Hacktivist Jeremy Hammond’s message to the world
November 15, 2013

Jeremy Hammond, a 28-year-old political activist, was sentenced today to 10 years in prison after pleading guilty to participating in the Anonymous hack into the computers of the private intelligence firm Strategic Forecasting (Stratfor). The Ceremonial Courtroom at the Federal Court for the Southern District of New York was filled today with an outpouring of support by journalists, activists and other whistleblowers who see Jeremy Hammond’s actions as a form of civil disobedience, motivated by a desire to protest and expose the secret activities of private intelligence corporations.

The following is Hammond’s final statement to the New York court:

Good morning. Thank you for this opportunity. My name is Jeremy Hammond and I’m here to be sentenced for hacking activities carried out during my involvement with Anonymous. I have been locked up at MCC for the past 20 months and have had a lot of time to think about how I would explain my actions.

Before I begin, I want to take a moment to recognize the work of the people who have supported me. I want to thank all the lawyers and others who worked on my case: Elizabeth Fink, Susan Kellman, Sarah Kunstler, Emily Kunstler, Margaret Kunstler, and Grainne O’Neill. I also want to thank the National Lawyers Guild, the Jeremy Hammond Defense Committee and Support Network, Free Anons, the Anonymous Solidarity Network, Anarchist Black Cross, and all others who have helped me by writing a letter of support, sending me letters, attending my court dates, and spreading the word about my case. I also want to shout out my brothers and sisters behind bars and those who are still out there fighting the power.

The acts of civil disobedience and direct action that I am being sentenced for today are in line with the principles of community and equality that have guided my life. I hacked into dozens of high profile corporations and government institutions, understanding very clearly that what I was doing was against the law, and that my actions could land me back in federal prison. But I felt that I had an obligation to use my skills to expose and confront injustice—and to bring the truth to light.

Could I have achieved the same goals through legal means? I have tried everything from voting petitions to peaceful protest and have found that those in power do not want the truth to be exposed. When we speak truth to power we are ignored at best and brutally suppressed at worst. We are confronting a power structure that does not respect its own system of checks and balances, never mind the rights of it’s own citizens or the international community.

My introduction to politics was when George W. Bush stole the Presidential election in 2000, then took advantage of the waves of racism and patriotism after 9/11 to launch unprovoked imperialist wars against Iraq and Afghanistan. I took to the streets in protest naively believing our voices would be heard in Washington and we could stop the war. Instead, we were labeled as traitors, beaten, and arrested.

I have been arrested for numerous acts of civil disobedience on the streets of Chicago, but it wasn’t until 2005 that I used my computer skills to break the law in political protest. I was arrested by the FBI for hacking into the computer systems of a right-wing, pro-war group called Protest Warrior, an organization that sold racist t-shirts on their website and harassed anti-war groups. I was charged under the Computer Fraud and Abuse Act, and the “intended loss” in my case was arbitrarily calculated by multiplying the 5000 credit cards in Protest Warrior’s database by $500, resulting in a total of $2.5 million.My sentencing guidelines were calculated on the basis of this “loss,” even though not a single credit card was used or distributed – by me or anyone else. I was sentenced to two years in prison.

While in prison I have seen for myself the ugly reality of how the criminal justice system destroys the lives of the millions of people held captive behind bars. The experience solidified my opposition to repressive forms of power and the importance of standing up for what you believe.

When I was released, I was eager to continue my involvement in struggles for social change. I didn’t want to go back to prison, so I focused on above-ground community organizing. But over time, I became frustrated with the limitations, of peaceful protest, seeing it as reformist and ineffective. The Obama administration continued the wars in Iraq and Afghanistan, escalated the use of drones, and failed to close Guantanamo Bay.

Around this time, I was following the work of groups like Wikileaks and Anonymous. It was very inspiring to see the ideas of hactivism coming to fruition. I was particularly moved by the heroic actions of Chelsea Manning, who had exposed the atrocities committed by U.S. forces in Iraq and Afghanistan. She took an enormous personal risk to leak this information – believing that the public had a right to know and hoping that her disclosures would be a positive step to end these abuses. It is heart-wrenching to hear about her cruel treatment in military lockup.

