Donate for the Cryptome archive of files from June 1996 to the present


29 June 2014. Correction of host offer initiation.

[Image]

[Image]

28 June 2014

WikiLeaks Offer and Sarah Harrison Likely a Hoax

Previous: http://cryptome.org/2014/06/wikileaks-fails/wikileaks-offer-fails.htm


On 25 January 2014, by Tweet and by Twitter Direct Message, "WikiLeaks" offered to host Cryptome on its servers. Cryptome by DM asked "WikiLeaks" for preferred means to transfer a USB of the Cryptome Archives, requesting an answer by encrypted email to assure "WikiLeaks" was not an imposter.

To assure the proposal was legitimate Cryptome sent an encrypted email to Jacob Appelbaum <jacob[at]appelbaum.net> asking if he could authenticate the offer. Appelbaum has not responded.

The next day an encrypted email arrived from "Sarah Harrison <sarah[at]wikileaks.org>"

Date: Thu, 26 Jun 2014 14:14:19 +0000
From: sarah[at]wikileaks.org
To: cryptome[at]earthlink.net
Subject: GPG Encrypted Message

The decrypted message:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Hi,

I am writing regarding collection details. I can confirm who can 
do so later today. Can you please let me know where they should 
go and timing possibilities?

Many thanks. 

Best

Sarah
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
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=Q8AC
-----END PGP SIGNATURE-----

Attached: key.asc

The "key.asc" PK provided  (this key was not found on keyservers) and a PGPdump analysis:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.10 (GNU/Linux)
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=cfop
-----END PGP PUBLIC KEY BLOCK-----


PGPdump Results
Old: Public Key Packet(tag 6)(525 bytes)
        Ver 4 - new
        Public key creation time - Thu Jun 26 13:34:00 UTC 2014
        Pub alg - RSA Encrypt or Sign(pub 1)
        RSA n(4096 bits) - ...
        RSA e(17 bits) - ...
Old: User ID Packet(tag 13)(36 bytes)
        User ID - Sarah Harrison <sarah[at]wikileaks.org>
Old: Signature Packet(tag 2)(567 bytes)
        Ver 4 - new
        Sig type - Positive certification of a User ID and Public Key packet(0x13).
        Pub alg - RSA Encrypt or Sign(pub 1)
        Hash alg - SHA256(hash 8)
        Hashed Sub: signature creation time(sub 2)(4 bytes)
                Time - Thu Jun 26 13:34:00 UTC 2014
        Hashed Sub: key flags(sub 27)(1 bytes)
                Flag - This key may be used to certify other keys
                Flag - This key may be used to sign data
        Hashed Sub: preferred symmetric algorithms(sub 11)(4 bytes)
                Sym alg - AES with 256-bit key(sym 9)
                Sym alg - AES with 192-bit key(sym 8)
                Sym alg - AES with 128-bit key(sym 7)
                Sym alg - CAST5(sym 3)
        Hashed Sub: preferred hash algorithms(sub 21)(4 bytes)
                Hash alg - SHA512(hash 10)
                Hash alg - SHA384(hash 9)
                Hash alg - SHA256(hash 8)
                Hash alg - SHA224(hash 11)
        Hashed Sub: preferred compression algorithms(sub 22)(4 bytes)
                Comp alg - ZLIB <RFC1950>(comp 2)
                Comp alg - BZip2(comp 3)
                Comp alg - ZIP <RFC1951>(comp 1)
                Comp alg - Uncompressed(comp 0)
        Hashed Sub: features(sub 30)(1 bytes)
                Flag - Modification detection (packets 18 and 19)
        Hashed Sub: key server preferences(sub 23)(1 bytes)
                Flag - No-modify
        Sub: issuer key ID(sub 16)(8 bytes)
                Key ID - 0x01B7BA88530CA418
        Hash left 2 bytes - c8 2a 
        RSA m^d mod n(4095 bits) - ...
                -> PKCS-1
Old: Public Subkey Packet(tag 14)(525 bytes)
        Ver 4 - new
        Public key creation time - Thu Jun 26 13:34:00 UTC 2014
        Pub alg - RSA Encrypt or Sign(pub 1)
        RSA n(4096 bits) - ...
        RSA e(17 bits) - ...
Old: Signature Packet(tag 2)(543 bytes)
        Ver 4 - new
        Sig type - Subkey Binding Signature(0x18).
        Pub alg - RSA Encrypt or Sign(pub 1)
        Hash alg - SHA256(hash 8)
        Hashed Sub: signature creation time(sub 2)(4 bytes)
                Time - Thu Jun 26 13:34:00 UTC 2014
        Hashed Sub: key flags(sub 27)(1 bytes)
                Flag - This key may be used to encrypt communications
                Flag - This key may be used to encrypt storage
        Sub: issuer key ID(sub 16)(8 bytes)
                Key ID - 0x01B7BA88530CA418
        Hash left 2 bytes - e2 63 
        RSA m^d mod n(4095 bits) - ...
                -> PKCS-1

The PGPDump shows the key was generated a few hours before the message was sent.

Cryptome provided a location and time frame by encrypted email to "Sarah Harrison" using a public key provided by "Harrison." The decrypted message:

Hi Sarah,
Anytime today, 11AM to 5PM, the parcel can be picked up at 
our front desk. No need for face to face with us. However we
would appreciate the person leaving a simple sign of receipt.
Any kind will do that indicates legitimacy. Let me know what
form that sign will be. This will help us avoid being spoofed 
by an imposter, all too common these days as you know.

