitter.com/6ESnLhsQtV</a></p>
<p>&mdash; WikiLeaks (@wikileaks) <a href="https://twitter.com/wikileaks/status/760225209358114816?ref_src=twsrc%5Etfw">August 1, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[0] --></p>
<p><!-- BLOCK(oembed)[1](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EDoes%20%26quot%3BBoard%20after%20party%26quot%3B%20image%20illustrate%20HRC%26%2339%3Bs%20poor%20WikiLeaks%20poll%20results--entitled%2C%20uncool%20and%20unaware%20of%20it%3F%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2Fht01ZlP8Z0%5C%22%3Epic.twitter.com%5C%2Fht01ZlP8Z0%3C%5C%2Fa%3E%3C%5C%2Fp%3E%26mdash%3B%20WikiLeaks%20%28%40wikileaks%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F759403029519015936%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2030%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F759403029519015936%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Does &quot;Board after party&quot; image illustrate HRC&#39;s poor WikiLeaks poll results&#8211;entitled, uncool and unaware of it? <a href="https://t.co/ht01ZlP8Z0">pic.twitter.com/ht01ZlP8Z0</a></p>
<p>&mdash; WikiLeaks (@wikileaks) <a href="https://twitter.com/wikileaks/status/759403029519015936?ref_src=twsrc%5Etfw">July 30, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[1] --></p>
<p><!-- BLOCK(oembed)[2](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EUS%20poll%3A%20Who%20will%20you%20vote%20to%20become%20President%3F%3C%5C%2Fp%3E%26mdash%3B%20WikiLeaks%20%28%40wikileaks%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F758855786806190080%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2029%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F758855786806190080%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">US poll: Who will you vote to become President?</p>
<p>&mdash; WikiLeaks (@wikileaks) <a href="https://twitter.com/wikileaks/status/758855786806190080?ref_src=twsrc%5Etfw">July 29, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[2] --></p>
<p><!-- BLOCK(oembed)[3](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EBernie%20Sanders%20Delegates%20drop%20this%20Wikileaks%20Banner%20as%20Hillary%20Clinton%20speaks%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fhashtag%5C%2FDNCinPHL%3Fsrc%3Dhash%26amp%3Bref_src%3Dtwsrc%255Etfw%5C%22%3E%23DNCinPHL%3C%5C%2Fa%3E%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fhashtag%5C%2FDNCLeak%3Fsrc%3Dhash%26amp%3Bref_src%3Dtwsrc%255Etfw%5C%22%3E%23DNCLeak%3C%5C%2Fa%3E%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fhashtag%5C%2FFeelTheBern%3Fsrc%3Dhash%26amp%3Bref_src%3Dtwsrc%255Etfw%5C%22%3E%23FeelTheBern%3C%5C%2Fa%3E%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2FoVGkQIc4Qu%5C%22%3Epic.twitter.com%5C%2FoVGkQIc4Qu%3C%5C%2Fa%3E%3C%5C%2Fp%3E%26mdash%3B%20WikiLeaks%20%28%40wikileaks%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F758862427840614400%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2029%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F758862427840614400%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Bernie Sanders Delegates drop this Wikileaks Banner as Hillary Clinton speaks <a href="https://twitter.com/hashtag/DNCinPHL?src=hash&amp;ref_src=twsrc%5Etfw">#DNCinPHL</a> <a href="https://twitter.com/hashtag/DNCLeak?src=hash&amp;ref_src=twsrc%5Etfw">#DNCLeak</a> <a href="https://twitter.com/hashtag/FeelTheBern?src=hash&amp;ref_src=twsrc%5Etfw">#FeelTheBern</a> <a href="https://t.co/oVGkQIc4Qu">pic.twitter.com/oVGkQIc4Qu</a></p>
<p>&mdash; WikiLeaks (@wikileaks) <a href="https://twitter.com/wikileaks/status/758862427840614400?ref_src=twsrc%5Etfw">July 29, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[3] --></p>
<p><!-- BLOCK(oembed)[4](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EPoll%20of%20polls%3A%20Trump%20now%20favored%20to%20win%20election%20after%20Democrats%20nominate%20Hillary%20Clinton%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fhashtag%5C%2FDNCLeak%3Fsrc%3Dhash%26amp%3Bref_src%3Dtwsrc%255Etfw%5C%22%3E%23DNCLeak%3C%5C%2Fa%3E%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2FDOooNoC7hO%5C%22%3Ehttps%3A%5C%2F%5C%2Ft.co%5C%2FDOooNoC7hO%3C%5C%2Fa%3E%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fhashtag%5C%2FDNCinPHL%3Fsrc%3Dhash%26amp%3Bref_src%3Dtwsrc%255Etfw%5C%22%3E%23DNCinPHL%3C%5C%2Fa%3E%3C%5C%2Fp%3E%26mdash%3B%20WikiLeaks%20%28%40wikileaks%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F758848427983634432%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2029%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F758848427983634432%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Poll of polls: Trump now favored to win election after Democrats nominate Hillary Clinton <a href="https://twitter.com/hashtag/DNCLeak?src=hash&amp;ref_src=twsrc%5Etfw">#DNCLeak</a> <a href="https://t.co/DOooNoC7hO">https://t.co/DOooNoC7hO</a> <a href="https://twitter.com/hashtag/DNCinPHL?src=hash&amp;ref_src=twsrc%5Etfw">#DNCinPHL</a></p>
<p>&mdash; WikiLeaks (@wikileaks) <a href="https://twitter.com/wikileaks/status/758848427983634432?ref_src=twsrc%5Etfw">July 29, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[4] --></p>
<p><!-- BLOCK(oembed)[5](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EAudience%20at%20DNC%20turns%20on%20Bernie%20Sanders%20after%20he%20says%20%26quot%3Bwe%20must%20elect%20Hillary%20Clinton%26quot%3B%20following%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fhashtag%5C%2FDNCLeak%3Fsrc%3Dhash%26amp%3Bref_src%3Dtwsrc%255Etfw%5C%22%3E%23DNCLeak%3C%5C%2Fa%3E%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2FyJszgko2XK%5C%22%3Ehttps%3A%5C%2F%5C%2Ft.co%5C%2FyJszgko2XK%3C%5C%2Fa%3E%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fhashtag%5C%2FDNCinPHL%3Fsrc%3Dhash%26amp%3Bref_src%3Dtwsrc%255Etfw%5C%22%3E%23DNCinPHL%3C%5C%2Fa%3E%3C%5C%2Fp%3E%26mdash%3B%20WikiLeaks%20%28%40wikileaks%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F757632872111104000%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2025%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F757632872111104000%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Audience at DNC turns on Bernie Sanders after he says &quot;we must elect Hillary Clinton&quot; following <a href="https://twitter.com/hashtag/DNCLeak?src=hash&amp;ref_src=twsrc%5Etfw">#DNCLeak</a> <a href="https://t.co/yJszgko2XK">https://t.co/yJszgko2XK</a> <a href="https://twitter.com/hashtag/DNCinPHL?src=hash&amp;ref_src=twsrc%5Etfw">#DNCinPHL</a></p>
<p>&mdash; WikiLeaks (@wikileaks) <a href="https://twitter.com/wikileaks/status/757632872111104000?ref_src=twsrc%5Etfw">July 25, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[5] --></p>
<p><!-- BLOCK(oembed)[6](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EHillary%20Clinton%26%2339%3Bs%20showy%20rewarding%20of%20corruption%20by%20DWS%20is%20an%20ill%20wind%20for%20the%20corruption-overton-window%20of%20a%20future%20presidency.%3C%5C%2Fp%3E%26mdash%3B%20WikiLeaks%20%28%40wikileaks%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F757319397329559552%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2024%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F757319397329559552%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Hillary Clinton&#39;s showy rewarding of corruption by DWS is an ill wind for the corruption-overton-window of a future presidency.</p>
<p>&mdash; WikiLeaks (@wikileaks) <a href="https://twitter.com/wikileaks/status/757319397329559552?ref_src=twsrc%5Etfw">July 24, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[6] --></p>
<p><!-- BLOCK(oembed)[7](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EHillary%20Clinton%20has%20stolen%20our%20innovative%20WikiLeaks%20twitter%20logo%20design.%20Compare%3A%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%3Fref_src%3Dtwsrc%255Etfw%5C%22%3E%40WikiLeaks%3C%5C%2Fa%3E%20vs%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FHillaryClinton%3Fref_src%3Dtwsrc%255Etfw%5C%22%3E%40HillaryClinton%3C%5C%2Fa%3E%20%3Ca%20href%3D%5C%22http%3A%5C%2F%5C%2Ft.co%5C%2Fmifka4mXf4%5C%22%3Epic.twitter.com%5C%2Fmifka4mXf4%3C%5C%2Fa%3E%3C%5C%2Fp%3E%26mdash%3B%20WikiLeaks%20%28%40wikileaks%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F587354526857957376%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EApril%2012%2C%202015%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F587354526857957376%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Hillary Clinton has stolen our innovative WikiLeaks twitter logo design. Compare: <a href="https://twitter.com/wikileaks?ref_src=twsrc%5Etfw">@WikiLeaks</a> vs <a href="https://twitter.com/HillaryClinton?ref_src=twsrc%5Etfw">@HillaryClinton</a> <a href="http://t.co/mifka4mXf4">pic.twitter.com/mifka4mXf4</a></p>
<p>&mdash; WikiLeaks (@wikileaks) <a href="https://twitter.com/wikileaks/status/587354526857957376?ref_src=twsrc%5Etfw">April 12, 2015</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[7] --></p>
<p>This has puzzled some of the group&#8217;s supporters, and led to speculation that the site&#8217;s Australian founder, Julian Assange, had <a href="http://www.nytimes.com/2016/07/27/us/politics/assange-timed-wikileaks-release-of-democratic-emails-to-harm-hillary-clinton.html">timed the release</a> of emails hacked from the servers of the Democratic National Committee to drive a wedge between supporters of Sen. Bernie Sanders and Hillary Clinton. The publication of emails that <a href="https://theintercept.com/2016/07/22/new-leak-top-dnc-official-wanted-to-use-bernie-sanderss-religious-beliefs-against-him/">revealed an anti-Sanders agenda</a> inside the Democratic party was certainly welcomed by the Republican nominee, Donald Trump.</p>
<p><!-- BLOCK(oembed)[8](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EThe%20Wikileaks%20e-mail%20release%20today%20was%20so%20bad%20to%20Sanders%20that%20it%20will%20make%20it%20impossible%20for%20him%20to%20support%20her%2C%20unless%20he%20is%20a%20fraud%21%3C%5C%2Fp%3E%26mdash%3B%20Donald%20J.%20Trump%20%28%40realDonaldTrump%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FrealDonaldTrump%5C%2Fstatus%5C%2F756962332228612096%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2023%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FrealDonaldTrump%5C%2Fstatus%5C%2F756962332228612096%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">The Wikileaks e-mail release today was so bad to Sanders that it will make it impossible for him to support her, unless he is a fraud!</p>
<p>&mdash; Donald J. Trump (@realDonaldTrump) <a href="https://twitter.com/realDonaldTrump/status/756962332228612096?ref_src=twsrc%5Etfw">July 23, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[8] --></p>
<p><!-- BLOCK(oembed)[9](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EThat%20is%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2FkpFxYDoNyX%5C%22%3Ehttps%3A%5C%2F%5C%2Ft.co%5C%2FkpFxYDoNyX%3C%5C%2Fa%3E%20--%20everyone%20can%20see%20for%20themselves.%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2FJBEoTSZocO%5C%22%3Epic.twitter.com%5C%2FJBEoTSZocO%3C%5C%2Fa%3E%3C%5C%2Fp%3E%26mdash%3B%20WikiLeaks%20%28%40wikileaks%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F756852586645426176%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2023%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F756852586645426176%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">That is <a href="https://t.co/kpFxYDoNyX">https://t.co/kpFxYDoNyX</a> &#8212; everyone can see for themselves. <a href="https://t.co/JBEoTSZocO">pic.twitter.com/JBEoTSZocO</a></p>
<p>&mdash; WikiLeaks (@wikileaks) <a href="https://twitter.com/wikileaks/status/756852586645426176?ref_src=twsrc%5Etfw">July 23, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[9] --></p>
<p>But it should come as no surprise to anyone who looks back at the founding principles of WikiLeaks that Assange — who has clearly stated <a href="https://youtu.be/34giUftE7BI?t=6m13s">his distaste</a> for the idea of the former secretary of state becoming president — would make aggressive use of leaked documents to try to undermine her.</p>
<p>As Raffi Khatchadourian explained in <a href="http://www.newyorker.com/magazine/2010/06/07/no-secrets">a <em>New Yorker</em> profile</a> of the WikiLeaks founder in 2010, &#8220;Assange, despite his claims to scientific journalism, emphasized to me that his mission is to expose injustice, not to provide an even-handed record of events.&#8221; To Assange, Khatchadourian wrote, &#8220;Leaks were an instrument of information warfare.&#8221;</p>
<p>In other words, Assange’s project has been from the start more like opposition research than dispassionate reporting. His goal is to find dirt in the servers of powerful individuals or organizations he sees as corrupt or dangerous, and bring them down by exposing it. As he memorably <a href="http://www.commondreams.org/news/2010/07/26/wikileaks-founder-julian-assange-war-logs-i-enjoy-crushing-bastards">told <em>Der Spiegel</em></a> in 2010, “I enjoy crushing bastards.&#8221;</p>
<p>His recent focus on &#8220;crushing&#8221; Clinton but not Trump has led some to ask Assange if he is worried about helping to elect someone who might be even more hostile to him — let alone to the causes of justice and peace that have motivated Wikileaks&#8217; previous disclosures. Asked recently by Amy Goodman of &#8220;Democracy Now&#8221; if he does prefer Trump over Clinton, <a href="https://youtu.be/f_3Rv-M1nIU?t=45s">Assange replied</a>, &#8220;You’re asking me, do I prefer cholera or gonorrhea?&#8221;</p>
<p>Speaking to Bill Maher on Friday night from the Ecuadorian Embassy in London, where he has been <a href="https://www.theguardian.com/media/2016/jun/19/angry-julian-assange-starts-fifth-year-living-in-ecuadors-london-embassy">effectively confined</a> for more than four years, Assange <a href="https://twitter.com/wikileaks/status/761937233356128256">joked about</a> hacking Trump&#8217;s tax returns, <a href="https://youtu.be/5-EJAIXdGp8">but added</a>, &#8220;from the perspective of WikiLeaks trying to protect its sources, you have really two very bad presidential candidates.&#8221;</p>
<p>In an address to the American Green Party convention on Saturday, Assange reiterated that both major party candidates for the presidency were &#8220;horrific,&#8221; but argued that &#8220;it certainly doesn&#8217;t make as much difference as people say,&#8221; which of them gets elected. What is important, he said, is to build political pressure &#8220;to discipline and hold to account and check the abuses of power during the next four years.&#8221;</p>
