Top-secret documents from the National Security Agency and its British counterpart reveal for the first time how the governments of the United States and the United Kingdom targeted WikiLeaks and other activist groups with tactics ranging from covert surveillance to prosecution.
The efforts ā detailed in documents provided previously by NSA whistleblower Edward Snowden ā included a broad campaign of international pressure aimed not only at WikiLeaks founder Julian Assange, but at what the U.S. government calls āthe human network that supports WikiLeaks.ā The documents also contain internal discussions about targeting the file-sharing site Pirate Bay and hacktivist collectives such as Anonymous.
One classified document from Government Communications Headquarters, Britainās top spy agency, shows that GCHQ used its surveillance system to secretly monitor visitors to a WikiLeaks site. By exploiting its ability to tap into the fiber-optic cables that make up the backbone of the Internet, the agency confided to allies in 2012, it was able to collect the IP addresses of visitors in real time, as well as the search terms that visitors used to reach the site from search engines like Google.
Another classified document from the U.S. intelligence community, dated August 2010, recounts how the Obama administration urged foreign allies to file criminal charges against Assange over the groupās publication of the Afghanistan war logs.
A third document, from July 2011, contains a summary of an internal discussion in which officials from two NSA offices ā including the agencyās general counsel and an arm of its Threat Operations Center ā considered designating WikiLeaks as āa āmalicious foreign actorā for the purpose of targeting.ā Such a designation would have allowed the group to be targeted with extensive electronic surveillance ā without the need to exclude U.S. persons from the surveillance searches.
In 2008, not long after WikiLeaks was formed, the U.S. Army prepared a report that identified the organization as an enemy, and plotted how it could be destroyed. The new documents provide a window into how the U.S. and British governments appear to have shared the view that WikiLeaks represented a serious threat, and reveal the controversial measures they were willing to take to combat it.
In a statement to The Intercept, Assange condemned what he called āthe reckless and unlawful behavior of the National Security Agencyā and GCHQās āextensive hostile monitoring of a popular publisherās website and its readers.ā
āNews that the NSA planned these operations at the level of its Office of the General Counsel is especially troubling,ā Assange said. āToday, we call on the White House to appoint a special prosecutor to investigate the extent of the NSAās criminal activity against the media, including WikiLeaks, its staff, its associates and its supporters.ā
Illustrating how far afield the NSA deviates from its self-proclaimed focus on terrorism and national security, the documents reveal that the agency considered using its sweeping surveillance system against Pirate Bay, which has been accused of facilitating copyright violations. The agency also approved surveillance of the foreign ābranchesā of hacktivist groups, mentioning Anonymous by name.
The documents call into question the Obama administrationās repeated insistence that U.S. citizens are not being caught up in the sweeping surveillance dragnet being cast by the NSA. Under the broad rationale considered by the agency, for example, any communication with a group designated as a āmalicious foreign actor,ā such as WikiLeaks and Anonymous, would be considered fair game for surveillance.
Julian Sanchez, a research fellow at the Cato Institute who specializes in surveillance issues, says the revelations shed a disturbing light on the NSAās willingness to sweep up American citizens in its surveillance net.
āAll the reassurances Americans heard that the broad authorities of the FISA Amendments Act could only be used to ātargetā foreigners seem a bit more hollow,ā Sanchez says, āwhen you realize that the āforeign targetā can be an entire Web site or online forum used by thousands if not millions of Americans.ā
GCHQ Spies on WikiLeaks Visitors
The system used by GCHQ to monitor the WikiLeaks website ā codenamed ANTICRISIS GIRL ā is described in a classified PowerPoint presentation prepared by the British agency and distributed at the 2012 āSIGDEV Conference.ā At the annual gathering, each member of the āFive Eyesā alliance ā the United States, United Kingdom, Canada, Australia and New Zealand ā describes the prior yearās surveillance successes and challenges.
In a top-secret presentation at the conference, two GCHQ spies outlined how ANTICRISIS GIRL was used to enable ātargeted website monitoringā of WikiLeaks (See slides 33 and 34). The agency logged data showing hundreds of users from around the world, including the United States, as they were visiting a WikiLeaks site ācontradicting claims by American officials that a deal between the U.K. and the U.S. prevents each country from spying on the otherās citizens.
