Patrice Riemens on Sun, 23 Jun 2013 22:40:23 +0200 (CEST)


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

<nettime> Peter Ludlow: The Strange Case of Barrett Brown (The Nation)


Original to The Nation
http://www.thenation.com/article/174851/strange-case-barrett-brown#ixzz2X1oYM1xV



 The Strange Case of Barrett Brown

Amid the outrage over the NSA's spying program, the jailing of
journalist Barrett Brown points to a deeper and very troubling
problem.

by Peter Ludlow
June 18, 2013
&#8194;

In early 2010, journalist and satirist Barrett Brown was working
on a book on political pundits, when the hacktivist collective
Anonymous caught his attention. He soon began writing about its
activities and potential. In a defense of the group?s anti-censorship
operations in Australia published on February 10, Brown declared, ?I
am now certain that this phenomenon is among the most important and
under-reported social developments to have occurred in decades, and
that the development in question promises to threaten the institution
of the nation-state and perhaps even someday replace it as the world?s
most fundamental and relevant method of human organization.?

By then, Brown was already considered by his fans to be the Hunter S.
Thompson of his generation. In point of fact he wasn?t like Hunter
S. Thompson, but was more of a throwback?a sharp-witted, irreverent
journalist and satirist in the mold of Ambrose Bierce or Dorothy
Parker. His acid tongue was on display in his co-authored 2007 book,
Flock of Dodos: Behind Modern Creationism, Intelligent Design and the
Easter Bunny, in which he declared: ?This will not be a polite book.
Politeness is wasted on the dishonest, who will always take advantage
of any well-intended concession.?

But it wasn?t Brown?s acid tongue so much as his love of minutiae
(and ability to organize and explain minutiae) that would ultimately
land him in trouble. Abandoning his book on pundits in favor of a
book on Anonymous, he could not have known that delving into the
territory of hackers and leaks would ultimately lead to his facing the
prospect of spending the rest of his life in prison. In light of the
bombshell revelations published by Glenn Greenwald and Barton Gellman
about government and corporate spying, Brown?s case is a good?and
underreported?reminder of the considerable risk faced by reporters who
report on leaks.

In February 2011, a year after Brown penned his defense of Anonymous,
and against the background of its actions during the Arab Spring,
Aaron Barr, CEO of the private intelligence company HBGary, claimed to
have identified the leadership of the hacktivist collective. (In fact,
he only had screen names of a few members). Barr?s boasting provoked
a brutal hack of HBGary by a related group called Internet Feds (it
would soon change its name to ?LulzSec?). Splashy enough to attract
the attention of The Colbert Report, the hack defaced and destroyed
servers and websites belonging to HBGary. Some 70,000 company e-mails
were downloaded and posted online. As a final insult to injury, even
the contents of Aaron Barr?s iPad were remotely wiped.

The HBGary hack may have been designed to humiliate the company, but
it had the collateral effect of dropping a gold mine of information
into Brown?s lap. One of the first things he discovered was a plan
to neutralize Glenn Greenwald?s defense of Wikileaks by undermining
them both. (?Without the support of people like Glenn, wikileaks
would fold,? read one slide.) The plan called for ?disinformation,?
exploiting strife within the organization and fomenting external
rivalries??creating messages around actions to sabotage or discredit
the opposing organization,? as well as a plan to submit fake documents
and then call out the error.? Greenwald, it was argued, ?if pushed,?
would ?choose professional preservation over cause.?

Other plans targeted social organizations and advocacy groups.
Separate from the plan to target Greenwald and WikiLeaks, HBGary was
part of a consortia that submitted a proposal to develop a ?persona
management? system for the United States Air Force, that would allow
one user to control multiple online identities for commenting in
social media spaces, thus giving the appearance of grassroots support
or opposition to certain policies.

The data dump from the HBGary hack was so vast that no one person
could sort through it alone. So Brown decided to crowdsource the
effort. He created a wiki page, called it ProjectPM, and invited other
investigative journalists to join in. Under Brown?s leadership, the
initiative began to slowly untangle a web of connections between the
US government, corporations, lobbyists and a shadowy group of private
military and information security consultants.

One connection was between Bank of America and the Chamber of
Commerce. WikiLeaks had claimed to possess a large cache of documents
belonging to Bank of America. Concerned about this, Bank of America
approached the United States Department of Justice. The DOJ directed
it to the law and lobbying firm Hunton and Williams, which does legal
work for Wells Fargo and General Dynamics and also lobbies for Koch
Industries, Americans for Affordable Climate Policy, Gas Processors
Association, Entergy among many other firms. The DoJ recommended
that Bank of America hire Hunton and Williams, explicitly suggesting
Richard Wyatt as the person to work with. Wyatt, famously, was the
lead attorney in the Chamber of Commerce?s lawsuit against the Yes
Men.

