WikiLeaks | Founding, History, Chelsea Manning, & Controversies | Britannica
Search Britannica
Click here to search
Search Britannica
Click here to search
Login
Subscribe
Subscribe
Home
Games & Quizzes
History & Society
Science & Tech
Biographies
Animals & Nature
Geography & Travel
Arts & Culture
Money
Videos
On This Day
One Good Fact
Dictionary
New Articles
History & Society
Lifestyles & Social Issues
Philosophy & Religion
Politics, Law & Government
World History
Science & Tech
Health & Medicine
Science
Technology
Biographies
Browse Biographies
Animals & Nature
Birds, Reptiles & Other Vertebrates
Bugs, Mollusks & Other Invertebrates
Environment
Fossils & Geologic Time
Mammals
Plants
Geography & Travel
Geography & Travel
Arts & Culture
Entertainment & Pop Culture
Literature
Sports & Recreation
Visual Arts
Companions
Demystified
Image Galleries
Infographics
Lists
Podcasts
Spotlights
Summaries
The Forum
Top Questions
#WTFact
100 Women
Britannica Kids
Saving Earth
Space Next 50
Student Center
Home
Games & Quizzes
History & Society
Science & Tech
Biographies
Animals & Nature
Geography & Travel
Arts & Culture
Money
Videos
WikiLeaks
Table of Contents
WikiLeaks
Table of Contents
Introduction & Top QuestionsFrom the founding of WikiLeaks to ClimategateWikiLeaks and Chelsea ManningEdward Snowden and the Sony Pictures hackWikiLeaks and its links to Russian intelligence
References & Edit History
Quick Facts & Related Topics
Images
Related Questions
What was the first publication on WikiLeaks?
Who controls the Internet?
Is the Internet “making us stupid”?
Is cancel culture (or “callout culture”) good for society?
Read Next
Who Invented the Internet?
Timeline of the 2000s
Inventions that Helped Shape How We Interact with Knowledge and Information
What’s the Difference Between the Deep Web and the Dark Web?
How Does Wi-Fi Work?
Discover
7 Surprising Uses for Mummies
9 Things You Might Not Know About Adolf Hitler
12 Greek Gods and Goddesses
The Seven Sacraments of the Roman Catholic church
9 of the World’s Deadliest Snakes
Did Marie-Antoinette Really Say “Let Them Eat Cake”?
What Is the “Ides” of March?
Home
Technology
The Web & Communication
Science & Tech
WikiLeaks
media organization and Web site
Actions
Cite
verifiedCite
While every effort has been made to follow citation style rules, there may be some discrepancies.
Please refer to the appropriate style manual or other sources if you have any questions.
Select Citation Style
MLA
APA
Chicago Manual of Style
Copy Citation
Share
Share
Share to social media
URL
https://www.britannica.com/topic/WikiLeaks
Give Feedback
External Websites
Feedback
Corrections? Updates? Omissions? Let us know if you have suggestions to improve this article (requires login).
Feedback Type
Select a type (Required)
Factual Correction
Spelling/Grammar Correction
Link Correction
Additional Information
Other
Your Feedback
Submit Feedback
Thank you for your feedback
Our editors will review what you’ve submitted and determine whether to revise the article.
External Websites
Official Site of WikiLeaks
Ohio State University - Origins - WikiLeaks, and the Past and Present of American Foreign Relations
Ohio State University - Origins - WikiLeaks, and the Past and Present of American Foreign Relations
Please select which sections you would like to print:
Table Of Contents
Cite
verifiedCite
While every effort has been made to follow citation style rules, there may be some discrepancies.
Please refer to the appropriate style manual or other sources if you have any questions.
Select Citation Style
MLA
APA
Chicago Manual of Style
Copy Citation
Share
Share
Share to social media
URL
https://www.britannica.com/topic/WikiLeaks
Feedback
External Websites
Feedback
Corrections? Updates? Omissions? Let us know if you have suggestions to improve this article (requires login).
Feedback Type
Select a type (Required)
Factual Correction
Spelling/Grammar Correction
Link Correction
Additional Information
Other
Your Feedback
Submit Feedback
Thank you for your feedback
Our editors will review what you’ve submitted and determine whether to revise the article.
External Websites
Official Site of WikiLeaks
Ohio State University - Origins - WikiLeaks, and the Past and Present of American Foreign Relations
Ohio State University - Origins - WikiLeaks, and the Past and Present of American Foreign Relations
Written by
Michael Ray
Michael Ray oversees coverage of European history and military affairs for Britannica. He earned a B.A. in history from Michigan State University in 1995. He was a teacher in the Chicago suburbs and Seoul,...
Michael Ray
Fact-checked by
The Editors of Encyclopaedia Britannica
Encyclopaedia Britannica's editors oversee subject areas in which they have extensive knowledge, whether from years of experience gained by working on that content or via study for an advanced degree. They write new content and verify and edit content received from contributors.
The Editors of Encyclopaedia Britannica
Last Updated:
Mar 5, 2024
?
Article History
Table of Contents
Julian Assange
See all media
Category:
Science & Tech
Date:
2006 - present
(Show?more)
Areas Of Involvement:
whistleblower
wiki
(Show?more)
Related People:
Julian Assange
Chelsea Manning
(Show?more)
See all related content →
Recent News
Mar. 4, 2024, 4:39 AM ET (Deutsche Welle)
Germany's Scholz speaks out against Assange extradition
Feb. 26, 2024, 12:31 PM ET (ABC News (U.S.))
WikiLeaks’ Assange faces wait to find out whether he can challenge extradition to the US
Feb. 26, 2024, 4:02 AM ET (ABC News (U.S.))
WikiLeaks founder Assange faces his last legal roll of the dice in Britain to avoid US extradition
Feb. 21, 2024, 7:37 PM ET (AP)
WikiLeaks’ Assange faces wait to find out whether he can challenge extradition to the US
Feb. 20, 2024, 3:59 PM ET (AP)
WikiLeaks founder Assange faces his last legal roll of the dice in Britain to avoid US extradition
Show More
Show Less
Top Questions
What is WikiLeaks?WikiLeaks is a media organization and website that functions as a clearinghouse for classified or otherwise privileged information.Who founded WikiLeaks?WikiLeaks was founded by Australian computer programmer and activist Julian Assange in 2006. Assange was inspired to create WikiLeaks by Daniel Ellsberg’s 1971 release of the Pentagon Papers.What was the first publication on WikiLeaks?The first document posted to the WikiLeaks website, in December 2006, was a message from a Somali rebel leader encouraging the use of hired gunmen to assassinate government officials. The document’s authenticity was never verified, but the story of WikiLeaks and questions regarding the ethics of its methods soon overshadowed it.WikiLeaks, media organization and website that functioned as a clearinghouse for classified or otherwise privileged information. WikiLeaks was founded in 2006 by Australian computer programmer and activist Julian Assange. From the founding of WikiLeaks to Climategate Assange, a noted computer hacker, pleaded guilty to a host of cybercrime charges in 1991, but, because of his youth, he received only minimal punishment. He was inspired to create WikiLeaks by Daniel Ellsberg’s 1971 release of the Pentagon Papers. Observing that two years had elapsed between Ellsberg’s obtaining the Pentagon Papers and their publication in The New York Times, Assange sought to streamline the whistleblowing process. In 2006 he created the basic design for the site on a computer in Australia, but wikileaks.org soon moved to servers in Sweden (later adding redundant systems in other countries) because of that country’s robust press-protection laws. Although WikiLeaks relied on volunteer labour for much of its daily operation, it deviated from the traditional “wiki” formula in that its content was not editable by end users. WikiLeaks received its first batch of sensitive documents not from a whistleblower but from The Onion Router (Tor), an encryption network designed to allow users to transmit data anonymously. A WikiLeaks volunteer mined the data emerging from Tor, eventually collecting more than a million documents and providing the site with its first scoop—a message from a Somali rebel leader encouraging the use of hired gunmen to assassinate government officials. It was posted to the site in December 2006. The document’s authenticity was never verified, but the story of WikiLeaks and questions regarding the ethics of its methods soon overshadowed it. In November 2007 the site posted the standard operating procedures for the U.S. military’s detention facility at Guantánamo Bay, Cuba. The following year the wikileaks.org site was briefly shut down as a result of legal action in the United States, but mirrors of the site, registered in Belgium (wikileaks.be), Germany (wikileaks.de), and the Christmas Islands (wikileaks.cx), were unaffected. It was not the site’s only legal challenge. After WikiLeaks published internal material from the Scientology movement in 2008, that group threatened suit on the grounds of copyright infringement. WikiLeaks responded by releasing thousands of Scientology documents. In 2009 the site made news when it released a cache of internal e-mails from East Anglia University’s Climatic Research Unit. Global warming skeptics seized on “Climategate” as proof of a conspiracy to silence debate on the subject or conceal data. A subsequent series of investigations found shortcomings in the peer review process but cleared the scientists of intentional wrongdoing.
Get a Britannica Premium subscription and gain access to exclusive content.
