, 58 tweets, 8 min read Read on Twitter
#CAKENEWS

Julian Assange, WikiLeaks founder, faces 17 more charges in new U.S. indictment latimes.com/politics/la-na…
Charges-
On November 30, 2009, Manning saved a text file entitled "wl-press.txt" to her
external hard drive and to an encrypted container on her computer. The file stated, "You can
currently contact our investigations editor directly in Iceland +354 862 3481; 24 hour service; ask
for
'Julian Assange.'" Similarly, on December 8, 2009, Manning ran several searches on Intelink
relating to Guantanamo Bay detainee operations, interrogations, and standard operating procedures
or "SOPs." These search terms were yet again consistent with WikiLeaks's
"Most Wanted Leaks,"
which sought Guantanamo Bay operating and interrogation SOPs under the "Military and
Intelligence" category.
ASSANGE Revealed the Names of Human Sources and Created a Grave and
Imminent Risk to Human Life.
35. Also following Manning's arrest, during 2010 and 2011, ASSANGE published via
the WikiLeaks website the documents classified up to the SECRET level that he had obtained
from
Manning, as described in paragraphs 12, 21, and 27, including approximately 75,000
Afghanistan war-related significant activity reports, 400,000 Iraq war-related significant activities
reports, 800 Guantanamo Bay detainee assessment briefs, £ind 250,000
U.S. Department of State
cables.
These
sources included journalists, religious leaders, human rights advocates, and political dissidents
who were living in repressive regimes and reported to the United States the abuses of their own
government, and the political conditions within their countries, at great risk
to their own safety.
By publishing these documents without redacting the human sources' names or other identifying
information, ASSANGE created a grave and imminent risk that the innocent people he named
would suffer serious physical harm and/or arbitrary detention.
On May 2, 2011, United States armed forces raided the compound of Osama bin
Laden in Abbottabad, Pakistan. During the raid, they collected a number of items of digital media,
which included the following: (1) a letter from bin Laden to another member of the terrorist
organization
al-Qaeda in which bin Laden requested that the member gather the DoD material
posted to WikiLeaks, (2) a letter from that same member of al-Qaeda to Bin Laden with
information from the Afghanistan War Documents provided by Manning to WikiLeaks and
released by WikiLeaks, and
(3) Department of State information provided by Manning to
WikiLeaks and released by WikiLeaks.
In an interview in August 2010, ASSANGE called it "regrettable" that sources
disclosed by WikiLeaks "may face some threat as a result." But, in the same interview, ASSANGE
insisted that "we are not obligated to protect other people's sources, military sources or spy
organization
sources, except from unjust retribution," adding that in general "there are numerous
cases where people sell information ... or frame others or are engaged in genuinely traitorous
behavior and actually that is something for the public to know about."
On July 30,2010, the New York Times published an article entitled "Taliban Study
WikiLeaks to Hunt Informants." The article stated that, after the release of the Afghanistan war
significant activity reports, a member of the Taliban contacted the New York Times and stated,
"We are studying the report. We knew about the spies and people who collaborate with U.S.
forces. We will investigate through our own secret service whether the people mentioned are really
spies working for the U.S. If they are U.S. spies, then we know how to punish them."
When
confronted about such reports, ASSANGE said, "The Taliban is not a coherent outfit, but we don't
say that it is absolutely impossible that anything we ever publish will ever result in harm—^we
cannot say that."
---At no point was ASSANGE a citizen of the United States, nor did he hold a United
States security clearance or otherwise have authorization to receive, possess, or communicate
classified information.---
Between in or about November 2009 and in or about May 2010, in an offense begun
and committed outside of the jurisdiction of any particular state or district of the United States, the
defendant, JULIAN PAUL ASSANGB, who will be first brought to the Eastern District of
Virginia,
and others unknown to the Grand Jury, knowingly and unlawfully obtained and aided,
abetted, counseled, induced, procured and willfully caused Manning to obtain documents,
writings, and notes connected with the national defense, for the purpose of obtaining information
respecting
the national defense—^namely, detainee assessment briefs classified up to the SECRET
level related to detainees who were held at Guantanamo Bay—^and with reason to believe that
the
information was to be used to the injury of the United States or the advantage of any foreign nation.
Count 11-