In November 2010, Hunton and Williams organized a number of private
intelligence, technology development and security contractors?HBGary,
plus Palantir Technologies, Berico Technologies and, according
to Brown, a secretive corporation with the ominous name Endgame
Systems?to form ?Team Themis???themis? being a Greek word meaning
?divine law.? Its main objective was to discredit critics of the
Chamber of Commerce, like Chamber Watch, using such tactics as
creating a ?false document, perhaps highlighting periodical financial
information,? giving it to a progressive group opposing the Chamber,
and then subsequently exposing the document as a fake to ?prove that
US Chamber Watch cannot be trusted with information and/or tell the
truth.? In addition, the group proposed creating a ?fake insider
persona? to infiltrate Chamber Watch. They would ?create two fake
insider personas, using one as leverage to discredit the other while
confirming the legitimacy of the second.? The leaked e-mails showed
that similar disinformation campaigns were being planned against
WikiLeaks and Glenn Greenwald.

It was clear to Brown that these were actions of questionable
legality, but beyond that, government contractors were attempting to
undermine Americans? free speech?with the apparent blessing of the
DOJ. A group of Democratic congressmen asked for an investigation into
this arrangement, to no avail.

By June 2011, the plot had thickened further. The FBI had the goods
on the leader of LulzSec, one Hector Xavier Monsegur, who went
under the nom de guerre Sabu. The FBI arrested him on June 7, 2011,
and (according to court documents) turned him into an informant
the following day. Just three days before his arrest, Sabu had
been central to the formation of a new group called AntiSec, which
comprised his former LulzSec crew members, as well as members as
Anonymous. In early December AntiSec hacked the website of a private
security company called Stratfor Global Intelligence. On Christmas
Eve, it released a trove of some 5 million internal company e-mails.
AntiSec member and Chicago activist Jeremy Hammond has pled guilty to
the attack and is currently facing ten years in prison for it.

The contents of the Stratfor leak were even more outrageous than those
of the HBGary hack. They included discussion of opportunities for
renditions and assassinations. For example, in one video, Statfor?s
vice president of intelligence, Fred Burton, suggested taking
advantage of the chaos in Libya to render Lockerbie bomber Abdelbaset
al-Megrahi, who had been released from prison on compassionate grounds
due to his terminal illness. Burton said that the case ?was personal.?
When someone pointed out in an e-mail that such a move would almost
certainly be illegal??This man has already been tried, found guilty,
sentenced?and served time??another Stratfor employee responded that
this was just an argument for a more efficient solution: "One more
reason to just bugzap him with a hellfire. :-)"

(Stratfor employees also seemed to take a keen interest in Jeremy
Scahill's writings about Blackwater in The Nation, copying and
circulating entire articles, with comments suggesting a principle
interest was in the question of whether Blackwater was setting up a
competing intelligence operation. E-mails also showed grudging respect
for Scahill: "Like or dislike Scahill's position (or what comes of his
work), he does an amazing job outing [Blackwater].")

When the contents of the Stratfor leak became available, Brown decided
to put ProjectPM on it. A link to the Stratfor dump appeared in an
Anonymous chat channel; Brown copied it and pasted it into the private
chat channel for ProjectPM, bringing the dump to the attention of the
editors.

Brown began looking into Endgame Systems, an information security
firm that seemed particularly concerned about staying in the shadows.
"Please let HBGary know we don?t ever want to see our name in a press
release," one leaked e-mail read. One of its products, available for a
$2.5 million annual subscription, gave customers access to "zero-day
exploits"?security vulnerabilities unknown to software companies?for
computer systems all over the world. Business Week published a story
on Endgame in 2011, reporting that "Endgame executives will bring up
maps of airports, parliament buildings, and corporate offices. The
executives then create a list of the computers running inside the
facilities, including what software the computers run, and a menu of
attacks that could work against those particular systems." For Brown,
this raised the question of whether Endgame was selling these exploits
to foreign actors and whether they would be used against computer
systems in the United States. Shortly thereafter, the hammer came
down.

The FBI acquired a warrant for Brown?s laptop, gaining the authority
to seize any information related to HBGary, Endgame Systems, Anonymous
and, most ominously, "email, email contacts, ?chat?, instant messaging
logs, photographs, and correspondence." In other words, the FBI wanted
his sources.

When the FBI went to serve Brown, he was at his mother?s house. Agents
returned with a warrant to search his mother?s house, retrieving
his laptop. To turn up the heat on Brown, the FBI initiated charges
against his mother for obstruction of justice for concealing his
laptop computer in her house. (Facing criminal charges, on March
22, 2013, his mother, Karen McCutchin, pled guilty to one count of
obstructing the execution of a search warrant. She faces up to twelve
months in jail. Brown maintains that she did not know the laptop was
in her home.)

