The controversial release this week by WikiLeaks of countless so-called secret international government documents should tell us all something about this Digital Age. There are no more "secrets." Not in government. Not in your professional life. Not even in your personal life. Especially if you foolishly 'fess up on Facebook.
Objective providing of Wikileaks is to distributed organization which publishes and analyzes information though an uncensorable approach -- focusing on documents, photos and video which have political or social significance.
Our primary interests are oppressive regimes in Asia, the former Soviet bloc, Sub-Saharan Africa and the Middle East, but we also expect to be of assistance to those in the west who wish to reveal unethical behavior in their own governments and corporations.
Since its creation in 2006, WikiLeaks has been a lightning rod for controversy. The non-profit media company, which serves as a clearinghouse for information leaked by anonymous whistleblowers around the world, has received both high praise and scathing criticism by human rights groups and governments alike. But regardless of how you feel about WikiLeaks' mission, there is at least one lesson security professionals should take away: Your data is only secure as your weakest link.
WikiLeaks been developing and improving a harm minimisation procedure. We do not censor our news, but from time to time we may remove or significantly delay the publication of some identifying details from original documents to protect life and limb of innocent people.
We accept leaked material in person and via postal drops as alternative methods, although we recommend the anonymous electronic drop box as the preferred method of submitting any material. We do not ask for material, but we make sure that if material is going to be submitted it is done securely and that the source is well protected. Because we receive so much information, and we have limited resources, it may take time to review a source's submission.
We also have a network of talented lawyers around the globe who are personally committed to the principles that WikiLeaks is based on, and who defend our media organisation.
"We assess all news stories and test their veracity. We send a submitted document through a very detailed examination a procedure. Is it real? What elements prove it is real? Who would have the motive to fake such a document and why? We use traditional investigative journalism techniques as well as more modern rtechnology-based methods. Typically we will do a forensic analysis of the document, determine the cost of forgery, means, motive, opportunity, the claims of the apparent authoring organisation, and answer a set of other detailed questions about the document. We may also seek external verification of the document For example, for our release of the Collateral Murder video, we sent a team of journalists to Iraq to interview the victims and observers of the helicopter attack. The team obtained copies of hospital records, death certificates, eye witness statements and other corroborating evidence supporting the truth of the story. Our verification process does not mean we will never make a mistake, but so far our method has meant that WikiLeaks has correctly identified the veracity of every document it has published." Source : WikiLeaks Website
In April 2010, WikiLeaks released a video of classified US military footage from 2007 that showed a US helicopter in Baghdad firing upon and killing 12 people, including two Reuters employees. The release of the video led to the 2010 arrest of a US Army intelligence analyst, PFC Bradley Manning, who allegedly provided the footage and other items—including 260,000 classified US diplomatic cables—to WikiLeaks.
Manning, who was based in the Middle East, allegedly accessed the information from two classified networks, to which he had access, and downloaded it to CD-RWs.
Assange said that his arrest would do nothing to halt the flow of American diplomatic cables being released by his group and newspapers in several countries. Hundreds have been published in redacted form this week and Assange said that all of the cables had already been distributed in a heavily encrypted form to tens of thousands of people.
If something happened to him, he suggested, then the password needed to unencrypt the data would be released and all the secrets would go out at once.
WikiLeaks had been tapping into Amazon's EC2, or Elastic Cloud Computing service. WikiLeaks said it's now being hosted by servers in Europe.
"History will win," Assange said in a web chat with readers of The Guardian newspaper, one of the media organizations helping to coordinate the documents' publication. "The world will be elevated to a better place.
WikiLeaks, which has triggered global governmental alarm by releasing reams of classified U.S. diplomatic cables, is facing attacks in cyberspace and in the legal sphere. The site is assailed by hackers and has been booted from its U.S. server. Frontman Julian Assange is in hiding and faces allegations of sexual misconduct.
"Whatever happens to the domain name and the actual organization, the idea unleashed by WikLeaks is going to continue," said Joshua Benton, director of the Nieman Journalism Lab.
Ben Laurie, a data security expert who advised WikiLeaks before it launched in 2006, agreed.
"The concept is not going to die. It's really hard to keep things shut down if they want to stay up," he said. "Look at everything else people would like not to happen online — phishing, spam, porn. It's all still there."
Little is known about the day-to-day functioning of WikiLeaks. It has no headquarters, few if any paid staff — but a famous public face in Assange, a wiry 39-year-old Australian computer hacker with no permanent address.
He's on the cover of newspapers and magazines around the world, but he has not appeared in public for a month.
Assange, who is somewhere in Britain, is the subject of a European arrest warrant issued by authorities in Sweden, where he is accused of rape, sexual molestation and unlawful coercion.
If British police arrest him, he will likely be caught up in a lengthy legal fight against extradition and could be jailed, his ability to operate as the face of WikiLeaks curtailed even further.
Assange denies the Swedish charges, which his British lawyer, Mark Stephens, has said stem from a "dispute over consensual but unprotected sex." He said Assange was happy to speak to Swedish prosecutors and had provided his contact details to authorities there and in Britain.
Assange also has made powerful enemies in the United States, especially since WikiLeaks released thousands of secret logs from the wars in Iraq and Afghanistan earlier this year. With the latest leaks, U.S. politicians have called for him to be prosecuted for espionage — or worse. Former Republican vice presidential candidate Sarah Palin asked on Facebook: "Why was he not pursued with the same urgency we pursue al-Qaida and Taliban leaders?"
Assange acknowledged Friday that "I have become the lightning rod."
"In the end, someone must be responsible to the public and only a leadership that is willing to be publicly courageous can genuinely suggest that sources take risks for the greater good," he said during a question-and-answer session on The Guardian newspaper's website.
No comments:
Post a Comment