Subscribe Now
WikiLeaks and Chelsea Manning In 2010 WikiLeaks posted a flurry of documents—almost half a million in total—relating to the U.S. wars in Iraq and Afghanistan. While much of the information was already in the public domain, the administration of U.S. Pres. Barack Obama criticized the leaks as a threat to U.S. national security. The site also made public an edited video, filmed in 2007 from the gun camera of a U.S. attack helicopter, that depicted the killing of a dozen people, including two Reuters employees. In November 2010 WikiLeaks released selections from a trove of some 250,000 classified diplomatic cables between the U.S. State Department and its embassies and consulates around the world. Those documents dated mostly from 2007 to 2010 but included some dating back as far as 1966. Among the wide-ranging topics covered in those secret documents were behind-the-scenes U.S. efforts to politically and economically isolate Iran, primarily in response to fears of Iran’s development of nuclear weapons. Chelsea ManningChelsea Manning, undated photo provided by the U.S. Army.(more)In the wake of those leaks, lawmakers in the United States pushed for the prosecution of Assange and any journalists or government insiders who had collaborated with WikiLeaks. The first formal charges were filed in May 2010, when Chelsea Manning, a low-level U.S. Army intelligence analyst, was arrested in connection with the release of the 2007 helicopter video. Investigators later accused Manning of the diplomatic cable leak as well. After a lengthy pretrial detention, Manning pleaded guilty to 10 charges. Military prosecutors pursued additional charges, and in July 2013 Manning was found guilty of numerous counts of espionage and theft. Although Manning was acquitted of aiding the enemy, the most serious of the charges, in August 2013 Manning was sentenced to 35 years in prison. In December 2010 wikileaks.org faced a flurry of setbacks. It was forced off-line once again when the site’s domain name provider terminated its account in the wake of a series of distributed denial-of-service attacks; as with previous service interruptions, WikiLeaks remained available on mirror sites or by directly linking to its IP address. Days later Assange was arrested by British police on an outstanding Swedish warrant for alleged sex crimes. That same week the organization’s fundraising efforts took an enormous hit when PayPal, Visa, and Mastercard suspended online payment processing for donations to WikiLeaks, a move that Assange characterized as a “financial blockade.” WikiLeaks began publishing another round of secret files from the Guantánamo Bay facility in April 2011. The documents contained detailed information about the majority of prisoners detained at Guantánamo from 2002 to 2008, including photographs, health records, and assessments of the potential threat posed by each prisoner. The files also indicated that dozens of detainees had passed through radicalized British mosques prior to their departure for Afghanistan and, ultimately, their capture by U.S. forces. In August 2011 the German newspapers Der Freitag and Der Spiegel uncovered a massive cache of unedited WikiLeaks documents in a password-protected file that was circulating on the Internet. The password was easily discovered, and the raw documents—the entirety of the U.S. diplomatic cable collection—could be viewed online. WikiLeaks responded to this revelation by posting more than 130,000 unedited cables onto its website. This was a radical departure from the organization’s previous methods, which involved redacting the names of sources or informants in the interest of preserving the safety of those individuals. Edward Snowden and the Sony Pictures hack Stating that the “blockade” enacted by financial companies in December 2010 had crippled WikiLeaks operations, in October 2011 Assange announced that the organization would stop publishing and focus its efforts on fundraising. During this time Assange remained under house arrest pending the resolution of his extradition hearing, and he began recording The World Tomorrow (later called The Julian Assange Show), an interview program that debuted on the state-run Russian satellite network RT in April 2012. With his extradition appeal having been denied and the Swedish arrest warrant pending, in June 2012 Assange applied for asylum in Ecuador and sought refuge in that country’s embassy in London. While Assange remained within the embassy, WikiLeaks resumed the publication of documents to its website. Among these were a massive collection of confidential e-mails from Syrian government officials and an overview of U.S. military detention policies. When National Security Agency whistleblower Edward Snowden fled to Hong Kong, WikiLeaks staffers facilitated his travel to Moscow. They remained with Snowden during his monthlong stay in the international transit zone of a Moscow airport and assisted with his application for asylum in Russia. In July 2013 Assange launched the WikiLeaks Party and announced his candidacy for a seat in the Australian Senate. Promoting a platform of “transparency, accountability, and justice,” the party fielded a total of seven candidates in Senate races in the Australian states of Victoria, New South Wales, and Western Australia. An interparty feud reduced the number of candidates to six prior to the September 7, 2013, general election, and, in that event, the WikiLeaks Party won less than 1 percent of the national vote. Although it failed to capture a single seat in the Senate, Assange, then in his second year of confinement within the Ecuadoran embassy, stated that the party would continue. In 2015 the party was deregistered by the Australian Electoral Commission. In November 2014 Sony Pictures Entertainment was the target of a massive data breach, and a group calling itself the Guardians of Peace soon began releasing sensitive company information in small batches. The hack was eventually attributed to North Korea. The following April, WikiLeaks published more than 200,000 of the stolen documents in a searchable database, a move that was immediately criticized by Sony. WikiLeaks and its links to Russian intelligence In March 2016 WikiLeaks unveiled a searchable archive of some 30,000 e-mail messages and attachments retrieved from a private server maintained by Hillary Clinton during her tenure as U.S. secretary of state (2009–13). The collection was made public by the State Department through the Freedom of Information Act. In July 2016, just days before the Democratic Party officially nominated Clinton as its candidate in the 2016 U.S. presidential race, WikiLeaks published more than 60,000 Democratic National Committee (DNC) e-mail messages and documents. The internal communication revealed that top DNC officials had a marked preference for Clinton over her rival for the Democratic nomination, Bernie Sanders, and DNC chair Debbie Wasserman Shultz resigned as a result. A probe by U.S. intelligence services and the Federal Bureau of Investigation later concluded that individuals with ties to the Russian government had hacked the DNC in an attempt to gain information that would bolster support for Republican Party presidential candidate Donald Trump. WikiLeaks had originally followed a policy of redacting personal or sensitive information from documents prior to release, but the DNC hack database contained credit card information as well as Social Security and passport numbers. Assange publicly declared his opposition to Clinton, but he denied any connection with Russia, although he made regular appearances on RT in the months prior to the November 2016 U.S. presidential election.
On October 7, 2016, a damaging video recording surfaced in which Trump boasted that his celebrity allowed him to grope women with impunity. Less than an hour later, WikiLeaks published a trove of e-mail messages from the personal account of Clinton campaign chair John Podesta. Investigators determined that access to Podesta’s Gmail account had been obtained via a spear-phishing attack carried out by Russian hackers. At that point, even people who had supported WikiLeaks began to criticize the organization for its lack of curation of leaked materials, its evolution into a de facto anti-Clinton research operation, and its role in an apparent cyberwar campaign orchestrated by Russian Pres. Vladimir Putin. After Trump’s victory, the U.S. Office of the Director of National Intelligence published a declassified summary of its findings, and it identified individuals within the GRU, Russia’s military intelligence service, that it believed were responsible for the hacking attacks on Podesta and the DNC. Assange continued to deny that WikiLeaks had received any material directly from the Russian government. Michael Ray
Wikileaks 為何遭到如此封殺? - 知乎首頁(yè)知乎知學(xué)堂發(fā)現(xiàn)等你來(lái)答?切換模式登錄/注冊(cè)朱利安·保羅·阿桑奇(Julian Paul Assange)維基解密Wikileaks 為何遭到如此封殺?從各國(guó)政府到 App Store,似乎人人皆誅之?顯示全部 ?關(guān)注者100被瀏覽40,849關(guān)注問(wèn)題?寫(xiě)回答?邀請(qǐng)回答?添加評(píng)論?分享?4 個(gè)回答默認(rèn)排序郭磊?法律話題下的優(yōu)秀答主? 關(guān)注 Wikileaks不再是一個(gè)簡(jiǎn)單的泄密者,更接近于一個(gè)全球機(jī)密和內(nèi)幕信息(很多是缺少審核的)的集散與發(fā)布平臺(tái),過(guò)去,一個(gè)單一情報(bào)被泄露造成的傷害,正在被無(wú)所畏懼,擁有極高全球關(guān)注度的Wikileaks,十倍、二十倍的加以放大。他們接受情報(bào)的種類(lèi)和渠道已經(jīng)超越了公共和外交層面,據(jù)悉他們手中掌握著一些令商業(yè)銀行和投資公司們感到難堪的信息。這意味著任何與它相關(guān)的大機(jī)構(gòu),都有可能成為泄密的對(duì)象,甚至引火燒身。Wikileaks不是一匹脫韁的野馬,但那些試圖限制、絞殺它的勢(shì)力,實(shí)際上早就處于一種“脫韁”狀態(tài)了。 發(fā)布于 2010-12-26 16:35?贊同 72??2 條評(píng)論?分享?收藏?喜歡收起?Gefrierend有文化的混混? 關(guān)注自從人類(lèi)穿上了衣服,就出現(xiàn)了另外一群人,他們有個(gè)有趣又合理的想法,“我想揭開(kāi)別人的底褲看一看”—阿桑奇。這自然引來(lái)了憤怒的反對(duì)—“我穿過(guò)那么多衣服,憑什么你只關(guān)心我的底褲?”“看什么!我的底褲是忠誠(chéng)的鮮紅!”“呸呸,自由的天藍(lán)色底褲才是正確!”“我穿的,是父輩的底褲!”“底褲下面是什么,你看看自己的不就知道了?”阿桑奇一脫褲子—“我沒(méi)穿底褲…”底褲的顏色、款式重要嗎?未必,不勒蛋就好。阿桑奇這種“流氓”有意義嗎?當(dāng)然!底褲要勤洗勤換,不然,你的根就爛掉了!發(fā)布于 2016-12-14 02:21?贊同 9??添加評(píng)論?分享?收藏?喜歡收起??
Julian Assange | Biography & Facts | Britannica
Search Britannica
Click here to search
Search Britannica
Click here to search
Login
Subscribe
Subscribe
Home
Games & Quizzes
History & Society
Science & Tech
Biographies
Animals & Nature
Geography & Travel
Arts & Culture
Money
Videos
On This Day
One Good Fact
Dictionary
New Articles
History & Society
Lifestyles & Social Issues
Philosophy & Religion
Politics, Law & Government
World History
Science & Tech
Health & Medicine
Science
Technology
Biographies
Browse Biographies
Animals & Nature
Birds, Reptiles & Other Vertebrates
Bugs, Mollusks & Other Invertebrates
Environment
Fossils & Geologic Time
Mammals
Plants
Geography & Travel
Geography & Travel
Arts & Culture
Entertainment & Pop Culture
Literature
Sports & Recreation
Visual Arts
Companions
Demystified
Image Galleries
Infographics
Lists
Podcasts
Spotlights
Summaries
The Forum
Top Questions
#WTFact
100 Women
Britannica Kids
Saving Earth
Space Next 50
Student Center
Home
Games & Quizzes
History & Society
Science & Tech
Biographies
Animals & Nature
Geography & Travel
Arts & Culture
Money
Videos
Julian Assange
Table of Contents
Julian Assange
Table of Contents
IntroductionEarly life and creation of WikiLeaksEarly WikiLeaks activity and legal issuesAsylum in the Ecuadoran embassy and impact on the 2016 U.S. presidential election
References & Edit History
Quick Facts & Related Topics
Images
Quizzes
Computers and Technology Quiz
Related Questions
What was the first publication on WikiLeaks?
Who are the most well-known computer scientists?
Is computer science used in video games?
How do I learn computer science?
Read Next
7 Notorious Women Criminals
Unusual Counting Systems
Influential Computer Programming Languages
Is Zero an Even or an Odd Number?
9 Modern Corporate Criminals
Discover
What Is the “Ides” of March?
The 10 Greatest Basketball Players of All Time
Was Napoleon Short?
Have Any U.S. Presidents Decided Not to Run For a Second Term?
12 Greek Gods and Goddesses
Inventors and Inventions of the Industrial Revolution
7 Surprising Uses for Mummies
Home
Science
Mathematics
Science & Tech
Julian Assange
Australian computer programmer
Actions
Cite
verifiedCite
While every effort has been made to follow citation style rules, there may be some discrepancies.
Please refer to the appropriate style manual or other sources if you have any questions.
Select Citation Style
MLA
APA
Chicago Manual of Style
Copy Citation
Share
Share
Share to social media
URL
https://www.britannica.com/biography/Julian-Assange
Give Feedback
External Websites
Feedback
Corrections? Updates? Omissions? Let us know if you have suggestions to improve this article (requires login).
Feedback Type
Select a type (Required)
Factual Correction
Spelling/Grammar Correction
Link Correction
Additional Information
Other
Your Feedback
Submit Feedback
Thank you for your feedback
Our editors will review what you’ve submitted and determine whether to revise the article.
External Websites
GlobalSecurity.org - Julian Assange
The First Amendment Encyclopedia - Biography of Julian Assange
Britannica Websites
Articles from Britannica Encyclopedias for elementary and high school students.
Julian Assange - Student Encyclopedia (Ages 11 and up)
Please select which sections you would like to print:
Table Of Contents
Cite
verifiedCite
While every effort has been made to follow citation style rules, there may be some discrepancies.
Please refer to the appropriate style manual or other sources if you have any questions.
Select Citation Style
MLA
APA
Chicago Manual of Style
Copy Citation
Share
Share
Share to social media
URL
https://www.britannica.com/biography/Julian-Assange
Feedback
External Websites
Feedback
Corrections? Updates? Omissions? Let us know if you have suggestions to improve this article (requires login).
Feedback Type
Select a type (Required)
Factual Correction
Spelling/Grammar Correction
Link Correction
Additional Information
Other
Your Feedback
Submit Feedback
Thank you for your feedback
Our editors will review what you’ve submitted and determine whether to revise the article.
External Websites
GlobalSecurity.org - Julian Assange
The First Amendment Encyclopedia - Biography of Julian Assange
Britannica Websites
Articles from Britannica Encyclopedias for elementary and high school students.