<p><!-- BLOCK(oembed)[10](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EStanding%20ovation%20for%20Julian%20Assange%20of%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%3Fref_src%3Dtwsrc%255Etfw%5C%22%3E%40wikileaks%3C%5C%2Fa%3E%20at%20the%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fhashtag%5C%2FGNCinHOU%3Fsrc%3Dhash%26amp%3Bref_src%3Dtwsrc%255Etfw%5C%22%3E%23GNCinHOU%3C%5C%2Fa%3E%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2FduXmSrAFF3%5C%22%3Epic.twitter.com%5C%2FduXmSrAFF3%3C%5C%2Fa%3E%3C%5C%2Fp%3E%26mdash%3B%20Green%20Party%20of%20MN%20%3F%20%28%40MnGreens%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FMnGreens%5C%2Fstatus%5C%2F761974990346399745%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EAugust%206%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FMnGreens%5C%2Fstatus%5C%2F761974990346399745%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Standing ovation for Julian Assange of <a href="https://twitter.com/wikileaks?ref_src=twsrc%5Etfw">@wikileaks</a> at the <a href="https://twitter.com/hashtag/GNCinHOU?src=hash&amp;ref_src=twsrc%5Etfw">#GNCinHOU</a> <a href="https://t.co/duXmSrAFF3">pic.twitter.com/duXmSrAFF3</a></p>
<p>&mdash; Green Party of MN ? (@MnGreens) <a href="https://twitter.com/MnGreens/status/761974990346399745?ref_src=twsrc%5Etfw">August 6, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[10] --></p>
<p>To better understand Assange&#8217;s recent intervention in the U.S. election, it helps to look more closely at a sort of manifesto he wrote as he was creating WikiLeaks. The same month that <a href="https://wikileaks.org/">WikiLeaks.org</a> went live, in December of 2006, Assange posted an essay on his blog, &#8220;<a href="https://cryptome.org/0002/ja-conspiracies.pdf">Conspiracy as Governance</a>,&#8221; in which he explained his theory that authoritarian regimes — and western political parties — maintain power by conspiring to keep the public in the dark, through &#8220;collaborative secrecy, working to the detriment of a population.&#8221; In order for the people to regain control of the political system, Assange argued, it is necessary to find ways of &#8220;throttling the conspiracy,&#8221; like disrupting the ability of the conspirators to communicate secretly.</p>
<p>With that in mind, Assange wrote, &#8220;let us consider two closely balanced and broadly conspiratorial power groupings, the US Democratic and Republican parties.&#8221; He continued, &#8220;Consider what would happen if one of these parties gave up their mobile phones, fax and email correspondence — let alone the computer systems which manage their subscribers, donors, budgets, polling, call centres and direct mail campaigns? They would immediately fall into an organisational stupor and lose to the other.&#8221;</p>
<p>A decade later, by releasing thousands of unredacted emails and voice-mail messages hacked from the Democratic Party — in <a href="https://wikileaks.org/dnc-emails/">a database</a> that makes it easy to search for the social security numbers of donors, as well as their passport and credit card details — Assange was finally able to put his theory into practice, by attempting to throttle one of the &#8220;conspiratorial power groupings&#8221; that selects candidates to run the U.S. government.</p>
<p>Assange&#8217;s attack on the DNC certainly revealed hypocrisy within the party, and led to <a href="http://www.nytimes.com/2016/08/03/us/politics/dnc-email-hack-hillary-clinton-bernie-sanders.html">the resignations of four senior officials</a>, but his decision to not redact personal information from those documents — or from a second cache of emails hacked from a Turkish political party — also led to criticism from some longtime supporters, including <a href="https://twitter.com/Snowden/status/758759203037151232">Edward Snowden</a>, the NSA whistleblower.</p>
<p><!-- BLOCK(oembed)[11](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EDemocratizing%20information%20has%20never%20been%20more%20vital%2C%20and%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%3Fref_src%3Dtwsrc%255Etfw%5C%22%3E%40Wikileaks%3C%5C%2Fa%3E%20has%20helped.%20But%20their%20hostility%20to%20even%20modest%20curation%20is%20a%20mistake.%3C%5C%2Fp%3E%26mdash%3B%20Edward%20Snowden%20%28%40Snowden%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FSnowden%5C%2Fstatus%5C%2F758759203037151232%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2028%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FSnowden%5C%2Fstatus%5C%2F758759203037151232%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Democratizing information has never been more vital, and <a href="https://twitter.com/wikileaks?ref_src=twsrc%5Etfw">@Wikileaks</a> has helped. But their hostility to even modest curation is a mistake.</p>
<p>&mdash; Edward Snowden (@Snowden) <a href="https://twitter.com/Snowden/status/758759203037151232?ref_src=twsrc%5Etfw">July 28, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[11] --></p>
<p>My colleague Glenn Greenwald also <a href="http://www.slate.com/articles/news_and_politics/interrogation/2016/07/glenn_greenwald_on_donald_trump_the_dnc_hack_and_a_new_mccarthyism.html">told Slate</a> last week that he was troubled by the fact that WikiLeaks had abandoned its previous policy of redaction. &#8220;There were tons of redactions when they were releasing Pentagon documents about the Afghanistan and Iraq wars,&#8221; he noted. &#8220;And they even wrote <a href="http://documents.nytimes.com/letters-between-wikileaks-and-gov">a letter to the State Department</a> before they released the cables requesting the State Department’s help in figuring out which information ought to be withheld.&#8221;</p>
<p>Although Assange has spoken of the dumping of &#8220;pristine,&#8221; unedited documents as a philosophical principle — and his biographer Andrew O&#8217;Hagan <a href="http://www.lrb.co.uk/v36/n05/andrew-ohagan/ghosting">reported</a> that the collapse of his working relationship with the editors of the <em>New York Times</em> and the <em>Guardian</em> was partly fueled by disagreements about redaction — it seems possible that the intense pressure on the organization has also made it nearly impossible to carry out careful editing of every document it obtains. Assange continues to be confined to Ecuador&#8217;s embassy in London — which has been described as illegal, “arbitrary detention” <a href="https://www.theguardian.com/media/2016/feb/04/julian-assange-wikileaks-arrest-friday-un-investigation">by a United Nations panel</a> — and Sarah Harrison, who was the site&#8217;s investigations editor, has chosen to live in exile in Berlin since helping Snowden get from Hong Kong to Russia, <a href="https://wikileaks.org/Statement-by-Sarah-Harrison-on.html">heeding legal advice</a> that she could face prosecution if she tried to return to Britain.</p>
<p>Whatever the reason, it is difficult to see a public-interest argument for making public some of what was contained in the DNC files. One of the voice-mail recordings, for instance, was <a href="http://www.theregister.co.uk/2016/07/28/exclusive_transcript_wikileaks_reveals_ass_call_from_a_zoo/">a conversation between a staffer and his young child</a> during a visit to a zoo, which appears to have been left by accident, following a pocket-dial. The staffer&#8217;s phone number was made available, much to the delight of some Trump supporters.</p>
<p>https://twitter.com/dileximan/status/759183261251665921</p>
<p>As the Turkish scholar <a href="http://www.huffingtonpost.com/zeynep-tufekci/wikileaks-erdogan-emails_b_11158792.html">Zeynep Tufekci explained</a> in the <em>Huffington Post</em>, a trove of Turkish-language emails WikiLeaks released last month, inaccurately presented as private messages from members of Turkey’s ruling party, the AKP, also included little of public interest but did reveal the private information of ordinary citizens.</p>
<p><!-- BLOCK(oembed)[12](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22und%5C%22%20dir%3D%5C%22ltr%5C%22%3ERELEASE%3A%20294%2C548%20emails%20from%20Turkey%26%2339%3Bs%20ruling%20political%20party%2C%20Erdo%3Fan%26%2339%3Bs%20AKP%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fhashtag%5C%2FAKPemails%3Fsrc%3Dhash%26amp%3Bref_src%3Dtwsrc%255Etfw%5C%22%3E%23AKPemails%3C%5C%2Fa%3E%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2F1Yof7YZpH7%5C%22%3Ehttps%3A%5C%2F%5C%2Ft.co%5C%2F1Yof7YZpH7%3C%5C%2Fa%3E%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2FGGzGS8oUrY%5C%22%3Epic.twitter.com%5C%2FGGzGS8oUrY%3C%5C%2Fa%3E%3C%5C%2Fp%3E%26mdash%3B%20WikiLeaks%20%28%40wikileaks%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F755500104543526912%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2019%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F755500104543526912%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="und" dir="ltr">RELEASE: 294,548 emails from Turkey&#39;s ruling political party, Erdo?an&#39;s AKP <a href="https://twitter.com/hashtag/AKPemails?src=hash&amp;ref_src=twsrc%5Etfw">#AKPemails</a> <a href="https://t.co/1Yof7YZpH7">https://t.co/1Yof7YZpH7</a> <a href="https://t.co/GGzGS8oUrY">pic.twitter.com/GGzGS8oUrY</a></p>
<p>&mdash; WikiLeaks (@wikileaks) <a href="https://twitter.com/wikileaks/status/755500104543526912?ref_src=twsrc%5Etfw">July 19, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[12] --></p>
<p>To make matters worse, the WikiLeaks Twitter feed also shared a link to another cache of hacked Turkish documents that included home addresses or phone numbers for every female voter in 79 of Turkey’s 81 provinces.</p>
<p><!-- BLOCK(oembed)[13](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EYou%20know%20the%20safety%2C%20privacy%20and%20misrepresentation%20of%20millions%20of%20people%20in%20other%20countries%20MATTERS%20too%3F%20Maybe%20not%20to%20Wikileaks%2C%20but%20to%20us%3F%3C%5C%2Fp%3E%26mdash%3B%20zeynep%20tufekci%20%28%40zeynep%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fzeynep%5C%2Fstatus%5C%2F760135784955600896%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EAugust%201%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fzeynep%5C%2Fstatus%5C%2F760135784955600896%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">You know the safety, privacy and misrepresentation of millions of people in other countries MATTERS too? Maybe not to Wikileaks, but to us?</p>
<p>&mdash; zeynep tufekci (@zeynep) <a href="https://twitter.com/zeynep/status/760135784955600896?ref_src=twsrc%5Etfw">August 1, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[13] --></p>
<p>Unfortunately, for believers in the WikiLeaks project, Assange has responded to criticism of his redaction-free document dumps by attacking even longtime supporters who have spoken out. The <a href="https://twitter.com/wikileaks">@wikiLeaks</a> Twitter account the site&#8217;s founder uses to annotate documents and rebut critics replied angrily to Snowden&#8217;s message about the desirability of some sort of selective editing, accusing the NSA whistleblower whom Assange helped get asylum in Russia of angling for a pardon from Clinton.</p>
<p><!-- BLOCK(oembed)[14](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EOpportunism%20won%26%2339%3Bt%20earn%20you%20a%20pardon%20from%20Clinton%20%26amp%3B%20curation%20is%20not%20censorship%20of%20ruling%20party%20cash%20flows%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2F4FeygfPynk%5C%22%3Ehttps%3A%5C%2F%5C%2Ft.co%5C%2F4FeygfPynk%3C%5C%2Fa%3E%3C%5C%2Fp%3E%26mdash%3B%20WikiLeaks%20%28%40wikileaks%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F758781081072046080%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2028%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F758781081072046080%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Opportunism won&#39;t earn you a pardon from Clinton &amp; curation is not censorship of ruling party cash flows <a href="https://t.co/4FeygfPynk">https://t.co/4FeygfPynk</a></p>
<p>&mdash; WikiLeaks (@wikileaks) <a href="https://twitter.com/wikileaks/status/758781081072046080?ref_src=twsrc%5Etfw">July 28, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[14] --></p>
<p>WikiLeaks also <a href="https://twitter.com/zeynep/status/757676431396732928">suggested</a>, wrongly, that Tufekci is an &#8220;apologist&#8221; for Turkey’s president, Recep Tayyip Erdogan — a leader she has, in fact, frequently criticized for his opposition to internet freedom.</p>
<p><!-- BLOCK(oembed)[15](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EI%20am%20...%20printing%20this%20one%20and%20putting%20in%20my%20wallet%20next%20time%20I%26%2339%3Bm%20in%20Turkey.%20%26quot%3BHi%2C%20I%26%2339%3Bm%20an%20Erdogan%20apologist.%26quot%3B%20%20%3F%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2FmduPcb9qlV%5C%22%3Epic.twitter.com%5C%2FmduPcb9qlV%3C%5C%2Fa%3E%3C%5C%2Fp%3E%26mdash%3B%20zeynep%20tufekci%20%28%40zeynep%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fzeynep%5C%2Fstatus%5C%2F757676431396732928%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2025%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fzeynep%5C%2Fstatus%5C%2F757676431396732928%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">I am &#8230; printing this one and putting in my wallet next time I&#39;m in Turkey. &quot;Hi, I&#39;m an Erdogan apologist.&quot;  ? <a href="https://t.co/mduPcb9qlV">pic.twitter.com/mduPcb9qlV</a></p>
<p>&mdash; zeynep tufekci (@zeynep) <a href="https://twitter.com/zeynep/status/757676431396732928?ref_src=twsrc%5Etfw">July 25, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[15] --></p>
<p>Of course, Assange is hardly alone in being quick to denounce his critics on Twitter, but the way in which he uses the @wikileaks account these days matters to the overall functioning of the organization because it is the only obvious way for outsiders to provide feedback on the annotation or analysis of the documents. Despite the site&#8217;s name, WikiLeaks never developed into a Wikipedia-like website that welcomes, or facilitates crowd-sourced annotation and vetting of the documents it obtains. If you spot an error on Wikipedia, you can fix it, but WikiLeaks does not allow for that kind of collaborative fact-checking.</p>
<p>That the site was originally intended to function more like a crowd-sourced, wiki platform was suggested by the <a href="https://wikileaks.org/wiki/Inside_Somalia_and_the_Union_of_Islamic_Courts">Wikipedia-like annotation</a> that accompanied the very first document uploaded by WikiLeaks in 2006. (Although it was described as a &#8220;leak,&#8221; that document &#8212; an order from an Islamist rebel leader in Somalia that the site&#8217;s editors could not verify as authentic &#8212; was not provided by a whistleblower, but <a href="https://www.wired.com/2010/06/wikileaks-documents/">stolen from Chinese hackers</a> by a WikiLeaks activist who intercepted traffic flowing through a Tor network server he owned.)</p>
