Contact theSOPAbout theSOPSupport theSOPWritersEditorsManaging Editors
theSOP logo
Published:April 9th, 2010 09:55 EST
CIA Planned to Destroy WikiLeaks?

CIA Planned to Destroy WikiLeaks?

By SOP newswire2

The entire report my be viewed at www.wikileaks.org

 

This document is a classifed (SECRET/NOFORN) 32 page U.S. counterintelligence investigation into WikiLeaks.

The possibility that current employees or moles within DoD or elsewhere in the U.S. government are providing

sensitive or classified information to Wikileaks.org cannot be ruled out ". It concocts a plan to fatally marginalize

the organization. Since WikiLeaks uses trust as a center of gravity by protecting the anonymity and identity of the

insiders, leakers or whisteblowers ", the report recommends The identification, exposure, termination of employment,

criminal prosecution, legal action against current or former insiders, leakers, or whistlblowers could potentially damage

or destroy this center of gravity and deter others considering similar actions from using the Wikileaks.org Web site ".

[As two years have passed since the date of the report, with no WikiLeaks` source exposed, it appears that this plan

was ineffective]. As an odd justificaton for the plan, the report claims that Several foreign countries including China,

Israel, North Kora, Russia, Vietnam, and Zimbabwe have denounced or blocked access to the Wikileaks.org website ".

The report provides further justification by enumerating embarrassing stories broken by WikiLeaks "U.S. equipment

expenditure in Iraq, probable U.S. violations of the Cemical Warfare Convention Treaty in Iraq, the battle over the

Iraqi town of Fallujah and human rights violations at Guantanmo Bay. Note that the report contains a number of

inaccurances, for instance, the claim that WikiLeaks has no editorial control. The report concludes with 13 items of

intelligence to be answered about WikiLeaks.

(U) Executive Summary

(S//NF) Wikileaks.org, a publicly accessible Internet Web site, represents a potential force

protection, counterintelligence, operational security (OPSEC), and information security

(INFOSEC) threat to the US Army. The intentional or unintentional leaking and posting of US

Army sensitive or classified information to Wikileaks.org could result in increased threats to

DoD personnel, equipment, facilities, or installations. The leakage of sensitive and classified

DoD information also calls attention to the insider threat, when a person or persons motivated by

a particular cause or issue wittingly provides information to domestic or foreign personnel or

organizations to be published by the news media or on the Internet. Such information could be of

value to foreign intelligence and security services (FISS), foreign military forces, foreign

insurgents, and foreign terrorist groups for collecting information or for planning attacks against

US force, both within the United States and abroad.

(S//NF) The possibility that a current employee or mole within DoD or elsewhere in the US

government is providing sensitive information or classified information to Wikileaks.org cannot

be ruled out. Wikileaks.org claims that the "leakers " or "whistleblowers " of sensitive or

classified DoD documents are former US government employees. These claims are highly

suspect, however, since Wikileaks.org states that the anonymity and protection of the leakers or

whistleblowers is one of its primary goals. Referencing of leakers using codenames and

providing incorrect employment information, employment status, and other contradictory

information by Wikileaks.org are most likely rudimentary OPSEC measures designed to protect

the identity of the current or former insiders who leaked the information. On the other hand, one

cannot rule out the possibility that some of the contradictions in describing leakers could be

inadvertent OPSEC errors by the authors, contributors, or Wikileaks.org staff personnel with

limited experience in protecting the identity of their sources.

(U) The stated intent of the Wikileaks.org Web site is to expose unethical practices, illegal

behavior, and wrongdoing within corrupt corporations and oppressive regimes in Asia, the

former Soviet bloc, Sub-Saharan Africa, and the Middle East. To do so, the developers of the

Wikileaks.org Web site want to provide a secure forum to where leakers, contributors, or

whistleblowers from any country can anonymously post or send documentation and other

information that exposes corruption or wrongdoing by governments or corporations. The

developers believe that the disclosure of sensitive or classified information involving a foreign

government or corporation will eventually result in the increased accountability of a democratic,

oppressive, or corrupt the government to its citizens.[2]

(S//NF) Anyone can post information to the Wikileaks.org Web site, and there is no editorial

review or oversight to verify the accuracy of any information posted to the Web site. Persons

accessing the Web site can form their own opinions regarding the accuracy of the information

posted, and they are allowed to post comments. This raises the possibility that the Wikileaks.org

Web site could be used to post fabricated information; to post misinformation, disinformation,

and propaganda; or to conduct perception management and influence operations designed to

convey a negative message to those who view or retrieve information from the Web site.[3]

 

The entire report my be viewed at www.wikileaks.org

 

The document you have been reading was passed to us by an individual stepping forward to reveal the truth or

preserve the integrity of the historical record. WikiLeaks is acknowledged to be the most successful defender of

confidential sources and the public`s right to know. If you have confidential material, contact us securely at:

https://secure.wikileaks.org/