Julian Assange - Student Encyclopedia (Ages 11 and up)
Written by
Michael Ray
Michael Ray oversees coverage of European history and military affairs for Britannica. He earned a B.A. in history from Michigan State University in 1995. He was a teacher in the Chicago suburbs and Seoul,...
Michael Ray
Fact-checked by
The Editors of Encyclopaedia Britannica
Encyclopaedia Britannica's editors oversee subject areas in which they have extensive knowledge, whether from years of experience gained by working on that content or via study for an advanced degree. They write new content and verify and edit content received from contributors.
The Editors of Encyclopaedia Britannica
Last Updated:
Mar 5, 2024
?
Article History
Table of Contents
Julian Assange
See all media
Category:
Science & Tech
Born:
July 3, 1971, Townsville, Queensland, Australia (age 52)
(Show?more)
Founder:
WikiLeaks
(Show?more)
See all related content →
Recent News
Mar. 4, 2024, 5:23 AM ET (Yahoo Movies Canada)
Auction to raise money for Julian Assange's fight against extradition to US
Feb. 26, 2024, 12:17 PM ET (ABC News (U.S.))
WikiLeaks’ Assange faces wait to find out whether he can challenge extradition to the US
Feb. 21, 2024, 7:37 PM ET (AP)
WikiLeaks’ Assange faces wait to find out whether he can challenge extradition to the US
Feb. 20, 2024, 3:59 PM ET (AP)
WikiLeaks founder Assange faces his last legal roll of the dice in Britain to avoid US extradition
Feb. 19, 2024, 2:43 AM ET (AP)
WikiLeaks founder Assange may be near the end of his long fight to stay out of the US
Show More
Show Less
Julian Assange (born July 3, 1971, Townsville, Queensland, Australia) Australian computer programmer who founded the media organization WikiLeaks. Practicing what he called “scientific journalism”—i.e., providing primary source materials with a minimum of editorial commentary—Assange, through WikiLeaks, released thousands of internal or classified documents from an assortment of government and corporate entities.
Early life and creation of WikiLeaks
Assange’s family moved frequently when he was a child, and he was educated with a combination of homeschooling and correspondence courses. As a teenager, he demonstrated an uncanny aptitude with computers, and, using the hacking nickname “Mendax,” he infiltrated a number of secure systems, including those at NASA and the Pentagon. In 1991 Australian authorities charged him with 31 counts of cybercrime; he pleaded guilty to most of them. At sentencing, however, he received only a small fine as punishment, and the judge ruled that his actions were the result of youthful inquisitiveness. Over the next decade, Assange traveled, studied physics at the University of Melbourne (he withdrew before earning a degree), and worked as a computer security consultant.
Britannica Quiz
Computers and Technology Quiz
Assange created WikiLeaks in 2006 to serve as a clearinghouse for sensitive or classified documents. Its first publication, posted to the WikiLeaks Web site in December 2006, was a message from a Somali rebel leader encouraging the use of hired gunmen to assassinate government officials. The document’s authenticity was never verified, but the story of WikiLeaks and questions regarding the ethics of its methods soon overshadowed it. WikiLeaks published a number of other scoops, including details about the U.S. military’s detention facility at Guantánamo Bay in Cuba, a secret membership roster of the British National Party, internal documents from the Scientology movement, and private e-mails from the University of East Anglia’s Climatic Research Unit.
Early WikiLeaks activity and legal issues
Julian AssangeJulian Assange at a conference in T?nsberg, Norway, March 2010.(more)In 2010 WikiLeaks posted almost half a million documents obtained from U.S. Army intelligence analyst Bradley Manning (later called Chelsea Manning)—mainly relating to the U.S. wars in Iraq and Afghanistan. While much of the information was already in the public domain, Pres. Barack Obama’s administration criticized the leaks as a threat to U.S. national security. In November of that year, WikiLeaks began publishing an estimated 250,000 confidential U.S. diplomatic cables. Those classified documents dated mostly from 2007 to 2010, but they included some dating back as far as 1966. Among the wide-ranging topics covered were behind-the-scenes U.S. efforts to politically and economically isolate Iran, primarily in response to fears of Iran’s development of nuclear weapons. Reaction from governments around the world was swift, and many condemned the publication. Assange became the target of much of that ire, and some American politicians called for him to be pursued as a terrorist.
Assange also faced prosecution in Sweden, where he was wanted in connection with sexual assault charges. (It was the second arrest warrant issued for Assange for those alleged crimes; the first warrant was dismissed in August 2010 because of lack of evidence.) Assange was arrested in London in December 2010 and held without bond, pending possible extradition to Sweden. He was eventually released on bail, and in February 2011 a British judge ruled that the extradition should proceed, a decision that was appealed by Assange’s attorneys. In December 2011 the British High Court found that Assange’s extradition case was “of general public importance” and recommended that it be heard by the Supreme Court. This decision allowed Assange to petition the Supreme Court directly for a final hearing on the matter.
In May 2011 Assange was awarded the Sydney Peace Foundation’s gold medal, an honour that had previously been bestowed on Nelson Mandela and the Dalai Lama, for his “exceptional courage in pursuit of human rights.” Assange’s memoir, Julian Assange: The Unauthorised Autobiography, was published against his wishes in September 2011. Assange had received a sizable advance payment for the book, but he withdrew his support for the project after sitting for some 50 hours of interviews, and the resulting manuscript, although at times enlightening, read very much like the early draft that it was.
Get a Britannica Premium subscription and gain access to exclusive content.
Subscribe Now
While Britain’s Supreme Court continued to weigh the matter of Assange’s extradition, he remained under house arrest on the estate of a WikiLeaks supporter in rural Norfolk. From this location, Assange recorded a series of interviews that were collected as The World Tomorrow, a talk show that debuted online and on the state-funded Russian satellite news network RT in April 2012. Hosting the program from a makeshift broadcast studio, Assange began the series with an interview with Hezbollah leader Hassan Nasrallah, Nasrallah’s first with a Western journalist since the 34-day war between Hezbollah and Israel in 2006.
Asylum in the Ecuadoran embassy and impact on the 2016 U.S. presidential election
In June 2012, after his extradition appeal was denied by the Supreme Court, Assange sought refuge in the Ecuadoran embassy. He applied for asylum on the grounds that extradition to Sweden could lead to eventual prosecution in the United States for actions related to WikiLeaks. Assange claimed that such a trial would be politically motivated and would potentially subject him to the death penalty. In August Assange’s request was granted, but he remained confined within the embassy as British and Ecuadoran officials attempted to resolve the issue. Assange began his second year within the walls of the embassy by launching a bid for a seat in the Australian Senate. His WikiLeaks Party, founded in July 2013, performed poorly in the September 7, 2013, Australian general election; it captured less than 1 percent of the national vote and failed to win any seats in the Senate. In August 2015 Swedish prosecutors dropped their investigation of three of the allegations against Assange, as they had been unable to interview him prior to the expiration of a five-year statute of limitations. Swedish authorities continued to pursue an investigation into the outstanding allegation of rape, however, and Assange remained within the Ecuadoran embassy in London.
In 2016 Assange became an active player in the U.S. presidential race, when WikiLeaks began publishing internal communications from the Democratic Party and the campaign of Democratic candidate Hillary Clinton. Assange made no secret of his personal hostility toward Clinton, and the leaks were clearly timed to do maximum damage to her campaign. Numerous independent cybersecurity experts and U.S. law enforcement agencies confirmed that the data had been obtained by hackers associated with Russian intelligence agencies. Despite this evidence, Assange denied that the information had come from Russia. In January 2017 a declassified U.S. intelligence report stated that Assange and WikiLeaks had been key parts of a sophisticated hybrid warfare campaign orchestrated by Russia against the United States. In May 2017, as Assange approached his fifth year under de facto house arrest in the Ecuadoran embassy in London, Swedish prosecutors announced that they had discontinued their investigation into the rape charges against him.
On April 11, 2019, Ecuador withdrew its offer of asylum to Assange, citing repeated violations of both international law and the terms that it had imposed upon him regarding his tenure in the embassy. After securing a written agreement from the British government that Assange “would not be extradited to a country where he could face torture or the death penalty,” Ecuadoran Pres. Lenín Moreno allowed British police to enter the embassy and arrest Assange. While he was no longer subject to investigation in Sweden, Assange was still wanted for failing to appear in British court. He was also the target of an outstanding extradition warrant from the United States for computer crimes.Michael Ray
WikiLeaks Timeline: 12 Years Of Disruption : NPR
Accessibility links
Skip to main content
Keyboard shortcuts for audio player
Open Navigation Menu
Newsletters
NPR Shop
Close Navigation Menu
Home
News
Expand/collapse submenu for News
National
World
Politics
Business
Health
Science
Climate
Race
Culture
Expand/collapse submenu for Culture
Books
Movies
Television
Pop Culture
Food
Art & Design
Performing Arts
Life Kit
Gaming
Music
Expand/collapse submenu for Music
Tiny Desk
Hip-Hop 50
All Songs Considered
Music Features
Live Sessions
Podcasts & Shows
Expand/collapse submenu for Podcasts & Shows
Daily
Morning Edition
Weekend Edition Saturday
Weekend Edition Sunday
All Things Considered
Fresh Air
Up First
Featured
The NPR Politics Podcast
Throughline
Trump's Trials
Pop Culture Happy Hour
More Podcasts & Shows
Search
Newsletters
NPR Shop
Tiny Desk
Hip-Hop 50
All Songs Considered
Music Features
Live Sessions
About NPR
Diversity
Organization
NPR Network
Support
Careers
Connect
Press
Ethics
WikiLeaks Timeline: 12 Years Of Disruption The impact of WikiLeaks on the world's politics, journalism and culture has been transformative. Here are the highlights.
National Security
12 Years Of Disruption: A WikiLeaks Timeline
April 11, 20192:11 PM ET
David Welna
Enlarge this image
WikiLeaks founder Julian Assange appears at the window of the balcony prior to making an address to the media at the Embassy of Ecuador in London on May 19, 2017.
Justin Tallis/AFP/Getty Images
hide caption
toggle caption
Justin Tallis/AFP/Getty Images
WikiLeaks founder Julian Assange appears at the window of the balcony prior to making an address to the media at the Embassy of Ecuador in London on May 19, 2017.
Justin Tallis/AFP/Getty Images
WikiLeaks was already established as an online outlet for posting secret documents from anonymous leakers well before its massive disclosure of U.S. government and military information in 2010. That was the year WikiLeaks' Australian founder, Julian Assange, faced allegations that led to his seeking asylum in Ecuador's London embassy.
National Security
Julian Assange Arrested, Faces U.S. Charges Related To 2010 WikiLeaks Releases
Here is a timeline of WikiLeaks' key disclosures and related developments. 2007 November: WikiLeaks posts a U.S. Army manual of standard operating procedures for soldiers overseeing al-Qaida suspects held captive at Camp Delta in Guantanamo Bay, Cuba. 2008 September: Two months before the U.S. presidential election, WikiLeaks posts leaked emails from the Yahoo account of Republican vice presidential contender Sarah Palin. 2009 November: WikiLeaks posts more than half-a-million pager messages it claims were sent on Sept. 11, 2001. 2010 April: WikiLeaks posts a classified U.S. military video of a U.S. Apache helicopter gunship firing on what the military says were believed to be armed fighters in New Baghdad, Iraq. Among the 18 killed were two Reuters journalists.