<p>Since the crowd-sourced aspect of WikiLeaks proved difficult to implement, and the site no longer relies mainly on collaborations with news organizations to vet and make sense of the vast troves of documents it obtains, Assange has, over time, taken on the role of the organization&#8217;s main analyst. Before the advent of Twitter, analysis and annotation written by Assange and his volunteers filled <a href="https://wikileaks.org/wiki/Category:Analyses">a section of the WikiLeaks website</a>. Lately, though, most of the interpretation of the documents has been done only in short bursts on the WikiLeaks Twitter feed, where the site&#8217;s founder draws attention to items he thinks are important, and tries to provide some context and analysis.</p>
<p>The micro-blogging format has obvious limits, however, when it comes to making complex annotations. The generally hostile tone of the WikiLeaks Twitter feed in response to even well-intentioned efforts to fact-check the group&#8217;s work has also severely hampered the project&#8217;s ability to use crowd-sourcing to properly annotate and vet the documents it posts. (I know this from first-hand experience, having been denounced by @wikileaks last month for <a href="https://theintercept.com/2016/07/26/russian-intelligence-hack-dnc-nsa-know-snowden-says/">pointing to a factual error</a> in one of the group&#8217;s tweets about a DNC email.)</p>
<p>This criticism might seem like a narrow, technical objection — and it is certainly the case that journalists independently continue to help verify and interpret the most significant documents Assange publishes — but WikiLeaks&#8217; lack of scrutiny of the documents it obtains, and its founder&#8217;s hostility to constructive criticism from outsiders, could be a significant problem if it is ever duped into publishing a forgery.</p>
<p>What if, as the cybersecurity consultant Matt Tait asked last month in relation to the DNC emails, a source &#8212; like, say, a hacker <a href="https://theintercept.com/2016/07/26/russian-intelligence-hack-dnc-nsa-know-snowden-says/">working for a Russian intelligence agency</a> &#8212; provided WikiLeaks with a cache of documents that was tampered with in order to smear a political candidate? </p>
<p>In a post on the blog Lawfare, <a href="https://lawfareblog.com/need-official-attribution-russias-dnc-hack">Tait explained</a> that he had spent some time looking through the DNC files for any signs of a fake email planted among the genuine ones:</p>
<blockquote><p>The metadata analysis I did on the leaked documents that day was almost by accident. I was actually looking for evidence of something much more frightening and which still keeps me up at night: What if the documents were mostly real, but had been surgically doctored? How effective would a carefully planted paragraph in an otherwise valid document be at derailing a campaign? How easily could Russia remove or sidestep an inconvenient DNC official with a single doctored paragraph showing “proof” of dishonest, unethical or illegal practices? And how little credibility would the sheepish official have in asserting that “all of the rest of the emails are true, but just not the one paragraph or email that makes me look bad?&#8221;</p></blockquote>
<p>WikiLeaks is justly proud of its record to date of not being duped by forgers.</p>
<p>&#8220;The materials that we release are pristine,&#8221; Assange told Bill Maher on Friday. &#8220;We&#8217;re really good at this, we have a ten-year perfect record of having never got it wrong in relation to the integrity of what we&#8217;ve released.&#8221;</p>
<p>Still, given that WikiLeaks is now unwilling or unable to closely scrutinize all of the documents it obtains, it is not hard to imagine a scenario where something like this could occur &#8212; and that possibility itself serves to diminish the group&#8217;s credibility as a source of unvarnished truth. </p>
<p>Even so, for an organization so wounded by official persecution, it remains capable of inflicting remarkable damage. Although the DNC leaks have so far failed to derail Clinton&#8217;s campaign, Assange has hinted in recent interviews that he has more material on the candidate that he plans to release soon. While it is unclear why Assange would hold on to any secrets that might torpedo Clinton, if he has something like that, the fear of a WikiLeaks-powered <a href="http://www.nytimes.com/1991/04/15/opinion/the-election-story-of-the-decade.html?pagewanted=all">October surprise</a> must still haunt the dreams of her advisors.</p>
<p>The post <a href="https://theintercept.com/2016/08/06/accusing-wikileaks-bias-beside-point/">What Julian Assange&#8217;s War on Hillary Clinton Says About WikiLeaks</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2016/08/06/accusing-wikileaks-bias-beside-point/feed/</wfw:commentRss>
                <slash:comments>623</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2016/08/0802_assange.jpg?fit=1400%2C701' width='1400' height='701' /><post-id xmlns="com-wordpress:feed-additions:1">77366</post-id>
            </item>
        
            <item>
                <title><![CDATA[If Russian Intelligence Did Hack the DNC, the NSA Would Know, Snowden Says]]></title>
                <link>https://theintercept.com/2016/07/26/russian-intelligence-hack-dnc-nsa-know-snowden-says/</link>
                <comments>https://theintercept.com/2016/07/26/russian-intelligence-hack-dnc-nsa-know-snowden-says/#comments</comments>
                <pubDate>Tue, 26 Jul 2016 16:43:44 +0000</pubDate>
                                    <dc:creator><![CDATA[Robert Mackey]]></dc:creator>
                                		<category><![CDATA[Cyberattacks]]></category>
		<category><![CDATA[Democrats]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Hillary Clinton]]></category>
		<category><![CDATA[Julian Assange]]></category>
		<category><![CDATA[Robert Mackey]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[WikiLeaks]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=75598</guid>
                                    <description><![CDATA[<p>Americans are right to ask for proof before accepting the idea that Russia was behind the hacking of the DNC; Edward Snowden says the NSA could provide it.</p>
<p>The post <a href="https://theintercept.com/2016/07/26/russian-intelligence-hack-dnc-nsa-know-snowden-says/">If Russian Intelligence Did Hack the DNC, the NSA Would Know, Snowden Says</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>As my colleague</u> Glenn Greenwald <a href="https://www.wnyc.org/story/glenn-greenwald-adversarial-free-press/">told WNYC</a> on Monday, while there may never be conclusive evidence that the Democratic National Committee was hacked by Russian intelligence operatives to extract <a href="https://wikileaks.org/dnc-emails/">the trove of embarrassing emails</a> published by WikiLeaks, it would hardly be shocking if that was what happened.</p>
<p>&#8220;Governments do spy on each other and do try to influence events in other countries,&#8221; Glenn noted. &#8220;Certainly the U.S. government has <a href="http://www.nytimes.com/2006/07/06/us/06wyatt.html?_r=0">a very long and successful history</a> of doing exactly that.&#8221;</p>
<p>Even so, he added, given the ease with which we were misled into war in Iraq by false claims about weapons of mass destruction &#8212; and <a href="https://twitter.com/tinyrevolution/status/757963459837526016">the long history of Russophobia</a> in American politics &#8212; it is vital to cast a skeptical eye over whatever evidence is presented to support the claim, made by Hillary Clinton&#8217;s aide Robby Mook, that this is all part of a Russian plot to sabotage the Democrats and help Donald Trump win the election.</p>
<p><!-- BLOCK(oembed)[2](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EClinton%20campaign%20manager%20on%20DNC%20leak%3A%20Experts%20say%20%26quot%3BRussians%20are%20releasing%20these%20emails%26quot%3B%20to%20help%20Trump%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fhashtag%5C%2FCNNSOTU%3Fsrc%3Dhash%26amp%3Bref_src%3Dtwsrc%255Etfw%5C%22%3E%23CNNSOTU%3C%5C%2Fa%3E%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2FGwJhloosPs%5C%22%3Ehttps%3A%5C%2F%5C%2Ft.co%5C%2FGwJhloosPs%3C%5C%2Fa%3E%3C%5C%2Fp%3E%26mdash%3B%20CNN%20Politics%20%28%40CNNPolitics%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FCNNPolitics%5C%2Fstatus%5C%2F757200262285123584%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2024%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FCNNPolitics%5C%2Fstatus%5C%2F757200262285123584%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Clinton campaign manager on DNC leak: Experts say &quot;Russians are releasing these emails&quot; to help Trump <a href="https://twitter.com/hashtag/CNNSOTU?src=hash&amp;ref_src=twsrc%5Etfw">#CNNSOTU</a> <a href="https://t.co/GwJhloosPs">https://t.co/GwJhloosPs</a></p>
<p>&mdash; CNN Politics (@CNNPolitics) <a href="https://twitter.com/CNNPolitics/status/757200262285123584?ref_src=twsrc%5Etfw">July 24, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[2] --></p>
<p>The theory <a href="https://www.buzzfeed.com/miriamelder/welcome-to-the-russian-game-its-embarrassing-its-dirty-and-i?utm_term=.maDWZy9wx#.id0geQypM">gained some traction</a>, particularly among Trump&#8217;s detractors, in part because the candidate has seemed obsessed at times with reminding crowds that Russian President Vladimir Putin once said <a href="https://youtu.be/5xwuVjgMfU4">something sort of nice</a> about him (though not, <a href="https://twitter.com/politico/status/694259701828210695">as Trump falsely claims</a>, that the American is &#8220;a genius&#8221;). Then last week, Trump&#8217;s campaign staff watered down a pledge to help Ukraine defend its territory from Russian-backed rebels and the candidate <a href="http://www.nytimes.com/2016/07/22/us/politics/donald-trump-foreign-policy-interview.html?_r=0">told the <em>New York Times</em></a> he would not necessarily honor the NATO treaty commitment that requires the United States military to defend other member states from a direct attack by Russia.</p>
<!-- BLOCK(promote-post)[0](%7B%22componentName%22%3A%22PROMOTE_POST%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22slug%22%3A%22election%22%2C%22crop%22%3A%22promo%22%7D) --><aside class="promote-banner">
    <a class="promote-banner__link" href="/collections/election-insecurity/">
              <span class="promote-banner__image">
          <img loading="lazy" decoding="async" width="300" height="150" src="https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?fit=300%2C150" class="attachment-medium size-medium" alt="Supporters of Democratic presidential nominee Hillary Clinton wave flags during election night at the Jacob K. Javits Convention Center in New York on November 8, 2016.  / AFP / Kena Betancur        (Photo credit should read KENA BETANCUR/AFP/Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=2965 2965w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=2400 2400w" sizes="auto, (max-width: 300px) 100vw, 300px" />        </span>
            <div class="promote-banner__text">
                  <p class="promote-banner__eyebrow">
            Read Our Complete Coverage          </p>
        
        <h2 class="promote-banner__title">Election Insecurity</h2>
      </div>
    </a>
  </aside><!-- END-BLOCK(promote-post)[0] -->
<p>Since Trump has refused to release his tax returns, there are also questions about whether or not his businesses might depend to some extent on Russian investors. “Russians make up a pretty disproportionate cross-section of a lot of our assets,” Trump’s son Donald Jr. told a real estate conference in 2008, <a href="https://www.washingtonpost.com/politics/inside-trumps-financial-ties-to-russia-and-his-unusual-flattery-of-vladimir-putin/2016/06/17/dbdcaac8-31a6-11e6-8ff7-7b6c1998b7a0_story.html">the <em>Washington Post</em> reported</a> last month. “We see a lot of money pouring in from Russia.”</p>
<p>Paul Manafort, who is directing Trump’s campaign and was for years a close adviser of a Putin ally, former President Viktor Yanukovych of Ukraine, <a href="http://www.nytimes.com/2016/07/25/us/politics/donald-trump-russia-emails.html">called the theory</a> that Trump&#8217;s campaign had ties to the Russian government &#8220;absurd.&#8221; (On Monday, Michael Isikoff of <em>Yahoo News</em> <a href="https://www.yahoo.com/news/exclusive-hacked-emails-of-dnc-oppo-researcher-point-to-russians-and-wider-penetration-154121061.html">reported</a> that a DNC researcher looking into Manafort&#8217;s ties to pro-Russian politicians in Ukraine in May had been warned that her personal Yahoo email account was under attack. &#8220;We strongly suspect that your account has been the target of state-sponsored actors,&#8221; the warning from the email service security team read.)</p>
<p>Unhelpfully for Trump, his most senior adviser with knowledge of the world of hacking, retired Lt. Gen. Michael T. Flynn, former director of the Defense Intelligence Agency, <a href="https://www.bloomberg.com/view/articles/2016-07-25/cybersecurity-experts-say-russia-hacked-the-democrats">told <em>Bloomberg View</em></a> that he &#8220;would not be surprised at all&#8221; to learn that Russia was behind the breach of the DNC network. “Both China and Russia have the full capability to do this,&#8221; he said.</p>
<p>Later on Monday, Trump himself then <a href="https://twitter.com/nbcnightlynews/status/757670708226908161">attributed the attack on the DNC to</a> &#8220;China, Russia, one of our many, many &#8216;friends,'&#8221; who &#8220;came in and hacked the hell out of us.&#8221;</p>
<p>Since very few of us are cybersecurity experts, and the Iraq debacle is a reminder of how dangerous it can be to put blind faith in experts whose claims might reinforce our own political positions, there is also the question of who we can trust to provide reliable evidence.</p>
<p>One expert in the field, who is well aware of the evidence-gathering capabilities of the U.S. government, is Edward Snowden, the former Central Intelligence Agency technician and National Security Agency whistleblower who exposed the extent of mass surveillance and has been given temporary asylum in Russia.</p>
