Wikileaks Public date: 10.08.2017 19:48:51

Publisher: Metro

Author:

1 Jan 2015

Wikileaks documents ‘offer hints about UFOs’, alien-hunters claim

Documents released by Wikileaks have already offered hints about little green men from beyond the stars including tantalising titbits from Japanese and Lithuanian politicians. But some UFO sites, naturally, believe that the wizard-haired Wikileaks maestro might have something better up his sleeve - namely evidence of alien spacecraft parked secretly in government hangars.
Documents released by Wikileaks have already offered hints about little green men from beyond the stars including...
Tags:
ufo

Publisher: Ars technica

Author:

31 Dec 2014

WikiLeaks claims employee’s Google mail, metadata seized by US government

On Christmas Eve, as the National Security Agency was releasing a report on NSA employees abuses of surveillance technology, Google was telling WikiLeaks about another sort of surveillance. According to a statement by WikiLeaks on Twitter, Google informed the organization on December 24 that the Gmail mailboxes and account metadata of a WikiLeaks employee had been turned over to law enforcement under a US federal warrant.
On Christmas Eve, as the National Security Agency was releasing a report on NSA employees abuses of surveillance...

Publisher: Computer World

Author:

2 Oct 2014

Wikileaks accuses intelligence watchdog of misleading Senate inquiry

Wikileaks founder Julian Assange has accused an Australian government agency of giving misleading evidence to a parliamentary inquiry. Assange said that representatives of the Office of the Inspector General of Intelligence and Security had misrepresented the "standard operating procedures" among the 5 Eyes intelligence sharing alliance, which comprises Australia, New Zealand, the UK, Canada and the US.
Wikileaks founder Julian Assange has accused an Australian government agency of giving misleading evidence to a...

Publisher: ZDnet

Author:

16 Sep 2014

WikiLeaks posts ‘weaponized malware’ for all to download

The long and sordid story of WikiLeaks takes an astonishingly irresponsible and very dangerous turn. WikiLeaks has released a trove of documents about a dangerous spyware program called FinFisher, produced by a German company named Gamma Group International. According to reporting by our own Chris Duckett, Gamma Group International has been selling FinFisher to "the police forces of the Netherlands and New South Wales, and the intelligence arms of the Hungarian, Qatari, Italian, and Bosnian governments."
The long and sordid story of WikiLeaks takes an astonishingly irresponsible and very dangerous turn. WikiLeaks has...

Publisher: WIRED

Author:

8 Aug 2014

Edward Snowden -The Untold Story

The Author a former NSA whistleblower meets with Snowden in Moscow. - ES is Edward Snowden, the most wanted man in the world. For almost nine months, I have been trying to set up an interview with him traveling to Berlin, Rio de Janeiro twice, and New York multiple times to talk with the handful of his confidants who can arrange a meeting. Among other things, I want to answer a burning question: What drove Snowden to leak hundreds of thousands of top-secret documents, revelations that have laid bare the vast scope of the government s domestic surveillance programs?
The Author a former NSA whistleblower meets with Snowden in Moscow. - ES is Edward Snowden, the most wanted man in the...

Publisher: NewsWeek

Author:

5 Aug 2014

Snowden Leak: NSA flagged Israel as leading espionage threat

The National Security Agency listed Israel among a handful of nations considered to pose the "greatest threat" to American government, military and industrial secrets, classified documents leaked by whistleblower Edward Snowden reveal.
The National Security Agency listed Israel among a handful of nations considered to pose the "greatest threat" to...

Publisher: Wired

Author:

30 Dec 2013

WikiLeaks’ Assange: Sysadmins of the World, Unite!

System administrators, who have access to confidential government or corporate documents, have particular ability to play a role in what he painted as a new class war, he said. "We can see that in the case of WikiLeaks, or the Snowden revelations, it's possible for even a single system administrator to have very significant constructive effect," he said. "This is not merely wrecking or disabling, not going on strikes, but rather shifting information from an information apartheid system from those with extraordinary power to the digital commons."
System administrators, who have access to confidential government or corporate documents, have particular ability to...

Publisher: Collective Evolution

Author:

29 Jun 2013

Wikileaks Cables Confirm Existence of Extraterrestrial Life

"There is abundant evidence that we are being contacted, that civilizations have been visiting us for a very long time. That their appearance is bizarre from any type of traditional materialistic western point of view. That these visitors use the technologies of consciousness, they use toroids, they use co-rotating magnetic disks for their propulsion systems, that seems to be a common denominator of the UFO phenomenon." - Dr Brian O leary, Former NASA Astronaut and Princeton Physics Professor (source)
"There is abundant evidence that we are being contacted, that civilizations have been visiting us for a very long time....
Tags:
ufo

Publisher: Wikileaks

Author:

8 Sep 2012

New Wikileaks Emails Show DEA Told to Backoff in Afghanistan

Wikileaks has released 2,694 emails that were stolen from the security firm Stratfor by the hacking group Anonymous in winter of last year. Business Insider reports that one of these released emails shows the U.S. Drug Enforcement Agency (DEA) was asked to back off of an investigation that the DEA said would tie drugs to terrorism.The subject of the email is "RE: Humint - Afghanistan - Karzai (Strictly Protect - Confidential)" and says
Wikileaks has released 2,694 emails that were stolen from the security firm Stratfor by the hacking group Anonymous in...