May: Pfc. Bradley (later known as Chelsea) Manning is arrested by the U.S. military and then court-martialed in June, charged with leaking the combat video posted on WikiLeaks as well as classified State Department documents by downloading those documents to a personal computer. July: WikiLeaks posts what it calls "The Afghan War Logs," more than 75,000 classified documents that record previously undisclosed civilian casualties inflicted by the U.S. and coalition forces, details of the pursuit of Osama bin Laden and accounts of stepped-up fighting by the Taliban. August: WikiLeaks founder Julian Assange faces an arrest warrant over allegations of rape and molestation during a visit to Sweden; police question him in Stockholm, where he denies the allegations. October: WikiLeaks posts nearly 400,000 classified military documents it calls "The Iraq War Logs"; they detail the involvement of Iraqi security forces in the torture of prisoners of war, document higher civilian death tolls and describe Iran's support for Iraqi insurgents. November: WikiLeaks posts the first 250,000 of more than 3 million leaked U.S. diplomatic cables from nearly 300 American consulates and embassies worldwide that span the years from 1966 to 2010. December: Assange is arrested in London to face extradition for the Swedish allegations; he is released and put under house arrest after posting bail.
2011 February: WikiLeaks posts seven cables from the U.S. Embassy in Cairo, amid violent clashes between Egyptian security forces and pro-democracy demonstrators; the documents discuss Egypt's human rights and civil liberties violations. April: WikiLeaks posts "The Guantanamo Files," some 800 classified military documents detailing the official allegations of terrorist actions by the men held captive in Guantanamo Bay, Cuba. October: After being removed from Amazon's servers and being allegedly cut off from major credit card companies as well as PayPal and Western Union, WikiLeaks suspends publication of leaked documents to "aggressively fundraise." 2012 February: WikiLeaks starts posting a trove of what it claims are 5 million leaked emails from Stratfor, a private company that describes itself as a "global intelligence company." June: Assange takes refuge in Ecuador's London embassy, where he seeks political asylum. July: WikiLeaks begins posting more than 2 million leaked emails, dating back to 2006, from 680 Syrian government officials and firms. August: Assange is granted political asylum at Ecuador's London embassy; a military judge condemns Manning to a 35-year prison sentence; Manning announces gender transition and asks to be known as Chelsea. 2013 Throughout the year: WikiLeaks posts leaked documents detailing the private negotiations for major trade deals, including the Trans-Pacific Partnership and the Transatlantic Trade and Investment Partnership. 2015 June: WikiLeaks posts leaked documents from the Saudi foreign ministry. July: WikiLeaks begins posting leaked National Security Agency documents revealing American surveillance of German Chancellor Angela Merkel, French President Fran?ois Hollande, U.N. Secretary-General Ban Ki-moon, as well as two prime ministers, Israel's Benjamin Netanyahu and Italy's Silvio Berlusconi. 2016 July: WikiLeaks posts nearly 20,000 emails and 8,000 attachments from leaders of the Democratic National Committee; Assange later denies allegations that Russian intelligence services were the source of the leak. October: WikiLeaks posts more than 2,000 hacked emails from the account of John Podesta, who at the time was campaign chairman for Democratic presidential nominee Hillary Clinton.
2017 January: Outgoing President Barack Obama commutes Manning's prison sentence, allowing her to be freed in May. March: WikiLeaks starts posting what it calls "Vault 7," which it claims to be a collection of thousands of internal Central Intelligence Agency documents that detail a covert hacking program carried out by the agency as well as malware and software it uses to spy on smart TVs, the operating systems of most smartphones and Web browsers. September: WikiLeaks starts posting the first of what it says are 650,000 leaked critical documents from surveillance contractors working in a Russia ruled by President Vladimir Putin. October: CIA Director Mike Pompeo says the U.S. is "working to take down" WikiLeaks, which he calls "an enormous threat." December: Assange is granted Ecuadorian citizenship. 2018 April: The Democratic National Committee files a lawsuit against WikiLeaks for its role in publishing the DNC's hacked emails. May: Manning's conviction under the Espionage Act is upheld by a U.S. Army Court of Criminal Appeals. November: A document written by a U.S. attorney inadvertently discloses that Assange has been charged under seal by the U.S. 2019 March: Manning is jailed after refusing to testify to a grand jury about what she leaked to WikiLeaks. April: Ecuadorian President Lenín Moreno accuses WikiLeaks of intercepting his private phone calls and hacking photos of his bedroom, his meals and his wife and daughters dancing; Moreno provided no evidence, and WikiLeaks calls the charges "bogus." Assange is arrested at Ecuador's London embassy by British police, accused of skipping bail. The U.S. Justice Department unseals an indictment of Assange dated March 6, 2018, that charges him with "conspiracy to commit computer intrusion."
Read & Listen
Home
News
Culture
Music
Podcasts & Shows
Connect
Newsletters
Press
Public Editor
Corrections
Contact & Help
About NPR
Overview
Diversity
NPR Network
Accessibility
Ethics
Finances
Get Involved
Support Public Radio
Sponsor NPR
NPR Careers
NPR Shop
NPR Events
NPR Extra
Terms of Use
Privacy
Your Privacy Choices
Text Only
Sponsor MessageBecome an NPR sponsor
如何看待wikileaks最新解密的vault 7文件? - 知乎首頁(yè)知乎知學(xué)堂發(fā)現(xiàn)等你來(lái)答?切換模式登錄/注冊(cè)黑客 (Hacker)維基解密中央情報(bào)局計(jì)算機(jī)安全Vault 7如何看待wikileaks最新解密的vault 7文件?https://wikileaks.org/ciav7p1/ 這些CIA的黑客軟件有什么影響顯示全部 ?關(guān)注者118被瀏覽7,809關(guān)注問(wèn)題?寫(xiě)回答?邀請(qǐng)回答?好問(wèn)題?添加評(píng)論?分享?1 個(gè)回答默認(rèn)排序知乎用戶(hù)CIA報(bào)告顯示美國(guó)政府(USG?不確定,歡迎指正)在美國(guó)制造的產(chǎn)品上留下漏洞并刻意使其處于開(kāi)啟狀態(tài)。不言而喻的野蠻行徑。什么信息讓這次的泄密顯得可信?程序和部門(mén)名稱(chēng),例如JQJ(IOC)crypt series,都是真實(shí)的。非內(nèi)部人士無(wú)從知曉。(wikileaks發(fā)布的)標(biāo)題錯(cuò)誤地暗示了CIA入侵了這些app(Signal,Telegram,WhatsApp,Confide encryption)。然而這些文件顯示IOS和安卓才是被入侵的對(duì)象,問(wèn)題更嚴(yán)重了。險(xiǎn)從何來(lái)?除非將這些被CIA開(kāi)啟的漏洞關(guān)閉,否則任何黑客都可以隨意利用它們。來(lái)來(lái)來(lái),這些東西能幫你搞個(gè)CIA的大新聞:由于美國(guó)政府花錢(qián)購(gòu)買(mǎi)暗門(mén)使得美國(guó)軟件處于危險(xiǎn)狀態(tài)的公開(kāi)證據(jù)。(圖中說(shuō)這些致命漏洞也被國(guó)外政府用來(lái)監(jiān)視記者和人權(quán)團(tuán)體)證據(jù)顯示CIA和FBI明知美國(guó)制造的智能手機(jī)有著致命弱點(diǎn)卻仍縱容漏洞處于開(kāi)啟狀態(tài),以達(dá)到監(jiān)視目的。=======================================================================阿登同學(xué)和維基解密上一次指摘俄羅斯政府是什么時(shí)候?不過(guò)我也不由得想起了某文件宣稱(chēng)14天后公布美國(guó)本土的利益輸送情報(bào),但也后來(lái)沒(méi)有下文了。發(fā)布于 2017-03-08 11:33?贊同 20??4 條評(píng)論?分享?收藏?喜歡收起??
Everything You Need to Know About Wikileaks | MIT Technology Review
You need to enable JavaScript to view this site.
Skip to ContentMIT Technology ReviewFeaturedTopicsNewslettersEventsPodcastsSign inSubscribeMIT Technology ReviewFeaturedTopicsNewslettersEventsPodcastsSign inSubscribePolicyEverything You Need to Know About WikileaksTwo experts lay out the facts surrounding the controversy.By Jonathan Zittrainarchive pageMolly Sauterarchive pageDecember 9, 2010What is Wikileaks?Wikileaks is a self-described “not-for-profit media organization,” launched in 2006 for the purposes of disseminating original documents from anonymous sources and leakers. Its website says: “Wikileaks will accept restricted or censored material of political, ethical, diplomatic or historical significance. We do not accept rumor, opinion, other kinds of first hand accounts or material that is publicly available elsewhere.”More-detailed information about the history of the organization can be found on Wikipedia (with all the caveats that apply to a rapidly changing Wiki topic). Wikipedia incidentally has nothing to do with Wikileaks—both share the word “Wiki” in the title, but they’re not affiliated.Who is Julian Assange, and what is his role in the Wikileaks organization?
Julian Assange is an Australian citizen who is said to have served as the editor-in-chief and spokesperson for Wikileaks since its founding in 2006. Before that, he was described as an advisor. Sometimes he is cited as its founder. The media and popular imagination currently equate him with Wikileaks itself, with uncertain accuracy.In 2006, Assange wrote a series of essays that have recently been tapped as an explanation of his political philosophy. A close reading of these essays shows that Assange’s personal philosophy is in opposition to what he calls secrecy-based, authoritarian conspiracy governments, in which category he includes the US government and many others not conventionally thought of as authoritarian. Thus, as opposed to espousing a philosophy of radical transparency, Assange is not “about letting sunlight into the room so much as about throwing grit in the machine.” For further analysis, check out Aaron Bady’s original blog post.
Why is Wikileaks so much in the public eye right now?At the end of November 2010, Wikileaks began to slowly release a trove of what it says are 251,287 diplomatic cables acquired from an anonymous source. These documents came on the heels of the release of the “Collateral Murder” video in April 2010, and Afghan and Iraq War logs in July 2010 and October 2010, which totaled 466,743 documents. The combined 718,030 are said to originate from a single source, thought to be U.S. Army intelligence analyst Pfc. Bradley Manning, who was arrested in May 2010, but that’s not confirmed.Has Wikileaks released classified material in the past?Yes, under an evolving set of models.Berkman Fellow Ethan Zuckerman has some interesting thoughts on the development of Wikileaks and its practices over the years, which will be explained in greater detail when the Berkman Center podcast about Wikileaks is released later this week. In the meantime, here’s a capsule version.Wikileaks has moved through three phases since its founding in 2006. In its first phase, during which it released several substantial troves of documents related to Kenya in 2008, Wikileaks operated very much with a standard wiki model: the public readership could actively post and edit materials, and it had a say in the types of materials that were accepted and how such materials were vetted. The documents released in that first phase were more or less a straight dump to the Web: very little organized redacting occurred on the part of Wikileaks.Wikileaks’s second phase was exemplified with the release of the “Collateral Murder” video in April 2010. The video was a highly curated, produced and packaged political statement. It was meant to illustrate a political point of view, not merely to inform.The third phase is the one we currently see with the release of the diplomatic cables: Wikileaks working in close conjunction with a select group of news organizations to analyze, redact and release the cables in a curated manner, rather than dumping them on the Internet or using them to illustrate a singular political point of view.