<p>&#8220;If Russia hacked the #DNC, they should be condemned for it,&#8221; <a href="https://twitter.com/Snowden/status/757573436059287552">Snowden wrote</a> on Twitter on Monday, with a link to <a href="https://www.washingtonpost.com/world/national-security/fbi-director-offers-new-evidence-to-back-claim-north-korea-hacked-sony/2015/01/07/ce667980-969a-11e4-8005-1924ede3e54a_story.html">a 2015 report</a> on the U.S. government&#8217;s response to the hacking of Sony Pictures. In that case, he noted, &#8220;the FBI presented evidence&#8221; for its conclusion that North Korea was responsible for the hacking and subsequent release of internal emails. (The FBI is now investigating the breach of the DNC&#8217;s network, which officials <a href="http://www.thedailybeast.com/articles/2016/07/25/fbi-suspects-russia-hacked-dnc-u-s-officials-say-it-was-to-elect-donald-trump.html">told the <em>Daily Beast</em></a> they first made the committee aware of in April.)</p>
<p>What&#8217;s more, Snowden added, the NSA has tools that should make it possible to trace the source of the hack. Even though the Director of National Intelligence usually opposes making such evidence public, he argued, this is a case in which the agency should do so, if only to discourage future attacks.</p>
<p><!-- BLOCK(oembed)[3](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EEvidence%20that%20could%20publicly%20attribute%20responsibility%20for%20the%20DNC%20hack%20certainly%20exists%20at%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fhashtag%5C%2FNSA%3Fsrc%3Dhash%26amp%3Bref_src%3Dtwsrc%255Etfw%5C%22%3E%23NSA%3C%5C%2Fa%3E%2C%20but%20DNI%20traditionally%20objects%20to%20sharing.%3C%5C%2Fp%3E%26mdash%3B%20Edward%20Snowden%20%28%40Snowden%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FSnowden%5C%2Fstatus%5C%2F757577131912208384%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2025%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FSnowden%5C%2Fstatus%5C%2F757577131912208384%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Evidence that could publicly attribute responsibility for the DNC hack certainly exists at <a href="https://twitter.com/hashtag/NSA?src=hash&amp;ref_src=twsrc%5Etfw">#NSA</a>, but DNI traditionally objects to sharing.</p>
<p>&mdash; Edward Snowden (@Snowden) <a href="https://twitter.com/Snowden/status/757577131912208384?ref_src=twsrc%5Etfw">July 25, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[3] --></p>
<p><!-- BLOCK(oembed)[4](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EWithout%20a%20credible%20threat%20that%20USG%20can%20and%20will%20use%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fhashtag%5C%2FNSA%3Fsrc%3Dhash%26amp%3Bref_src%3Dtwsrc%255Etfw%5C%22%3E%23NSA%3C%5C%2Fa%3E%20capabilities%20to%20publicly%20attribute%20responsibility%2C%20such%20hacks%20will%20become%20common.%3C%5C%2Fp%3E%26mdash%3B%20Edward%20Snowden%20%28%40Snowden%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FSnowden%5C%2Fstatus%5C%2F757578400915660802%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2025%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FSnowden%5C%2Fstatus%5C%2F757578400915660802%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Without a credible threat that USG can and will use <a href="https://twitter.com/hashtag/NSA?src=hash&amp;ref_src=twsrc%5Etfw">#NSA</a> capabilities to publicly attribute responsibility, such hacks will become common.</p>
<p>&mdash; Edward Snowden (@Snowden) <a href="https://twitter.com/Snowden/status/757578400915660802?ref_src=twsrc%5Etfw">July 25, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[4] --></p>
<p><!-- BLOCK(oembed)[5](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3ETo%20summarize%3A%20the%20US%20Intel%20Community%20should%20modernize%20their%20position%20on%20disclosure.%20Defensive%20capabilities%20should%20be%20aggressively%20public.%3C%5C%2Fp%3E%26mdash%3B%20Edward%20Snowden%20%28%40Snowden%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FSnowden%5C%2Fstatus%5C%2F757579983653072896%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2025%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FSnowden%5C%2Fstatus%5C%2F757579983653072896%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">To summarize: the US Intel Community should modernize their position on disclosure. Defensive capabilities should be aggressively public.</p>
<p>&mdash; Edward Snowden (@Snowden) <a href="https://twitter.com/Snowden/status/757579983653072896?ref_src=twsrc%5Etfw">July 25, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[5] --></p>
<p>Another former insider with knowledge of American and Russian intelligence capabilities, Michael McFaul, the U.S. ambassador to Russia from 2012 to 2014, agreed that it should be possible for the U.S. to present proof if Russia was, in fact, responsible for the attack.</p>
<p><!-- BLOCK(oembed)[6](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EI%20assume%20that%20the%20US%20counterintelligence%20agencies%20have%20been%20investigating%20Russian%20theft%20of%20DNC%20emails.%20Hope%20they%20tell%20us%20results%20soon.%3C%5C%2Fp%3E%26mdash%3B%20Michael%20McFaul%20%28%40McFaul%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FMcFaul%5C%2Fstatus%5C%2F757313667574534144%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2024%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FMcFaul%5C%2Fstatus%5C%2F757313667574534144%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">I assume that the US counterintelligence agencies have been investigating Russian theft of DNC emails. Hope they tell us results soon.</p>
<p>&mdash; Michael McFaul (@McFaul) <a href="https://twitter.com/McFaul/status/757313667574534144?ref_src=twsrc%5Etfw">July 24, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[6] --></p>
<p><!-- BLOCK(oembed)[7](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EAs%20U.S.%20voter%2C%20I%26%2339%3Bm%20appalled%20by%20Russian%20meddling%2C%20want%20it%20investigated%20%26amp%3B%20stopped.%20As%20long-time%20analyst%20of%20Russia%2C%20Im%20impressed%3B%20they%26%2339%3Bre%20good%3C%5C%2Fp%3E%26mdash%3B%20Michael%20McFaul%20%28%40McFaul%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FMcFaul%5C%2Fstatus%5C%2F757327076525350912%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2024%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FMcFaul%5C%2Fstatus%5C%2F757327076525350912%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">As U.S. voter, I&#39;m appalled by Russian meddling, want it investigated &amp; stopped. As long-time analyst of Russia, Im impressed; they&#39;re good</p>
<p>&mdash; Michael McFaul (@McFaul) <a href="https://twitter.com/McFaul/status/757327076525350912?ref_src=twsrc%5Etfw">July 24, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[7] --></p>
<p>While we wait to see if the NSA will take its most famous former employee&#8217;s advice, it is worth reading <a href="https://motherboard.vice.com/read/all-signs-point-to-russia-being-behind-the-dnc-hack">a thorough review of the evidence produced so far</a>, compiled for Motherboard by Thomas Rid, a professor at King’s College London who has charted <a href="https://www.amazon.co.uk/Cyber-War-Will-Take-Place/dp/1849042802/ref=pd_sim_sbs_14_2?ie=UTF8&amp;dpID=51QHppn5nDL&amp;dpSrc=sims&amp;preST=_AC_UL160_SR102%2C160_&amp;psc=1&amp;refRID=HP9F6NFPQBTSFV4T2W2C">the use of hacking for espionage</a>.</p>
<p>As Rid explains, the attribution of the DNC hack to Russian intelligence agents was first suggested on June 15 by CrowdStrike, the cybersecurity firm hired by the Democrats to investigate the possible breach of their system in May.</p>
<p>Last month, one of the firm&#8217;s founders, Dmitri Alperovitch, explained in <a href="https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/">a detailed technical analysis</a> of their findings that CrowdStrike discovered &#8220;two separate Russian intelligence-affiliated adversaries present in the DNC network in May.&#8221;</p>
<p>The groups, he added, are so familiar to the investigators from previous attacks that they have acquired commonly used nicknames in the security industry. One, “Cozy Bear” or “APT 29,” had been inside the committee’s network for about a year; a second, “Fancy Bear,” also called “APT 28,” breached the system in April.</p>
<blockquote><p>We’ve had lots of experience with both of these actors attempting to target our customers in the past and know them well. In fact, our team considers them some of the best adversaries out of all the numerous nation-state, criminal and hacktivist/terrorist groups we encounter on a daily basis. Their tradecraft is superb, operational security second to none and the extensive usage of &#8220;living-off-the-land&#8221; techniques enables them to easily bypass many security solutions they encounter. In particular, we identified advanced methods consistent with nation-state level capabilities including deliberate targeting and &#8220;access management&#8221; tradecraft — both groups were constantly going back into the environment to change out their implants, modify persistent methods, move to new Command &amp; Control channels and perform other tasks to try to stay ahead of being detected.</p></blockquote>
<p>Cozy Bear is the group that &#8220;successfully infiltrated the unclassified networks of <a href="http://www.thedailybeast.com/articles/2015/04/08/obama-to-putin-stop-hacking-me.html">the White House</a>, <a href="http://www.cnn.com/2015/03/10/politics/state-department-hack-worst-ever/">State Department</a>, and <a href="https://www.theguardian.com/technology/2015/aug/06/us-military-joint-chiefs-hacked-officials-blame-russia">U.S. Joint Chiefs of Staff</a>&#8221; last year, Alperovitch noted. Fancy Bear, he added, has &#8220;been linked publicly to intrusions into the <a href="https://next.ft.com/content/668a131e-1928-11e6-b197-a4af20d5575e">German Bundestag</a> and <a href="http://www.bbc.com/news/world-europe-33072034">France’s TV5 Monde</a> TV station in April 2015.&#8221;</p>
<p>Readers with a high level of technical competence can parse the clues explained fully in Alperovitch&#8217;s blog post, but he also noted a surprising fact: that the two groups thought to be affiliated with rival Russian intelligence agencies &#8212; the successor to the Soviet-era KGB, known as the FSB, and the GRU, a military intelligence service &#8212; appeared unaware of each other&#8217;s activities.</p>
<p>&#8220;We have identified no collaboration between the two actors, or even an awareness of one by the other,&#8221; Alperovitch observed. &#8220;Instead, we observed the two Russian espionage groups compromise the same systems and engage separately in the theft of identical credentials.&#8221;</p>
<p>One day after this initial attribution of the attack to Russian intelligence was made public by CrowdStrike and the DNC, someone using the pseudonym Guccifer 2.0, in reference to the Romanian hacker who famously <a href="http://gawker.com/5982694/hacker-exposes-bush-family-emails-photos-and-george-w-bushs-amazing-self-portraits">uncovered</a> George W. Bush&#8217;s secret career as a painter of selfies, started publishing documents stolen from the committee&#8217;s servers on <a href="https://guccifer2.wordpress.com/">a WordPress blog</a> set up that day, and taunting the security experts <a href="https://twitter.com/GUCCIFER_2">on Twitter</a>.</p>
<p>Guccifer 2.0, who claims to be a Romanian who dislikes Russians, <a href="http://gawker.com/this-looks-like-the-dncs-hacked-trump-oppo-file-1782040426">told my colleague Sam Biddle</a> that he or she had carried out the attack with no help from anyone else, just to expose &#8220;all those illuminati that captured our world,&#8221; and had provided hacked documents to WikiLeaks.</p>
<p>However, several analysts pointed out that there is evidence in the metadata that copies of the DNC documents posted online by Guccifer 2.0, starting with an opposition research dossier on Trump, appear to have been processed on a computer with Russian language settings. Parsing the documents on Twitter, the blogger Davi Ottenheimer and an information security analyst who writes as @pwnallthethings pointed out that copies of the stolen documents uploaded to WordPress rendered the hacker&#8217;s username, Iron Felix, in Cyrillic characters, and gave error messages for links in Russian.</p>
<p>https://twitter.com/pwnallthethings/status/743197064843104257</p>
<p><!-- BLOCK(oembed)[8](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22nl%5C%22%20dir%3D%5C%22ltr%5C%22%3E%26quot%3Berror%21%20invalid%20hyperlinks%26quot%3B%20in%20Russian...%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2FT9jmLnNiKF%5C%22%3Epic.twitter.com%5C%2FT9jmLnNiKF%3C%5C%2Fa%3E%3C%5C%2Fp%3E%26mdash%3B%20davi%20%28%28%28%3F%29%29%29%20%3F%3F%20%28%40daviottenheimer%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fdaviottenheimer%5C%2Fstatus%5C%2F743199165459529728%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJune%2015%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fdaviottenheimer%5C%2Fstatus%5C%2F743199165459529728%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="nl" dir="ltr">&quot;error! invalid hyperlinks&quot; in Russian&#8230; <a href="https://t.co/T9jmLnNiKF">pic.twitter.com/T9jmLnNiKF</a></p>
<p>&mdash; davi (((?))) ?? (@daviottenheimer) <a href="https://twitter.com/daviottenheimer/status/743199165459529728?ref_src=twsrc%5Etfw">June 15, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[8] --></p>
<p>Doubts were also cast over Guccifer 2.0&#8217;s identity by his or her apparent lack of fluency in Romanian in <a href="https://motherboard.vice.com/read/why-does-dnc-hacker-guccifer-20-talk-like-this">an online chat</a> with Lorenzo Franceschi-Bicchierai of Motherboard.</p>
<p>Despite Guccifer 2.0&#8217;s claims, CrowdStrike&#8217;s attribution to the previously known Russian groups was supported by subsequent research last month from two rival network security firms: Fidelis Cybersecurity and Mandiant.</p>
<p>&#8220;We performed an independent review of the malware and other data (filenames, file sizes, IP addresses) in order to validate and provide our perspective on the reporting done by CrowdStrike,&#8221; Michael Buratowski, a Fidelis senior vice president, explained in <a href="http://www.threatgeek.com/2016/06/dnc_update.html">a detailed technical analysis</a>. The firm&#8217;s conclusions supported the attribution to the two well-known Russian groups. Among other factors, Buratowski noted, &#8220;the malware samples were conspicuously large&#8221; and &#8220;contained all or most of their embedded dependencies and functional code.&#8221;</p>
