SlideShare une entreprise Scribd logo
1  sur  38
Thet
Aung
What is WiKiLeaks



        WikiLeaks is an international new media
        non-profit organization that publishes
        submissions of otherwise unavailable documents
        from anonymous news sources and leaks.
Who run this?
   The Guardian newspaper describes
    Julian Assange as
    “an Australian Internet activist, as its
    director.”
Goal
   To ensure that whistleblowers and
    journalists are not jailed for emailing
    sensitive or classified documents
History
   First appeared on the Internet in
    December 2006

   January 2007, the website stated that
    it had over 1.2 million leaked
    documents
Administration
   Revenue stream is donations
   Planning to add an auction model to
    sell early access to documents.
   Receives no money for personnel
    costs
   Only for hardware, travelling and
    bandwidth
Leaks
First document in December 2006
   Apparent Somali assassination order
   A decision to assassinate government
    officials signed by Sheikh Hassan
    Dahir Aweys
Leaks
April 2010

   Video from a 2007 incident in which
    Iraqi civilians and journalists were
    killed by U.S. forces, on a website
    called Collateral Murder.
Leaks
July 2010

   Afghan War Diary, a compilation of
    more than 76,900 documents about
    the War in Afghanistan not previously
    available for public review.
Leaks
October 2010

   A package of almost 400,000
    documents called the Iraq War Logs in
    coordination with major commercial
    media organisations.
Leaks
November 2010,

   Releasing U.S. State department
    diplomatic cables.
Technology used by
WiKiLeaks
   MediaWiKi
   Freenet
   Tor
   PGP
Technical changes
   First user-editable wiki site

   Traditional publication model

   No longer accepts either user comments or
    edits.

   Multiple servers and different domain names

   Number of denial-of-service attacks

   Disconnection from different Domain Name
    System (DNS) providers.
DDOS
Hosting
   An uncensorable system for
    untraceable mass document leaking
   Hosted by PRQ, a Sweden-based
    company
   “Highly secure, no-questions-asked
    hosting services”
Hosting
   Swedish constitution, which gives the
    information providers total legal protection.

   It is forbidden according to Swedish law for
    any administrative authority to make inquiries
    about the sources of any type of newspaper.

   These laws, and the hosting by PRQ, make it
    difficult to take WikiLeaks offline.
Hosting
17 August 2010
   Swedish Pirate Party will be hosting and managing
    many of WikiLeaks' new servers.
   The party donates servers and bandwidth to WikiLeaks
    without charge.
   Technicians of the party will make sure that the servers
    are maintained and working.
   Some servers are hosted in an underground nuclear
    bunker in Stockholm.
Bulletproof Hosting
   Own servers at undisclosed locations
   Keeps no logs
   Uses military-grade encryption
   Protect sources and other confidential
    information.
Moving around
   Target of a denial-of-service attack

   Move to Amazon's servers

   Ousted without a public statement

    from the company

   Decided to move to OVH in France
Moving around
   French government, and OVH legality of
    hosting WikiLeaks.

   The court in Lille immediately declined to
    force OVH to shut down the WikiLeaks site

   The court in Paris stated it would need more
    time to examine the highly technical issue
After the US diplomatic cables
leak
   American owned EveryDNS dropped
    WikiLeaks from its entries on 2
    December 2010


   Citing DDoS attacks that “threatened
    the stability of its infrastructure”
After the US diplomatic cables
leak
   The Wau Holland Foundation that had
    been redirecting donations to WikiLeaks.
   PayPal alleged that the account violated
    its “Acceptable Use Policy”, specifically
    that it was used for “activities that
    encourage, promote, facilitate or instruct
    others to engage in illegal activity”
After the US diplomatic cables
leak
   6 December, the Swiss bank, PostFinance
    announced that it had frozen the assets of
    Assange that it holds, totalling 31,000 euros

   On the same day, MasterCard announced that “it
    is taking action to ensure that WikiLeaks can no
    longer accept MasterCard-branded products”,
    adding “MasterCard rules prohibit customers
    from directly or indirectly engaging in or
    facilitating any action that is illegal”

   The next day, Visa Inc. announced it was
    suspending payments to WikiLeaks, pending
    “further investigations”
After the US diplomatic cables
leak
   Hundreds of mirrors of the WikiLeaks site appeared

   Anonymous group of internet activists, called on supporters to
    attack the websites of companies who do not support
    WikiLeaks.

