Bank Julius Baer drops its litigation against in California, for now

| | Comments (1)

Following the Judge's ruling last week, the case in the California Northern District Federal Court against has now been dropped.

The Electronic Frontier Foundation have a copy of the Plaintiff's Notice of Dismissal (.pdf 4 pages) whereby William J. Briggs II, a junior lawyer from Lavely & Singer files a Voluntary Motion of Dismissal without prejudice on behalf of the Swiss bank Bank Julius Baer and their Cayman Islands tax haven subsidiary Julius Baer Bank Trust Co. Ltd in their ill advised public relations disaster against, their domain name registrar Dynadot LLC, and the 10 unnamed John Does.


voluntarily dismisses, without prejudice, the above captioned action in its entirety, whereby Plaintiffs may, at their option, later pursue their claims, including in an alternate court, jurisdiction or venue.

See the rest of the EFF's copies of the Court documents: Bank Julius Baer& co. v Wikileaks

By dropping the case, after the strong hints from the Judge to think again, now that the "cat is out of the bag" in regard to the alleged documents which have been published via, the remaining Motions to Intervene by various media and civil liberties organisations and individuals will not now be heard, .

Lavely & Singer, based in Century City, near Hollywood, claim to be "one of the world's premiere talent-side entertainment litigation firms", which may well be true.
However, their legalistic bullying tactics and failure to understand, or deliberate misrepresentation of the internet's technical infrastructure, has rebounded on their clients Bank Julius Bär.

Rightly or wrongly now, for many people, and for search engine queries into the future, Bank Julius Baer is associated with with illegal tax evasion and money laundering.

"Bad publicity" might be better than "no publicity" for Hollywood media celebrity wannabes, but that should be an anathema for a Swiss Bank whose business model is supposedly to provide confidential, trust based private banking and investment "wealth management" services for the very rich.

Plaintiffs may, at their option, later pursue their claims, including in an alternate court, jurisdiction or venue.

Surely the Gnomes of Zürich cannot be so stupid as to commit commercial suicide, by continuing to employ "media celebrity attack dog" lawyers ?

This case also highlights some more Questions about the project:

Would the initial Temporary Restraining Order have even been granted, had there actually been a lawyer representing present at the hearing ?

  • Was the failure to submit legal counter arguments , even through the Californian electronic filing system, by the date set by the Court, also harmful to their defence ?

  • Was this failure to be legally represented actually a deliberate tactic by the political activists, to stir up media and civil liberties organisations to spring to their defence with amici curiae briefs ?

    What will happen with a legal court case, say involving Contempt of Court for breaking the UK High Court Injunction regarding the Northern Rock plc pre- nationalisation investor prospectus, and the UK equivalent of Lavely & Singer, the London based law firm of Schillings ?

    This is within the European Union, which does have legal jurisdiction over the actual servers currently in Sweden.

    See Northern Rock vs Wikileaks


    Wikileaks has not competency pertaining to fair play. If the information Wikileaks uses are based on (illegal) larceny, Wikileaks is like a Mafia fighting another Mafia... This is evident since Wikileaks does not only commit crimes on dictatorial regime in former Soviet Union, Asia and Africa but as the lawsuit with Bank Baer aids and demonstrates, Wikileaks abets crimes in Western democratic states. It moreover favors crimes of hatred and extortions of individuals wanting to blackmail their employers. That is what the case Wikileaks and Julius Baer is about. Who wants to join a Mafia in order to fight against Mafia?

    About this blog

    This blog here at (no "S") discusses the ethical and technical issues raised by the project, which is trying to be a resource for whistleblower leaks, by providing "untraceable mass document leaking and analysis".

    These are bold and controversial aims and claims, with both pros and cons, especially for something which crosses international boundaries and legal jurisdictions.

    This blog is not part of the project, and there really are no copies of leaked documents or files being mirrored here.

    Email Contact

    Please feel free to email us your views about this website or news about the issues it tries to comment on:

    email: blog@WikiLeak[dot]org

    Before you send an email to this address, remember that this blog is independent of the project.

    If you have confidential information that you want to share with us, please make use of our PGP public encryption key or an email account based overseas e.g. Hushmail

    Now that the project is defunct, so far as new whistleblower are concerned, what are the alternatives ?

    The wiki page lists links and anonymity analyses of some of the many post-wikileaks projects.

    There are also links to better funded "official" whistlblowing crime or national security reporting tip off websites or mainstream media websites. These should, in theory, be even better at protecting the anonymity and security of their informants, than wikileaks, but that is not always so.

    New whistleblower website operators or new potential whistleblowers should carefully evaluate the best techniques (or common mistakes) from around the world and make their personal risk assessments accordingly.

    Hints and Tips for Whistleblowers and Political Dissidents

    The Submissions web page provides some methods for sending them leaked documents, with varying degrees of anonymity and security. Anybody planning to do this for real, should also read some of the other guides and advice to political activists and dissidents:

    Please take the appropriate precautions if you are planning to blow the whistle on shadowy and powerful people in Government or commerce, and their dubious policies. The mainstream media and bloggers also need to take simple precautions to help preserve the anonymity of their sources e.g. see Spy Blog's Hints and Tips for Whistleblowers - or use this easier to remember link:

    BlogSafer - wiki with multilingual guides to anonymous blogging

    Digital Security & Privacy for Human Rights Defenders manual, by Irish NGO Frontline Defenders.