<p>&#8220;This is a very specific modus operandi less sophisticated actors do not employ,&#8221; he argued.</p>
<p>A Mandiant researcher, Marshall Heilman, <a href="https://www.washingtonpost.com/world/national-security/cyber-researchers-confirm-russian-government-hack-of-democratic-national-committee/2016/06/20/e7375bc0-3719-11e6-9ccd-d6005beac8b3_story.html">told the <em>Washington Post</em></a> he agreed that the malware and associated servers were consistent with those previously used by the two Russian groups.</p>
<p>Another American cybersecurity firm, ThreatConnect, <a href="https://www.threatconnect.com/guccifer-2-all-roads-lead-russia/">reported</a> on Tuesday that it had uncovered evidence that &#8220;Guccifer 2.0 is using the Russia-based Elite VPN service to communicate and leak documents&#8221; to reporters.</p>
<p>The suspicion that the raid of the DNC servers might have been carried out by Russian intelligence was unsurprising to some experts, as <em>Wired</em>’s <a href="https://www.wired.com/2016/06/hack-brief-russias-breach-dnc-trumps-dirt/">Andy Greenberg reported</a>, given that the FBI warned <a href="http://www.newsweek.com/campaign-2008-secrets-mccain-gambles-palin-85079">both Barack Obama and John McCain in 2008</a> that their campaign computer systems had been breached by foreign hackers, most likely from Russia or China.</p>
<p>Some observers, like the Harvard Law professor Jack Goldsmith, who worked for President George W. Bush, <a href="https://lawfareblog.com/more-thoughts-dnc-hack">suggested</a> that such attacks might be seen as payback, given that American intelligence agencies have made aggressive use of hacking, which &#8220;almost certainly extends to political organizations in adversary states.&#8221;</p>
<p><!-- BLOCK(oembed)[9](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3E7%5C%2F%20%20Current%20U.S.%20cyber-espionage%20almost%20certainly%20extends%20to%20political%20organizations%20in%20adversary%20states.%3C%5C%2Fp%3E%26mdash%3B%20Jack%20Goldsmith%20%28%40jacklgoldsmith%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fjacklgoldsmith%5C%2Fstatus%5C%2F757917930042437634%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2026%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fjacklgoldsmith%5C%2Fstatus%5C%2F757917930042437634%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">7/  Current U.S. cyber-espionage almost certainly extends to political organizations in adversary states.</p>
<p>&mdash; Jack Goldsmith (@jacklgoldsmith) <a href="https://twitter.com/jacklgoldsmith/status/757917930042437634?ref_src=twsrc%5Etfw">July 26, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[9] --></p>
<p>As the journalist Marcy Wheeler <a href="https://www.emptywheel.net/2016/07/25/nsa-and-cia-hacked-enrique-pena-nieto-before-the-2012-election/">noted on her blog</a>, according to <a href="http://www.spiegel.de/international/world/nsa-hacked-email-account-of-mexican-president-a-928817.html">report on the Snowden documents</a> by Jens Glüsing, Laura Poitras, Marcel Rosenbach and Holger Stark for <em>Spiegel</em>, the NSA hacked into &#8220;a key mail server in the Mexican Presidencia domain within the Mexican Presidential network,&#8221; during that country&#8217;s 2012 election campaign, and intercepted 85,489 text messages sent by the ruling party candidate, Enrique Peña Nieto himself, or his associates.</p>
<p>What makes the DNC breach new, however, is the fact that close to 20,000 emails and other documents &#8212; including personal information and credit card details of donors &#8212; were provided to WikiLeaks, which made them public on the eve of this week&#8217;s convention. Some of the private email traffic made public, which validated complaints from the Bernie Sanders campaign that the DNC officials favored Hillary Clinton, helped to reopen wounds from the bruising primary campaign.</p>
<p><!-- BLOCK(oembed)[10](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EChants%20of%20%26quot%3BWikiLeaks%26quot%3B%20and%20%26quot%3BLock%20her%20up%26quot%3B%20outside%20the%20DNC%20convention.%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2FYksSfoWnKn%5C%22%3Epic.twitter.com%5C%2FYksSfoWnKn%3C%5C%2Fa%3E%3C%5C%2Fp%3E%26mdash%3B%20Philip%20Crowther%20%28%40PhilipinDC%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FPhilipinDC%5C%2Fstatus%5C%2F757715166347792384%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2025%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FPhilipinDC%5C%2Fstatus%5C%2F757715166347792384%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Chants of &quot;WikiLeaks&quot; and &quot;Lock her up&quot; outside the DNC convention. <a href="https://t.co/YksSfoWnKn">pic.twitter.com/YksSfoWnKn</a></p>
<p>&mdash; Philip Crowther (@PhilipinDC) <a href="https://twitter.com/PhilipinDC/status/757715166347792384?ref_src=twsrc%5Etfw">July 25, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[10] --></p>
<p>https://twitter.com/jbarro/status/757679402780065792</p>
<p>The role played by WikiLeaks, and the professed indifference of the group&#8217;s founder, Julian Assange, to the source of the hacked documents, caused some journalists to ask if the site had allowed itself to be used as part of a post-modern dirty trick, a sort of Watergate 2.0.</p>
<p>One reporter, James Surowiecki of the <em>New Yorker</em>, even mused about how WikiLeaks might have treated documents provided by the Watergate burglars had it been around in 1972 when the Republican operatives broke into the DNC office in that building, precisely to obtain damaging information about the party through theft and surveillance.</p>
<p><!-- BLOCK(oembed)[11](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EIf%20WL%20had%20been%20around%20in%20%26%2339%3B72%2C%20would%20it%20have%20published%20DNC%20documents%20Watergate%20burglars%20stole%20and%20transcripts%20from%20the%20bugs%20they%20planted%3F%3C%5C%2Fp%3E%26mdash%3B%20James%20Surowiecki%20%28%40JamesSurowiecki%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FJamesSurowiecki%5C%2Fstatus%5C%2F757309581848698881%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2024%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fjamessurowiecki%5C%2Fstatus%5C%2F757309581848698881%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">If WL had been around in &#39;72, would it have published DNC documents Watergate burglars stole and transcripts from the bugs they planted?</p>
<p>&mdash; James Surowiecki (@JamesSurowiecki) <a href="https://twitter.com/JamesSurowiecki/status/757309581848698881?ref_src=twsrc%5Etfw">July 24, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[11] --></p>
<p>Of course, many other reporters have taken the view that the material made public by WikiLeaks is clearly newsworthy, given that it helps expose the inner workings of a largely unaccountable private political party, which plays a central and privileged role in the election of America&#8217;s leaders. That is why an array of publications, <a href="https://theintercept.com/2016/07/22/new-leak-top-dnc-official-wanted-to-use-bernie-sanderss-religious-beliefs-against-him/">including <em>The Intercept</em></a>, quickly started to provide reporting and analysis on what was revealed in the leaked documents.</p>
<p>Asked by NBC News on Monday if WikiLeaks might have been used to distribute documents stolen as part of a Russian intelligence operation, Assange insisted there was &#8220;no proof of that whatsoever &#8212; we have not disclosed our source, and of course this is a diversion that&#8217;s being pushed by the Hillary Clinton campaign.&#8221;</p>
<p><!-- BLOCK(oembed)[12](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EWATCH%3A%20No%20proof%20Russians%20used%20WikiLeaks%20in%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fhashtag%5C%2FDNCLeak%3Fsrc%3Dhash%26amp%3Bref_src%3Dtwsrc%255Etfw%5C%22%3E%23DNCLeak%3C%5C%2Fa%3E%2C%20Julian%20Assange%20tells%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FRichardEngel%3Fref_src%3Dtwsrc%255Etfw%5C%22%3E%40RichardEngel%3C%5C%2Fa%3E%20on%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FNBCNightlyNews%3Fref_src%3Dtwsrc%255Etfw%5C%22%3E%40NBCNightlyNews%3C%5C%2Fa%3E.%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2FUJCBe4fT9l%5C%22%3Ehttps%3A%5C%2F%5C%2Ft.co%5C%2FUJCBe4fT9l%3C%5C%2Fa%3E%3C%5C%2Fp%3E%26mdash%3B%20NBC%20Nightly%20News%20with%20Lester%20Holt%20%28%40NBCNightlyNews%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FNBCNightlyNews%5C%2Fstatus%5C%2F757713076128915457%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2025%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FNBCNightlyNews%5C%2Fstatus%5C%2F757713076128915457%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">WATCH: No proof Russians used WikiLeaks in <a href="https://twitter.com/hashtag/DNCLeak?src=hash&amp;ref_src=twsrc%5Etfw">#DNCLeak</a>, Julian Assange tells <a href="https://twitter.com/RichardEngel?ref_src=twsrc%5Etfw">@RichardEngel</a> on <a href="https://twitter.com/NBCNightlyNews?ref_src=twsrc%5Etfw">@NBCNightlyNews</a>. <a href="https://t.co/UJCBe4fT9l">https://t.co/UJCBe4fT9l</a></p>
<p>&mdash; NBC Nightly News with Lester Holt (@NBCNightlyNews) <a href="https://twitter.com/NBCNightlyNews/status/757713076128915457?ref_src=twsrc%5Etfw">July 25, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[12] --></p>
<p>Of course, given that a cornerstone of the WikiLeaks promise to sources is that the site was designed to receive material without revealing the identity of the leaker to anyone at the anti-secrecy group, it should be impossible for Assange himself to know that the hacked DNC documents did not come from a Russian intelligence operative &#8212; or, for that matter, a Republican one.</p>
<p>Convinced by the available evidence that the leak was orchestrated by Russian intelligence, Thomas Rid, the security analyst who writes for Motherboard, went so far as to suggest that by publishing these documents, WikiLeaks had become &#8220;a legitimate target&#8221; for counterintelligence operations by the five-nation club of the United States, Britain, Canada, Australia, and New Zealand.</p>
<p>https://twitter.com/RidT/status/757153240458858496</p>
<p>Although WikiLeaks describes the hacked DNC emails as &#8220;part one of our new Hillary Leaks series,&#8221; Assange himself rejected the charge that he is helping in a partisan attack. &#8220;This is a quite a classical release,&#8221; he <a href="http://www.democracynow.org/2016/7/25/exclusive_wikileaks_julian_assange_on_releasing">told Amy Goodman</a> of &#8220;Democracy Now&#8221; on Monday, &#8220;showing the benefit of producing pristine data sets, presenting them before the public, where there’s equal access to all journalists and to interested members of the public to mine through them and have them in a citable form where they can then be used to prop up certain criticisms or political arguments.&#8221;</p>
<p>Assange <a href="http://www.democracynow.org/2016/7/25/julian_assange_choosing_between_trump_or">demurred</a> when Goodman asked if he preferred Trump over Clinton &#8212; &#8220;You’re asking me, do I prefer cholera or gonorrhea?&#8221; &#8212; but he was more forthright in <a href="http://www.itv.com/news/update/2016-06-12/assange-on-peston-on-sunday-more-clinton-leaks-to-come/">an interview</a> with Robert Peston of Britain&#8217;s ITV on June 12, two days before the DNC hack was first reported.</p>
<!-- BLOCK(youtube)[1](%7B%22componentName%22%3A%22YOUTUBE%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22sourceId%22%3A%22__HRN6eot18%22%2C%22sourceName%22%3A%22youtube%22%2C%22start%22%3A%22%22%7D) --><iframe loading='lazy' class='social-iframe social-iframe--youtube' width='100%' src='//www.youtube.com/embed/__HRN6eot18?enablejsapi=1' frameborder='0' allowfullscreen></iframe><!-- END-BLOCK(youtube)[1] -->
<p>After telling Peston in that conversation, &#8220;We have emails relating to Hillary Clinton which are pending publication,&#8221; Assange was asked if his intention was to help Trump get elected. &#8220;Well, I think Trump is a completely unpredictable phenomenon. You can&#8217;t predict what he would do in office,&#8221; he replied. &#8220;From my personal perspective, well, you know, the emails we published show that Hillary Clinton is receiving constant updates about my personal situation; she has pushed for the prosecution of WikiLeaks, which is still in train. So, we do see her as a bit of a problem, for freedom of the press more generally.&#8221;</p>
<p>On Twitter, WikiLeaks has been more forthright about seeing the DNC emails and those from Clinton&#8217;s personal server &#8212; which the group copied from the State Department&#8217;s website to make into a searchable database &#8212; as material that can be used &#8220;to prop up certain criticisms&#8221; of the former secretary of state.</p>
<p><!-- BLOCK(oembed)[13](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EHillary%20Clinton%26%2339%3Bs%20showy%20rewarding%20of%20corruption%20by%20DWS%20is%20an%20ill%20wind%20for%20the%20corruption-overton-window%20of%20a%20future%20presidency.%3C%5C%2Fp%3E%26mdash%3B%20WikiLeaks%20%28%40wikileaks%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F757319397329559552%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2024%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F757319397329559552%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Hillary Clinton&#39;s showy rewarding of corruption by DWS is an ill wind for the corruption-overton-window of a future presidency.</p>
<p>&mdash; WikiLeaks (@wikileaks) <a href="https://twitter.com/wikileaks/status/757319397329559552?ref_src=twsrc%5Etfw">July 24, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[13] --></p>
<p><!-- BLOCK(oembed)[14](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EAudience%20at%20DNC%20turns%20on%20Bernie%20Sanders%20after%20he%20says%20%26quot%3Bwe%20must%20elect%20Hillary%20Clinton%26quot%3B%20following%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fhashtag%5C%2FDNCLeak%3Fsrc%3Dhash%26amp%3Bref_src%3Dtwsrc%255Etfw%5C%22%3E%23DNCLeak%3C%5C%2Fa%3E%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2FyJszgko2XK%5C%22%3Ehttps%3A%5C%2F%5C%2Ft.co%5C%2FyJszgko2XK%3C%5C%2Fa%3E%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fhashtag%5C%2FDNCinPHL%3Fsrc%3Dhash%26amp%3Bref_src%3Dtwsrc%255Etfw%5C%22%3E%23DNCinPHL%3C%5C%2Fa%3E%3C%5C%2Fp%3E%26mdash%3B%20WikiLeaks%20%28%40wikileaks%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F757632872111104000%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2025%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F757632872111104000%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Audience at DNC turns on Bernie Sanders after he says &quot;we must elect Hillary Clinton&quot; following <a href="https://twitter.com/hashtag/DNCLeak?src=hash&amp;ref_src=twsrc%5Etfw">#DNCLeak</a> <a href="https://t.co/yJszgko2XK">https://t.co/yJszgko2XK</a> <a href="https://twitter.com/hashtag/DNCinPHL?src=hash&amp;ref_src=twsrc%5Etfw">#DNCinPHL</a></p>