The IP addresses collected by GCHQ are used to identify individual computers that connect to the Internet, and can be traced back to specific people if the IP address has not been masked using an anonymity service. If WikiLeaks or other news organizations were receiving submissions from sources through a public dropbox on their website, a system like ANTICRISIS GIRL could potentially be used to help track them down. (WikiLeaks has not operated a public dropbox since 2010, when it shut down its system in part due to security concerns over surveillance.)
In its PowerPoint presentation, GCHQ identifies its target only as āwikileaks.ā One slide, displaying analytics derived from the surveillance, suggests that the site monitored was the official wikileaks.org domain. It shows that users reached the targeted site by searching for āwikileaks.orgā and for āmaysan uxo,ā a term associated with a series of leaked Iraq war logs that are hosted on wikileaks.org.
The ANTICRISIS GIRL initiative was operated by a GCHQ unit called Global Telecoms Exploitation (GTE), which was previously reported by The Guardian to be linked to the large-scale, clandestine Internet surveillance operation run by GCHQ, codenamed TEMPORA.
Operating in the United Kingdom and from secret British eavesdropping bases in Cyprus and other countries, GCHQ conducts what it refers to as āpassiveā surveillance ā indiscriminately intercepting massive amounts of data from Internet cables, phone networks and satellites. The GTE unit focuses on developing āpioneering collection capabilitiesā to exploit the stream of data gathered from the Internet.
As part of the ANTICRISIS GIRL system, the documents show, GCHQ used publicly available analytics software called Piwik to extract information from its surveillance stream, not only monitoring visits to targeted websites like WikiLeaks, but tracking the country of origin of each visitor.
It is unclear from the PowerPoint presentation whether GCHQ monitored the WikiLeaks site as part of a pilot program designed to demonstrate its capability, using only a small set of covertly collected data, or whether the agency continues to actively deploy its surveillance system to monitor visitors to WikiLeaks. It was previously reported in The Guardian that X-KEYSCORE, a comprehensive surveillance weapon used by both NSA and GCHQ, allows āan analyst to learn the IP addresses of every person who visits any website the analyst specifies.ā
GCHQ refused to comment on whether ANTICRISIS GIRL is still operational. In an email citing the agencyās boilerplate response to inquiries, a spokeswoman insisted that āall of GCHQās work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorized, necessary and proportionate, and that there is rigorous oversight.ā
But privacy advocates question such assurances. āHow could targeting an entire websiteās user base be necessary or proportionate?ā says Gus Hosein, executive director of the London-based human rights group Privacy International. āThese are innocent people who are turned into suspects based on their reading habits. Surely becoming a target of a stateās intelligence and security apparatus should require more than a mere click on a link.ā
The agencyās covert targeting of WikiLeaks, Hosein adds, call into question the entire legal rationale underpinning the stateās system of surveillance. āWe may be tempted to see GCHQ as a rogue agency, ungoverned in its use of unprecedented powers generated by new technologies,ā he says. āBut GCHQās actions are authorized by [government] ministers. The fact that ministers are ordering the monitoring of political interests of Internet users shows a systemic failure in the rule of law.ā
Going After Assange and His Supporters
The U.S. attempt to pressure other nations to prosecute Assange is recounted in a file that the intelligence community calls its āManhunting Timeline.ā The document details, on a country-by-country basis, efforts by the U.S. government and its allies to locate, prosecute, capture or kill alleged terrorists, drug traffickers, Palestinian leaders and others. There is a timeline for each year from 2008 to 2012.
