Skip to content or view screen version

Is Stratfor spying on you? Wikileaks.

Alex Smith | 07.03.2012 16:59 | Ecology | Policing | Repression | Sheffield

Private American spy agency Stratfor outed by Wikileaks. Audio of Julian Assange, Yes Men, Bhopal charities, Spanish & Italian Press reveal privatization of government docs for sale to corporations, spying on charities & NGO's, and more. Are you being spied on by this American company? Best of press conference London Feb 27th, 2012. Radio Ecoshock show 120307

Amazing revelations about the depth of privatized spy agencies.

Stratfor hires former U.S. government agents, and bribes insiders and journalists (possibly in contravention to the Foreign Corrupt Practices Act).

Wikileaks announces the initial release from a trove of 5 million Stratfor emails hacked by the group Anonymous.

CD Quality listen/download here:
 http://www.ecoshock.net/eshock12/ES_120307_Show.mp3

Stratfor emails brag about access to secret and classified U.S. government information. (When will they be investigated and charged?)

In one case, Stratfor agent Fred Burton suggests access to FBI files on PETA (People for the Ethical Treatment of Animals) for his client Coca Cola, regarding the Vancouver Winter Olympics 2010.

Other emails brag about access to drone attack info, and documents from Bin Laden's safe house.

The Stratfor emails also reveal a multinational effort to attack Wikileaks Editor in Chief Julian Assange. The promise to bankrupt him, plot to remove his Australian citizenship, and to jail him for decades if not life, using a secret Grand Jury indictment which Stratfor knows about (again, illegally). One Stratfor agent suggests killing Assange.

Surely the British Courts have to take these threats to Julian Assange seriously, in his case to avoid extradition to Sweden (the mid-way stop to mistreatment and life in prison in America, for this Australian citizen).

Stratfor has been shown to be incompetent, but still does planning for the U.S. Marines, and reports for the Air Force. It's a nest of vipers, as heard this week on Radio Ecoshock.

Includes direct source material, including analysis by Julian Assange of harmful big media mergers, not published elsewhere.

Support Julian Assange at  http://www.wikileaks.org

Alex Smith
- Homepage: http://www.ecoshock.org

Comments

Hide the following comment

arrest

08.03.2012 22:47

JEREMY HAMMOND, a/k/a “Anarchaos,” a/k/a “sup_g,” a/k/a “burn,” a/k/a “yohoho,” a/k/a “POW,” a/k/a “tylerknowsthis,”
a/k/a “crediblethreat,”
Jeremy Hammond is being charged with the computer hack on Stratfor.

Jeremy Hammond talk at Defcon regarding electronic civil disobedience
 http://video.google.com/videoplay?docid=1269112265902193941

Jeremy Hammond - Chicago Magazine Article
 http://www.chicagomag.com/Chicago-Magazine/July-2007/The-Hacktivist/


Feb. 27 WikiLeaks press conference: The Global Intelligence Files
 http://www.ustream.tv/recorded/20736311



INSIGHT - CT/CYBER - cyber and internet governance issues - EU105
 http://wikileaks.org/gifiles/docs/167291_-alpha-insight-ct-cyber-cyber-and-internet-governance-issues.html
 http://wikileaks.org/gifiles/attach/13/13943_GSC-CyberBulletin-4-October-2011.pdf

Re: hacker questions
 http://wikileaks.org/gifiles/docs/1549513_re-hacker-questions-.html

Fwd: Re: US 'to view major cyber attacks as acts of war'
 http://wikileaks.org/gifiles/docs/1661172_fwd-re-us-to-view-major-cyber-attacks-as-acts-of-war-.html

Cyber Security Question...
 http://wikileaks.org/gifiles/docs/5482669_cyber-security-question-.html

Re: cybersecurity
 http://wikileaks.org/gifiles/docs/5514431_re-cybersecurity-.html

re encryption guidance
 http://wikileaks.org/gifiles/docs/3464416_re-encryption-guidance-.html
 http://wikileaks.org/gifiles/docs/3546963_re-encryption-guidance-.html

palantir software
 http://wikileaks.org/gifiles/docs/745547_re-ct-tactical-palantir-software-.html

open-source-practice
 http://wikileaks.org/gifiles/docs/5091635_re-a-thought-on-open-source-practice-.html


DHS - Safeguarding Sensitive Information
 http://cryptocomb.org/DHS-Safeguarding-Sensitive-FOUO-Information.pdf

Anon Project Mayhem DHS Report
 http://cryptocomb.org/Project-Mayhem-DHS.pdf

PROTECTING SENSITIVE COMPARTMENTED INFORMATION WITHIN INFORMATION SYSTEMS - (SCIF Manual)
 http://cryptocomb.org/Protecting-SCI-Within-is-Manual-2004-FOUO.pdf

DHS Training Documents/Presentations regarding surveillance practices/procedures
 http://cryptocomb.org/DHS-training-materials-csoghoian-foia.zip