I thought long and hard about choosing this path again. I had to ask myself, if Chelsea Manning fell into the abysmal nightmare of prison fighting for the truth, could I in good conscience do any less, if I was able? I thought the best way to demonstrate solidarity was to continue the work of exposing and confronting corruption.

I was drawn to Anonymous because I believe in autonomous, decentralized direct action. At the time Anonymous was involved in operations in support of the Arab Spring uprisings, against censorship, and in defense of Wikileaks. I had a lot to contribute, including technical skills, and how to better articulate ideas and goals. It was an exciting time—the birth of a digital dissent movement, where the definitions and capabilities of hacktivism were being shaped.

I was especially interested in the work of the hackers of LulzSec who were breaking into some significant targets and becoming increasingly political. Around this time, I first started talking to Sabu, who was very open about the hacks he supposedly committed, and was encouraging hackers to unite and attack major government and corporate systems under the banner of Anti Security. But very early in my involvement, the other Lulzsec hackers were arrested, leaving me to break into systems and write press releases. Later, I would learn that Sabu had been the first one arrested, and that the entire time I was talking to him he was an FBI informant.

Anonymous was also involved in the early stages of Occupy Wall Street. I was regularly participating on the streets as part of Occupy Chicago and was very excited to see a worldwide mass movement against the injustices of capitalism and racism. In several short months, the “Occupations” came to an end, closed by police crackdowns and mass arrests of protestors who were kicked out of their own public parks. The repression of Anonymous and the Occupy Movement set the tone for Antisec in the following months – the majority of our hacks against police targets were in retaliation for the arrests of our comrades.

I targeted law enforcement systems because of the racism and inequality with which the criminal law is enforced. I targeted the manufacturers and distributors of military and police equipment who profit from weaponry used to advance U.S. political and economic interests abroad and to repress people at home. I targeted information security firms because they work in secret to protect government and corporate interests at the expense of individual rights, undermining and discrediting activists, journalists and other truth seekers, and spreading disinformation.

I had never even heard of Stratfor until Sabu brought it to my attention. Sabu was encouraging people to invade systems, and helping to strategize and facilitate attacks. He even provided me with vulnerabilities of targets passed on by other hackers, so it came as a great surprise when I learned that Sabu had been working with the FBI the entire time.

On December 4, 2011, Sabu was approached by another hacker who had already broken into Stratfor’s credit card database. Sabu, under the watchful eye of his government handlers, then brought the hack to Antisec by inviting this hacker to our private chatroom, where he supplied download links to the full credit card database as well as the initial vulnerability access point to Stratfor’s systems.

I spent some time researching Stratfor and reviewing the information we were given, and decided that their activities and client base made them a deserving target. I did find it ironic that Stratfor’s wealthy and powerful customer base had their credit cards used to donate to humanitarian organizations, but my main role in the attack was to retrieve Stratfor’s private email spools which is where all the dirty secrets are typically found.

It took me more than a week to gain further access into Stratfor’s internal systems, but I eventually broke into their mail server. There was so much information, we needed several servers of our own in order to transfer the emails. Sabu, who was involved with the operation at every step, offered a server, which was provided and monitored by the FBI. Over the next weeks, the emails were transferred, the credit cards were used for donations, and Stratfor’s systems were defaced and destroyed. Why the FBI would introduce us to the hacker who found the initial vulnerability and allow this hack to continue remains a mystery.

As a result of the Stratfor hack, some of the dangers of the unregulated private intelligence industry are now known. It has been revealed through Wikileaks and other journalists around the world that Stratfor maintained a worldwide network of informants that they used to engage in intrusive and possibly illegal surveillance activities on behalf of large multinational corporations.