An entry from August 2010 ā headlined āUnited States, Australia, Great Britain, Germany, Icelandā ā states: āThe United States on August 10 urged other nations with forces in Afghanistan, including Australia, United Kingdom, and Germany, to consider filing criminal charges against Julian Assange.ā It describes Assange as the āfounder of the rogue Wikileaks Internet website and responsible for the unauthorized publication of over 70,000 classified documents covering the war in Afghanistan.ā
In response to questions from The Intercept, the NSA suggested that the entry is āa summary derived from a 2010 articleā in the Daily Beast. That article, which cited an anonymous U.S. official, reported that āthe Obama administration is pressing Britain, Germany, Australia, and other allied Western governments to consider opening criminal investigations of WikiLeaks founder Julian Assange and to severely limit his nomadic travels across international borders.ā
The government entry in the āManhunting Timelineā adds Iceland to the list of Western nations that were pressured, and suggests that the push to prosecute Assange is part of a broader campaign. The effort, it explains, āexemplifies the start of an international effort to focus the legal element of national power upon non-state actor Assange, and the human network that supports WikiLeaks.ā The entry does not specify how broadly the government defines that āhuman network,ā which could potentially include thousands of volunteers, donors and journalists, as well as people who simply spoke out in defense of WikiLeaks.
In a statement, the NSA declined to comment on the documents or its targeting of activist groups, noting only that the agency āprovides numerous opportunities and forums for their analysts to explore hypothetical or actual circumstances to gain appropriate advice on the exercise of their authorities within the Constitution and the law, and to share that advice appropriately.ā
But the entry aimed at WikiLeaks comes from credentialed officials within the intelligence community. In an interview in Hong Kong last June, Edward Snowden made clear that the only NSA officials empowered to write such entries are those āwith top-secret clearance and public key infrastructure certificatesā ā a kind of digital ID card enabling unique access to certain parts of the agencyās system. Whatās more, Snowden added, the entries are āpeer reviewedā ā and every edit made is recorded by the system.
The U.S. launched its pressure campaign against WikiLeaks less than a week after the group began publishing the Afghanistan war logs on July 25, 2010. At the time, top U.S. national security officials accused WikiLeaks of having ābloodā on its hands. But several months later, McClatchy reported that āU.S. officials concede that they have no evidence to date that the documents led to anyoneās death.ā
The government targeting of WikiLeaks nonetheless continued. In April 2011, Salon reported that a grand jury in Virginia was actively investigating both the group and Assange on possible criminal charges under espionage statutes relating to the publication of classified documents. And in August of 2012, the Sydney Morning Herald, citing secret Australian diplomatic cables, reported that āAustralian diplomats have no doubt the United States is still gunning for Julian Assangeā and that āAustraliaās diplomatic service takes seriously the likelihood that Assange will eventually be extradited to the US on charges arising from WikiLeaks obtaining leaked US military and diplomatic documents.ā
Bringing criminal charges against WikiLeaks or Assange for publishing classified documents would be highly controversial ā especially since the group partnered with newspapers like The Guardian and The New York Times to make the war logs public. āThe biggest challenge to the press today is the threatened prosecution of WikiLeaks, and itās absolutely frightening,ā James Goodale, who served as chief counsel of the Times during its battle to publish The Pentagon Papers, told the Columbia Journalism Review last March. āIf you go after the WikiLeaks criminally, you go after the Times. Thatās the criminalization of the whole process.ā
In November 2013, The Washington Post, citing anonymous officials, reported that the Justice Department strongly considered prosecuting Assange, but concluded it ācould not do so without also prosecuting U.S. news organizations and journalistsā who had partnered with WikiLeaks to publish the documents. According to the Post, officials ārealized that they have what they described as a āNew York Times problemāā ā namely, that any theory used to bring charges against Assange would also result in criminal liability for the Times, The Guardian, and other papers which also published secret documents provided to WikiLeaks.
NSA proposals to target WikiLeaks
As the new NSA documents make clear, however, the U.S. government did more than attempt to engineer the prosecution of Assange. NSA analysts also considered designating WikiLeaks as a āmalicious foreign actorā for surveillance purposes ā a move that would have significantly expanded the agencyās ability to subject the groupās officials and supporters to extensive surveillance.
Such a designation would allow WikiLeaks to be targeted with surveillance without the use of ādefeatsā ā an agency term for technical mechanisms to shield the communications of U.S. persons from getting caught in the dragnet.