Publisher: decryptedtech

Author:

11 Aug 2012

New Group AntiLeaks Opens Up DDoS War on WikiLeaks, But Might Not Be What They Claim

Now we have something new a group called AntiLeaks has popped up and managed to drop a 10GB/s + DDoS attack on WikiLeaks, their affiliate sites and mirrors. This is something pretty spectacular when you think about it. The group claims to be a group of young adults, citizens of the United States of America and are deeply concerned about the recent developments with Julian Assange and his attempt at asylum in Ecuador , but their tactics and capabilities seems to indicate something more is going on here.
Now we have something new a group called AntiLeaks has popped up and managed to drop a 10GB/s + DDoS attack on...

Publisher: neowin

Author:

11 Aug 2012

WikiLeaks hit by sustained DDoS over surveillance leaks

It s been a while since we heard anything big from WikiLeaks, but things seem to be heating up again. The site has been under a sustained DDoS attack for the last week or so, apparently by a group of self-described young adult citizens of the USA, after it released a trove of emails regarding an unprecedented surveillance system known as TrapWire.
It s been a while since we heard anything big from WikiLeaks, but things seem to be heating up again. The site has been...

Publisher: VentureBeat

Author:

10 Aug 2012

CIA-connected private intelligence firm TrapWire watching Americans

The latest WikiLeaks release has shone a spotlight on an alleged domestic and foreign surveillance program run with cloud-based software provided by Virginia company TrapWire, many of whose top leaders and employees are former members of three-letter American intelligence agencies
The latest WikiLeaks release has shone a spotlight on an alleged domestic and foreign surveillance program run with...

Publisher: Science Blog

Author:

1 Aug 2012

UK scientists say they’ve identified future of war, via Wikileaks

Models to accurately predict the future of military conflicts based on classified information from the Afghan war revealed by whistleblower website Wikileaks have been created by scientists at the University of Sheffield. Using war logs with about 77,000 events including location, day and time of occurrence and other details from the war in Afghanistan between 2004 and 2009, the team of scientists - including scientists from the universities of Edinburgh and Columbia, USA - were able to predict armed opposition group activity way into the future of the battle.
Models to accurately predict the future of military conflicts based on classified information from the Afghan war...

Publisher: itwire

Author:

16 Jul 2012

Anonymous creates Par AnoIA, WikiLeaks gets scared

In a very public snub to WikiLeaks, the cyber vigilante group Anonymous has created its own publishing system for confidential data. Par:AnoIA, which supposedly stands for Potentially Alarming Research: Anonymous Intelligence Agency, although one suspects the derivation came after the acronym, is intended to be a direct, but more liberal competitor to the closely moderated WikiLeaks site.
In a very public snub to WikiLeaks, the cyber vigilante group Anonymous has created its own publishing system for...

Publisher: redOrbit

Author:

14 Jul 2012

WikiLeaks Victory Against Visa A Significant Victory

An Icelandic court ordered a local Visa affiliate which had broken contract laws by refusing to process credit card donations to WikiLeaks to resume processing transactions in what officials at the website dubbed a "significant victory" in its ongoing battle with governments and financial institutions, various media outlets are reporting. redOrbit (http://s.tt/1hR8X)
An Icelandic court ordered a local Visa affiliate which had broken contract laws by refusing to process credit card...
Tags:

Publisher: bgr

Author:

22 May 2012

WikiLeaks supporters launch social network for like minded individuals

Backers of the whistle-blowing organisation WikiLeaks recently launched Friends of WikiLeaks (FoWL), an encrypted social network for like-minded individuals. "Friends of WikiLeaks is a network of people from across the globe who defend WikiLeaks, its people, its alleged sources and its mission," the website's homepage says. "We publicly and privately promote WikiLeaks and individuals and organisations aligned with the mission of WikiLeaks."
Backers of the whistle-blowing organisation WikiLeaks recently launched Friends of WikiLeaks (FoWL), an encrypted social...
Tags:

Publisher: Slashdot

Author:

6 Apr 2012

State Department CIO Interviewed About Post-Wikileaks Changes

"Eighteen months after its diplomatic cables were exposed in the WikiLeaks breach, the State Department continues to lock down its confidential information, while increasing its use of using social media. The agency is deploying new security technology, including auditing and monitoring tools that detect anomalous activity on the State Department's classified networks and systems
"Eighteen months after its diplomatic cables were exposed in the WikiLeaks breach, the State Department continues to...