INTELLIGENCE SUPPORT TO URBAN OPERATIONS
 http://cryptocomb.org/FM_2-91.4_Intelligence_Support_to_Urban_Operations_(FOUO)_(Jan_2008).pdf

Building your presence with Facebook Pages: A guide for Military Organizations
 http://cryptocomb.org/FacebookGuideMilitaryOrgs.pdf

Homeland Security and Intelligence: Next Steps in Evolving the Mission
 http://cryptocomb.org/Next_Steps_in_Evolving_the_Mission.pdf

DoD Handling Dissent/Protest by Service Members
 http://cryptome.org/dodi/dodi-1325-06.pdf

Computer (In)security:Infiltrating Open Systems
 http://cryptome.org/compinsec.htm

DARPA RFP for Cyber Insider Threat
 http://cryptome.org/dodi/cinder.pdf

us-dhs-leftwing-extremist-cyber-threat
 http://wlstorage.net/file/us-dhs-leftwing-extremist-cyber-threat.pdf

NSA Overview of Cloud Computing
 http://cryptome.org/2012/01/nsa-cloud.pdf

Security and Privacy in Public Cloud Computing
 http://cryptome.org/0003/SP-800-144.pdf

DHS Updates Social Media Spying Targets
 http://cryptome.org/2012/01/dhs-sm-spy-a.pdf

DHS Joint Cybersecurity Services Pilot
 http://cryptome.org/2012/01/0080.pdf

NSA Review of Information for the Public
 http://cryptome.org/2012/01/0072.pdf

FBI Social Media and Open Sources Spying
 http://cryptome.org/2012/01/0065.pdf

British Bases in Cyprus and Signals Intelligence
 http://cryptome.org/2012/01/0060.pdf

Internet Trust Next Generation
 http://cryptome.org/2012/01/0042.pdf

PGP Spying
 http://cryptome.org/2012/01/0013.pdf

285 Pages of DHS Media Monitoring Docs
 http://epic.org/foia/epic-v-dhs-media-monitoring/EPIC-FOIA-DHS-Media-Monitoring-12-2012.pdf

Navy Critical Infrastructure Program
 http://cryptome.org/dodi/secnav-3501-1c.pdf

Air Force COMINT Solicitation
 http://cryptome.org/0006/af-comint-sol.pdf

Militarizing Civil Agencies for Peace of Mind
 http://cryptome.org/0005/gsa-1122.zip

Raytheon Cybersecurity Technology
 http://cryptome.org/0005/raytheon-cysec.zip

Raytheon Intelligence and Information Systems
 http://cryptome.org/raytheon-iis.pdf

Critical Infrastructure Needs Cybersecurity
 http://cryptome.org/0005/gao-11-865t.pdf

Marine Full Spectrum Cyberspace Operations
 http://cryptome.org/dodi/usmc-cyber.zip

DoD Strategy for Operating in Cyberspace
 http://cryptome.org/0005/dod-cyberspace.zip

FBI Computer Patheticism
 http://cryptome.org/nara/fbi/fbi-04-0204.pdf

Smart Grid Cybersecurity Weaknesses
 http://cryptome.org/0003/gao-11-117.zip
 http://cryptome.org/0003/nistir-7628.zip
 http://cryptome.org/0002/doe100510-2.pdf
 http://cryptome.org/0002/doe100510.pdf
 http://cryptome.org/2012/01/gao-12-507t.pdf

NSA And Computer Development
 http://cryptome.org/0002/nsa-computers.pdf

Global Free Flow of Information on the Internet
 http://cryptome.org/0002/doc092910.pdf

DARPA RFP for Cyber Insider Threat
 http://cryptome.org/dodi/cinder.pdf

China Military and Security Developments 2010
 http://cryptome.org/dodi/cmpr-2010.zip

False Blogs and Military Information Strategy
 http://cryptome.org/dodi/jsou-06-5.pdf

Electronic Intelligence (ELINT) at NSA
 http://cryptome.org/nsa-elint.zip

Field Manual 2.0 Intelligence
 http://cryptome.org/dodi/fm-2-0-intel.zip

Covert Blogs as Military Information Operations
 http://cryptome.org/covert-blogs.zip

Soviet Capabilities in Electronic Warfare
 http://cryptome.org/soviet-ew.zip
 http://cryptome.org/jya/rusigint.htm

How the FBI Surveils the Net
 http://cryptome.org/fbi-cgvop.zip

UK Police Guide to Computer/Electronic Evidence
 http://cryptome.org/acpo-guide.htm

NSA to intercept TETRA police networks
 http://cryptome.org/nsa-tetra.htm

CIA Head Forsees Better Hackers
 http://cryptome.org/jya/cia-hackers.htm

WarFighter Information
 http://cryptome.org/jya/win-ndx.htm

Hackers Are Out to Get You
 http://cryptome.org/jya/mirror.txt


r