Address:

251 West 89th Street 
Northwest corner of Broadway, No. 1 subway, 86th Street stop

Will be in grey envelope with material inside. Name on envelope:

Margaret Mead Foundation

Our tel: 212-873-8700

Regards,

John

There was no answer to this email and nobody came for the pick-up. Cryptome then sent an encrypted email to "Harrison" stating the handover did not occur. The decrypted message:

Dear Sarah,

The collection is canceled due to not receiving confirmation by encrypted 
email within proposed time frame. Concerned about being spoofed by an
imposter. And cannot authenticate your PK.

Regards,

John

This email was not answered.

Yesterday Cryptome sent an encrypted email to Trevor Timm <trevor[at]pressfreedomfoundation.org> asking if he could request Sarah Harrision to authenticate the "Harrison" public key. He emailed he would attempt to do so. No answer has been provided by Timm.

Yesterday Cryptome sent an encrypted email to Sarah Harrison <sarah.harrison[at]couragefound.org> describing the receipt of an encrypted email from a party claiming to be her, provided details of the public key provided -- email used, key ID, date and time of generation -- and asked if she could verify the key. No response has been received. The decrypted message:

*** PGP SIGNATURE VERIFICATION ***
*** Status:   Good Signature
*** Signer:   Cryptome <cryptome[at]earthlink.net> (0x8B3BF75C)
*** Signed:   6/27/2014 1:23:46 PM
*** Verified: 6/28/2014 12:37:52 PM
*** BEGIN PGP DECRYPTED/VERIFIED MESSAGE ***

Dear Ms. Harrison,

Yesterday we received an encrypted email from a party
identified as Sarah Harrison <sarah[at]wikileaks.org>

We were able to decrypt the message.

However sent an encrypted response to the email address
but have not received an answer.

We have been unable to verify the public key provided
as an attachment for responding to the email.

Public key creation time - Thu Jun 26 13:34:00 UTC 2014 
User ID - Sarah Harrison <sarah[at]wikileaks.org> 
Key ID - 0x01B7BA88530CA418

Do you recognize this email address and public key?

We are concerned that the email may be a forgery.

Thanks very much,

John Young
Cryptome.org
New York, NY
212-873-8700

*** END PGP DECRYPTED/VERIFIED MESSAGE ***

Today, 28 June 2014, appeared unsubstantiated allegation that Sarah Harrison has had a falling out with Julian Assange, and that she was preparing a book on the Snowden affair.

http://www.wikileaks-forum.com/the-critics/632/another-assange-foot-soldier-sarah-
harrison-missing-in-action/30393/

Another Assange Foot Soldier (Sarah Harrison) Missing In Action

We just love Assange gossip, its the stuff that makes the world go round: Back in 2010 we had a pretty good incite into just what was going on within [at]wikileaks. Some of the leaked "Insiders"stuff was questionable, however, with the passage of time some of it was absolutely spot on. Remember this was 2010 when Assange was being treated as some sort of Messiah by an adoring and unquestioning media. In a series of "Wikileaks Insider" messages that were run at www.cryptome.org forwarded by PGPBOARD Assange was exposed as an untrustworthy and arch manipulator, and [at]Wikileaks a virtual one man band.

Over the years we have maintained casual contact with the source of these 2010 Insiders leaks, who I might add has nothing to do with Wikileaks any more, and has a professional career in Germany.

SARAH HARRISON

OK having set the scene; let's continue. The parting of the ways between Assange and Sarah Harrison WAS NOT as amicable as Wikileaks aka Julian Assange would have one believe. Firstly Assange was intensely jealous of firstly Snowden for effectively freezing him out of the NSA leaks and his collaboration with Greenwald, and even more so with Sarah Harrison, who he suspected of becoming more of a personal advisor to Snowden than he anticipated!!

True to his colours, Assange's paranoia got the better of him, the relationship turned toxic and they eventually broke up. This was prior to Harrison leaving Russia.

Her next stop was Berlin, this was not by accident or fear of arrest in the UK, or anywhere else for that matter. This was yet another smoke screen. Sarah had something else on her mind, and that was the writing and publication of a kiss and tell book about her tenure at Wikileaks. Berlin would be prime choice, since many of the characters that were actively involved in Wikleaks early days, and subsequent schism were resident in Germany. Sarah needed no help concerning the later developments in the Swedish sex case issues, she was front and centre here.

We have been told that Sarah found or was contacted by the Berg's; they met in Berlin and was extensively briefed in detail about Assange and his early engagement of Wikileaks and donor funding irregularities.

Finally; as far we are concerned, this will be the DEFINITIVE tome about Assange and the disaster that became Wikileaks. I cannot wait for its publication, or details about who will publish...

Regards

AT

« Last Edit: Today at 12:32:14 AM by Alan Taylor »

(Cryptome is familiar with Alan Taylor's skeptical views of Assange and WikiLeaks.)

Based on the lack of response to our emails to "Harrison" and Harrison and if the allegations are credible, it suggests the true Sarah Harrison did not send the encrypted email to Cryptome, that instead her identity was forged as hoax. This may also suggest the "WikiLeaks" offer to host Cryptome was forged or a hoax.

A reader has warned that the hoax may have been perpetuated by Robert David Graham [at]ErrataRob (and associates) who first taunted WikiLeaks to host Cryptome (it is easy to forge Twitter Direct Messages as well as public keys):

[Image]

The reader's warning message:

I just read "June 26, 2014 2014-0923.htm  WikiLeaks Offer to Host
Cryptome Fails"

http://cryptome.org/2014/06/wikileaks-fails/wikileaks-offer-fails.htm

You refer to a trusted third party [Appelbaum]? I hope this is not:
Robert David Graham [at]ErrataRob.

I'm certain that he has very very close links with GCHQ. If you remember
Full-Disclosure.pdf, he was basically the mouth piece of
GCHQ at the time. I addressed his comments and opposition in the last
update of Full-disclosure.

http://cryptome.org/2013/12/Full-Disclosure.pdf


To be continued, or not.