Publisher: TG Daily

Author:

6 Apr 2012

WikiLeaks founder accuses media of libel

Julian Assange, the founder of the whistle-blowing WikiLeaks website, recently told a UK-based inquiry that he is the victim of "extensive press libels."?? "People who find themselves caught up in particularly newsworthy events or, as in my case, politically controversial circumstances face a stark choice: either to engage in prohibitively expensive litigation or to seek protection and redress through complaint to a press standards body or regulator," Assange wrote in official testimony submitted to the Leveson Inquiry.
Julian Assange, the founder of the whistle-blowing WikiLeaks website, recently told a UK-based inquiry that he is the...

Publisher: physorg

Author:

22 Mar 2012

Why WikiLeaks’ bid for radical transparency failed

The scale and significance of the 2010 WikiLeaks disclosures were overstated, according to new research. Analysis of the WikiLeaks debacle in the International Review of Administrative Sciences, published by SAGE on behalf of the Institute for Administrative Sciences (IIAS), serves to highlight four key reasons why radical transparency is hard to achieve, and why a technological fix alone will not achieve it.
The scale and significance of the 2010 WikiLeaks disclosures were overstated, according to new research. Analysis of the...

Publisher: iTnews

Author:

12 Mar 2012

Anonymous hurt by arrests but hard to kill

In turning one of its best-known hackers into an informant and breaking open the highest profile elements of the Anonymous movement, authorities have dealt a serious blow to a group they found a growing irritant. But as the broader "Anonymous" label - complete with its iconic Guy Fawkes mask imagery - is used by ever more disparate causes worldwide, it may be all but impossible to shut it down for good.
In turning one of its best-known hackers into an informant and breaking open the highest profile elements of the...

Publisher: TG Daily

Author:

10 Mar 2012

From the Pentagon Papers to WikiLeaks

Daniel Ellsberg, who leaked top secret Pentagon Papers during the Vietnam War, says he strongly identifies with Pfc. Bradley Manning. "I don't think anyone should be prosecuted ... for releasing information to Congress or the public that reveals criminal behavior."? Ellsberg also defended WikiLeaks founder Julian Assange for publishing the controversial material.
Daniel Ellsberg, who leaked top secret Pentagon Papers during the Vietnam War, says he strongly identifies with Pfc....

Publisher: Techdirt

Author:

10 Mar 2012

Transparency Double Standard: UK Public Inquiry Requests Info From Wikileaks

Well, this is interesting. Given the general condemnation of Wikileaks by governments, all the ongoing controversy and reputation problems faced by the organization, you wouldn't expect them to be approached with any official requests for leaked information. But it seems just that has happened in the UK, where the Leveson Inquiry into media ethics has requested and received a dossier from Wikileaks on corruption in the British press.
Well, this is interesting. Given the general condemnation of Wikileaks by governments, all the ongoing controversy and...
9 Mar 2012

Rogers’ “Cybersecurity” Bill Is Broad Enough to Use Against WikiLeaks and The Pirate Bay

Congress is doing it again: they re proposing overbroad regulations that could have dire consequences for our Internet ecology. The Cyber Intelligence Sharing and Protection Act of 2011 (H.R. 3523), introduced by Rep. Mike Rogers and Rep. Dutch Ruppersberger, allows companies or the government1 free rein to bypass existing laws in order to monitor communications, filter content, or potentially even shut down access to online services for "cybersecurity purposes."
Congress is doing it again: they re proposing overbroad regulations that could have dire consequences for our Internet...

Publisher: Dark Reading

Author:

29 Feb 2012

WikiLeaks Stratfor Disclosure Highlights Email Encryption Failure

Stratfor appears to have run afoul of Anonymous and WikiLeaks on account of its intelligence-gathering activities. A blog post published Sunday on the AnonOps Communications blog, a reliable source of Anonymous-related information, accused Stratfor of being "a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal's Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon, and government agencies, including the U.S. Department of Homeland Security, the U.S. Marines and the U.S. Defense Intelligence Agency."
Stratfor appears to have run afoul of Anonymous and WikiLeaks on account of its intelligence-gathering activities. A...

Publisher: Wired

Author:

27 Feb 2012

Wikileaks Pairs with Anonymous to Publish Intelligence Firm’s Dirty Laundry

In an unprecedented collaboration between Anonymous and WikiLeaks, the secret spilling site began leaking Sunday night portions of a massive trove of e-mails from the private intelligence firm Stratfor that Anonymous obtained by hacking the company in December. WikiLeaks did not mention the source of the reported five gigabytes of e-mails in its press release, but did say it has been working for months with 25 media outlets from around the world to analyze the documents.
In an unprecedented collaboration between Anonymous and WikiLeaks, the secret spilling site began leaking Sunday night...

Publisher: Techdirt

Author:

22 Feb 2012

Wikileaks Denied A Speaking Opportunity At UN Conference About Wikileaks

UNESCO, the United Nations Educational Scientific and Cultural Organization, is hosting a conference about The Media World after Wikileaks and News of the World. Sounds like it could be an interesting event, but one organization not happy about it... is Wikileaks. Seeing as it was a conference that touched on Wikileaks' interests directly, Wikileaks asked to take part, and was instead denied a chance to speak at the event. When asked about this, UNESCO actually claimed that choosing to not allow Wikileaks attendees was an exercise in "freedom of expression," which seems like a poor choice of words.
UNESCO, the United Nations Educational Scientific and Cultural Organization, is hosting a conference about The Media...

