If someone allegedly gave Manning encryption software that would help download documents to pass onto WikiLeaks, then presumably Manning deployed that in Iraq. And if someone from WikiLeaks allegedly gave Manning software that subsequently got loaded onto DOD computers in Iraq, then it might explain their current theory of prosecution for conspiracy to leak this information.
|By: emptywheel Monday January 10, 2011 5:00 pm|
|By: David Dayen Monday November 29, 2010 6:38 am|
Here’s what I’m looking at as Congress returns for the last of the lame duck session today. . . .
|By: TobyWollin Monday April 19, 2010 8:00 pm|
Our lives are filled to the brim; we have literally hundreds if not thousands of pieces of media throw up at us every single day. We don’t have a single moment to spare to figure out what to pay attention to. It’s mind-boggling. So, here, tonight, right on our stage, Aunt Toby is going to give you The Guide to the Un-News using today’s headlines (sort of like “The Guide to the Recently Deceased” only the bodies involved probably stink more).
|By: emptywheel Saturday March 27, 2010 4:00 pm|
Cass Sunstein doesn’t really have all that much to do with the content of this post. I named it after him as an excuse to recommend that you read Glenn Greenwald’s take-down of Sunstein as a potential SCOTUS appointee, and particularly to remind you of Sunstein’s paper advocating extensive propaganda to knock down the theories of those Sunstein deems to have committed “cognitive blunders.” There is no evidence Sunstein’s theories of governmental information control have to do with the apparent increasing persecution of open source leak outlets, but it does seem to stem from the same kind of authoritarian instinct.
|By: Kirk Murphy Friday January 30, 2009 5:04 pm|
I can’t figure out if these Bushies are doing it for the usual bribes, or because they’re homicidally jealous of sentient beings.