After Stratfor, I continued to break into other targets, using a powerful “zero day exploit” allowing me administrator access to systems running the popular Plesk webhosting platform. Sabu asked me many times for access to this exploit, which I refused to give him. Without his own independent access, Sabu continued to supply me with lists of vulnerable targets. I broke into numerous websites he supplied, uploaded the stolen email accounts and databases onto Sabu’s FBI server, and handed over passwords and backdoors that enabled Sabu (and, by extension, his FBI handlers) to control these targets.

These intrusions, all of which were suggested by Sabu while cooperating with the FBI, affected thousands of domain names and consisted largely of foreign government websites, including those ofXXXXXXX,XXXXXXXX,XXXX,XXXXXX,XXXXX,XXXXXXXX,XXXXXXXand theXXXXXX XXXXXXX. In one instance, Sabu and I provided access information to hackers who went on to deface and destroy many government websites inXXXXXX. I don’t know how other information I provided to him may have been used, but I think the government’s collection and use of this data needs to be investigated. 

The government celebrates my conviction and imprisonment, hoping that it will close the door on the full story. I took responsibility for my actions, by pleading guilty, but when will the government be made to answer for its crimes?

The U.S. hypes the threat of hackers in order to justify the multi billion dollar cyber security industrial complex, but it is also responsible for the same conduct it aggressively prosecutes and claims to work to prevent. The hypocrisy of “law and order” and the injustices caused by capitalism cannot be cured by institutional reform but through civil disobedience and direct action. Yes I broke the law, but I believe that sometimes laws must be broken in order to make room for change.

In the immortal word of Frederick Douglas, “Power concedes nothing without a demand. It never did and it never will. Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them, and these will continue till they are resisted with either words or blows, or both. The limits of tyrants are prescribed by the endurance of those whom they oppress.”

This is not to say that I do not have any regrets. I realize that I released the personal information of innocent people who had nothing to do with the operations of the institutions I targeted. I apologize for the release of data that was harmful to individuals and irrelevant to my goals. I believe in the individual right to privacy—from government surveillance, and from actors like myself, and I appreciate the irony of my own involvement in the trampling of these rights. I am committed to working to make this world a better place for all of us. I still believe in the importance of hactivism as a form of civil disobedience, but it is time for me to move on to other ways of seeking change. My time in prison has taken a toll on my family, friends, and community. I know I am needed at home. I recognize that 7 years ago I stood before a different federal judge, facing similar charges, but this does not lessen the sincerity of what I say to you today.

It has taken a lot for me to write this, to explain my actions, knowing that doing so—honestly—could cost me more years of my life in prison. I am aware that I could get as many as 10 years, but I hope that I do not, as I believe there is so much work to be done.



A profound injustice was committed today. Transparency activist Jeremy Hammond has been sentenced to 10 years in prison for leaking internal emails from the firm Stratfor to Wikileaks, which revealed massive unlawful surveillance by corporations. For this act of conscience, Hammond will spend the next decade of his life behind bars.

Via Center for Constitutional Rights

Jeremy Hammond gets ten year in federal prison for helping expose Stratfor’s collusion with the US government’s spying on it’s own people.

The unrepentant pedo on the right got 2 years. The average murderer, around 6 years. Only 6% of rapists ever serve incarceration time. (3% from other sources who might be using unreported rapes in their methodology)


I sat in the front row of a New York federal court in November 2013 the day Jeremy Hammond was sentenced to 10 years in prison for hacking into the computers of a private security firm that works on behalf of the government, including the Department of Homeland Security, the Marine Corps, the Defense Intelligence Agency, and corporations such as Dow Chemical and Raytheon. Hammond, then age twenty-six, released to WikiLeaks, Rolling Stone, and other publications some 5 million emails in 2011 from the Texas-based company Strategic Forecasting Inc., or Stratfor. His four co-defendants, convicted in Great Britain, were sentenced to less time combined—the longest sentence was 32 months—than the 120-month sentence meted out to Hammond.

Jeremy Hammond’s a hero who exposed surveillance-state secrets. His excessive prison sentence should terrify us all

Anonymous hacker behind Stratfor attack faces life in prison
November 23, 2012

A pretrial hearing in the case against accused LulzSec hacker Jeremy Hammond this week ended with the 27-year-old Chicago man being told he could be sentenced to life in prison for compromising the computers of Stratfor.