Publisher: Betabeat

Author:

14 Feb 2012

Whistleblowing Website Cryptome Hacked, Conspiracy Theories Do Not Abound

Cryptome, a sort of proto-WikiLeaks website best known for exposing the CIA analyst who found Osama Bin Laden, announced this week that its entire website had been hacked. But, in a surprising response from Cryptome founder John Young - a man suspicious even of tap water - no foul play was suspected. At least no more foul than the usual Internet hijinks.
Cryptome, a sort of proto-WikiLeaks website best known for exposing the CIA analyst who found Osama Bin Laden, announced...
Tags:

Publisher: Tribune

Author:

18 Jan 2012

Iran’s Bomb and Pakistan by Pervez Hoodbhoy

Voices within the Pakistani establishment spoke against giving nuclear support to Iran. US pressure was partly the reason but so was the discomfort with Iran, a Shi'ite state. These suspicions were confirmed by confidential American cables revealed by Wikileaks. They detail Pakistan s efforts to dissuade Iran from pursuing its weapons program. General Pervez Musharraf, prime minister Shaukat Aziz and foreign minister Khurshid Kasuri held at least seven meetings, whether face-to-face or by telephone, with the Iranians.
Voices within the Pakistani establishment spoke against giving nuclear support to Iran. US pressure was partly the...
18 Jan 2012

Silencing Donahue and Anti-War Voices by Phil Donahue

In a time in the history of this nation, when there is so much happening under the table, when administrations feel they have to protect us, and in order to do that efficiently they have to keep it secret, I celebrate the courage of Bradley Manning. I ve yet to see anybody prove to anybody else that somebody was killed because of whatever it is that Bradley Manning has made public.
In a time in the history of this nation, when there is so much happening under the table, when administrations feel they...

Publisher: Slashdot

Author:

10 Jan 2012

Leaked Memo Says Apple Provides Backdoor To Governments

"In a tweet early this morning, cybersecurity researcher Christopher Soghoian pointed to an internal memo of India's Military Intelligence that has been liberated by hackers and posted on the Net. The memo suggests that, "in exchange for the Indian market presence" mobile device manufacturers, including RIM, Nokia, and Apple (collectively defined in the document as "RINOA") have agreed to provide backdoor access on their devices
"In a tweet early this morning, cybersecurity researcher Christopher Soghoian pointed to an internal memo of India's...

Publisher: ITworld

Author:

4 Jan 2012

Is vulnerability an objective?

*Why does just about everyone in your organization have direct access to just about all the company secret files? There is no reason that the person in the mailroom or, in most cases, the company president, should have such access. Take a look at WikiLeaks to see what goes wrong when there is too indiscriminate access.
*Why does just about everyone in your organization have direct access to just about all the company secret files? There...

Publisher: VentureBeat

Author:

29 Dec 2011

10 things you need to know about Anonymous’ Stratfor hack

On Dec. 24th, hacker collective Anonymous stole credit card info and other sensitive data from U.S. security firm Stratfor, but keeping track of who and what are affected by the scandal can be difficult. We ve put together a 10-point FAQ for better understanding the major hacking incident, which blew up in the news cycle on Christmas and continues to worry people as more details are released.
On Dec. 24th, hacker collective Anonymous stole credit card info and other sensitive data from U.S. security firm...

Publisher: Boston

Author:

29 Dec 2011

Alleged Leaker Case More Tech than Military

During testimony at a military installation where Pfc. Bradley Manning is fighting efforts to have him court-martialed over alleged leaks to Wikileaks, tech jargon is paramount. The digital forensic examiners littered their testimonies with the terms of their trade. Text files. Zip files. Hash values. Allocated and unallocated disk space
During testimony at a military installation where Pfc. Bradley Manning is fighting efforts to have him court-martialed...

Publisher: ZeroHedge

Author:

28 Dec 2011

Anonymous Explains Why 2.7 Million Stratfor Emails Were Hacked

Stratfor was not breached in order to obtain customer credit card numbers, which the hackers in question could not have expected to be as easily obtainable as they were. Rather, the operation was pursued in order to obtain the 2.7 million e-mails that exist on the firm's servers. This wealth of data includes correspondence with untold thousands of contacts who have spoken to Stratfor's employees off the record over more than a decade.
Stratfor was not breached in order to obtain customer credit card numbers, which the hackers in question could not have...

Publisher: CIO Today

Author:

27 Dec 2011

Anonymous Attacks Again, Uses Stolen Credit Card Data

Those claiming credit for the latest Anonymous cyberattack said they obtained about 4,000 passwords, home addresses, and credit card information from Statfor's private client list, and have posted that private data on a public information sharing site. The hacker group claims to have obtained about 200 gigabytes of data.
Those claiming credit for the latest Anonymous cyberattack said they obtained about 4,000 passwords, home addresses, and...

