Documents released by Wikileaks have already offered hints about little green men from beyond the stars including tantalising titbits from Japanese and Lithuanian politicians. But some UFO sites, naturally, believe that the wizard-haired Wikileaks maestro might have something better up his sleeve - namely evidence of alien spacecraft parked secretly in government hangars.
On Christmas Eve, as the National Security Agency was releasing a report on NSA employees abuses of surveillance technology, Google was telling WikiLeaks about another sort of surveillance. According to a statement by WikiLeaks on Twitter, Google informed the organization on December 24 that the Gmail mailboxes and account metadata of a WikiLeaks employee had been turned over to law enforcement under a US federal warrant.
Wikileaks founder Julian Assange has accused an Australian government agency of giving misleading evidence to a parliamentary inquiry. Assange said that representatives of the Office of the Inspector General of Intelligence and Security had misrepresented the "standard operating procedures" among the 5 Eyes intelligence sharing alliance, which comprises Australia, New Zealand, the UK, Canada and the US.
The long and sordid story of WikiLeaks takes an astonishingly irresponsible and very dangerous turn. WikiLeaks has released a trove of documents about a dangerous spyware program called FinFisher, produced by a German company named Gamma Group International. According to reporting by our own Chris Duckett, Gamma Group International has been selling FinFisher to "the police forces of the Netherlands and New South Wales, and the intelligence arms of the Hungarian, Qatari, Italian, and Bosnian governments."
The Author a former NSA whistleblower meets with Snowden in Moscow. - ES is Edward Snowden, the most wanted man in the world. For almost nine months, I have been trying to set up an interview with him traveling to Berlin, Rio de Janeiro twice, and New York multiple times to talk with the handful of his confidants who can arrange a meeting. Among other things, I want to answer a burning question: What drove Snowden to leak hundreds of thousands of top-secret documents, revelations that have laid bare the vast scope of the government s domestic surveillance programs?
The National Security Agency listed Israel among a handful of nations considered to pose the "greatest threat" to American government, military and industrial secrets, classified documents leaked by whistleblower Edward Snowden reveal.
System administrators, who have access to confidential government or corporate documents, have particular ability to play a role in what he painted as a new class war, he said. "We can see that in the case of WikiLeaks, or the Snowden revelations, it's possible for even a single system administrator to have very significant constructive effect," he said. "This is not merely wrecking or disabling, not going on strikes, but rather shifting information from an information apartheid system from those with extraordinary power to the digital commons."
"There is abundant evidence that we are being contacted, that civilizations have been visiting us for a very long time. That their appearance is bizarre from any type of traditional materialistic western point of view. That these visitors use the technologies of consciousness, they use toroids, they use co-rotating magnetic disks for their propulsion systems, that seems to be a common denominator of the UFO phenomenon." - Dr Brian O leary, Former NASA Astronaut and Princeton Physics Professor (source)
The White House warned today of the threat posed by WikiLeaks, LulzSec, and other "hacktivist" groups that have the ability to target U.S. companies and expropriate confidential data.
Wikileaks has released 2,694 emails that were stolen from the security firm Stratfor by the hacking group Anonymous in winter of last year. Business Insider reports that one of these released emails shows the U.S. Drug Enforcement Agency (DEA) was asked to back off of an investigation that the DEA said would tie drugs to terrorism.The subject of the email is "RE: Humint - Afghanistan - Karzai (Strictly Protect - Confidential)" and says
Now we have something new a group called AntiLeaks has popped up and managed to drop a 10GB/s + DDoS attack on WikiLeaks, their affiliate sites and mirrors. This is something pretty spectacular when you think about it. The group claims to be a group of young adults, citizens of the United States of America and are deeply concerned about the recent developments with Julian Assange and his attempt at asylum in Ecuador , but their tactics and capabilities seems to indicate something more is going on here.
It s been a while since we heard anything big from WikiLeaks, but things seem to be heating up again. The site has been under a sustained DDoS attack for the last week or so, apparently by a group of self-described young adult citizens of the USA, after it released a trove of emails regarding an unprecedented surveillance system known as TrapWire.