Judge Loretta Preska told Hammond in a Manhattan courtroom on Tuesday that he could be sentenced to serve anywhere from 360 months-to-life if convicted on all charges relating to last year’s hack of Strategic Forecasting, or Stratfor, a global intelligence company whose servers were infiltrated by an offshoot of the hacktivist collective Anonymous.

Hammond is not likely to take the stand until next year, but so far has been imprisoned for eight months without trial. Legal proceedings in the case might soon be called into question, however, after it’s been revealed that Judge Preska’s husband was a victim of the Stratfor hack.

According to the indictment filed in March, Hammond illegally obtained credit card information stolen from Stratfor and uploaded it to a server that was unbeknownst to him maintained by the federal government. Months earlier the FBI had arrested Hector Xavier Monsegur, a New York hacker who spearheaded LulzSec under the alias “Sabu,” and relied on from thereon out to help the authorities nab other individuals affiliated with Anonymous and LulzSec. The feds say Hammond openly admitted to compromising Stratfor’s data in online chats with their informant and unsealed a three count indictment against him relating to hacking back in March.

After Anons gained access to Stratfor’s servers, they collected a trove of internal emails and more thousands of credit card details belonging to the firm’s paid subscribers that were released last Christmas. A class action suit was filed against Strafor over the breach of security, and in June the company settled with its customers at an estimated cost of $1.75 million. Just now, though, it’s been learned that Judge Preska may have a vested interest in seeking a prosecution by any means necessary.

Among the thousands of Statfor client’s whose credit card data was compromised in the hack alleged to be linked to Hammond is Thomas J. Kavaler, a partner at the law firm of Cahill Gordon & Reindel LLP and the husband of Judge Preska. The archived document dump released by LulzSec last year includes personal information from Mr. Kavaler that suggests he was victimized in the attack and thus qualifies for the class action settlement.

In a press release issued under the branding of the Anonymous collective, supporters for Hammond call for Judge Preska’s immediate resignation from the case.

“Judge Preska by proxy is a victim of the very crime she intends to judge Jeremy Hammond for. Judge Preska has failed to disclose the fact that her husband is a client of Stratfor and recuse herself from Jeremy’s case, therefore violating multiple Sections of Title 28 of the United States Code,” the statement reads.

“Judge Loretta Preska’s impartiality is compromised by her Husband’s involvement with Stratfor and a clear prejudice against Hammond exists, as evident by her statements,” it continues. “Without justice being freely, fully, and impartially administered, neither our persons, nor our rights, nor our property, can be protected.”

According to Sue Crabtree, a member of the Jeremy Hammond Solidarity Network and a witness to his bail hearing this week, Judge Preska ordered the continue incarceration of Hammond on the basis that he is a danger to the community and likely to flee the country if released from holding. Crabtree notes that Hammond does not now nor has he ever had a passport, though, and has also since been added to a terrorist watch list.

“In the end, Jeremy was denied bail because he was deemed a flight risk and more dangerous than [a] sexual predator. And yes, if you are asking yourself if this was said, it was said. Jeremy’s legal team stated they would appeal this denial of bail,” she writes on a Facebook group for Hammond.

After Anonymous went public with the hack of Strafor in December 2011, the internal emails from the intelligence firm were handed off to WikiLeaks, who soon after began publishing the findings. Among the information stored in the emails was documentation alleging that law enforcement agencies spied on Occupy Wall Street protesters and proof of an international surveillance system called Trapwire. Hammond is at this point likely to be the first US citizen tried in a civilian court for crimes relating to the whistleblower site.

Michael Ratner of the Center for Constitutional Rights (CCR) tells The Real News network this week that the denial of bail is both “very disturbing” and “legally wrong.”

“The bigger story is what they’ve done in this country to Jeremy Hammond, Bradley Manning, and what they have proposed to do to Julian Assange, and that’s really say that they’re going to come down as heavily as they can on people who expose government secrets, whistleblowers,” Ratner says.