Publisher: The Register

Author:

27 Dec 2011

Greens Senator champions Assange cause

The Australian Prime Minister and Attorney General may have shunned Julian Assange in his bid for justice, but Greens Senator Scott Ludlam has emerged as one of the Wikileaks founder s core supporters. Ludlam has returned from a mission to Europe where he sought to secure some surety over Assange's human rights, if he is extradited to Sweden.
The Australian Prime Minister and Attorney General may have shunned Julian Assange in his bid for justice, but Greens...

Publisher: ibtimes

Author:

21 Dec 2011

Twitter Accused of Censoring Wikileaks, Anonymous Supporters

Reports have emerged alleging social network giant Twitter is censoring its content, closing accounts supporting anti-authoritarian causes such as Wikileaks and the Anonymous sponsored Occupy movement. The initial report of Twitter censoring users stemmed from Business Insider columnist David Seaman Monday. In his report Seaman alleged that his Twitter account had been closed as a means to silence his ongoing support for the Occupy movement and "talking too much" about the controversial detainment without trial provisions in America's FY 2012 National Defense Authorization Act (NDAA).
Reports have emerged alleging social network giant Twitter is censoring its content, closing accounts supporting...

Publisher: Computerworld

Author:

12 Oct 2011

Hacktivism: The fallout from Anonymous and LulzSec

Like the mutant offspring of Captain Jack Sparrow and French anarchist Pierre Proudhon -- famous for his 'property is theft' claim -- activist hacking group LulzSec surfed the Web spreading debonair charm, chaos and reckless acts of 'hacktivism' in equal measure.
Like the mutant offspring of Captain Jack Sparrow and French anarchist Pierre Proudhon -- famous for his 'property is...

Publisher: Wired

Author:

7 Oct 2011

White House Issues ‘WikiLeaks’ Order to Secure Classified Data

More than a year after thousands of classified and sensitive U.S. government documents were leaked to the secret-spilling site WikiLeaks, the White House has issued an executive order designed to improve the security of classified networks and prevent further leaks.
More than a year after thousands of classified and sensitive U.S. government documents were leaked to the...

Publisher: PCWorld

Author:

27 Sep 2011

Which Social Networks Fight for Your Rights

U.S. government agencies regularly request that social network providers disclose user data or take down content for legal reasons, often to prevent or remove defamation, hate speech, and child pornography. Most social networks will notify you of government requests for your information unless they are specifically barred from doing so by court order. Twitter explicitly promises as much and has demonstrated a willingness to fight for its users in the past, in one case securing a court order allowing the company to notify Birgitta Jornsdottir that her private data was being subpoenaed by the U.S. Department of Justice as part of an investigation into her involvement with WikiLeaks earlier this year.
U.S. government agencies regularly request that social network providers disclose user data or take down content for...

Publisher: Techdirt

Author:

13 Sep 2011

BofA Has To Pay Fired Whistleblower $930,000

The US Department of Labor has told Bank of America to reinstate a guy they fired for blowing the whistle on fraud at Countrywide, and pay him $930,000 for his troubles. Apparently, BofA fired the guy soon after taking over Countrywide and discovered that this (unnamed) employee was trying to report on the fact that others, who had reported fraud at Countrywide, had been the victims of corporate retaliation.
The US Department of Labor has told Bank of America to reinstate a guy they fired for blowing the whistle on fraud at...
12 Sep 2011

Random Acts of Blindness: Air Force List of WikiLeaks Banned Sites is Released

Thanks to some dogged nudging by the good folks at MuckRock.com*, we now have an authoritative list of the websites blocked by the U.S. Air Force because of the WikiLeaks disclosures. The list of 45 sites primarily covers various WikiLeaks mirror sites, as well as several of the main media outlets that partnered with the whistleblowing platform last year, including The New York Times, The Guardian, el Pais, Der Spiegel, and OWNI.fr.
Thanks to some dogged nudging by the good folks at MuckRock.com*, we now have an authoritative list of the websites...

Publisher: tmcnet

Author:

4 Sep 2011

Mugabe has prostate cancer, will be dead by 2013

The personal banker to Zimbabwe's Robert Mugabe told a former US ambassador that the ageing president had prostate cancer that would kill him by 2013, leaked US embassy cables show.
The personal banker to Zimbabwe's Robert Mugabe told a former US ambassador that the ageing president had prostate...
Tags:

Publisher: Ars technica

Author:

2 Sep 2011

Hacker Kayla taken down in latest LulzSec arrests

Police have arrested two men in the UK in connection with online attacks performed by LulzSec and Anonymous. The men, aged 20 and 24, were arrested yesterday by officers from the Metropolitan Police Service's Central e-Crime Unit (PCeU) and are accused of conspiring to commit offences under the Computer Misuse Act of 1990. Police have searched the homes of one of the men and seized computers for further examination.
Police have arrested two men in the UK in connection with online attacks performed by LulzSec and Anonymous. The men,...