The latest WikiLeaks release has shone a spotlight on an alleged domestic and foreign surveillance program run with cloud-based software provided by Virginia company TrapWire, many of whose top leaders and employees are former members of three-letter American intelligence agencies
Models to accurately predict the future of military conflicts based on classified information from the Afghan war revealed by whistleblower website Wikileaks have been created by scientists at the University of Sheffield. Using war logs with about 77,000 events including location, day and time of occurrence and other details from the war in Afghanistan between 2004 and 2009, the team of scientists - including scientists from the universities of Edinburgh and Columbia, USA - were able to predict armed opposition group activity way into the future of the battle.
In a very public snub to WikiLeaks, the cyber vigilante group Anonymous has created its own publishing system for confidential data. Par:AnoIA, which supposedly stands for Potentially Alarming Research: Anonymous Intelligence Agency, although one suspects the derivation came after the acronym, is intended to be a direct, but more liberal competitor to the closely moderated WikiLeaks site.
Wikilieaks has scored a victory against the financial blockade imposed by Mastercard and Visa, with an Icelandic judge ordering a local company to resume processing credit card payments to the website.
An Icelandic court ordered a local Visa affiliate which had broken contract laws by refusing to process credit card donations to WikiLeaks to resume processing transactions in what officials at the website dubbed a "significant victory" in its ongoing battle with governments and financial institutions, various media outlets are reporting. redOrbit (http://s.tt/1hR8X)
Backers of the whistle-blowing organisation WikiLeaks recently launched Friends of WikiLeaks (FoWL), an encrypted social network for like-minded individuals. "Friends of WikiLeaks is a network of people from across the globe who defend WikiLeaks, its people, its alleged sources and its mission," the website's homepage says. "We publicly and privately promote WikiLeaks and individuals and organisations aligned with the mission of WikiLeaks."
Julian Assange, the founder of the whistle-blowing WikiLeaks website, recently told a UK-based inquiry that he is the victim of "extensive press libels."?? "People who find themselves caught up in particularly newsworthy events or, as in my case, politically controversial circumstances face a stark choice: either to engage in prohibitively expensive litigation or to seek protection and redress through complaint to a press standards body or regulator," Assange wrote in official testimony submitted to the Leveson Inquiry.
"Eighteen months after its diplomatic cables were exposed in the WikiLeaks breach, the State Department continues to lock down its confidential information, while increasing its use of using social media. The agency is deploying new security technology, including auditing and monitoring tools that detect anomalous activity on the State Department's classified networks and systems
The scale and significance of the 2010 WikiLeaks disclosures were overstated, according to new research. Analysis of the WikiLeaks debacle in the International Review of Administrative Sciences, published by SAGE on behalf of the Institute for Administrative Sciences (IIAS), serves to highlight four key reasons why radical transparency is hard to achieve, and why a technological fix alone will not achieve it.
In turning one of its best-known hackers into an informant and breaking open the highest profile elements of the Anonymous movement, authorities have dealt a serious blow to a group they found a growing irritant. But as the broader "Anonymous" label - complete with its iconic Guy Fawkes mask imagery - is used by ever more disparate causes worldwide, it may be all but impossible to shut it down for good.
Daniel Ellsberg, who leaked top secret Pentagon Papers during the Vietnam War, says he strongly identifies with Pfc. Bradley Manning. "I don't think anyone should be prosecuted ... for releasing information to Congress or the public that reveals criminal behavior."? Ellsberg also defended WikiLeaks founder Julian Assange for publishing the controversial material.
Well, this is interesting. Given the general condemnation of Wikileaks by governments, all the ongoing controversy and reputation problems faced by the organization, you wouldn't expect them to be approached with any official requests for leaked information. But it seems just that has happened in the UK, where the Leveson Inquiry into media ethics has requested and received a dossier from Wikileaks on corruption in the British press.
Congress is doing it again: they re proposing overbroad regulations that could have dire consequences for our Internet ecology. The Cyber Intelligence Sharing and Protection Act of 2011 (H.R. 3523), introduced by Rep. Mike Rogers and Rep. Dutch Ruppersberger, allows companies or the government1 free rein to bypass existing laws in order to monitor communications, filter content, or potentially even shut down access to online services for "cybersecurity purposes."