WikiLeaks Blows The Whistle on ‘TrapWire’, A Government Funded Surveillance Program

Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology — and have installed it across the US under the radar of most Americans, according to emails hacked by Anonymous.

Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. It’s part of a program called TrapWire and it’s the brainchild of the Abraxas, a Northern Virginia company staffed with elite from America’s intelligence community. The employee roster at Arbaxas reads like a who’s who of agents once with the Pentagon, CIA and other government entities according to their public LinkedIn profiles, and the corporation’s ties are assumed to go deeper than even documented.

The details on Abraxas and, to an even greater extent TrapWire, are scarce, however, and not without reason. For a program touted as a tool to thwart terrorism and monitor activity meant to be under wraps, its understandable that Abraxas would want the program’s public presence to be relatively limited. But thanks to last year’s hack of the Strategic Forecasting intelligence agency, or Stratfor, all of that is quickly changing.

Hacktivists aligned with the loose-knit Anonymous collective took credit for hacking Stratfor on Christmas Eve, 2011, in turn collecting what they claimed to be more than five million emails from within the company. WikiLeaks began releasing those emails as the Global Intelligence Files (GIF) earlier this year and, of those, several discussing the implementing of TrapWire in public spaces across the country were circulated on the Web this week after security researcher Justin Ferguson brought attention to the matter. At the same time, however, WikiLeaks was relentlessly assaulted by a barrage of distributed denial-of-service (DDoS) attacks, crippling the whistleblower site and its mirrors, significantly cutting short the number of people who would otherwise have unfettered access to the emails.

According to a press release (pdf) dated June 6, 2012, TrapWire is “designed to provide a simple yet powerful means of collecting and recording suspicious activity reports.” A system of interconnected nodes spot anything considered suspect and then input it into the system to be “analyzed and compared with data entered from other areas within a network for the purpose of identifying patterns of behavior that are indicative of pre-attack planning.”

In a 2009 email included in the Anonymous leak, Stratfor Vice President for Intelligence Fred Burton is alleged to write, TrapWire is a technology solution predicated upon behavior patterns in red zones to identify surveillance. It helps you connect the dots over time and distance. Burton formerly served with the US Diplomatic Security Service, and Abraxas’ staff includes other security experts with experience in and out of the Armed Forces.

What is believed to be a partnering agreement included in the Stratfor files from August 13, 2009 indicates that they signed a contract with Abraxas to provide them with analysis and reports of their TrapWire system (pdf).

Since its inception, TrapWire has been implemented in most major American cities at selected high value targets (HVTs) and has appeared abroad as well. The iWatch monitoring system adopted by the Los Angeles Police Department (pdf) works in conjunction with TrapWire, as does the District of Columbia and the "See Something, Say Something” program conducted by law enforcement in New York City, which had 500 surveillance cameras linked to the system in 2010. Private properties including Las Vegas, Nevada casinos have subscribed to the system. The State of Texas reportedly spent half a million dollars with an additional annual licensing fee of $150,000 to employ TrapWire, and the Pentagon and other military facilities have allegedly signed on as well.

In one email from 2010 leaked by Anonymous, Stratfor’s Fred Burton allegedly writes, “God Bless America. Now they have EVERY major HVT in CONUS, the UK, Canada, Vegas, Los Angeles, NYC as clients. Files on reveal that the US Department of Homeland Security and Department of Defense together awarded Abraxas and TrapWire more than one million dollars in only the past eleven months.

Rapists don’t get ten years in prison. People who crash the world economy don’t get ten years in prison. They don’t even have _charges_ brought against them!

I love WikiLeaks – by which I mean that any organization that helps ferret out the secrets of states or the nefarious secrets of corporations deserves a cozy place in my heart. But as anyone who has experienced my love can tell you, it’s not always lovely. So I don’t feel bad at all about taking the business end of my press-crit rake to the latest WikiLeaks project, “The Global Intelligence Files.”