Publisher: Techdirt

Author:

2 Sep 2011

Leaked State Department Cable Confirms What Everyone Already Knew: MPAA Was Behind Bogus Australian ISP Lawsuit

When it comes to copyright issues, the various State Department leaks via Wikileaks have only served to confirm what pretty much everyone already knew. Earlier we'd covered revelations about US diplomatic involvement in new copyright laws in Spain, and the latest (as a bunch of you sent in) is the rather upfront admission that the MPAA was absolutely behind the decision to sue iiNet in Australia.
When it comes to copyright issues, the various State Department leaks via Wikileaks have only served to confirm what...

Publisher: Boing Boing

Author:

1 Sep 2011

Guardian denies responsibility for unredacted cables

The Guardian released a statement today assailing Wikileaks' accusation that one of its reporters published the password to an unredacted set of leaked U.S. diplomatic cables. The newspaper admits publishing the password, but says it was assured that the files encrypted with it were temporary and would not become public.
The Guardian released a statement today assailing Wikileaks' accusation that one of its reporters published the password...

Publisher:

Author:

1 Sep 2011

WikiLeaks’ mystery cable, US backlash and Guardian row

On the heels of its recent release of US diplomatic cables WikiLeaks has released an encrypted file after telling its followers on Twitter to "stay tuned for an important announcement." The contents of the 571 megabyte file are a mystery as it cannot be accessed without a decryption key, which the anti-secrecy website said would be released "at the appropriate moment."
On the heels of its recent release of US diplomatic cables WikiLeaks has released an encrypted file after telling its...

Publisher:

Author:

30 Aug 2011

Quote Of The Day: Glenn Greenwald On This Whole Wikileaks Kerfuffle

As far as OpenLeaks is concerned, I have found the whole thing to be strange from the beginning, because if you look at the way in which this sort of dissident faction left Wikileaks and began this competing organization, what you'll find is that the differences that supposedly motivated it were very trivial and petty and personalized.
As far as OpenLeaks is concerned, I have found the whole thing to be strange from the beginning, because if you look at...

Publisher:

Author:

12 Aug 2011

Who is Anonymous?

The group, who apparently has no leader, came into prominence by openly supporting the release of classified documents through Wikileaks. But it wasn t until the hacking of Sony s PlayStation Network that the public took notice of them. And although they have been blamed for nearly every hacking attempt in the last two years, the question is- are they as dangerous as the general media claims? Who exactly is Anonymous, and for lack of a better phrase, what do they want?
The group, who apparently has no leader, came into prominence by openly supporting the release of classified documents...
Tags:

Publisher:

Author:

11 Aug 2011

State Department Spent $1.2 Billion On An Asset Monitoring System… That Ignores All Non-Windows Equipment

We just wrote about a GAO report showing how the Defense Department is somewhat incompetent at dealing with online threats. Of course, it's not clear that anyone else in the government is any better. The GAO is back with yet another report, dinging the State Department for its dreadful computer security monitoring program. In this case, it's talking about threats to the State Department's network, rather than to third parties. And while the State Department spent a whopping $1.2 billion of taxpayer money on a fancy computer system, called iPost, to monitor everything, it turns out that it only works on Windows machines:
We just wrote about a GAO report showing how the Defense Department is somewhat incompetent at dealing with online...
4 Aug 2011

Protecting Against the Weakest Link – Information Security in the Age of WikiLeaks

WikiLeaks has published top-secret information from the U.S. military s wars in Iraq and Afghanistan, and has also shared thousands of pages of U.S. State Department cables with the world. The U.S. government and other governments around the world are learning that in the age of WikiLeaks, no secret is safe. What does this mean to international companies or organizations? This white paper shows a few lessons of WikiLeaks for information security leaders in today s business and government organizations.
WikiLeaks has published top-secret information from the U.S. military s wars in Iraq and Afghanistan, and has also...

Publisher:

Author:

29 Jul 2011

Feds Defend Seizure of WikiLeaks Supporter’s Laptop

The Justice Department on Thursday fired back against a lawsuit filed by a WikiLeaks supporter and friend of accused leaker Bradley Manning over the warrantless seizure of his laptop, arguing that they held onto the machine for a lengthy 49 days only because he refused to provide the password, and because his dual-boot Linux/Windows configuration taxed federal agents forensics capabilities.
The Justice Department on Thursday fired back against a lawsuit filed by a WikiLeaks supporter and friend of accused...
28 Jul 2011

News of the World, media cartels and the fiscalisation of power” 2009 interview with Julian Assange

In this and subsequent interviews, Julian has talked a lot about the historic record, and it s to that thing posterity I m offering this now. To reiterate, this interview was conducted 18 months ago: I make no claim, and nor should anyone else, that the opinions expressed in it (for example, around the News of the World phone hacking scandal) are opinions he holds today. The facts have changed and, who knows, the man might have changed too. This is about understanding who he was and what was motivating him before he set out on what was probably the most eventful and scary year of his life.
In this and subsequent interviews, Julian has talked a lot about the historic record, and it s to that thing posterity I...