What news organizations have access to the diplomatic cables and how did they get them?According to the Associated Press, Wikileaks gave four news organizations (Le Monde, El Pais, The Guardian and Der Spiegel) all 251,287 classified documents before anything was released to the public. The Guardian subsequently shared its trove with The New York Times.So have all 251,287 documents been released to the public?No. Each of the five news organizations is hosting the text of at least some of the documents in various forms with or without the relevant metadata (country of origin, classification level, reference ID). The Guardian and Der Spiegel have performed analyses of the metadata of the entire trove, excluding the body text. The Guardian’s analysis is available for download from its website.Wikileaks itself has released (as of December 7, 2010) 960 documents out of the total 251,287. The Associated Press has reported that Wikileaks is only releasing cables in coordination with the actions of the five selected news organizations. Julian Assange made similar statements in an interview with Guardian readers on December 3, 2010. Cables are being released daily as the five news organizations publish articles related to the content.Is each of the five news organizations hosting all the documents that Wikileaks has released?No. Each of the five news organizations hosts a different selection of the released documents, in different forms, which may or may not overlap. It’s not clear how much they’re coordinating on releasing new documents, since each appears to have a full set and normally newspapers would be eager to scoop one another.How are the five news organizations releasing the cables?
Le Monde has created an application, developed in conjunction with Linkfluence, that hosts the searchable text of several hundred cables. The text can be searched by the sender (country of origin, office or official), date range, persons of interest cited in the docs, classification status, or any combination of the above. Only the untranslated, English text of the cables can be accessed and cut-and-paste is not available.El Pais offers access to more than 200 cables, available in the original English or in Spanish translation, searchable by country of origin and key terms and subjects (such as “Google and China”). These searches also return El Pais articles written on a given subject, often placed ahead of the cables in the search listings. The paper also offers a “How to read a diplomatic cable” feature, explaining what all the abbreviations and technical verbiage mean in plain speak, posted on November 28, 2010.
The Guardian offers the cable data in several forms: It has performed an analysis of metadata of the entire 251,287-document trove, and made it available in several forms (spreadsheets hosted on Google Docs and in downloadable form) as well as infographics.The Guardian also hosts at least 422 cables on its website, searchable by subject, originating country, and countries referenced.The New York Times hosts what it calls a “selection of the documents from a cache of a quarter-million confidential American diplomatic cables that WikiLeaks intends to make public starting on November 28. The webpage goes on to say “A small number of names and passages in some of the cables have been removed by The New York Times to protect diplomats’ confidential sources, to keep from compromising American intelligence efforts or to protect the privacy of ordinary citizens.”The documents are not searchable and are organized by general subject.Who is responsible for redacting the documents? What actions did Wikileaks take to ensure that individuals were not put in danger by publication of the documents?According to the Associated Press and statements released by Wikileaks and Julian Assange, Wikileaks is currently relying on the expertise of the five news organizations to redact the cables as they are released, and it is following their redactions as it releases the documents on its website. (This cannot be verified without examining the original documents, which we have not done—nor are we linking to them here.) According to the BBC, Julian Assange approached the U.S. State Department for guidance on redacting the documents prior to their release. One can imagine the State Department’s dilemma there: assist and risk legitimating the enterprise; don’t assist and risk poor redaction. In a public letter, Harold Koh, legal adviser to the Department of State, declined to assist the organization and demanded the return of the documents.
Are the documents hosted anywhere else on the Internet? What is the “insurance” file?In late July 2010, Wikileaks is said to have posted to its Afghan War Logs site, and to a torrent site an encrypted file with “insurance” in the name. The file, which apparently can still be found on various peer-to-peer networks, is 1.4 gigabytes and is encrypted with AES256, a very strong encryption standard which would make it virtually impossible to open without the password. What is in the insurance file is not known. It has been speculated that it contains the unredacted cables provided by the original source(s), as well as other, previously unreleased information held by Wikileaks. There is further speculation, which has been indirectly boosted by Julian Assange, that the key to the file will be distributed in the event of either the death of Assange or the destruction of Wikileaks as a functioning organization. However, none of these things is known. All that is known for sure is that it’s a really big file with heavy encryption that’s already in a number of people’s hands and floating around for others to get.What happens if Wikileaks gets shut down? Can it be shut down?It depends on what’s meant by “Wikileaks” and what’s meant by “shut down.”
Julian Assange has made statements suggesting that if Wikileaks becomes nonfunctional as an organization, the key to the encrypted “insurance” file will be released (the key itself is not a big document and could presumably fit into Twitter messages). The actual machination of how such a “dead man’s switch” would release the key is not known. If the key were released, and if the encrypted insurance file contains unredacted and unreleased secret documents, then those decrypted files would be available to many people nearly instantaneously. Wikileaks claimed in August that the insurance file had been downloaded more than 100,000 times.Wikileaks apparently maintains a small paid staff—who and where is not exactly on a “people” page, though there used to be a physical P.O. box in Australia where documents could be sent—and is additionally supported by volunteers, speculated to be at most a few thousand. So, would it be possible for a motivated organization to disrupt its real-world infrastructure? Yes, probably. However, at this point, it is not practical to recover the information the organization has already distributed (which includes the entire trove of diplomatic cables to the press as well as whatever is in the encrypted insurance file), as well as any other undistributed information the organization might seek to release. So in terms of the recovery of leaked information, the downfall of Wikileaks as an organization would matter little.Furthermore, there appear to be currently more than 1,000 sites mirroring Wikileaks and its content. Wikileaks has made available downloadable files containing its entire archive of released materials to date.Why did wikileaks.org stop working as a way to find the site?For a traditional website to work it needs a domain name like “website.com” so that people can find it easily with a Web browser. The domain name system (“DNS”) is hierarchical—information is spread from a zone containing several top-level (root) servers down to zones containing lower-level servers—but the top level servers do not determine everything held by servers lower down. Domain names can stop working for any number of reasons. One common assumption is is that the Internet Corporation for Assigned Names and Numbers (ICANN), which manages certain top-level protocol and parameter assignments for the Internet, intervened in the case of Wikileqaks. It did not.A little technical discussion to explain why: The root zone orchestrated by ICANN is a very small file — just a mapping between each top-level domain (“TLD”) like .org or .ch to the IP address(es) of servers designated to say more about that TLD (one server, not in ICANN’s hands, keeps track of names under .org, one for names under .ch, etc.). So the only thing ICANN could do is to all-or-nothing delete .org or .ch, making every domain name with that ending disappear temporarily.Note that wikileaks.org went down not because of anything done to its DNS entry within the list kept by the registry that manages.org domains (full disclosure: I’m on the board of Trustees for the non-profit Internet Society (ISOC) which is the parent to the Public Interest Registry, which keeps track of names in .org). Instead, the name server to which its entry pointed (even lower down the DNS chain) was attacked with a flood of traffic by unknown parties and EveryDNS, the operator of that name server, chose to stop answering queries about Wikileaks in the hopes that the attack would stop. (Apparently it did.) A website also needs hosting, and Wikileaks has apparently had to shift its hosting at least once after being dropped by a chosen provider: Amazon’s commodity hosting service shut down the site for terms of service violations after being contacted by U.S. Senator Joseph Lieberman.On a more technical level, the Wikileaks website can come under attack, and its means of collecting money can be made much more difficult.Jonathan Zittrain is a professor of law and professor of computer science at Harvard, and co-founder of its Berkman Center for Internet & Society; Molly Sauter is a research assistant at the Berkman Center. Further updates will appear at www.jz.org hideby Jonathan Zittrain & Molly SauterSharelinkedinlink opens in a new windowtwitterlink opens in a new windowfacebooklink opens in a new windowemaillink opens in a new windowPopular10 Breakthrough Technologies 2024The EditorsScientists are finding signals of long covid in blood. They could lead to new treatments.Cassandra WillyardAI for everything: 10 Breakthrough Technologies 2024Will Douglas HeavenOpenAI teases an amazing new generative video model called SoraWill Douglas HeavenDeep DivePolicyThree technology trends shaping 2024’s electionsThe biggest story of this year will be elections in the US and all around the globe
By Tate Ryan-Mosleyarchive pageFour lessons from 2023 that tell us where AI regulation is goingWhat we should expect in the coming 12 months in AI policy
By Tate Ryan-Mosleyarchive pageYes, remote learning can work for preschoolersThe largest-ever humanitarian intervention in early childhood education shows that remote learning can produce results comparable to a year of in-person teaching.
By Anya Kamenetzarchive pageThe FTC’s unprecedented move against data brokers, explainedIt could signal more aggressive action from policy makers to curb the corrosive effects that data brokers have on personal privacy.
By Tate Ryan-Mosleyarchive pageStay connectedIllustration by Rose WongGet the latest updates fromMIT Technology ReviewDiscover special offers, top stories,
upcoming events, and more.Enter your emailPrivacy PolicyThank you for submitting your email!Explore more newslettersIt looks like something went wrong.
We’re having trouble saving your preferences.