That top-secret document ā which summarizes a discussion between the NSAās Office of the General Counsel and the Oversight and Compliance Office of the agencyās Threat Operations Center ā spells out a rationale for including American citizens in the surveillance:
āIf the foreign IP is consistently associated with malicious cyber activity against the U.S., so, tied to a foreign individual or organization known to direct malicious activity our way, then there is no need to defeat any to, from, or about U.S. Persons. This is based on the description that one end of the communication would always be this suspect foreign IP, and so therefore any U.S. Person communicant would be incidental to the foreign intelligence task.ā
In short, labeling WikiLeaks a āmalicious foreign targetā would mean that anyone communicating with the organization for any reason ā including American citizens ā could have their communications subjected to government surveillance.
When NSA officials are asked in the document if WikiLeaks or Pirate Bay could be designated as āmalicious foreign actors,ā the reply is inconclusive: āLet us get back to you.ā There is no indication of whether either group was ever designated or targeted in such a way.
The NSAās lawyers did, however, give the green light to subject other activists to heightened surveillance. Asked if it would be permissible to ātarget the foreign actors of a loosely coupled group of hackers ⦠such as with Anonymous,ā the response is unequivocal: āAs long as they are foreign individuals outside of the US and do not hold dual citizenship ⦠then you are okay.ā
NSA Lawyers: āItās Nothing to Worry Aboutā
Sanchez, the surveillance expert with the Cato Institute, says the document serves as āa reminder that NSA essentially has carte blanche to spy on non-Americans. In public statements, intelligence officials always talk about spying on āterrorists,ā as if those are the only targets ā but Section 702 [of the 2008 FISA Amendments Act] doesnāt say anything about āterrorists.ā They can authorize collection on any āpersons reasonably believed to be [located] outside the United States,ā with āpersonsā including pretty much any kind of group not āsubstantiallyā composed of Americans.ā
Sanchez notes that while it makes sense to subject some full-scale cyber-attacks to government surveillance, āit would make no sense to lump together foreign cyberattackers with sites voluntarily visited by enormous numbers of Americans, like Pirate Bay or WikiLeaks.ā
Indeed, one entry in the NSA document expressly authorizes the targeting of a āmaliciousā foreign server ā offering Pirate Bay as a specific example āāeven if there is a possibility that U.S. persons could be using it as well.ā NSA officials agree that there is no need to exclude Americans from the surveillance, suggesting only that the agencyās spies ātry to minimizeā how many U.S. citizens are caught in the dragnet.
Another entry even raises the possibility of using X-KEYSCORE, one of the agencyās most comprehensive surveillance programs, to target communications between two U.S.-based Internet addresses if they are operating through a āproxyā being used for āmalicious foreign activity.ā In response, the NSAās Threat Operations Center approves the targeting, but the agencyās general counsel requests āfurther clarification before signing off.ā
If WikiLeaks were improperly targeted, or if a U.S. citizen were swept up in the NSAās surveillance net without authorization, the agencyās attitude seems to be one of indifference. According to the document ā which quotes a response by the NSAās Office of General Counsel and the oversight and compliance office of its Threat Operations Center ā discovering that an American has been selected for surveillance must be mentioned in a quarterly report, ābut itās nothing to worry about.ā
The attempt to target WikiLeaks and its broad network of supporters drew sharp criticism from the group and its allies. āThese documents demonstrate that the political persecution of WikiLeaks is very much alive,ā says Baltasar Garzón, the Spanish former judge who now represents the group. āThe paradox is that Julian Assange and the WikiLeaks organization are being treated as a threat instead of what they are: a journalist and a media organization that are exercising their fundamental right to receive and impart information in its original form, free from omission and censorship, free from partisan interests, free from economic or political pressure.ā
For his part, Assange remains defiant. āThe NSA and its U.K. accomplices show no respect for the rule of law,ā he told The Intercept. āBut there is a cost to conducting illicit actions against a media organization.ā Referring to a criminal complaint that the group filed last year against āinterference with our journalistic work in Europe,ā Assange warned that āno entity, including the NSA, should be permitted to act against a journalist with impunity.ā
Assange indicated that in light of the new documents, the group may take further legal action.
āWe have instructed our general counsel, Judge Baltasar Garzón, to prepare the appropriate response,ā he said. āThe investigations into attempts to interfere with WikiLeaksā work will go wherever they need to go. Make no mistake: those responsible will be held to account and brought to justice.ā
ZNetwork is funded solely through the generosity of its readers.
Donate








