I wonder what happened to the Wikileaks expose of Bank of America.
You may recall that shortly after the Wikileaks’ dump of US Military files (Bradley Manning), Julian Assange promised that documents were coming showing illegal practices at Bank of America. One day later it was breathlessly reported that Assange is a pervert and rapist. Now those documents are yesterday’s news. Nothing’s been released.
You may also remember what happened to Elliot Spitzer after he became governor? As Attorney General, he was known as The Sheriff of Wall Street where he was feared and loathed. As Governor he had power to hurt them with exposure and regulation. Voila! Another sexual perversion surfaces.
In February, after Assange’s announcement of Wikileak’s planned release – and the subsequent personal smears – this story appeared at their site:
Bank of America using Private Intel Firms to Attack Wikileaks
In a document titled “The WikiLeaks Threat” three data intelligence companies, Plantir Technologies, HBGary Federal and Berico Technologies, outline a plan to attack Wikileaks. They are acting upon request from Hunton and Williams, a law firm working for Bank of America. The Department of Justice recommended the law firm to Bank of America according to an article in The Tech Herald. The prosed attacks on WikiLeaks according to the slides include these actions:
- Feed the fuel between the feuding groups. Disinformation. Create messages around actions of sabotage or discredit the opposing organizations. Submit fake documents and then call out the error.
- Create concern over the security of the infrastructure. Create exposure stories. If the process is believed not to be secure they are done.
- Cyber attacks against the infrastructure to get data on document submitters. This would kill the project. Since the servers are now in Sweden and France putting a team together to get access is more straightforward.
- Media campaign to push the radial and reckless nature of WikiLeaks activities. Sustain pressure. Does nothing for the fanatics, but creates concern and doubt among moderates.
- Search for leaks. Use social media to profile and identify risky behavior of employees.
And TPM has observed that:
. . . the Gitmo files could be Assange’s last hurrah. Wikileaks’ encrypted submission has been broken for more than a year now, which means no new juicy tidbits have been coming in.
It’s too easy.