Try refreshing this page and updating them one
more time. If you continue to get this message,
reach out to us at
customer-service@technologyreview.com with a list of newsletters you’d like to receive.The latest iteration of a legacyFounded at the Massachusetts Institute of Technology in 1899, MIT Technology Review is a world-renowned, independent media company whose insight, analysis, reviews, interviews and live events explain the newest technologies and their commercial, social and political impact.READ ABOUT OUR HISTORYAdvertise with MIT Technology ReviewElevate your brand to the forefront of conversation around emerging technologies that are radically transforming business. From event sponsorships to custom content to visually arresting video storytelling, advertising with MIT Technology Review creates opportunities for your brand to resonate with an unmatched audience of technology and business elite.ADVERTISE WITH US? 2024 MIT Technology ReviewAboutAbout usCareersCustom contentAdvertise with usInternational EditionsRepublishingMIT NewsHelpHelp & FAQMy subscriptionEditorial guidelinesPrivacy policyTerms of ServiceWrite for usContact ustwitterlink opens in a new windowfacebooklink opens in a new windowinstagramlink opens in a new windowrsslink opens in a new windowlinkedinlink opens in a new window
維基解密 - 知乎首頁(yè)知乎知學(xué)堂發(fā)現(xiàn)等你來(lái)答?切換模式登錄/注冊(cè)維基解密維基解密(又稱(chēng)維基泄密、維基揭秘;英語(yǔ):WikiLeaks),是通過(guò)協(xié)助知情人讓組織、企業(yè)、政府在陽(yáng)光下運(yùn)作的、無(wú)國(guó)界、非盈利的互聯(lián)網(wǎng)媒體。 朱利安·保羅·阿桑奇,一個(gè)澳大利亞的互聯(lián)網(wǎng)積極分子,通…查看全部?jī)?nèi)容關(guān)注話題?管理?分享?百科討論精華視頻等待回答?切換為時(shí)間排序教資面試解密Ep1:維基解密,教資面試報(bào)名不得不了解的秘密Gabi領(lǐng)資料和加群,請(qǐng)
https://www.craft.do/s/iyUGI8tZuwyt1z
教資面試可以打印準(zhǔn)考證啦!是不是后悔了?考試第一天和第二天的題目是否一樣?Gabi老師維基解密面試,不看后悔半年,看了面試必過(guò)!教資面試所有人…閱讀全文??贊同 9??25 條評(píng)論?分享?收藏?喜歡? 舉報(bào)如何看待維基解密創(chuàng)始人阿桑奇于 2019 年 4 月 11 日在倫敦被捕?西風(fēng)獨(dú)自涼看好看電影,寫(xiě)最佳影評(píng)維基爆料壞了希拉里的好事,川普贏得大選,白左乃至整個(gè)歐洲斯坦對(duì)阿桑奇恨之入骨: [圖片] 希拉里甚至提議用無(wú)人機(jī)干掉阿桑奇,罪惡是文明的基石嘛,呵呵。 阿桑奇有點(diǎn)像堂吉訶德,他挑戰(zhàn)的是民主黨、歐洲斯坦等巨無(wú)霸…… 為什么早不抓晚不抓? 結(jié)束通俄門(mén)調(diào)查之后,美國(guó)強(qiáng)烈要求引渡阿桑奇(維基解密最新消息),作為打擊白左的利器,他比任何時(shí)候都要吃香——厄瓜多爾一直待價(jià)而沽,現(xiàn)在價(jià)錢(qián)終于談妥: [圖片] 阿桑奇若能提供民主黨全委會(huì)…閱讀全文??贊同 115??12 條評(píng)論?分享?收藏?喜歡如何評(píng)價(jià)阿桑奇身體健康狀況嚴(yán)重惡化?千秋凜然英雄氣學(xué)生怕是,沒(méi)希望了。 各國(guó)統(tǒng)治者不會(huì)讓他活著走出監(jiān)獄的。 這是一位理想主義的戰(zhàn)士! 一位本來(lái)能靠才華過(guò)上富足生活,卻為了人類(lèi)的福祉,不惜以生命撕開(kāi)惡魔偽裝的人! 弱者要隱私,強(qiáng)者要透明,這個(gè)世界正好他媽是反著的! 唯有敬仰! 不知他的理想何日能實(shí)現(xiàn),不知千千萬(wàn)萬(wàn)理想主義者前仆后繼所追求的東西何時(shí)能到來(lái)!閱讀全文??贊同 139??9 條評(píng)論?分享?收藏?喜歡阿桑奇是英雄還是危險(xiǎn)分子?彼得·克魯泡特金民社安康大丈夫當(dāng)如是也 [圖片]閱讀全文??贊同 43??添加評(píng)論?分享?收藏?喜歡維基解密阿桑奇被捕了,接下來(lái)他將面臨什么?大師兄留學(xué)讓留學(xué)真正成為全民選擇對(duì)于阿桑奇接下來(lái)的命運(yùn),他是否會(huì)被引渡到美國(guó),誰(shuí)也說(shuō)不準(zhǔn)。 點(diǎn)擊卡片了解更多哦。 昨天,英國(guó)倫敦發(fā)生了一件震驚世界的大事,英國(guó)該不該逮捕阿桑奇? 關(guān)注“英國(guó)大師兄”,后臺(tái)回復(fù)“教材” 領(lǐng)取20.5G全英文名校教材 回復(fù)“雅思”,領(lǐng)取最新雅思福利禮包 昨天,英國(guó)倫敦發(fā)生了一件震驚世界的大事,維基解密創(chuàng)始人阿桑奇在倫敦被英國(guó)警察逮捕。 英國(guó)的各大主流媒體幾乎都頭版頭條對(duì)這一大事件進(jìn)行了報(bào)道。 [圖片] 所有報(bào)道幾乎都采用…閱讀全文??贊同 29??10 條評(píng)論?分享?收藏?喜歡Wikileaks點(diǎn)贊“靈魂烹飪”發(fā)現(xiàn),1994年紀(jì)錄片驚人相似Reincarnated.Ra[圖片] Wikileaks對(duì)網(wǎng)友關(guān)于“靈魂烹飪”和Marina Abramovic的對(duì)于邪教儀式與行為藝術(shù)區(qū)分的自我解讀點(diǎn)了個(gè)贊。 [圖片] 細(xì)心網(wǎng)友發(fā)現(xiàn)了Marina Abramovic對(duì)希拉里的捐款達(dá)到了2700美金的最高個(gè)人上線。 見(jiàn)多識(shí)廣的美國(guó)人民表示早知道了,這次Wikileaks證實(shí)了他們的猜測(cè)。 https://twitter.com/wikileaks/status/794473977162924032 無(wú)獨(dú)有偶,其實(shí)早在1994年就有紀(jì)錄片推出了關(guān)于華盛頓特區(qū)的兒童性侵行為與戀童圈子,直達(dá)白宮高層。越戰(zhàn)老兵與16年的參議員John DeCamp冒死調(diào)查。 [圖片] 想…閱讀全文??贊同 339??117 條評(píng)論?分享?收藏人民英雄阿桑奇對(duì)美國(guó)大選的公開(kāi)聲明只增笑耳JasonSimple and direct作者:zj wolf 維基解密網(wǎng)站主頁(yè)新刊登了如下聲明(2016年11月8日) https://wikileaks.org/Assange-Statement-on-the-US-Election.html Assange Statement on the US Election 8 November 2016 By Julian Assange In recent months, WikiLeaks and I personally have come under enormous pressure to stop publishing what the Clinton campaign says about itself to itself. That pressure has come from the campaign’s allies, including the Obama administration, an…閱讀全文??贊同 114??10 條評(píng)論?分享?收藏維基解密有哪些最新猛料?圖盧編程愛(ài)好者維基解密當(dāng)年曝光美軍機(jī)密火速成名的時(shí)候,維基百科的創(chuàng)始人還特意出來(lái)澄清,我們和他們沒(méi)關(guān)系。題主這么一問(wèn),估計(jì)吉米·威爾士又要笑cry 了。 Wiki 這個(gè)詞指代的是可協(xié)作文本系統(tǒng),早年間但凡是想做在線協(xié)作內(nèi)容社區(qū)的,都喜歡拿來(lái)做域名。閱讀全文??贊同 26??1 條評(píng)論?分享?收藏?喜歡杜特爾特怒噴索羅斯:人權(quán)屬于索羅斯Reincarnated.Ra[圖片] http://www.reuters.com/article/us-philippines-duterte-idUSKBN12Z223 菲律賓總統(tǒng)杜特爾特在星期五晚上關(guān)于毒品戰(zhàn)爭(zhēng)的聲明中宣布毒品情況已經(jīng)大大改觀,并感謝中國(guó)對(duì)于緝毒的大力支持。這個(gè)新上任的總統(tǒng)在演講中卻不停抨擊美國(guó)。 中國(guó)替菲律賓捐建了一個(gè)很大的戒毒中心?!艾F(xiàn)在誰(shuí)幫了菲律賓?中國(guó)?!倍盘貭柼卣f(shuō)道?!懊绹?guó)呢?他們說(shuō)了啥?‘杜特爾特,停止未經(jīng)法律審判的殺戮。我們會(huì)讓你負(fù)責(zé)的?!?“我說(shuō)了:‘你們可以去地獄了。你們都是屎。你們把菲律賓人當(dāng)狗看。。?!喿x全文??贊同 145??44 條評(píng)論?分享?收藏澳總理為維基揭秘創(chuàng)始人阿桑奇發(fā)聲,促美國(guó)結(jié)束對(duì)其追捕,該事件的具體情況是什么?劉某某兜無(wú)碎銀幾兩,偏愛(ài)指點(diǎn)江山;身止百十斤肉,妄言民族大義。其實(shí)看到斯諾登宣誓成為俄羅斯公民并獲得保護(hù)那一刻,我就想到了阿桑奇。 同樣是西方虛偽民主和美國(guó)惡行的揭露者,甚至阿桑奇提供的美軍在阿富汗和伊拉克的暴行更直接更有力,為什么他會(huì)被遺忘? 個(gè)人認(rèn)為,其他時(shí)候就算了,但在斯諾登成為俄羅斯公民而舉世矚目的時(shí)候,還在英國(guó)倫敦監(jiān)獄里面的阿桑奇不該被遺忘。 簡(jiǎn)單描述一下阿桑奇的事吧: 朱利安.阿桑奇,1971年7月出生在澳大利亞湯斯維爾; 1987年開(kāi)始學(xué)習(xí)編程,主攻黑客技…閱讀全文??贊同 72??3 條評(píng)論?分享?收藏?喜歡阿桑奇被捕有哪些罪名成立?一頭霧水資深潛水員(1)瑞典抓阿桑奇的罪名是”涉嫌性侵和強(qiáng)奸“(allegations of sexual assault and rape) 但當(dāng)初瑞典抓阿桑奇的罪名成立嗎? 任何當(dāng)時(shí)關(guān)心過(guò)瑞典案的人都很容易看出那是一出典型的“女色設(shè)局”。其發(fā)生在曼寧爆料幾個(gè)月之后,奧巴馬司法部正考慮如何抓捕阿桑奇并與瑞典官方接觸后發(fā)生的。事實(shí)上阿桑奇在“女色設(shè)局”之前就公開(kāi)預(yù)言美國(guó)正在想辦法引渡他(奧巴馬政府的司法部長(zhǎng)霍德要修理阿桑奇的話已泄露出來(lái)),盡管不知道以…閱讀全文??贊同 47??14 條評(píng)論?分享?收藏?喜歡應(yīng)該如何評(píng)價(jià)阿桑奇和他的維基解密?WarOH協(xié)虎用通俗的語(yǔ)言科普軍史故事、武器裝備,傳播軍史正能量2010年,一段伊拉克戰(zhàn)爭(zhēng)的視頻在全世界互聯(lián)網(wǎng)上流傳,視頻內(nèi)容是美國(guó)陸軍航空部隊(duì)在伊拉克的屠殺。 該事件發(fā)生于2007年夏天,美國(guó)陸軍航空兵兩架“阿帕奇”在巴格達(dá)“剿匪”,他們直接向地上的居民掃射,打死平民十幾人。這些視頻本來(lái)都是美國(guó)陸軍的高度機(jī)密,是絕不可能外傳的,事件發(fā)生后美國(guó)政府嚴(yán)查泄密事件,最后找到了一個(gè)網(wǎng)站——維基解密。 [圖片] 維基解密,這個(gè)如今大名鼎鼎的網(wǎng)站在當(dāng)年還比較冷門(mén), 其創(chuàng)始人是澳大利亞著名…閱讀全文??贊同 38??2 條評(píng)論?分享?收藏?喜歡希拉里謀殺Scalia跟進(jìn):另一封郵件是交易合同Reincarnated.Ra在此聲明:此欄目十分政治不正確外加陰謀論,對(duì)于已經(jīng)發(fā)生過(guò)的被“證明”的真相毫無(wú)興趣。比如誰(shuí)都知道的希特勒用4個(gè)爐子奧斯維辛集中營(yíng)殺了多達(dá)幾百萬(wàn)猶太人這種事情,泰坦尼克號(hào)是自然事故之類(lèi)的是不會(huì)報(bào)道的。喜歡陰謀論的低智商小朋友請(qǐng)像我一樣戴好Tinfoil Hat。理客中IQ200們還請(qǐng)帶著你們“希拉里真做出這種事早就被告了”的思維到別的欄目刷藍(lán)瘦香菇,屑屑。 ----------------------------------------------------------…閱讀全文??贊同 130??55 條評(píng)論?分享?收藏阿桑奇被捕,如何看待維基解密與阿桑奇?彼得·克魯泡特金民社安康“自由”的西方逮捕阿桑奇,因?yàn)樗非蟮氖钦嬲淖杂?,而敵人只是用虛偽的“自由”?lái)欺騙人民。那不僅是阿桑奇的敵人,更是全人類(lèi)的敵人。 —— 忠告 全世界所有熱愛(ài)自由、熱愛(ài)正義、熱愛(ài)真理的人——應(yīng)該支持他。自由無(wú)國(guó)界。支持他就是支持自己。阿桑奇遭遇了卑劣的背叛,但是阿桑奇從未背叛自由與人民,自由與人民也絕不會(huì)背叛阿桑奇。 一個(gè)無(wú)一兵一卒一官一職的人,卻令全世界反動(dòng)勢(shì)力所忌憚、視之為眼中刺肉中釘。這是其作…閱讀全文??贊同 650??24 條評(píng)論?分享?收藏?喜歡如何看待維基解密創(chuàng)始人阿桑奇于 2019 年 4 月 11 日在倫敦被捕?王子君手中錢(qián)、腳下路、steamdeck的重量,均不使我心安謝邀。 在權(quán)力面前英雄是什么?工具。 現(xiàn)在工具的價(jià)值已經(jīng)用盡,工具人的使命結(jié)束了。 斯諾登能喘著氣離開(kāi)香港,阿桑奇能夠躲在厄瓜多爾大使館7年,背后都是有著艱深錯(cuò)雜的大國(guó)博弈。否則,我們就把國(guó)家機(jī)關(guān)想的太弱小,太無(wú)能了。 官僚體制雖然在維系工種上一貫表現(xiàn)的臃腫低效,但是一旦這套系統(tǒng)被動(dòng)員起來(lái)解決某些問(wèn)題,配合國(guó)家所擁有的資源,其效率往往令人咋舌。 這就是國(guó)家意志。 阿桑奇從獲得庇護(hù)那一天,就已經(jīng)注定了被…閱讀全文??贊同 4055??146 條評(píng)論?分享?收藏?喜歡應(yīng)該如何評(píng)價(jià)阿桑奇和他的維基解密?dzdxy是阿桑奇和他的同伴們?cè)谔嵝盐覀冋硖幰粋€(gè)滿(mǎn)是謊言和荒謬的世界。但即便如此,他還是要遭受牢獄之災(zāi)。難道這本身不是一件更大的丑聞? 不用說(shuō)阿桑奇這類(lèi)名人了。還有許多無(wú)政府主義者,比如正在遭受意大利41 BIS特別隔離監(jiān)禁的無(wú)政府主義者阿爾弗雷多·科斯皮托(Alfredo Cospito)同志,他被以“政治大屠殺”的荒謬?yán)碛膳袥Q。法西斯分子殺害青年會(huì)被釋放,但無(wú)政府主義者的反抗則成了“政治大屠殺”。 41 BIS對(duì)于革命者來(lái)說(shuō)就像…閱讀全文??贊同 31??添加評(píng)論?分享?收藏?喜歡奧巴馬。。。撒謊可不是好孩子!Reincarnated.Ra最新Wikileaks郵件有一份勁爆泄密: 2015年郵件門(mén)爆發(fā)的時(shí)候有人采訪了奧巴馬問(wèn)他是不是知曉希拉里使用私人郵箱。奧巴馬回答了不知道。 [圖片] https://twitter.com/katherinemiller/status/574350749280432129/photo/1 這一條鏈接竟然出現(xiàn)在了Wikileaks的郵件里!具體就是希拉里團(tuán)隊(duì)也觀察到了奧巴馬的言論,但他們知道奧巴馬曾發(fā)給希拉里不是政府gov結(jié)尾的郵箱來(lái)討論重大問(wèn)題,所以?shī)W巴馬這個(gè)不知情肯定站不住腳,得趕緊把相關(guān)郵件刪光! [圖片] WikiLeaks - The Podesta Emails 現(xiàn)在問(wèn)題來(lái)了:…閱讀全文??贊同 133??18 條評(píng)論?分享?收藏怎樣讓阿桑奇(維基解密創(chuàng)始人)免受牢獄之災(zāi)?Punk rabbiT非線性黑客,懂的比你多阿桑奇被英國(guó)關(guān)的都不成人形了,他父親上次去看望說(shuō)他身體狀況還不如他,說(shuō)實(shí)話他的健康都是個(gè)問(wèn)題了,釋放就別想了,阿桑奇唯一有可能活命的機(jī)會(huì)就是當(dāng)初直接去俄羅斯,跟斯諾登一樣,但是他選擇了躲進(jìn)英國(guó)厄瓜多爾的大使館,其實(shí)就已經(jīng)是個(gè)死人了閱讀全文??贊同 96??17 條評(píng)論?分享?收藏?喜歡瀏覽量6170 萬(wàn)討論量4.7 萬(wàn)?幫助中心知乎隱私保護(hù)指引申請(qǐng)開(kāi)通機(jī)構(gòu)號(hào)聯(lián)系我們?舉報(bào)中心涉未成年舉報(bào)網(wǎng)絡(luò)謠言舉報(bào)涉企虛假舉報(bào)更多?關(guān)于知乎下載知乎知乎招聘知乎指南知乎協(xié)議更多京 ICP 證 110745 號(hào) · 京 ICP 備 13052560 號(hào) - 1 · 京公網(wǎng)安備 11010802020088 號(hào) · 京網(wǎng)文[2022]2674-081 號(hào) · 藥品醫(yī)療器械網(wǎng)絡(luò)信息服務(wù)備案(京)網(wǎng)藥械信息備字(2022)第00334號(hào) · 廣播電視節(jié)目制作經(jīng)營(yíng)許可證:(京)字第06591號(hào) · 服務(wù)熱線:400-919-0001 · Investor Relations · ? 2024 知乎 北京智者天下科技有限公司版權(quán)所有 · 違法和不良信息舉報(bào):010-82716601 · 舉報(bào)郵箱:jubao@zhihu.