    Everyone’s Guide to By-Passing Internet Censorship for Citizens Worldwide (.pdf - 31 pages), by the Citizenlab at the University of Toronto.

    Handbook for Bloggers and Cyber-Dissidents - March 2008 version - (2.2 Mb - 80 pages .pdf) by Reporters Without Borders

    Reporters Guide to Covering the Beijing Olympics by Human Rights Watch.

    A Practical Security Handbook for Activists and Campaigns (v 2.6) (.doc - 62 pages), by experienced UK direct action political activists

    Anonymous Blogging with Wordpress & Tor - useful step by step guide with software configuration screenshots by Ethan Zuckerman at Global Voices Advocacy. (updated March 10th 2009 with the latest Tor / Vidalia bundle details)

    WikiLeakS Links

    The Frequently Asked Questions (FAQ) page.

    WikiLeakS Twitter feeds

    The website does not stay online all of the time, especially when there is a surge of traffic caused by mainstream media coverage of a particularly newsworthy leak.

    Recently, they have been using their new Twitter feeds, to selectively publicise leaked documents to the media, and also to report on the status of routing or traffic congestion problems affecting the main website in Stockholm, Sweden.

    N.B.the words "security" or "anonymity" and "Twitter" are mutually exclusive: Twitter feed via SSL encrypted session: unencrypted Twitter feed

    Internet Censorship

    OpenNet Initiative - researches and measures the extent of actual state level censorship of the internet. Features a blocked web URL checker and censorship map.

    Temporary Autonomous Zone

    Temporary Autonomous Zones (TAZ) by Hakim Bey (Peter Lambourn Wilson)

    Cyberpunk author William Gibson

    Campaign Button Links

    Watching Them, Watching Us, UK Public CCTV Surveillance Regulation Campaign
    UK Public CCTV Surveillance Regulation Campaign

    NO2ID Campaign - cross party opposition to the NuLabour Compulsory Biometric ID Card
    NO2ID Campaign - cross party opposition to the NuLabour Compulsory Biometric ID Card and National Identity Register centralised database.

    Gary McKinnon is facing extradition to the USA under the controversial Extradition Act 2003, without any prima facie evidence or charges brought against him in a UK court. Try him here in the UK, under UK law.
    Gary McKinnon is facing extradition to the USA under the controversial Extradition Act 2003, without any prima facie evidence or charges brought against him in a UK court. Try him here in the UK, under UK law.

    FreeFarid_150.jpg - Kafkaesque extradition of Farid Hilali under the European Arrest Warrant to Spain

    Peaceful resistance to the curtailment of our rights to Free Assembly and Free Speech in the SOCPA Designated Area around Parliament Square and beyond

    Parliament Protest blog - resistance to the Designated Area restricting peaceful demonstrations or lobbying in the vicinity of Parliament.

    Petition to the European Commission and European Parliament against their vague Data Retention plans
    Data Retention is No Solution Petition to the European Commission and European Parliament against their vague Data Retention plans.

    Save Parliament: Legislative and Regulatory Reform Bill (and other issues)
    Save Parliament - Legislative and Regulatory Reform Bill (and other issues)

    Open Rights Group

    The Big Opt Out Campaign - opt out of having your NHS Care Record medical records and personal details stored insecurely on a massive national centralised database.

    Tor - the onion routing network
    Tor - the onion routing network - "Tor aims to defend against traffic analysis, a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security. Communications are bounced around a distributed network of servers called onion routers, protecting you from websites that build profiles of your interests, local eavesdroppers that read your data or learn what sites you visit, and even the onion routers themselves."

    Tor - the onion routing network
    Anonymous Blogging with Wordpress and Tor - useful Guide published by Global Voices Advocacy with step by step software configuration screenshots (updated March 10th 2009).

    Amnesty International's campaign

    BlogSafer - wiki with multilingual guides to anonymous blogging

    NGO in a box - Security Edition privacy and security software tools

    Home Office Watch blog, "a single repository of all the shambolic errors and mistakes made by the British Home Office compiled from Parliamentary Questions, news reports, and tip-offs by the Liberal Democrat Home Affairs team."

    Reporters Without Borders - Reporters Sans Frontières - campaign for journalists 'and bloggers' freedom in repressive countries and war zones.

    Committee to Protect Bloggers - "devoted to the protection of bloggers worldwide with a focus on highlighting the plight of bloggers threatened and imprisoned by their government."

    wikileaks_logo_low.jpg - the controversial "uncensorable, anonymous whistleblowing" website based currently in Sweden.

    Syndicate this site (XML):

    Recent Comments

    • Arthur Schickelberg: Wikileaks has not competency pertaining to fair play. If the read more

    November 2018

    Sun Mon Tue Wed Thu Fri Sat
            1 2 3
    4 5 6 7 8 9 10
    11 12 13 14 15 16 17
    18 19 20 21 22 23 24
    25 26 27 28 29 30