By his own admission, the FBI?s targeting of his mother made Brown
snap. In September 2012, he uploaded an incoherent YouTube video, in
which he explained that he had been in treatment for an addiction to
heroin, taking the medication Suboxone, but had gone off his meds and
now was in withdrawal. He threatened the FBI agent that was harassing
his mother, by name, warning:

"I know what?s legal, I know what?s been done to me.? And if it?s
legal when it?s done to me, it?s going to be legal when it?s done to
FBI Agent Robert Smith?who is a criminal."

"That?s why [FBI special agent] Robert Smith?s life is over. And when
I say his life is over, I?m not saying I?m going to kill him, but I
am going to ruin his life and look into his fucking kids?. How do you
like them apples?"

The media narrative was immediately derailed. No longer would this be
a story about the secretive information-military-industrial complex;
now it was the sordid tale of a crazy drug addict threatening an FBI
agent and his (grown) children. Actual death threats against agents
are often punishable by a few years in jail. But Brown?s actions made
it easier for the FBI to sell some other pretext to put him away for
life.

The Stratfor data included a number of unencrypted credit card numbers
and validation codes. On this basis, the DOJ accused Brown of credit
card fraud for having shared that link with the editorial board
of ProjectPM. Specifically, the FBI charged him with traffic in
stolen authentication features, access device fraud and aggravated
identity theft, as well as an obstruction of justice charge (for being
at his mother?s when the initial warrant was served) and charges
stemming from his threats against the FBI agent. All told, Brown is
looking at century of jail time: 105 years in federal prison if served
sequentially. He has been denied bail.

Considering that the person who carried out the actual Stratfor
hack had several priors and is facing a maximum of ten years, the
inescapable conclusion is that the problem is not with the hack
itself but with Brown?s journalism. As Glenn Greenwald remarked inThe
Guardian: ?It is virtually impossible to conclude that the obscenely
excessive prosecution he now faces is unrelated to that journalism and
his related activism.?

Today, Brown is in prison and ProjectPM is under increased scrutiny
by the DOJ, even as its work has ground to a halt. In March, the DOJ
served the domain hosting service CloudFlare with a subpoena for
all records on the ProjectPM website, and in particular asked for
the IP addresses of everyone who had accessed and contributed to
ProjectPM, describing it as a ?forum? through which Brown and others
would ?engage in, encourage, or facilitate the commission of criminal
conduct online.? The message was clear: Anyone else who looks into
this matter does so at their grave peril.

Some journalists are now understandably afraid to go near the
Stratfor files. The broader implications of this go beyond Brown;
one might think that what we are looking at is Cointelpro 2.0?an
outsourced surveillance state?but in fact it?s worse. One can?t help
but infer that the US Department of Justice has become just another
security contractor, working alongside the HBGarys and Stratfors on
behalf of corporate bidders, with no sense at all for the justness
of their actions; they are working to protect corporations and
private security contractors and give them license to engage in
disinformation campaigns against ordinary citizens and their advocacy
groups. The mere fact that the FBI?s senior cybersecurity advisor
has recently moved to Hunton and Williams shows just how incestuous
this relationship has become. Meanwhile, the Department of Justice
is also using its power and force to trample on the rights of
citizens like Barrett Brown who are trying to shed light on these
nefarious relationships. In order to neutralize those who question or
investigate the system, laws are being reinterpreted or extended or
otherwise misappropriated in ways that are laughable?or would be if
the consequences weren?t so dire.

While the media and much of the world have been understandably
outraged by the revelation of the NSA?s spying programs, Barrett
Brown?s work was pointing to a much deeper problem. It isn?t the sort
of problem that can be fixed by trying to tweak a few laws or by
removing a few prosecutors. The problem is not with bad laws or bad
prosecutors. What the case of Barrett Brown has exposed is that we
confronting a different problem altogether. It is a systemic problem.
It is the failure of the rule of law.

Journalist Michael Hastings, 33, died in a car crash yesterday. Read
Greg Mitchell?s obituary here. Peter Ludlow June 18, 2013

About the Author
Peter Ludlow, a professor of philosophy at Northwestern University, is
currently co-producing (with Vivien Lesnik Weisman) a documentary on
hacktivist actions against private intelligence firms and the surveillance
state.

Also by the Author
WikiLeaks and Hacktivist Culture (Internet and New Media, Law, Media
Activism, Peace Activism)




#  distributed via <nettime>: no commercial use without permission
#  <nettime>  is a moderated mailing list for net criticism,
#  collaborative text filtering and cultural politics of the nets
#  more info: http://mx.kein.org/mailman/listinfo/nettime-l
#  archive: http://www.nettime.org contact: nettime@kein.org