<p>&mdash; WikiLeaks (@wikileaks) <a href="https://twitter.com/wikileaks/status/757632872111104000?ref_src=twsrc%5Etfw">July 25, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[14] --></p>
<p>Some of that criticism, however, has not been well-grounded in fact, leaving the organization open to accusations that, rather than serving as an impartial clearinghouse for leaks, annotated by its readers &#8212; like Wikipedia &#8212; it has evolved into a platform for analysis by a small circle of insiders.</p>
<p>To take one example, on Saturday, a WikiLeaks tweet incorrectly claimed that one email from the leak revealed that Luis Miranda, the DNC communications director, had suggested that Trump might have been right to say that Ted Cruz&#8217;s father was involved in the Kennedy assassination.</p>
<p><!-- BLOCK(oembed)[15](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3E%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fhashtag%5C%2FDNCLeak%3Fsrc%3Dhash%26amp%3Bref_src%3Dtwsrc%255Etfw%5C%22%3E%23DNCLeak%3C%5C%2Fa%3E%3A%20Trump%20may%20be%20right%20about%20Ted%20Cruz%26%2339%3Bs%20father%20%26amp%3B%20JFK%20kill%20%20--%20Comms%20head%20Luis%20Miranda%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2FjjJV1ndJzM%5C%22%3Ehttps%3A%5C%2F%5C%2Ft.co%5C%2FjjJV1ndJzM%3C%5C%2Fa%3E%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2FUGbPNLutAE%5C%22%3Epic.twitter.com%5C%2FUGbPNLutAE%3C%5C%2Fa%3E%3C%5C%2Fp%3E%26mdash%3B%20WikiLeaks%20%28%40wikileaks%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F756942100940353537%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2023%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F756942100940353537%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr"><a href="https://twitter.com/hashtag/DNCLeak?src=hash&amp;ref_src=twsrc%5Etfw">#DNCLeak</a>: Trump may be right about Ted Cruz&#39;s father &amp; JFK kill  &#8212; Comms head Luis Miranda <a href="https://t.co/jjJV1ndJzM">https://t.co/jjJV1ndJzM</a> <a href="https://t.co/UGbPNLutAE">pic.twitter.com/UGbPNLutAE</a></p>
<p>&mdash; WikiLeaks (@wikileaks) <a href="https://twitter.com/wikileaks/status/756942100940353537?ref_src=twsrc%5Etfw">July 23, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[15] --></p>
<p>Reading <a href="https://wikileaks.org/dnc-emails/emailid/7735">the email</a> itself, however, shows something quite different. The complete text of the email chain makes it clear that Miranda was contributing to a thread in which officials worked together to edit a draft of a humorous press release, or &#8220;hit,&#8221; that mocked Trump for making such an outlandish suggestion.</p>
<p>While Miranda did write to his colleagues that Cruz&#8217;s father might have been part of an anti-Castro Cuban exile community &#8220;with questionable histories,&#8221; he also indicated that he approved the final text, which was <a href="http://factivists.democrats.org/dangerous-donalds-conspiracy-theories-all-i-know-is-what-is-on-the-internet/">posted online by the DNC</a> that same day. That text put Trump&#8217;s claim about Cruz&#8217;s father at the top of a list of examples of &#8220;the GOP’s presumptive standard bearer just spouting nonsense he reads on the internet or in the tabloids.&#8221;</p>
<p><!-- BLOCK(oembed)[16](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EHere%26%2339%3Bs%20the%20May%203%20DNC%20press%20release%20mocking%20Trump%20for%20discussing%20conspiracy%20theories%2C%20like%20Cruz%26%2339%3Bs%20father%20killing%20JFK%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2FhiDBXO75hH%5C%22%3Epic.twitter.com%5C%2FhiDBXO75hH%3C%5C%2Fa%3E%3C%5C%2Fp%3E%26mdash%3B%20Robert%20Mackey%20%28%40RobertMackey%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FRobertMackey%5C%2Fstatus%5C%2F757809279701176320%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EJuly%2026%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2FRobertMackey%5C%2Fstatus%5C%2F757809279701176320%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Here&#39;s the May 3 DNC press release mocking Trump for discussing conspiracy theories, like Cruz&#39;s father killing JFK <a href="https://t.co/hiDBXO75hH">pic.twitter.com/hiDBXO75hH</a></p>
<p>&mdash; Robert Mackey (@RobertMackey) <a href="https://twitter.com/RobertMackey/status/757809279701176320?ref_src=twsrc%5Etfw">July 26, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[16] --></p>
<p>While such errors in the annotation of the DNC documents look more like sloppiness than an attempt to intentionally mislead readers, the mistakes point to a weakness in the platform&#8217;s development &#8212; the lack of a robust system for correcting mistakes noted by readers, like the one used by Wikipedia.</p>
<p>That problem has also been noted in the way WikiLeaks presented emails from Hillary Clinton&#8217;s private server first released by the State Department.</p>
<p>In March, WikiLeaks was criticized by some Twitter followers &#8212; <a href="https://twitter.com/wikileaks/status/710866944572796928">including David Kenner</a>, the Middle East editor of <em>Foreign Policy</em> &#8212; for the confusing way it presented <a href="https://wikileaks.org/clinton-emails/emailid/18328">the text</a> of a draft opinion article sent to Clinton by a friend as if it were the text of an email from her &#8212; and one that revealed her secret plan to destroy the Syrian government to help Israel.</p>
<p><!-- BLOCK(oembed)[17](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EHillary%20Emails%3A%20Overthrow%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fhashtag%5C%2FSyrian%3Fsrc%3Dhash%26amp%3Bref_src%3Dtwsrc%255Etfw%5C%22%3E%23Syrian%3C%5C%2Fa%3E%20government%20to%20help%20Israel%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2Fe93JddH9nv%5C%22%3Ehttps%3A%5C%2F%5C%2Ft.co%5C%2Fe93JddH9nv%3C%5C%2Fa%3E%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fhashtag%5C%2Fsyria%3Fsrc%3Dhash%26amp%3Bref_src%3Dtwsrc%255Etfw%5C%22%3E%23syria%3C%5C%2Fa%3E%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fhashtag%5C%2Firan%3Fsrc%3Dhash%26amp%3Bref_src%3Dtwsrc%255Etfw%5C%22%3E%23iran%3C%5C%2Fa%3E%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fhashtag%5C%2Fsaudi%3Fsrc%3Dhash%26amp%3Bref_src%3Dtwsrc%255Etfw%5C%22%3E%23saudi%3C%5C%2Fa%3E%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2FyZysFuOT2H%5C%22%3Epic.twitter.com%5C%2FyZysFuOT2H%3C%5C%2Fa%3E%3C%5C%2Fp%3E%26mdash%3B%20WikiLeaks%20%28%40wikileaks%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F710818660298919936%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EMarch%2018%2C%202016%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fwikileaks%5C%2Fstatus%5C%2F710818660298919936%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Hillary Emails: Overthrow <a href="https://twitter.com/hashtag/Syrian?src=hash&amp;ref_src=twsrc%5Etfw">#Syrian</a> government to help Israel <a href="https://t.co/e93JddH9nv">https://t.co/e93JddH9nv</a> <a href="https://twitter.com/hashtag/syria?src=hash&amp;ref_src=twsrc%5Etfw">#syria</a> <a href="https://twitter.com/hashtag/iran?src=hash&amp;ref_src=twsrc%5Etfw">#iran</a> <a href="https://twitter.com/hashtag/saudi?src=hash&amp;ref_src=twsrc%5Etfw">#saudi</a> <a href="https://t.co/yZysFuOT2H">pic.twitter.com/yZysFuOT2H</a></p>
<p>&mdash; WikiLeaks (@wikileaks) <a href="https://twitter.com/wikileaks/status/710818660298919936?ref_src=twsrc%5Etfw">March 18, 2016</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[17] --></p>
<p>In fact, as the State Department&#8217;s website makes clear, that text was sent to Clinton as an attachment to <a href="https://foia.state.gov/searchapp/DOCUMENTS/HRCEmail_NovWeb/293/DOC_0C05794497/C05794497.pdf">a 2012 email from James Rubin</a>, who served in Bill Clinton&#8217;s administration. Reading the email, Rubin attached his draft piece to make it clear that he hoped his essay &#8212; which was later published in slightly revised form by <em>Foreign Policy</em> &#8212; would convince the Obama administration to help Syrian rebels topple Bashar al-Assad largely to &#8220;forestall the biggest danger on the horizon, that Israel launches a surprise attack on Iran&#8217;s nuclear facilities.&#8221;</p>
<p>Rubin also made it clear in his email that he did not think Clinton shared his view of the situation at that time. &#8220;I know you may not agree,&#8221; he wrote, &#8220;but I thought it was better to share this with you first as at least a new way to look at the problem.&#8221;</p>
<p>Unfortunately, the way WikiLeaks described Rubin&#8217;s draft op-ed as one of &#8220;Hillary Emails&#8221; sowed confusion online and led to <a href="http://newobserveronline.com/clinton-destroy-syria-israel/">outraged blog posts</a> and <a href="http://sputniknews.com/us/20160323/1036788250/clinton-email-assad-ouster.html">Russian news reports</a> that mistakenly credited Assange&#8217;s group with revealing the text of a bombshell email from Clinton that offered insight into her thinking.</p>
<p>Despite concerns that the group&#8217;s own annotation of documents related to Clinton might be at times muddled, in his &#8220;Democracy Now&#8221; interview, Assange defended his decision not to &#8220;establish partnerships with the <em>New York Times</em> or the <em>Washington Post</em>,&#8221; as he has done in the past to ensure that leaked documents would come to light not only in raw form but also accompanied by some analysis from political or national security reporters.</p>
<p>Working with the editorial staffs of those newspapers on material like this &#8220;might be counterproductive,&#8221; Assange said, &#8220;because they are partisans of one group or another.&#8221;</p>
<p>The post <a href="https://theintercept.com/2016/07/26/russian-intelligence-hack-dnc-nsa-know-snowden-says/">If Russian Intelligence Did Hack the DNC, the NSA Would Know, Snowden Says</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2016/07/26/russian-intelligence-hack-dnc-nsa-know-snowden-says/feed/</wfw:commentRss>
                <slash:comments>111</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2016/07/0726_snowden.jpg?fit=1383%2C703' width='1383' height='703' /><post-id xmlns="com-wordpress:feed-additions:1">75598</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?fit=300%2C150" />
		<media:content url="https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?fit=300%2C150" medium="image">
			<media:title type="html">Supporters of Democratic presidential nominee Hillary Clinton wave flags during election night at the Jacob K. Javits Convention Center in New York on November 8, 2016.  / AFP / Kena Betancur        (Photo credit should read KENA BETANCUR/AFP/Getty Images)</media:title>
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters]]></title>
                <link>https://theintercept.com/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/</link>
                <comments>https://theintercept.com/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/#comments</comments>
                <pubDate>Tue, 18 Feb 2014 06:50:03 +0000</pubDate>
                                    <dc:creator><![CDATA[Glenn Greenwald]]></dc:creator>
                                    <dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
                                		<category><![CDATA[Julian Assange]]></category>
		<category><![CDATA[WikiLeaks]]></category>

                <guid isPermaLink="false">https://theintercept.com/?post_type=article&#038;p=1030</guid>
                                    <description><![CDATA[<p>Top-secret documents from the National Security Agency and its British counterpart reveal for the first time how the governments of the United States and the United Kingdom targeted WikiLeaks and other activist groups with tactics ranging from covert surveillance to prosecution.</p>
<p>The post <a href="https://theintercept.com/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/">Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p>Top-secret documents from the National Security Agency and its British counterpart reveal for the first time how the governments of the United States and the United Kingdom targeted WikiLeaks and other activist groups with tactics ranging from covert surveillance to prosecution.</p>
<p>The efforts – detailed in documents provided previously by NSA whistleblower Edward Snowden – included a broad campaign of international pressure aimed not only at WikiLeaks founder Julian Assange, but at<b> </b>what the U.S. government calls “the human network that supports WikiLeaks.”&nbsp;The documents also contain internal discussions about targeting&nbsp;the file-sharing site Pirate Bay and hacktivist collectives such as Anonymous.<b></b></p>
<p>One <a href="https://theintercept.com/document/2014/02/18/psychology-new-kind-sigdev/">classified document</a> from Government Communications Headquarters, Britain&#8217;s top spy agency, shows that GCHQ used its surveillance system to secretly monitor visitors to a WikiLeaks site. By exploiting its ability to tap into the fiber-optic cables that make up the backbone of the Internet, the agency confided to allies in 2012, it was able to collect the IP addresses of visitors in real time, as well as the search terms that visitors used to reach the site from search engines like Google.</p>
<p>Another classified document from the U.S. intelligence community, dated August 2010, recounts how the Obama administration urged foreign allies to file criminal charges against Assange over the group’s publication of the Afghanistan war logs.</p>
<p><a href="https://theintercept.com/document/2014/02/18/discovery-sigint-targeting-scenarios-compliance/">A third document</a>, from July 2011, contains a summary of an internal discussion in which officials from two NSA offices – including the agency’s general counsel and an arm of its Threat Operations Center – considered designating WikiLeaks as “a ‘malicious foreign actor’ for the purpose of targeting.” Such a designation would have allowed the group to be targeted with extensive electronic surveillance – without the need to exclude U.S. persons from the surveillance searches.</p>