Between in or about November 2009 and in or about May 2010, in an offense begun
and committed outside of the jurisdiction of any particular state or district of the United States, the
defendant, JULIAN PAUL ASSANGE, who will be first brought to the Eastern District of
Virginia, and others unknown to the Grand Jury, aided, abetted, counseled, induced, procured and
willfully caused Manning, who had lawful possession of, access to, and control over documents
relating to the national defense—^namely, Iraq rules of engagement files classified
up to the
SECRET level—^to communicate, deliver, and transmit the documents to ASSANGE, a person
not entitled to receive them.
Between in or about November 2009 and in or about May 2010, in an offense begun
and committed outside of the jurisdiction of any particular state or district of the United States, the
defendant, JULIAN PAUL ASSANGE, who will be first brought to the Eastern District of
Virginia,
and others unknown to the Grand Jury, aided, abetted, counseled, induced, procured and
willfully caused Manning, who had unauthorized possession of, access to, and control over
documents relating to the national defense—^namely, detainee assessment briefs classified up to
the
SECRET level related to detainees who were held at Guantanamo Bay—^to communicate,
deliver, and transmit the documents to ASSANGE, a person not entitled to receive them.
Between in or about November 2009 and in or about May 2010, in an offense begun
and committed outside of the jurisdiction of any particular state or district of the United States, the
defend^t, JULIAN PAUL ASSANGE, who will be first brought to the Eastern District of
Virginia,
and others unknown to the Grand Jury, aided, abetted, counseled, induced, procured and
willfully caused Manning, who had unauthorized possession of, access to, and control over
documents relating to the national defense—^namely, U.S. Department of State cables classified
up to
the SECRET level—^to communicate, deliver, and transmit the documents to ASSANGE, a
person not entitled to receive them.
Between in or about November 2009 and in or about May 2010, in an offense begun
and committed outside of the jurisdiction of any particular state or district of the United States, the
defendant, JULIAN PAUL ASSANGE, who will be first brought to the Eastern District of
Virginia,
and others unknown to the Grand Jury, aided, abetted, counseled, induced, procured and
willfully caused Manning, who had unauthorized possession of, access to, and control over
documents relating to the national defense—^namely, Iraq rules of engagement files classified up
to
the SECRET level—^to communicate, deliver, and transmit the documents to ASSANGE, a
person not entitled to receive them.
From in or about July 2010 and continuing until at least the time of this Superseding
Indictment, in an offense begun and committed outside of the jurisdiction of any particular state
or district of the United States, the defendant, JULIAN PAUL ASSANGE, who will be first
brought
to the Eastern District of Virginia, having unauthorized possession of, access to, and
control over documents relating to the national defense, willfully and unlawfully caused and
attempted to cause such materials to be communicated, delivered, and transmitted to persons not
entitled to receive them.
C. Specifically, as alleged above, ASSANGE, having unauthorized possession of
significant activity reports, classified up to the SECRET level, from the Afghanistan war
containing the names of individuals, who risked their safety and freedom by providing
information
to the United States and our allies, communicated the documents containing names of those
sources to all the world by publishing them on the Internet.
Specifically, as alleged above, ASSANGE, having unauthorized possession of
significant activity reports, classified up to the SECRET level, from the Iraq war containing the
names of individuals, who risked their safety and freedom by providing information to the United
States
and our allies, communicated the documents containing names of those sources to all the
world by publishing them on the Internet.
Specifically, as alleged above, ASSANGE, having unauthorized possession of State
Department cables, classified up to the SECRET level, containing the names of individuals, who
risked their safety and freedom by providing information to the United States and our allies,
communicated the documents containing names of those sources to all the world by publishing
them on the Internet.
(A) to knowingly access a computer, without authorization and exceeding
authorized access, to obtain information that has been determined by the United States
Government pursuant to an Executive order and statute to require protection against
unauthorized disclosure for reasons
of national defense and foreign relations, namely,
documents relating to the national defense classified up to the SECRET level, with reason
to believe that such information so obtained could be used to the injury of the United States
and the advantage of any foreign nation, and
to willfully communicate, deliver, transmit,
and cause to be communicated, delivered, or transmitted the same, to any person not
entitled to receive it, and willfully retain the same and fail to deliver it to the officer or
employee entitled to receive it; and
(B) to intentionally access a computer, without authorization and exceeding
authorized access, to obtain information from a department and agency of the United States
PURPOSE AND OBJECT OF THE CONSPIRACY
The primary purpose of the conspiracy was to facilitate Manning's acquisition and
transmission of classified information related to the national defense of the United States so that
WikiLeaks could publicly disseminate
the information on its website.
1. It was part of the conspiracy that ASSANGE and Manning used the "Jabber" online
chat service to collaborate on the acquisition and dissemination of the classified records, and to
enter into the agreement to crack the password hash stored on United States Department of Defense
computers cormected to the Secret Internet Protocol Network.
2. It was part of the conspiracy that ASSANGE and Manning took measures to
conceal Manning as the source of the disclosure of classified records to WikiLeaks, including by
removing usernames from the disclosed
information and deleting chat logs between ASSANGE
and Manning.
3. It was . part of the conspiracy that ASSANGE encouraged Manning to provide
information and records from departments and agencies of the United States.
4. It was part of the conspiracy that ASSANGE and Manning
used a special folder on
a cloud drop box of WikiLeaks to transmit classified records containing information related to the
national defense of the United States.
•In order to furdier the goals and puiposes of the conspiracy, ASSANGE and his
conspirators conunitted overt acts, including, but not liniited to, the following:
1. On or about March 2,2010, Manning copied a Linux operating system to a CD, to
allow Manning to access a United
States Department of Defense computer file that was accessible
only to users with administrative-level privileges. ..
2. On of about March 8,2010, Manning provided ASSANGE with part of a password
hash stored on United States Department of Defense computers connected to the
Secret Internet
I
Protocol Network.
3. On or about March 10, 2010, ASSANGE requested more informatiori firom
Manning related to the password hash. ASSANGE indicated that he had been tiydng to crack the
password hash by stating that he had "no luck so far."
-Finished-

There are some issues with OCR typos- My apologies

18 Count indictment in total-

I did not include them all-

I put the information here that I felt most relevant-

ONΞ
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to ΞLΞVΞNTH
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!