Stratfor appears to have run afoul of Anonymous and WikiLeaks on account of its intelligence-gathering activities. A blog post published Sunday on the AnonOps Communications blog, a reliable source of Anonymous-related information, accused Stratfor of being "a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal's Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon, and government agencies, including the U.S. Department of Homeland Security, the U.S. Marines and the U.S. Defense Intelligence Agency."
In an unprecedented collaboration between Anonymous and WikiLeaks, the secret spilling site began leaking Sunday night portions of a massive trove of e-mails from the private intelligence firm Stratfor that Anonymous obtained by hacking the company in December. WikiLeaks did not mention the source of the reported five gigabytes of e-mails in its press release, but did say it has been working for months with 25 media outlets from around the world to analyze the documents.
UNESCO, the United Nations Educational Scientific and Cultural Organization, is hosting a conference about The Media World after Wikileaks and News of the World. Sounds like it could be an interesting event, but one organization not happy about it... is Wikileaks. Seeing as it was a conference that touched on Wikileaks' interests directly, Wikileaks asked to take part, and was instead denied a chance to speak at the event. When asked about this, UNESCO actually claimed that choosing to not allow Wikileaks attendees was an exercise in "freedom of expression," which seems like a poor choice of words.
Cryptome, a sort of proto-WikiLeaks website best known for exposing the CIA analyst who found Osama Bin Laden, announced this week that its entire website had been hacked. But, in a surprising response from Cryptome founder John Young - a man suspicious even of tap water - no foul play was suspected. At least no more foul than the usual Internet hijinks.
Voices within the Pakistani establishment spoke against giving nuclear support to Iran. US pressure was partly the reason but so was the discomfort with Iran, a Shi'ite state. These suspicions were confirmed by confidential American cables revealed by Wikileaks. They detail Pakistan s efforts to dissuade Iran from pursuing its weapons program. General Pervez Musharraf, prime minister Shaukat Aziz and foreign minister Khurshid Kasuri held at least seven meetings, whether face-to-face or by telephone, with the Iranians.
In a time in the history of this nation, when there is so much happening under the table, when administrations feel they have to protect us, and in order to do that efficiently they have to keep it secret, I celebrate the courage of Bradley Manning. I ve yet to see anybody prove to anybody else that somebody was killed because of whatever it is that Bradley Manning has made public.
"In a tweet early this morning, cybersecurity researcher Christopher Soghoian pointed to an internal memo of India's Military Intelligence that has been liberated by hackers and posted on the Net. The memo suggests that, "in exchange for the Indian market presence" mobile device manufacturers, including RIM, Nokia, and Apple (collectively defined in the document as "RINOA") have agreed to provide backdoor access on their devices
*Why does just about everyone in your organization have direct access to just about all the company secret files? There is no reason that the person in the mailroom or, in most cases, the company president, should have such access. Take a look at WikiLeaks to see what goes wrong when there is too indiscriminate access.
On Dec. 24th, hacker collective Anonymous stole credit card info and other sensitive data from U.S. security firm Stratfor, but keeping track of who and what are affected by the scandal can be difficult. We ve put together a 10-point FAQ for better understanding the major hacking incident, which blew up in the news cycle on Christmas and continues to worry people as more details are released.
During testimony at a military installation where Pfc. Bradley Manning is fighting efforts to have him court-martialed over alleged leaks to Wikileaks, tech jargon is paramount. The digital forensic examiners littered their testimonies with the terms of their trade. Text files. Zip files. Hash values. Allocated and unallocated disk space
Stratfor was not breached in order to obtain customer credit card numbers, which the hackers in question could not have expected to be as easily obtainable as they were. Rather, the operation was pursued in order to obtain the 2.7 million e-mails that exist on the firm's servers. This wealth of data includes correspondence with untold thousands of contacts who have spoken to Stratfor's employees off the record over more than a decade.
The Australian Prime Minister and Attorney General may have shunned Julian Assange in his bid for justice, but Greens Senator Scott Ludlam has emerged as one of the Wikileaks founder s core supporters. Ludlam has returned from a mission to Europe where he sought to secure some surety over Assange's human rights, if he is extradited to Sweden.