<p>In 2008, not long after WikiLeaks was formed, the U.S. Army prepared a report that identified the organization as an enemy, and <a href="http://www.nytimes.com/2010/03/18/us/18wiki.html?_r=0"><span style="text-decoration: underline;">plotted how it could be destroyed</span></a>. The new documents provide a window into how the U.S. and British governments appear to have shared the view that WikiLeaks represented a serious threat, and reveal the controversial measures they were willing to take to combat it.</p>
<p>In a statement to <em>The Intercept,</em> Assange condemned what he called “the reckless and unlawful behavior of the National Security Agency” and GCHQ&#8217;s &#8220;extensive hostile monitoring of a popular publisher&#8217;s website and its readers.&#8221;</p>
<p>&#8220;News that the NSA planned these operations at the level of its Office of&nbsp;the General Counsel is especially troubling,&#8221; Assange said. &#8220;Today, we call on the White House to appoint a special prosecutor to investigate the extent of the NSA&#8217;s criminal&nbsp;activity against the media, including WikiLeaks, its staff, its&nbsp;associates and its supporters.&#8221;</p>
<p>Illustrating how far afield the NSA deviates from <a href="http://www.foxnews.com/politics/2013/06/18/nsa-chief-defends-surveillance-says-helped-prevent-terror-more-than-50-times/" target="_blank" rel="noopener">its self-proclaimed focus</a> on terrorism and national security, the documents reveal that the agency considered using its sweeping surveillance system against Pirate Bay, which has been accused of facilitating copyright violations. The agency also approved surveillance of the foreign “branches” of hacktivist groups, mentioning Anonymous by name.</p>
<p>The documents call into question the Obama administration’s repeated insistence that U.S. citizens are not being caught up in the sweeping surveillance dragnet being cast by the NSA. Under the broad rationale considered by the agency, for example, any communication with a group designated as a “malicious foreign actor,” such as WikiLeaks and Anonymous, would be considered fair game for surveillance.</p>
<p>Julian Sanchez, a research fellow at the Cato Institute who specializes in surveillance issues, says the revelations shed a disturbing light on the NSA’s willingness to sweep up American citizens in its surveillance net.</p>
<p>“All the reassurances Americans heard that the broad authorities of the FISA Amendments Act could only be used to ‘target’ foreigners seem a bit more hollow,” Sanchez says, “when you realize that the ‘foreign target’ can be an entire Web site or online forum used by thousands if not millions of Americans.”</p>
<p>&nbsp;</p>
<h4>GCHQ Spies on WikiLeaks Visitors</h4>
<p>The system used by GCHQ to monitor the WikiLeaks website – codenamed ANTICRISIS GIRL – is described in a classified PowerPoint presentation prepared by the British agency and distributed at the 2012 “SIGDEV Conference.” At the annual gathering, each member of the “Five Eyes” alliance – the United States, United Kingdom, Canada, Australia and New Zealand – describes the prior year&#8217;s surveillance successes and challenges.</p>
<p>In a top-secret presentation at the conference<b>, </b>two GCHQ spies outlined how ANTICRISIS GIRL was used to enable “targeted website monitoring” of WikiLeaks (<a href="https://theintercept.com/document/2014/02/18/psychology-new-kind-sigdev/">See slides 33 and 34</a>). The agency logged data showing hundreds of users from around the world, including the United States, as they were visiting a WikiLeaks site –contradicting <a href="http://www.pbs.org/newshour/rundown/an-exclusive-club-the-five-countries-that-dont-spy-on-each-other/">claims</a> by American officials that a deal between the U.K. and the U.S. prevents each country from spying on the other’s citizens.</p>
<p>The IP addresses collected by GCHQ are used to identify individual computers that connect to the Internet, and can be traced back to specific people if the IP address has not been masked using an anonymity service. If WikiLeaks or other news organizations were receiving submissions from sources through a public dropbox on their website, a system like ANTICRISIS GIRL could potentially be used to help track them down. (WikiLeaks has not operated a public dropbox since 2010, when it shut down its system in part due to security concerns over surveillance.)</p>
<p><a href="https://theintercept.com/wp-content/uploads/2014/02/piwik2.png" target="_blank" rel="noopener"><!-- BLOCK(imagebox)[0](%7B%22componentName%22%3A%22IMAGEBOX%22%2C%22entityType%22%3A%22RESOURCE%22%2C%22resource%22%3A%7B%22__typename%22%3A%22Image%22%2C%22accessibleDescription%22%3Anull%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F02%5C%2Fpiwik2.png%22%7D%7D)(%7B%22className%22%3A%22default%22%2C%22src%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F02%5C%2Fpiwik2.png%22%2C%22style%22%3A%7B%22border%22%3A%221px%20solid%20%23333%22%7D%2C%22title%22%3Anull%7D) --><div class='default' style='border:1px solid #333;'><img data-recalc-dims="1" src="https://theintercept.com/wp-content/uploads/2014/02/piwik2.png?w=1200" alt='' title='' /></div><!-- END-BLOCK(imagebox)[0] --></a></p>
<p>In its PowerPoint presentation, GCHQ identifies its target only as &#8220;wikileaks.&#8221; One slide, displaying analytics<strong>&nbsp;</strong>derived from the surveillance, suggests that the site monitored was the official wikileaks.org domain. It shows that users reached the targeted site by searching for “wikileaks.org” and for “maysan uxo,” a term associated with a series of leaked Iraq war logs that are hosted on wikileaks.org.</p>
<p>The ANTICRISIS GIRL initiative was operated by a GCHQ unit called Global Telecoms Exploitation (GTE), which was <a href="http://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa">previously reported by <em>The Guardian</em></a> to be linked to the large-scale, clandestine Internet surveillance operation run by GCHQ, codenamed TEMPORA.</p>
<p>Operating in the United Kingdom and from secret British eavesdropping bases in Cyprus and other countries, GCHQ conducts what it refers to as “passive” surveillance – indiscriminately intercepting massive amounts of data from Internet cables, phone networks and satellites. The GTE unit focuses on developing “pioneering collection capabilities” to exploit the stream of data gathered from the Internet.</p>
<p>As part of the ANTICRISIS GIRL system, the documents show, GCHQ used publicly available analytics software called <a href="http://piwik.org/">Piwik</a> to extract information from its surveillance stream, not only monitoring visits to targeted websites like WikiLeaks, but tracking the country of origin of each visitor.</p>
<!-- BLOCK(imagebox)[1](%7B%22componentName%22%3A%22IMAGEBOX%22%2C%22entityType%22%3A%22RESOURCE%22%2C%22resource%22%3A%7B%22__typename%22%3A%22Image%22%2C%22accessibleDescription%22%3Anull%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F02%5C%2Fpiwik1.png%22%7D%7D)(%7B%22className%22%3A%22default%22%2C%22src%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F02%5C%2Fpiwik1.png%22%2C%22style%22%3A%7B%22border%22%3A%221px%20solid%20%23333%22%7D%2C%22title%22%3Anull%7D) --><div class='default' style='border:1px solid #333;'><img data-recalc-dims="1" src="https://theintercept.com/wp-content/uploads/2014/02/piwik1.png?w=1200" alt='' title='' /></div><!-- END-BLOCK(imagebox)[1] -->
<p>It is unclear from the PowerPoint presentation whether GCHQ monitored the WikiLeaks site as part of a pilot program designed to demonstrate its capability, using only a small set of covertly collected data, or whether the agency continues to actively deploy its surveillance system to monitor visitors to WikiLeaks. It was <a href="http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data">previously reported in <em>The Guardian</em></a> that X-KEYSCORE, a comprehensive surveillance weapon used by both NSA and GCHQ, allows “an analyst to learn the IP addresses of every person who visits any website the analyst specifies.”</p>
<p>GCHQ refused to comment on whether ANTICRISIS GIRL is still operational. In an email citing the agency’s boilerplate response to inquiries, a spokeswoman insisted that “all of GCHQ&#8217;s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorized, necessary and proportionate, and that there is rigorous oversight.”</p>
<p>But privacy advocates question such assurances. “How could targeting an entire website&#8217;s user base be necessary or proportionate?” says Gus Hosein, executive director of the London-based human rights group Privacy International. “These are innocent people who are turned into suspects based on their reading habits. Surely becoming a target of a state’s intelligence and security apparatus should require more than a mere click on a link.”</p>
<p>The agency’s covert targeting of WikiLeaks, Hosein adds, call into question the entire legal rationale underpinning the state’s system of surveillance. &#8220;We may be tempted to see GCHQ as a rogue agency, ungoverned in its use of unprecedented powers generated by new technologies,” he says. “But GCHQ’s actions are authorized by [government] ministers. The fact that ministers are ordering the monitoring of political interests of Internet users shows a systemic failure in the rule of law.”</p>
<p>&nbsp;</p>
<h4>Going After Assange and His Supporters</h4>
<p>The U.S. attempt to pressure other nations to prosecute Assange is recounted in a file that the intelligence community calls its “Manhunting Timeline.” The document details, on a country-by-country basis, efforts by the U.S. government and its allies to locate, prosecute, capture or kill alleged terrorists, drug traffickers, Palestinian leaders and others. There is a timeline for each year from 2008 to 2012.</p>
<p><a href="https://theintercept.com/wp-content/uploads/2014/02/manhunting1.png" target="_blank" rel="noopener"><!-- BLOCK(imagebox)[2](%7B%22componentName%22%3A%22IMAGEBOX%22%2C%22entityType%22%3A%22RESOURCE%22%2C%22resource%22%3A%7B%22__typename%22%3A%22Image%22%2C%22accessibleDescription%22%3Anull%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F02%5C%2Fmanhunting1.png%22%7D%7D)(%7B%22className%22%3A%22default%22%2C%22src%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F02%5C%2Fmanhunting1.png%22%2C%22style%22%3A%7B%22border%22%3A%221px%20solid%20%23333%22%7D%2C%22title%22%3Anull%7D) --><div class='default' style='border:1px solid #333;'><img data-recalc-dims="1" src="https://theintercept.com/wp-content/uploads/2014/02/manhunting1.png?w=1200" alt='' title='' /></div><!-- END-BLOCK(imagebox)[2] --></a></p>
<p>An entry from August 2010 – headlined “United States, Australia, Great Britain, Germany, Iceland” – states: “The United States on August 10 urged other nations with forces in Afghanistan, including Australia, United Kingdom, and Germany, to consider filing criminal charges against Julian Assange.” It describes Assange as the “founder of the rogue Wikileaks Internet website and responsible for the unauthorized publication of over 70,000 classified documents covering the war in Afghanistan.”</p>
<p><a href="https://theintercept.com/wp-content/uploads/2014/02/assange_pressure.png" target="_blank" rel="noopener"><!-- BLOCK(imagebox)[3](%7B%22componentName%22%3A%22IMAGEBOX%22%2C%22entityType%22%3A%22RESOURCE%22%2C%22resource%22%3A%7B%22__typename%22%3A%22Image%22%2C%22accessibleDescription%22%3Anull%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F02%5C%2Fassange_pressure.png%22%7D%7D)(%7B%22className%22%3A%22default%22%2C%22src%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F02%5C%2Fassange_pressure.png%22%2C%22style%22%3A%7B%22border%22%3A%221px%20solid%20%23333%22%7D%2C%22title%22%3Anull%7D) --><div class='default' style='border:1px solid #333;'><img data-recalc-dims="1" src="https://theintercept.com/wp-content/uploads/2014/02/assange_pressure.png?w=1200" alt='' title='' /></div><!-- END-BLOCK(imagebox)[3] --></a></p>
<p>In response to questions from <em>The Intercept</em><i>, </i>the NSA suggested that the entry is “a summary derived from a 2010 article” in the <em>Daily Beast.<b> </b></em><a href="http://www.thedailybeast.com/articles/2010/08/10/a-western-crackdown-on-wikileaks.html" target="_blank" rel="noopener"><span style="text-decoration: underline;">That article</span></a>, which cited an anonymous U.S. official, reported that “the Obama administration is pressing Britain, Germany, Australia, and other allied Western governments to consider opening criminal investigations of WikiLeaks founder Julian Assange and to severely limit his nomadic travels across international borders.”</p>
<p>The government entry in the &#8220;Manhunting Timeline&#8221; adds Iceland to the list of Western nations that were pressured, and suggests that the push to prosecute Assange is part of a broader campaign. The effort, it explains,<b> </b>“exemplifies the start of an international effort to focus the legal element of national power upon non-state actor Assange, and the human network that supports WikiLeaks.” The entry does not specify how broadly the government defines that “human network,” which could potentially include thousands of volunteers, donors and journalists, as well as people who simply spoke out in defense of WikiLeaks.</p>
<p>In a statement, the NSA declined to comment on the documents or its targeting of activist groups, noting only that the agency “provides numerous opportunities and forums for their analysts to explore hypothetical or actual circumstances to gain appropriate advice on the exercise of their authorities within the Constitution and the law, and to share that advice appropriately.”</p>
<p>But the entry aimed at WikiLeaks comes from credentialed officials within the intelligence community. In an interview in Hong Kong last June, Edward Snowden made clear that the only NSA officials empowered to write such entries are those “with top-secret clearance and public key infrastructure certificates” – a kind of digital ID card enabling unique access to certain parts of the agency’s system. What’s more, Snowden added, the entries are “peer reviewed” – and every edit made is recorded by the system.</p>
<p>The U.S. launched its pressure campaign against WikiLeaks less than a week after the group began publishing the Afghanistan war logs on July 25, 2010. At the time, top U.S. national security officials accused WikiLeaks of having <a href="http://www.guardian.co.uk/world/2010/jul/30/us-military-wikileaks-afghanistan-war-logs" target="_blank" rel="noopener"><span style="text-decoration: underline;">“blood” on its hands</span></a>. But several months later, <a href="http://www.mcclatchydc.com/2010/11/28/104404/officials-may-be-overstating-the.html" target="_blank" rel="noopener"><span style="text-decoration: underline;">McClatchy reported</span></a> that “U.S. officials concede that they have no evidence to date that the documents led to anyone&#8217;s death.”</p>