The Files contain in excess of 5 million emails from the Texas-based private intelligence firm Stratfor. WikiLeaks appears to have obtained the email from the hackers at Anonymous, who nicked the haul late last year. There may be great stuff in the 5 million emails, but the files released thus far, which International Business Times puts at 194 emails, underwhelm.

Today’s email dump and the first set of stories based on them aren’t a complete waste because they help demystify both WikiLeaks and Stratfor. Both organizations are capable of doing “good” work. But little of that is on display here.

Reuters Opinion: “Wikiyawn” by Jack Shafer

Why The Media Ignores Jeremy Hammond While Praising Edward Snowden

Jeremy Hammond’s hack of Stratfor, a corporate intelligence agency, created global solidarity by revealing how the 1% targets activists worldwide.

From Mint Press News / By Kit O’Connell

The mainstream media has devoted hundreds of articles to NSA whistleblower Edward Snowden, the subject of the Oscar-winning documentary “Citizenfour,” but it’s not devoted the same level of attention to many…

View On WordPress

Jeremy Hammond, the hactivist who gave $700,000 to charities with stolen credit cards and showed the world how security company Stratfor spies on resistance movements, has been transferred to a new prison. Please send him some love and support.

Jeremy Hammond
FCI Petersburg Medium
P.O. BOX 1000

Members of the group anonymous say they have stolen credit card information for the purpose of charity. About $1 million was reportedly stolen from Stratfor, in Austin, Texas, a leading provider of military, economic and political analysis for clients that include Apple and the U.S. Air Force. 

Anonymous is a network of computer savvy users who engage in hacktivism, “computer activism.” An operation began in June 2011, with an attack on the Serious Organized Crime Agency, the U.K.’s national law enforcement agency. Since then, Anonymous went after the governments of Brazil, Tunisia and Zimbabwe, NATO, various U.S. law enforcement websites and Fox News. 

Details are emerging about the extent of an anonymous hack on security think tank Strategic Forecasting that was first reported Christmas Day and appears to have affected some 50,000 individuals.

Austin, Texas-based Strategic Forecasting, or Stratfor, disclosed over the weekend that its Web site, which remains down, was hacked and information about its corporate subscribers–who include the likes of the U.S. Army, U.S. Air Force, and Miami Police Department–was disclosed. AntiSec, an Anonymous-affiliated hacktivist group, quickly claimed responsibility and promised “mayhem” with plans to release even more documents.

Documents from the hack posted to date by both Anonymous and AntiSec, according to Identity Finder, include:Identity Finder, a New York-based data loss and identity theft prevention service, today published a report stating that AntiSec has so far released personal information obtained in the hack for Stratfor subscribers with first names beginning with A through M. The rest of the alphabet, along with what AntiSec claims are copies of 2.7 million e-mails, are expected to be released in upcoming days.

• 50,277 unique credit card numbers, of which 9,651 are not expired. 
• 86,594 e-mail addresses, of which 47,680 are unique. 
• 27,537 phone numbers, of which 25,680 are unique. 
• 44,188 encrypted passwords, of which roughly 50 percent could be easily cracked. 

Some reports said Anonymous’ stated goal was to steal money from individual accounts to give as Christmas donations to organizations like the American Red Cross and Save the Children.VentureBeat said that on Christmas Day, Anonymous had posted five receipts of donations it had made to charities using stolen cards.

CNET was unable to track down Stratfor officials for comment Tuesday night, but a Facebook post by Chief Executive George Friedman confirms the breach, noting that the company will offer identity theft protection and monitoring services to affected subscribers. He adds that some of the people whose names were published by AntiSec had simply subscribed to the firm’s publications and did not have a deeper relationship with the company.

Identity Finder CEO Todd Feinman said credit card fraud related to the incident has already been “well documented.” “This is the latest data leak by ‘breachers’ who not only hack into corporations but also breach their data privacy by posting the information online,” Feinman said in a statement. “Unfortunately this problem will only get worse unless corporations minimize their data footprint and shrink their data target.”