Those claiming credit for the latest Anonymous cyberattack said they obtained about 4,000 passwords, home addresses, and credit card information from Statfor's private client list, and have posted that private data on a public information sharing site. The hacker group claims to have obtained about 200 gigabytes of data.
Reports have emerged alleging social network giant Twitter is censoring its content, closing accounts supporting anti-authoritarian causes such as Wikileaks and the Anonymous sponsored Occupy movement. The initial report of Twitter censoring users stemmed from Business Insider columnist David Seaman Monday. In his report Seaman alleged that his Twitter account had been closed as a means to silence his ongoing support for the Occupy movement and "talking too much" about the controversial detainment without trial provisions in America's FY 2012 National Defense Authorization Act (NDAA).
Like the mutant offspring of Captain Jack Sparrow and French anarchist Pierre Proudhon -- famous for his 'property is theft' claim -- activist hacking group LulzSec surfed the Web spreading debonair charm, chaos and reckless acts of 'hacktivism' in equal measure.
A U.S. news report says the U.S. government obtained a secret court order to force Google Inc. and a small Internet provider to hand over information from the e-mail accounts of a WikiLeaks volunteer.
More than a year after thousands of classified and sensitive U.S. government documents were leaked to the secret-spilling site WikiLeaks, the White House has issued an executive order designed to improve the security of classified networks and prevent further leaks.
U.S. government agencies regularly request that social network providers disclose user data or take down content for legal reasons, often to prevent or remove defamation, hate speech, and child pornography. Most social networks will notify you of government requests for your information unless they are specifically barred from doing so by court order. Twitter explicitly promises as much and has demonstrated a willingness to fight for its users in the past, in one case securing a court order allowing the company to notify Birgitta Jornsdottir that her private data was being subpoenaed by the U.S. Department of Justice as part of an investigation into her involvement with WikiLeaks earlier this year.
The US Department of Labor has told Bank of America to reinstate a guy they fired for blowing the whistle on fraud at Countrywide, and pay him $930,000 for his troubles. Apparently, BofA fired the guy soon after taking over Countrywide and discovered that this (unnamed) employee was trying to report on the fact that others, who had reported fraud at Countrywide, had been the victims of corporate retaliation.
Thanks to some dogged nudging by the good folks at MuckRock.com*, we now have an authoritative list of the websites blocked by the U.S. Air Force because of the WikiLeaks disclosures. The list of 45 sites primarily covers various WikiLeaks mirror sites, as well as several of the main media outlets that partnered with the whistleblowing platform last year, including The New York Times, The Guardian, el Pais, Der Spiegel, and OWNI.fr.
Analysts at an Israeli company that infiltrates online forums to identify terrorists often claim responsibility for attacks to bolster their credibility, according to a recently-leaked cable from the U.S. Department of State.
When it comes to copyright issues, the various State Department leaks via Wikileaks have only served to confirm what pretty much everyone already knew. Earlier we'd covered revelations about US diplomatic involvement in new copyright laws in Spain, and the latest (as a bunch of you sent in) is the rather upfront admission that the MPAA was absolutely behind the decision to sue iiNet in Australia.
Police have arrested two men in the UK in connection with online attacks performed by LulzSec and Anonymous. The men, aged 20 and 24, were arrested yesterday by officers from the Metropolitan Police Service's Central e-Crime Unit (PCeU) and are accused of conspiring to commit offences under the Computer Misuse Act of 1990. Police have searched the homes of one of the men and seized computers for further examination.
The Guardian released a statement today assailing Wikileaks' accusation that one of its reporters published the password to an unredacted set of leaked U.S. diplomatic cables. The newspaper admits publishing the password, but says it was assured that the files encrypted with it were temporary and would not become public.
On the heels of its recent release of US diplomatic cables WikiLeaks has released an encrypted file after telling its followers on Twitter to "stay tuned for an important announcement." The contents of the 571 megabyte file are a mystery as it cannot be accessed without a decryption key, which the anti-secrecy website said would be released "at the appropriate moment."
Wikileaks, facing criticism after unredacted versions of diplomatic cables escaped into the wild, today accused a Guardian journalist of negligently publishing the password required to decrypt them.