Publisher:

Author:

19 Jul 2011

FBI’s Anonymous Catch May Be Small Fry

The FBI's victory is at best a symbolic one. It is hard to imagine that the FBI nabbed anyone of importance in Anonymous, Paul Moriarty, CEO of Umbra Data, told TechNewsWorld. "These groups have a core cadre of experts that are excellent at covering their tracks. The rest are hanger-ons, or back in the day, what we called script kiddies," he said.
The FBI's victory is at best a symbolic one. It is hard to imagine that the FBI nabbed anyone of importance in...

Publisher:

Author:

13 Jul 2011

Manning-Lamo Chat Logs Revealed

A little more than a year ago, Wired.com published excerpts from instant messenger chats between accused WikiLeaks source Bradley Manning and Adrian Lamo, the ex-hacker in whom he confided and who reported him to the authorities. It s now time to reveal the previously unpublished portions of these conversations
A little more than a year ago, Wired.com published excerpts from instant messenger chats between accused WikiLeaks...

Publisher:

Author:

12 Jul 2011

Julian Assange’s extradition appeal kicks off

On Tuesday, the court began hearing an appeal by Assange against a decision by Belmarsh Magistrates' Court in February to send him to Sweden for questioning about allegations of rape and sexual coercion. His defence barrister Ben Emerson kicked proceedings off on Tuesday by arguing the actions behind the allegations of sexual misconduct against Assange would not be judged offences under British law.
On Tuesday, the court began hearing an appeal by Assange against a decision by Belmarsh Magistrates' Court in February...

Publisher:

Author:

12 Jul 2011

Julian Assange’s extradition hearing begins

WikiLeaks editor Julian Assange has appeared at the Royal Courts of Justice on the first day of a High Court bid to avoid extradition. On Tuesday, the court began hearing an appeal by Assange against a decision by Belmarsh Magistrates' Court in February to send him to Sweden for questioning about allegations of rape and sexual coercion.
WikiLeaks editor Julian Assange has appeared at the Royal Courts of Justice on the first day of a High Court bid to...

Publisher:

Author:

9 Jul 2011

Activism and ‘Lulz’ Motivate Latest Rash of Hacks – sony, security

Two prominent hacker groups, Anonymous and LulzSec, have ignited increasing concern over computer security by staging spectacular attacks and data heists against large corporations and government websites. The two groups have pulled off more than 30 attacks in the past two months, taking down websites belonging to the U.S. Senate and the CIA, humbling the gargantuan company Sony, and compromising nearly 2 million user logins and IDs across the Web.
Two prominent hacker groups, Anonymous and LulzSec, have ignited increasing concern over computer security by staging...

Publisher:

Author:

6 Jul 2011

Archivists, librarians and WikiLeaks

If you ve followed this blog you will know that our first Recordkeeping Roundtable event, in March 2011, was on the subject of WikiLeaks ( After WikiLeaks, is it all over for the Archives? ). At that session we explored, amongst other things, what WikiLeaks cause and method says about the role and nature of archives - and what we as archivists can learn from them, in particular about shifting notions of gatekeeper access to records, building trust with user communities and dissemination and redundancy of information on the Web.
If you ve followed this blog you will know that our first Recordkeeping Roundtable event, in March 2011, was on the...

Publisher:

Author:

5 Jul 2011

Wikileaks fundraising ad, and Assange taking credit for Egypt revolution, criticized

WikiLeaks head Julian Assange seems to be taking credit for "Arab Spring" in a recently released fundraising video. Dan Murphy in the CSM has a critical take: "Hundreds of thousands risking their lives to face down a tyrant? Expensive. Taking credit for it from a London mansion? Cheap."
WikiLeaks head Julian Assange seems to be taking credit for "Arab Spring" in a recently released fundraising video. Dan...

Publisher:

Author:

29 Jun 2011

Ohio teen may be linked to LulzSec attacks

A teenager in Ohio may be linked to the recent cyberattacks that hit government and corporate sites in the U.S. and U.K and have so far resulted in the arrest of U.K. teen Ryan Cleary.
A teenager in Ohio may be linked to the recent cyberattacks that hit government and corporate sites in the U.S. and U.K...

Publisher:

Author:

28 Jun 2011

The End Of LulzSec Is Not The End Of Hactivism

Lots of news over the weekend concerning the surprise announcement that LulzSec -- the group of "hactivists-for-the-lulz" who were able to generate so much attention -- had announced plans to disband just a day or so after promising many more hacks.
Lots of news over the weekend concerning the surprise announcement that LulzSec -- the group of...
Tags:

Publisher:

Author:

24 Jun 2011

LulzSec’s first Operation Anti-Security release: Arizona DPS

Hacking group Lulz Security has released a torrent of documents stolen from the Arizona Department of Public Safety in what it says will be the first release of information accumulated as part of "Operation Anti-Security," a campaign to hack, disrupt, and embarrass law enforcement agencies and private security contractors.
Hacking group Lulz Security has released a torrent of documents stolen from the Arizona Department of Public Safety in...
Tags:

Publisher:

Author:

22 Jun 2011

The menace of computer hacking

In late May, the US media group PBS ran a strange story on its website. "Prominent rapper Tupac has been found alive and well in a small resort in New Zealand," it reported. "The small town - unnamed due to security risks - allegedly housed Tupac and Biggie Smalls (another rapper) for several years."
In late May, the US media group PBS ran a strange story on its website. "Prominent rapper Tupac has been found alive and...