How Has WikiLeaks Managed to Keep Its Web Site Up and Running? | Scientific American
Skip to main contentScientific AmericanSign inDecember 7, 20108 min readHow Has WikiLeaks Managed to Keep Its Web Site Up and Running?Despite cyber attacks, the loss of key service providers and threats from government officials worldwide, the controversial site continues to add to its online cache of cablegate documentsBy Larry GreenemeierTechnologyOn supporting science journalismIf you're enjoying this article, consider supporting our award-winning journalism by subscribing. By purchasing a subscription you are helping to ensure the future of impactful stories about the discoveries and ideas shaping our world today.The arrest of WikiLeaks founder Julian Assange in London Tuesday may have brought an end to the standoff between the 39-year-old Australian and European law enforcement, but the organization he leads has vowed to continue releasing sensitive documents. Just how WikiLeaks has been able to continue posting classified material from U.S. and other nations' diplomats and officials—despite numerous cyber attacks against the Web site and the defection of key service providers—is a bit of Internet trickery commonly deployed by legitimate and criminal online organizations alike to protect themselves from traffic spikes and from being shut down. Such is the persistence of information in the Internet Age.
PRQ.se, the Swedish Internet service provider hosting the original wikiLeaks.org Web site, has reported denial-of-service (DOS) attacks against its servers hosting WikiLeaks material. In a DOS attack computers are programmed to flood Internet servers with requests for data to the extent that those servers cannot function. WikiLeaks has since moved its Web site to the wikiLeaks.ch address. The organization last week was cut off from its provider of domain name system (DNS) service, which is used to route Internet traffic from a Web address, such as wikiLeaks.org, to the actual Internet Protocol (IP) address where WikiLeaks's data resides. EveryDNS.net dropped wikiLeaks.org as a client on December 2, citing the danger that the cyber attacks aimed at that site poses to the service's 500,000 other clients.
The U.S. government has spent the past week sticking its fingers in the dike that Wikileaks breached. The Library of Congress on December 3 confirmed that it is blocking access to the WikiLeaks site across its computer systems, including those for use by patrons in the reading rooms. "The Library decided to block Wikileaks because applicable law obligates federal agencies to protect classified information. Unauthorized disclosures of classified documents do not alter the documents' classified status or automatically result in declassification of the documents," according to a statement on the Library of Congress Web site. Many, but not all, of the documents published as part of "cablegate" contain classified information.
Yet, by keeping copies of its Web site hosted at 507 different locations, or "mirror sites," worldwide, WikiLeaks persists. In general, the organization encrypts its data and keeps the source of its whistle-blower submissions anonymous. In addition, at any given time WikiLeaks computers are feeding hundreds of thousands of fake submissions throughout its network to obscure the real documents, their points of origin and their destinations, The New Yorker reported in June.
A posting on the WikiLeaksTwitter feed Tuesday morning read: "Today's actions against our editor-in-chief, Julian Assange, won't affect our operations: We will release more cables tonight as normal." Meanwhile, Assange fights extradition to Sweden, where he is accused of one count of rape, one charge of unlawful coercion and two allegations of sexual molestation stemming from a trip to that country in August.
To better understand how WikiLeaks has been able to keep its Web site functioning despite having incurred the ire of the U.S. government and many of its allies, Scientific American spoke with Hemanshu Nigam, a former U.S. Department of Justice prosecutor of child and computer crimes who has also held high-level cyber security positions at Microsoft and News Corp. Nigam, who in May founded his own online safety, security and privacy firm called SSP Blue, points out that WikiLeaks's resilience is an important reminder of the care that must be taken by governments and individuals alike with important information, that once shared, rarely ever goes away completely.
[An edited transcript of the interview follows.]
The cat-and-mouse game that WikiLeaks is playing with authorities worldwide is a prime example of the persistence of information on the Internet. Of course, the cat is fully out of the bag now that media outlets are reporting extensively on the contents of the leaked files, but why couldn't the U.S. government or some other entity simply shut down direct access to WikiLeaks's cablegate files?
You can shut down a Web site, but there's no question an individual intent on distributing that information will already have thought about keeping a copy of it in multiple other locations, either online or offline. When you run a Web site, if you're worried about an attack on that Web site, whether it's a distributed denial-of-service attack or some sort of virus attack, the best solution to those worries is to create backup plans. There could be a copy of that information sitting on a thumb drive that everyone buys at Costco for really cheap nowadays. It could be backed up on a CD. It could be stored with a cloud network storage company that can be accessed from anywhere. That's why this is a pretty significant challenge for the government to try to shut down a site—the task is, frankly, impossible.
What can be done to stem the tide of information?
If you think [Assange] has done something criminal in nature and against national security, then focus on the arrest and prosecution, and focus on recovering the diplomatic damage that's already been done.
Over the past week, the WikiLeaks Web site has been brought down due to distributed denial-of-service [DOS] attacks, and then subsequently brought back online. What tools and techniques are available to Web sites to enable them to route and re-route access?
One tool is redirection, where you could have 10 different Web site addresses set up that send you to a particular location. [For example, readers who visit SciAm.com will automatically be redirected to ScientificAmerican.com.] Another option is to set up mirror sites—if the core Web server goes down, there's another Web server at a different location that will have the exact same look, feel and content. Redirects and mirror sites are common and they're necessary in order to run a legitimate business online.
Beyond the proactive steps that can be taken, the Web keeps a cache of data even after it has been taken offline. Google is a perfect example of a data cache—it doesn't actually go out on the Internet and crawl with its crawling capabilities to go find what you're looking for and bring it back to you each time you do a search. It's already done that; it's spent hours and hours of background computing time crawling the Web, sorting it and organizing it, putting it in a way that when you search for something, Google goes into its own cached data set to find it. The history maintained by your Web browser is another example of a data cache. In addition, some Web searches will return listings containing a "cached" hyperlink. When you click on that link, the original site may not exist, but the cache may still be there. It can take anywhere from three months to a year for Web browsers to re-crawl the Internet and update their cache to shed deleted Web pages.
Malicious hackers use these methods as well as proxy servers to obfuscate the location of their data and avoid prosecution. Are there legitimate uses for proxies, redirection, mirror sites and data caches?