<p>The government targeting of WikiLeaks nonetheless continued. In April 2011, <em>Salon</em> <a href="http://www.salon.com/2011/04/27/wikileaks_26/" target="_blank" rel="noopener">reported</a> that a grand jury in Virginia was actively investigating both the group and Assange on possible criminal charges under espionage statutes relating to the publication of classified documents. And in August of 2012, the <em>Sydney Morning Herald</em>, citing secret Australian diplomatic cables, <a href="http://www.smh.com.au/national/us-in-pursuit-of-assange-cables-reveal-20120817-24e8u.html" target="_blank" rel="noopener">reported</a> that “Australian diplomats have no doubt the United States is still gunning for Julian Assange” and that “Australia&#8217;s diplomatic service takes seriously the likelihood that Assange will eventually be extradited to the US on charges arising from WikiLeaks obtaining leaked US military and diplomatic documents.”</p>
<p>Bringing criminal charges against WikiLeaks or Assange for publishing classified documents would be highly controversial – especially since the group partnered with newspapers like <em>The Guardian</em> and <em>The New York Times</em> to make the war logs public. “The biggest challenge to the press today is the threatened prosecution of WikiLeaks, and it&#8217;s absolutely frightening,” James Goodale, who served as chief counsel of the <em>Times </em>during its battle to publish The Pentagon Papers, <a href="http://www.cjr.org/critical_eye/qa_with_goodale_obama_press_fr.php" target="_blank" rel="noopener">told the <em>Columbia Journalism Review</em></a> last March. “If you go after the WikiLeaks criminally, you go after the <em>Times</em>. That’s the criminalization of the whole process.”</p>
<p>In November 2013, <em>The Washington Post</em>, citing anonymous officials, <a href="http://www.washingtonpost.com/world/national-security/julian-assange-unlikely-to-face-us-charges-over-publishing-classified-documents/2013/11/25/dd27decc-55f1-11e3-8304-caf30787c0a9_story.html" target="_blank" rel="noopener">reported</a> that the Justice Department strongly considered prosecuting Assange, but concluded it “could not do so without also prosecuting U.S. news organizations and journalists” who had partnered with WikiLeaks to publish the documents. According to the <em>Post</em><i>, </i>officials “realized that they have what they described as a ‘<em>New York Times</em> problem’” – namely, that any theory used to bring charges against Assange would also result in criminal liability for the <em>Times, The Guardian</em><i>, </i>and other papers which also published secret documents provided to WikiLeaks<i>.</i></p>
<p>&nbsp;</p>
<h4>NSA proposals to target WikiLeaks</h4>
<p>As the new NSA documents make clear, however, the U.S. government did more than attempt to engineer the prosecution of Assange. NSA analysts also considered designating WikiLeaks as a “malicious foreign actor” for surveillance purposes – a move that would have significantly expanded the agency’s ability to subject the group’s officials and supporters to extensive surveillance.</p>
<p>Such a designation would allow WikiLeaks to be targeted with surveillance without the use of “defeats” – an agency term for technical mechanisms to shield the communications of U.S. persons from getting caught in the dragnet.</p>
<p><a href="https://theintercept.com/document/2014/02/18/discovery-sigint-targeting-scenarios-compliance/">That top-secret document</a> – which summarizes a discussion between the NSA’s Office of the General Counsel and the Oversight and Compliance Office of the agency’s Threat Operations Center – spells out a rationale for including American citizens in the surveillance:</p>
<blockquote><p>“If the foreign IP is consistently associated with malicious cyber activity against the U.S., so, tied to a foreign individual or organization known to direct malicious activity our way, then there is no need to defeat any to, from, or about U.S. Persons. This is based on the description that one end of the communication would always be this suspect foreign IP, and so therefore any U.S. Person communicant would be incidental to the foreign intelligence task.”</p></blockquote>
<p>In short, labeling WikiLeaks a “malicious foreign target” would mean that anyone communicating with the organization for any reason – including American citizens – could have their communications subjected to government surveillance.</p>
<p><span style="line-height: 1.5em;">When NSA officials are asked in the document if WikiLeaks or Pirate Bay could be designated as “malicious foreign actors,” the reply is inconclusive: “Let us get back to you.” There is no indication of whether either group was ever designated or targeted in such a way.</span></p>
<!-- BLOCK(imagebox)[4](%7B%22componentName%22%3A%22IMAGEBOX%22%2C%22entityType%22%3A%22RESOURCE%22%2C%22resource%22%3A%7B%22__typename%22%3A%22Image%22%2C%22accessibleDescription%22%3Anull%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F02%5C%2Fwikileaks1.png%22%7D%7D)(%7B%22className%22%3A%22default%22%2C%22src%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F02%5C%2Fwikileaks1.png%22%2C%22style%22%3A%7B%22border%22%3A%221px%20solid%20%23333%22%7D%2C%22title%22%3Anull%7D) --><div class='default' style='border:1px solid #333;'><img data-recalc-dims="1" src="https://theintercept.com/wp-content/uploads/2014/02/wikileaks1.png?w=1200" alt='' title='' /></div><!-- END-BLOCK(imagebox)[4] -->
<p>The NSA’s lawyers did, however, give the green light to subject other activists to heightened surveillance. Asked if it would be permissible to “target the foreign actors of a loosely coupled group of hackers &#8230; such as with Anonymous,” the response is unequivocal: “As long as they are foreign individuals outside of the US and do not hold dual citizenship &#8230; then you are okay.”</p>
<!-- BLOCK(imagebox)[5](%7B%22componentName%22%3A%22IMAGEBOX%22%2C%22entityType%22%3A%22RESOURCE%22%2C%22resource%22%3A%7B%22__typename%22%3A%22Image%22%2C%22accessibleDescription%22%3Anull%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F02%5C%2Fwikileaks2.png%22%7D%7D)(%7B%22className%22%3A%22default%22%2C%22src%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F02%5C%2Fwikileaks2.png%22%2C%22style%22%3A%7B%22border%22%3A%221px%20solid%20%23333%22%7D%2C%22title%22%3Anull%7D) --><div class='default' style='border:1px solid #333;'><img data-recalc-dims="1" src="https://theintercept.com/wp-content/uploads/2014/02/wikileaks2.png?w=1200" alt='' title='' /></div><!-- END-BLOCK(imagebox)[5] -->
<p>&nbsp;</p>
<h4>NSA Lawyers: “It’s Nothing to Worry About”</h4>
<p>Sanchez, the surveillance expert with the Cato Institute, says the document serves as “a reminder that NSA essentially has carte blanche to spy on non-Americans. In public statements, intelligence officials always talk about spying on ‘terrorists,’ as if those are the only targets — but Section 702 [of the 2008 FISA Amendments Act] doesn&#8217;t say anything about ‘terrorists.’ They can authorize collection on any ‘persons reasonably believed to be [located] outside the United States,’ with ‘persons’ including pretty much any kind of group not ‘substantially’ composed of Americans.”</p>
<p>Sanchez notes that while it makes sense to subject some full-scale cyber-attacks to government surveillance, “it would make no sense to lump together foreign cyberattackers with sites voluntarily visited by enormous numbers of Americans, like Pirate Bay or WikiLeaks.”</p>
<p>Indeed, one entry in the NSA document expressly authorizes the targeting of a “malicious” foreign server – offering Pirate Bay as a specific example –“even if there is a possibility that U.S. persons could be using it as well.” NSA officials agree that there is no need to exclude Americans from the surveillance, suggesting only that the agency’s spies “try to minimize” how many U.S. citizens are caught in the dragnet.</p>
<!-- BLOCK(imagebox)[6](%7B%22componentName%22%3A%22IMAGEBOX%22%2C%22entityType%22%3A%22RESOURCE%22%2C%22resource%22%3A%7B%22__typename%22%3A%22Image%22%2C%22accessibleDescription%22%3Anull%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F02%5C%2Fwikileaks3.png%22%7D%7D)(%7B%22className%22%3A%22default%22%2C%22src%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F02%5C%2Fwikileaks3.png%22%2C%22style%22%3A%7B%22border%22%3A%221px%20solid%20%23333%22%7D%2C%22title%22%3Anull%7D) --><div class='default' style='border:1px solid #333;'><img data-recalc-dims="1" src="https://theintercept.com/wp-content/uploads/2014/02/wikileaks3.png?w=1200" alt='' title='' /></div><!-- END-BLOCK(imagebox)[6] -->
<p>Another entry even raises the possibility of using X-KEYSCORE, one of the agency’s most comprehensive surveillance programs, to target communications between two U.S.-based Internet addresses if they are operating through a “proxy” being used for “malicious foreign activity.” In response, the NSA’s Threat Operations Center approves the targeting, but the agency’s general counsel requests “further clarification before signing off.”</p>
<!-- BLOCK(imagebox)[7](%7B%22componentName%22%3A%22IMAGEBOX%22%2C%22entityType%22%3A%22RESOURCE%22%2C%22resource%22%3A%7B%22__typename%22%3A%22Image%22%2C%22accessibleDescription%22%3Anull%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F02%5C%2Fwikileaks4.png%22%7D%7D)(%7B%22className%22%3A%22default%22%2C%22src%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F02%5C%2Fwikileaks4.png%22%2C%22style%22%3A%7B%22border%22%3A%221px%20solid%20%23333%22%7D%2C%22title%22%3Anull%7D) --><div class='default' style='border:1px solid #333;'><img data-recalc-dims="1" src="https://theintercept.com/wp-content/uploads/2014/02/wikileaks4.png?w=1200" alt='' title='' /></div><!-- END-BLOCK(imagebox)[7] -->
<p>If WikiLeaks were improperly targeted, or if a U.S. citizen were swept up in the NSA’s surveillance net without authorization, the agency’s attitude seems to be one of indifference. According to the document – which quotes a response by the NSA’s Office of General Counsel and the oversight and compliance office of its Threat Operations Center – discovering that an American has been selected for surveillance must be mentioned in a quarterly report, “but it’s nothing to worry about.”</p>
<!-- BLOCK(imagebox)[8](%7B%22componentName%22%3A%22IMAGEBOX%22%2C%22entityType%22%3A%22RESOURCE%22%2C%22resource%22%3A%7B%22__typename%22%3A%22Image%22%2C%22accessibleDescription%22%3Anull%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F02%5C%2Fwikileaks5.png%22%7D%7D)(%7B%22className%22%3A%22default%22%2C%22src%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F02%5C%2Fwikileaks5.png%22%2C%22style%22%3A%7B%22border%22%3A%221px%20solid%20%23333%22%7D%2C%22title%22%3Anull%7D) --><div class='default' style='border:1px solid #333;'><img data-recalc-dims="1" src="https://theintercept.com/wp-content/uploads/2014/02/wikileaks5.png?w=1200" alt='' title='' /></div><!-- END-BLOCK(imagebox)[8] -->
<p>The attempt to target WikiLeaks and its broad network of supporters drew sharp criticism from the group and its allies. “These documents demonstrate that the political persecution of WikiLeaks is very much alive,” says Baltasar Garzón, the Spanish former judge who now represents the group. “The paradox is that Julian Assange and the WikiLeaks organization are being treated as a threat instead of what they are: a journalist and a media organization that are exercising their fundamental right to receive and impart information in its original form, free from omission and censorship, free from partisan interests, free from economic or political pressure.”</p>
<p>For his part, Assange remains defiant. “The NSA and its U.K. accomplices show no respect for the rule of law,” he told <em>The Intercept</em><i>. </i>“But there is a cost to conducting illicit actions against a media organization.” Referring to a <a href="https://wikileaks.org/Updated-Press-Release-WikiLeaks.html" target="_blank" rel="noopener">criminal complaint</a> that the group filed last year against “interference with our journalistic work in Europe,” Assange warned that “no entity, including the NSA, should be permitted to act against a journalist with impunity.”</p>
<p>Assange indicated that in light of the new documents, the group may take further legal action.</p>
<p>“We have instructed our general counsel, Judge Baltasar Garzón<b><i>, </i></b>to prepare the appropriate response,” he said. “The investigations into attempts to interfere with WikiLeaks’ work will go wherever they need to go. Make no mistake: those responsible will be held to account and brought to justice.”</p>
<p><em>Documents referenced in this article:</em></p>
<ul>
<li><a href="https://theintercept.com/document/2014/02/18/psychology-new-kind-sigdev/">Psychology: A New Kind of SIGDEV</a></li>
<li><a href="https://theintercept.com/document/2014/02/18/discovery-sigint-targeting-scenarios-compliance/">Discovery SIGINT Targeting Scenarios and Compliance</a></li>
</ul>
<p>The post <a href="https://theintercept.com/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/">Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/feed/</wfw:commentRss>
                <slash:comments>372</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2014/02/julian_assange.jpg?fit=659%2C462' width='659' height='462' /><post-id xmlns="com-wordpress:feed-additions:1">1030</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2014/02/piwik2.png?w=1200" />
		<media:content url="https://theintercept.com/wp-content/uploads/2014/02/piwik2.png?w=1200" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2014/02/piwik1.png?w=1200" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2014/02/manhunting1.png?w=1200" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2014/02/assange_pressure.png?w=1200" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2014/02/wikileaks1.png?w=1200" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2014/02/wikileaks2.png?w=1200" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2014/02/wikileaks3.png?w=1200" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2014/02/wikileaks4.png?w=1200" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2014/02/wikileaks5.png?w=1200" medium="image" />
            </item>
            </channel>
</rss>