Publisher:

Author:

11 Jun 2011

Pentagon building Internet simulator to practice cyberwar

The US military is building a model of the Internet so it can practice cyberwarfare games. The project, which will be live by next summer, will include software that mimics human behavior under varying military threat levels, according to reports.
The US military is building a model of the Internet so it can practice cyberwarfare games. The project, which will be...
Tags:

Publisher:

Author:

8 Jun 2011

Anonymous warns NATO not to challenge it

Responding to a recent report from the North Atlantic Treaty Organization condemning Anonymous, the online "hacktivist" group has issued a public response warning the global organization not to challenge it.
Responding to a recent report from the North Atlantic Treaty Organization condemning Anonymous, the online "hacktivist"...

Publisher:

Author:

20 May 2011

WikiLeaks Shows Need for a Legal ‘Watchdog Privilege’

WikiLeaks makes news and shapes the public agenda. But the site, and any that follow in its footsteps, would be vulnerable if dragged into a U.S. federal court proceeding aimed at unmasking a source. Fifth Amendment protections aside, WikiLeaks wouldn t qualify to claim the federal reporter s privilege.
WikiLeaks makes news and shapes the public agenda. But the site, and any that follow in its footsteps, would be...
Tags:

Publisher:

Author:

11 May 2011

WikiLeaks Threatens Its Own Leakers With $20 Million Penalty

WikiLeaks founder Julian Assange now makes his associates sign a draconian nondisclosure agreement that, among other things, asserts that the organization s huge trove of leaked material is 'solely the property of WikiLeaks,' according to a report Wednesday.
WikiLeaks founder Julian Assange now makes his associates sign a draconian nondisclosure agreement that, among other...

Publisher:

Author:

7 May 2011

WSJ Launches Wikileaks Competitor… But Says It Can Reveal Your Info To Law Enforcement

With all the focus on Wikileaks recently, and the question of whether it is or is not "press" (not that it actually matters), one point that I've heard more than a few people raise is: why didn't any of the big news organizations create Wikileaks?
With all the focus on Wikileaks recently, and the question of whether it is or is not "press" (not that it actually...

Publisher:

Author:

5 May 2011

Hillary Clinton: We Want Journalism Innovation That Makes Info Easier To Share… Unless It’s Wikileaks

Jeff Sonderman points us to the odd statement put out by Hilary Clinton and the State Department for World Press Freedom Day, in which she praises the internet for making info easier to share and for holding governments accountable:
Jeff Sonderman points us to the odd statement put out by Hilary Clinton and the State Department for World Press Freedom...

Publisher:

Author:

2 May 2011

Wikileaks: America will foot the bill for record company enforcement in NZ if NZ will let America write its laws

Michael Geist sez, "Wikileaks has just posted hundreds of cables from U.S. personnel in New Zealand that reveal regular government lobbying on copyright, offers to draft New Zealand three-strikes and you're out legislation, and a recommendation to spend over NZ$500,000 to fund a recording industry-backed IP enforcement initiative.
Michael Geist sez, "Wikileaks has just posted hundreds of cables from U.S. personnel in New Zealand that reveal regular...

Publisher:

Author:

1 May 2011

Wikileaks cables reveal US pressuring Canada on IP enforcement

"Embassy Ottawa remains frustrated by the Government of Canada's continuing failure to introduce - let alone pass - major copyright reform legislation that would, inter alia, implement and ratify the World Intellectual Property Organization (WIPO) Internet treaties." That's the opening line of a United States embassy dispatch sent to Washington, DC in February of 2008, now published by Wikileaks.
"Embassy Ottawa remains frustrated by the Government of Canada's continuing failure to introduce - let alone pass -...
Tags:

Publisher:

Author:

28 Apr 2011

Army Wants to Stage Plays at Guantanamo Bay

Get ready for live theater at the world's most notorious detention facility. No, not for live readings of the Gitmo Files. The Army wants to stage readings from Sophocles' classic plays Ajax and Philoctetes for the beleaguered troops at Guantanamo Bay.
Get ready for live theater at the world's most notorious detention facility. No, not for live readings of the Gitmo...

Publisher:

Author:

25 Apr 2011

Guantanamo Files: The essential primer

We wake up Monday to another batch of leaked, classified documents, and some of the most indicting yet: The Guantanamo files. The cache, leaked to Wikileaks, provides intelligence assessments of 759 of the 779 prisoners held at Gitmo.
We wake up Monday to another batch of leaked, classified documents, and some of the most indicting yet: The Guantanamo...
Page 1 of 3

Leave a Comment

Your email address will not be published. Required fields are marked *

Name *