A lot of legitimate sites use proxy servers, for example, because they keep data requests from being bottlenecked at a single server and make data flow faster. This can also be used to hide your location, which is useful when you're operating a controversial site and are worried about it being attacked or vandalized online. You could be standing up for a cause that you believe in such as gay rights and you have a Web site dedicated to that, but you're worried that people against your cause will try to take your site down. Then you would want to try to use proxies and route the data traffic to other locations, jump from one router to another and put the site behind a caching wall. You use multiple layers of security to protect yourself. Of course, proxy servers are also used by those doing things that are illegal to help avoid prosecution.
EveryDNS.net, a provider of domain name system [DNS] service that routes Internet traffic from domain names to IP addresses, dropped the wikiLeaks.org account last week. EveryDNS.net does not host content, however, so what did this action mean for WikiLeaks?
Basically if you don't have a DNS provider, nobody can find you. When you punch in wikiLeaks.org, your system says, I need to go find wikiLeaks.org, so it goes to a DNS provider that says, "I can point you to that direction." When you take that away that DNS provider there's nobody telling the computer where to go to retrieve it. You in essence go dark.
EveryDNS.net indicated on its Web site that? having WikiLeaks as a client—and providing DNS services for the site's content—put other clients at a security risk. Could cyber attacks against wikiLeaks.org actually endanger other EveryDNS.net sites?
I think this is a positive statement [by EveryDNS.net] and has a lot to do with them being worried about their reputation and being seen as aligned with a guy who may be charged pretty soon with crimes against the United States. This is what I would drop into the category of corporate reputation management. From a security perspective, I don't think there's really a worry here, unless what they're worried about is a potential anti-WikiLeaks attacker saying, "I'm going to go after all of your clients simply because you are supporting wikiLeaks.org."
All of the documents posted to WikiLeaks's Web site thus far amount to a few gigabytes of data. Now WikiLeaks claims to have a 1.4-gigabyte "insurance" file, or poison pill, (containing information about BP and Guantánamo Bay) protected by a 256-digit key encryption to use in the event founder Julian Assange is prosecuted or the Web site is permanently shuttered. Why is this significant? What would it take to decrypt such a heavily protected file?
Use of 256-digit key encryption is [a level of encryption that is] more than serious—it's ridiculous. Here's a guy who's backed into a corner and who's telling the world that he has the button to what in his mind is a nuclear bomb. What he's saying is, "I have a file that is guarded heavily that you can't break into but I can." He's set it up in a way that there is nothing that can be done to destroy or tamper with the file—it would take you years to decrypt 256-digit encryption.
What does the WikiLeaks incident tell people about the way information lives on the Internet, and what lesson should be learned here?
The message is loud and clear to individuals, businesses and the government. On your laptop you should have a sentence taped to the top of your screen that says, "Before I hit send, do I want to see this on the front page of The New York Times or in Scientific American?" Once you hit send and send it to the Internet world, it's going to be persistent—and in many ways permanent. If you don't put certain information onto the public Net, you're not going to have this problem in the first place. The message to the government is that as much as it wants to embrace the digital world it still needs to take almost a pause and look at the data they have and consider whether that data should be stored in digital form. If it is going to go into digital form, then there's a very long list of security measures that the government needs to be focused on. The government really needs to be on a red-alert status when it comes to protecting their top-secret information.Rights & PermissionsLarry Greenemeier is the associate editor of technology for Scientific American, covering a variety of tech-related topics, including biotech, computers, military tech, nanotech and robots.More by Larry GreenemeierExpand Your World with ScienceLearn and share the most exciting discoveries, innovations and ideas shaping our world today.SubscribeSign up for our newslettersSee the latest storiesRead the latest issueFollow Us:Return & Refund PolicyAboutPress RoomFAQsContact UsInternational EditionsAdvertiseSA Custom MediaTerms of UsePrivacy PolicyCalifornia Consumer Privacy StatementUse of cookies/Do not sell my dataScientific American is part of Springer Nature, which owns or has commercial relations with thousands of scientific publications (many of them can be found at www.springernature.com/us). Scientific American maintains a strict policy of editorial independence in reporting developments in science to our readers.? 2024 SCIENTIFIC AMERICAN, A DIVISION OF SPRINGER NATURE AMERICA, INC.ALL RIGHTS RESERVED.
Wikileaks: 8 biggest leaks in its history | TechRadar
Skip to main content
Open menu
Close menu
Tech Radar
TechRadar the technology experts
Search
Search TechRadar
RSS
US EditionAsiaSingaporeEuropeDanmarkSuomiNorgeSverigeUKItaliaNederlandBelgi? (Nederlands)FranceDeutschlandEspa?aNorth AmericaUS (English)CanadaMéxicoAustralasiaAustraliaNew Zealand
Phones
Computing
TVs
Streaming
Health
Audio
Cameras
More
Home
News
Best
Reviews
Opinion
How to
Versus
Deals
Coupons
Tech Radar Pro
Tech Radar Gaming
TrendingApple Vision Pro reviewSamsung Galaxy S24 Ultra reviewSamsung Galaxy S24 reviewGalaxy RingWordle hintsBest VPN
When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.
Computing
Internet
Wi-Fi & Broadband
Wikileaks: 8 biggest leaks in its history
News
By Marc Chacksfield published 29 November 2010
From BNP lists to the Iraq War documents
Wikileaks - leakiest site around
Page 1 of 2:
BNP, Scientology and Sarah Palin
BNP, Scientology and Sarah Palin
Web censorship, climate and the Bilderbergers
The most important website in the world right now isn't Facebook, Google or Twitter but one that's lifting the lid on the machinations of governments the world over. It's also shining a light on racist political parties and trying to out those who are actively censoring the web.Wikileaks, for good or bad, is offering up the truth in a way that's not been seen before.Its motto is "to publish fact-based stories without fear or favour" and it's a site run by volunteers who seemingly seek nothing but fact.This week saw the biggest leak yet for the site. A total of 251,287 United States embassy cables were put onto torrents for anyone to download.According to Wikileaks, it's "the largest set of confidential documents ever to be released into the public domain."The documents go as far back as 1966 and offering them up to the public has seen the US and many other countries go into diplomatic crisis overload.But this isn't the first time Wikileaks has managed to deliver documents that have embarrassed whole countries and it certainly won't be the last.Below are 8 of the biggest leaks from a website that's only been around for four short years, but has already left a legacy that will last for decades to come.1. Scientology exposedIt's one of the most secretive religions in the world. Founded by sci-fi author L Ron Hubbard in 1952 and now seen as the religion of choice by the Hollywood elite, the methods of the Church of Scientology have been shrouded in secrecy for a long time.Wikileaks changed all this by posting "the collected secret 'bibles' of Scientology" – a whole host of documents that explained the hierarchy within Scientology.The religion and its lawyers were not best pleased.2. BNP membership list releasedFor some reason, not everybody in the British National Party is happy to have their name associated with the BNP.This became apparent when Wikileaks (and other blogs) published details of every member of the far-right political part, including addresses and what they did for a living.The document meant that anybody who downloaded the information could CTRL+F their way to finding out who in their hometown was paying the BNP to pedal its non-immigration stance.Teachers were exposed, as were members of the UK police force, which was bad news for the officers – it's illegal to be in the police and support the party.3. Afghan War logsThe leaking of the Afghan War Logs put Wikileaks firmly in the public conscience, mainly due to the US government publicly condemning the information that was made available to the public.Talk of torture, the death of civilians and a multitude of cover-ups did not make for light reading, but did show off the true horror of what was seen by many as an unwinnable war.4. Sarah Palin's email account gets hackedPalin's latest slip of the tongue made her North Korea's latest fan recently, but it was her outed Yahoo email accounts that caused even more embarrassment back in 2008.According to information given to Wikileaks, Palin was using her private Yahoo account to send work messages – a minor faux pas, but one that is strictly forbidden when you're part of the US government.Considering she may well be running for President in the near future, we really hope she doesn't make the same mistake again. Or at least updates her personal email to something a bit hipper, like Gmail.
1
2
Current page:
BNP, Scientology and Sarah Palin
Next Page Web censorship, climate and the Bilderbergers
Get daily insight, inspiration and deals in your inboxGet the hottest deals available in your inbox plus news, reviews, opinion, analysis and more from the TechRadar team.Contact me with news and offers from other Future brandsReceive email from us on behalf of our trusted partners or sponsorsBy submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.
Marc ChacksfieldSocial Links NavigationMarc Chacksfield is the Editor In Chief, Shortlist.com at DC Thomson. He started out life as a movie writer for numerous (now defunct) magazines and soon found himself online - editing a gaggle of gadget sites, including TechRadar, Digital Camera World and Tom's Guide UK. At Shortlist you'll find him mostly writing about movies and tech, so no change there then.
More about wi fi broadbandDo you dread trying to change your router settings? Login problems could soon be a thing of the pastGoogle’s Nest Wi-Fi routers have vanished from the Google Store - could a Wi-Fi 7 model be inbound?LatestWe have a technology skills mismatch problem and only IT can fix itSee more latest??
Most PopularFinal Fantasy 14's massive graphical overhaul will bring in new players but ease worries about the game's future, says directorBy Demi WilliamsMarch 06, 2024Forget Windows and macOS — Linux market share reaches a new high as users search for an alternativeBy Luke HughesMarch 06, 2024Ghost of Tsushima Director’s Cut is coming to PC later this yearBy Dashiell WoodMarch 06, 2024Another big reason to install iOS 17.4 right now – it fixes two major security threatsBy Alex BlakeMarch 06, 2024Google TV is now streaming over 35 Oscar nominee movies for free – here’s the full listBy Amelia SchwankeMarch 06, 2024The UK is “on track to become the world’s next Silicon Valley” as Jeremy Hunt reveals the Spring Budget, but cybersecurity gets no mentionBy Benedict CollinsMarch 06, 2024These two ransomware giants are joining forces to hit more victims across the worldBy Sead Fadilpa?i?March 06, 2024Your Roku TV and streaming stick will stop working unless you agree to controversial new termsBy Amelia SchwankeMarch 06, 2024Elden Ring players seemingly uncover the 'small element' related to Shadow of the Erdtree mentioned by director MiyazakiBy Demi WilliamsMarch 06, 2024Dodge flexes its muscle with the first all-electric Charger DaytonaBy Leon PoultneyMarch 06, 2024Warner Bros. outlines its future strategy, plans on focusing on its biggest franchises and live-service games instead of 'volatile' AAA titlesBy Demi WilliamsMarch 06, 2024
MOST POPULARMOST SHARED1If the Galaxy Z Fold 6 Ultra is real it could finally change my mind about foldable phones24 new movies coming to Max in March 2024 with over 90% on Rotten Tomatoes3VMware customers are jumping ship as Broadcom sales continue - here's where they're moving to4Octopus is undercutting Blackmagic with its low-cost Super 16 cine camera with Arri Alexa chops5This new Microsoft Teams update is a small one — but it could easily cost you your job1Nvidia CEO predicts the death of coding — Jensen Huang says AI will do the work, so kids don't need to learn2AI is going to change your phone – and your face. Here's how34 new movies coming to Max in March 2024 with over 90% on Rotten Tomatoes4VMware customers are jumping ship as Broadcom sales continue - here's where they're moving to5Octopus is undercutting Blackmagic with its low-cost Super 16 cine camera with Arri Alexa chops
TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.
About Us
Contact Future's experts
Contact Us
Terms and conditions
Privacy policy
Cookies policy
Advertise with us
Web notifications
Accessibility Statement
Careers
?
Future US, Inc. Full 7th Floor, 130 West 42nd Street,
New York,
NY 10036.