Indeed, this is just the latest attack by Anonymous and its offshoots, who have gained notoriety for their denial-of-service attacks and data breaches on a host of targets. From Sony and the CIA to bankers, police officers, and Fox News, the attacks were, for months, almost a daily occurrence. And with the emergence of the Occupy Wall Street protests, Anonymous actions have become more organized and focused on a cause–political protest of financial inequality and corporate influence.

Stratfor was likely targeted not only because of its client list of major companies and government entities but also to highlight its apparent security glitches.
WikiLeaks Releases "Global Intelligence Files"

WikiLeaks released today what it’s calling “The Global Intelligence Files.” The document dump comes from over five million emails from STRATFOR, a Texas-based intelligence firm that offers subscription-based geopolitical analysis to its clients.

Via WikiLeaks:

The emails date from between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal’s Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defense Intelligence Agency. The emails show Stratfor’s web of informers, pay-off structure, payment-laundering techniques and psychological methods, for example:

“[Y]ou have to take control of him. Control means financial, sexual or psychological control… This is intended to start our conversation on your next phase” – CEO George Friedman to Stratfor analyst Reva Bhalla on 6 December 2011, on how to exploit an Israeli intelligence informant providing information on the medical condition of the President of Venezuala, Hugo Chavez.

The material contains privileged information about the US government’s attacks against Julian Assange and WikiLeaks and Stratfor’s own attempts to subvert WikiLeaks. There are more than 4,000 emails mentioning WikiLeaks or Julian Assange. The emails also expose the revolving door that operates in private intelligence companies in the United States. Government and diplomatic sources from around the world give Stratfor advance knowledge of global politics and events in exchange for money. The Global Intelligence Files exposes how Stratfor has recruited a global network of informants who are paid via Swiss banks accounts and pre-paid credit cards. Stratfor has a mix of covert and overt informants, which includes government employees, embassy staff and journalists around the world.

As usual, WikiLeaks is working with media partners around the world to amplify the materials' release. Among the participants are Rolling Stone, McClatchy, L'Espresso, Al Akkhbar (Lebanon), Nawaat (Tunisia), The Hindu (India) and Dawn Media (Pakistan) among others.

Oddly, among the others are The Yes Men.

Any journalist in the United States should be concerned about the precedent that the Barrett Brown case sets for people who share information, report on hacking, or those who use hackers as sources.
—  Kevin Gallagher, a writer and activist who heads the Free Barrett Brown support network talks to Democracy Now! about the five-year prison term given to journalist and activist Barrett Brown.

Activists demand judge step down in Jeremy Hammond case
December 1, 2012

Supporters of Jeremy Hammond, the Chicago hacktivist denied bail by a federal judge in New York for his role in the hack of Stratfor, a private intelligence firm, are now demanding the judge in the case recuse herself. Judge Loretta Preska denied bail to Hammond in court last week, saying that the alleged anonymous affiliated hacker posed a “substantial danger to the community.” Information revealed since her ruling shows that Preska’s husband, Thomas Kaveler is employed by Cahill Gordon & Reindel LLP, a client of Stratfor, and Kaveler himself was a victim of the hack.

According to a press release from the collective Anonymous, Kaveler’s email address and other data was published by Wikileaks after the Stratfor hack. Preska never disclosed this information and supporters of Hammond say that conflicts with her ability to give him a fair trial. “Judge Loretta Preska’s impartiality is compromised by her husband’s involvement with Stratfor and a clear prejudice against Hammond exists, as evidenced by her statements,” the press release stated.

Truthout reports Gideon Oliver, president of the New York chapter of the National Lawyers Guild told supporters at a rally in New York on Thursday that, “The court regularly releases people accused of crimes more serious than the crimes Jeremy is accused of. Jeremy’s continuing pre-trial imprisonment will severely hamper his attorney’s ability to prepare a defense and defend Jeremy at trial.”

Hammond potentially faces 30 years to life imprisonment if convicted. He has been held for eight months without bail or trial and is not expected to take the stand until next year.