Apple did not have a global security team until March 2008, when it hired employees from drug company Pfizer to counter rampant counterfeiting of its products in China, according to a cable leaked by activist group WikiLeaks.
As far as OpenLeaks is concerned, I have found the whole thing to be strange from the beginning, because if you look at the way in which this sort of dissident faction left Wikileaks and began this competing organization, what you'll find is that the differences that supposedly motivated it were very trivial and petty and personalized.
For the second time in a year, WikiLeaks has lost control of its full, unredacted cache of a quarter-million U.S. State Department cables and this time the leaked files are apparently online.
The group, who apparently has no leader, came into prominence by openly supporting the release of classified documents through Wikileaks. But it wasn t until the hacking of Sony s PlayStation Network that the public took notice of them. And although they have been blamed for nearly every hacking attempt in the last two years, the question is- are they as dangerous as the general media claims? Who exactly is Anonymous, and for lack of a better phrase, what do they want?
We just wrote about a GAO report showing how the Defense Department is somewhat incompetent at dealing with online threats. Of course, it's not clear that anyone else in the government is any better. The GAO is back with yet another report, dinging the State Department for its dreadful computer security monitoring program. In this case, it's talking about threats to the State Department's network, rather than to third parties. And while the State Department spent a whopping $1.2 billion of taxpayer money on a fancy computer system, called iPost, to monitor everything, it turns out that it only works on Windows machines:
WikiLeaks has published top-secret information from the U.S. military s wars in Iraq and Afghanistan, and has also shared thousands of pages of U.S. State Department cables with the world. The U.S. government and other governments around the world are learning that in the age of WikiLeaks, no secret is safe. What does this mean to international companies or organizations? This white paper shows a few lessons of WikiLeaks for information security leaders in today s business and government organizations.
The Justice Department on Thursday fired back against a lawsuit filed by a WikiLeaks supporter and friend of accused leaker Bradley Manning over the warrantless seizure of his laptop, arguing that they held onto the machine for a lengthy 49 days only because he refused to provide the password, and because his dual-boot Linux/Windows configuration taxed federal agents forensics capabilities.
In this and subsequent interviews, Julian has talked a lot about the historic record, and it s to that thing posterity I m offering this now. To reiterate, this interview was conducted 18 months ago: I make no claim, and nor should anyone else, that the opinions expressed in it (for example, around the News of the World phone hacking scandal) are opinions he holds today. The facts have changed and, who knows, the man might have changed too. This is about understanding who he was and what was motivating him before he set out on what was probably the most eventful and scary year of his life.
Anonymous and LulzSec in response to FBI crackdown point out that: 'Governments lying to their citizens' and 'corporations aiding and conspiring with said governments' as part of what they find unacceptable and that gives them legitimacy.
The FBI's victory is at best a symbolic one. It is hard to imagine that the FBI nabbed anyone of importance in Anonymous, Paul Moriarty, CEO of Umbra Data, told TechNewsWorld. "These groups have a core cadre of experts that are excellent at covering their tracks. The rest are hanger-ons, or back in the day, what we called script kiddies," he said.
A little more than a year ago, Wired.com published excerpts from instant messenger chats between accused WikiLeaks source Bradley Manning and Adrian Lamo, the ex-hacker in whom he confided and who reported him to the authorities. It s now time to reveal the previously unpublished portions of these conversations
On Tuesday, the court began hearing an appeal by Assange against a decision by Belmarsh Magistrates' Court in February to send him to Sweden for questioning about allegations of rape and sexual coercion. His defence barrister Ben Emerson kicked proceedings off on Tuesday by arguing the actions behind the allegations of sexual misconduct against Assange would not be judged offences under British law.
WikiLeaks editor Julian Assange has appeared at the Royal Courts of Justice on the first day of a High Court bid to avoid extradition. On Tuesday, the court began hearing an appeal by Assange against a decision by Belmarsh Magistrates' Court in February to send him to Sweden for questioning about allegations of rape and sexual coercion.
Two prominent hacker groups, Anonymous and LulzSec, have ignited increasing concern over computer security by staging spectacular attacks and data heists against large corporations and government websites. The two groups have pulled off more than 30 attacks in the past two months, taking down websites belonging to the U.S. Senate and the CIA, humbling the gargantuan company Sony, and compromising nearly 2 million user logins and IDs across the Web.
If you ve followed this blog you will know that our first Recordkeeping Roundtable event, in March 2011, was on the subject of WikiLeaks ( After WikiLeaks, is it all over for the Archives? ). At that session we explored, amongst other things, what WikiLeaks cause and method says about the role and nature of archives - and what we as archivists can learn from them, in particular about shifting notions of gatekeeper access to records, building trust with user communities and dissemination and redundancy of information on the Web.
WikiLeaks head Julian Assange seems to be taking credit for "Arab Spring" in a recently released fundraising video. Dan Murphy in the CSM has a critical take: "Hundreds of thousands risking their lives to face down a tyrant? Expensive. Taking credit for it from a London mansion? Cheap."
There hasn't been much talk lately over the fact that PayPal, MasterCard and Visa all cut off Wikileaks late last year, after the US government freaked out about the release of some State Department Cables
A teenager in Ohio may be linked to the recent cyberattacks that hit government and corporate sites in the U.S. and U.K and have so far resulted in the arrest of U.K. teen Ryan Cleary.
Lots of news over the weekend concerning the surprise announcement that LulzSec -- the group of "hactivists-for-the-lulz" who were able to generate so much attention -- had announced plans to disband just a day or so after promising many more hacks.
Hacking group Lulz Security has released a torrent of documents stolen from the Arizona Department of Public Safety in what it says will be the first release of information accumulated as part of "Operation Anti-Security," a campaign to hack, disrupt, and embarrass law enforcement agencies and private security contractors.
In late May, the US media group PBS ran a strange story on its website. "Prominent rapper Tupac has been found alive and well in a small resort in New Zealand," it reported. "The small town - unnamed due to security risks - allegedly housed Tupac and Biggie Smalls (another rapper) for several years."
The US military is building a model of the Internet so it can practice cyberwarfare games. The project, which will be live by next summer, will include software that mimics human behavior under varying military threat levels, according to reports.
Responding to a recent report from the North Atlantic Treaty Organization condemning Anonymous, the online "hacktivist" group has issued a public response warning the global organization not to challenge it.
WikiLeaks makes news and shapes the public agenda. But the site, and any that follow in its footsteps, would be vulnerable if dragged into a U.S. federal court proceeding aimed at unmasking a source. Fifth Amendment protections aside, WikiLeaks wouldn t qualify to claim the federal reporter s privilege.
WikiLeaks founder Julian Assange now makes his associates sign a draconian nondisclosure agreement that, among other things, asserts that the organization s huge trove of leaked material is 'solely the property of WikiLeaks,' according to a report Wednesday.
With all the focus on Wikileaks recently, and the question of whether it is or is not "press" (not that it actually matters), one point that I've heard more than a few people raise is: why didn't any of the big news organizations create Wikileaks?
Jeff Sonderman points us to the odd statement put out by Hilary Clinton and the State Department for World Press Freedom Day, in which she praises the internet for making info easier to share and for holding governments accountable:
Michael Geist sez, "Wikileaks has just posted hundreds of cables from U.S. personnel in New Zealand that reveal regular government lobbying on copyright, offers to draft New Zealand three-strikes and you're out legislation, and a recommendation to spend over NZ$500,000 to fund a recording industry-backed IP enforcement initiative.
"Embassy Ottawa remains frustrated by the Government of Canada's continuing failure to introduce - let alone pass - major copyright reform legislation that would, inter alia, implement and ratify the World Intellectual Property Organization (WIPO) Internet treaties." That's the opening line of a United States embassy dispatch sent to Washington, DC in February of 2008, now published by Wikileaks.
Get ready for live theater at the world's most notorious detention facility. No, not for live readings of the Gitmo Files. The Army wants to stage readings from Sophocles' classic plays Ajax and Philoctetes for the beleaguered troops at Guantanamo Bay.
We wake up Monday to another batch of leaked, classified documents, and some of the most indicting yet: The Guantanamo files. The cache, leaked to Wikileaks, provides intelligence assessments of 759 of the 779 prisoners held at Gitmo.