   Operation Payback

   The Associated Free Press reported that attempts to shut
    down the wikileaks.org

   The site surviving via the so-called Streisand effect, whereby
    attempts to censor information online leads to it being
    replicated in many places
After the US diplomatic cables
leak
   XIPWIRE established a way to donate
    to WikiLeaks, and waived their fees
Verification of submissions
   Never released a misattributed
    document
   Documents are assessed before
    release
   Misleading leaks “are already well-
    placed in the mainstream media”
Verification of submissions
   Submitted documents are vetted by a
    group of five reviewers, with expertise
    in different fields
   Assange has the final decision about
    the assessment of a document
Insurance file
   On 29 July 2010 WikiLeaks added a 1.4 GB
    "Insurance File" to the Afghan War Diary
    page.
   The file is AES encrypted
   To serve as insurance in case the WikiLeaks
    website or its spokesman Julian Assange are
    incapacitated
   The passphrase could be published
Insurance file
   “If anything happens to Assange or the website,
    a key will go out to unlock the files. There would
    then be no way to stop the information from
    spreading like wildfire because so many people
    already have copies.”

   “What most folks are speculating is that the
    insurance file contains unreleased information
    that would be especially embarrassing to the US
    government if it were released.”
WikiLeaks has won a number of awards

   2008 Economist magazine New Media
    Award

   June 2009, WikiLeaks and Julian
    Assange won Amnesty International's UK
    Media Award (in the category "New
    Media")

   May 2010, the New York Daily News
    listed WikiLeaks first in a ranking of
    "websites that could totally change the
    news".
Criticism
U.S. Secretary of State Hillary Clinton
   “This disclosure is not just an attack
    on America's foreign policy interests, it
    is an attack on the international
    community”
Criticism
The President of Iran,
Mahmoud Ahmadinejad
   “To show concern with Iran by Arab states
    was a planned leak by the United States to
    discredit his government, though he did not
    indicate whether he believed WikiLeaks was
    in collusion with the United States or was
    simply an unwitting facilitator.”
Criticism
Former Canadian government adviser
Tom Flanagan
   “I think Assange should be
    assassinated.”
Criticism
Russian investigative reporter
Andrei Soldatov
   “WikiLeaks is motivated by anger over
    declining funding and resources for
    investigative reporting.”
Upcoming leaks
   5GB from Bank of America
   Assange commented on the possible
    impact of the release that “it could
    take down a bank or two.”
   Stock price fell by three percent
WikiLeaks had information
            thermo-nuclear device
            which it would release
            if the organisation needs
             to defend itself
References
 The WikiLeaks Debate
By Rob Grace
http://lawandsecurity.foreignpolicyblogs.co
  m

 On the WikiLeaks debate
Benjamin Cunningham
http://blogs.praguepost.com/politics

 WikiLeaks From Wikipedia
http://en.wikipedia.org/wiki/WikiLeaks
Wikileaks

Contenu connexe

Tendances

Osint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraftOsint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraft
Steph Cliche
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
realpeterz
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
CTIN
 
Uniform Domain Name Dispute Resolution
Uniform Domain Name Dispute ResolutionUniform Domain Name Dispute Resolution
Uniform Domain Name Dispute Resolution
libertyluver
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
charlesgarrett
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
kelsports
 

Tendances (20)

Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Types of cyber crime
Types of cyber crimeTypes of cyber crime
Types of cyber crime
 
Crime analysis
Crime analysisCrime analysis
Crime analysis
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Osint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraftOsint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraft
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Uniform Domain Name Dispute Resolution
Uniform Domain Name Dispute ResolutionUniform Domain Name Dispute Resolution
Uniform Domain Name Dispute Resolution
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
Google Dorks
Google DorksGoogle Dorks
Google Dorks
 
Data security
Data securityData security
Data security
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence Agencies
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Invasion of privacy
Invasion of privacyInvasion of privacy
Invasion of privacy
 
cia
cia cia
cia
 

En vedette

What's the point about wikileaks?
What's the point about wikileaks?What's the point about wikileaks?
What's the point about wikileaks?
Joris Berthelot
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
Ana Meskovska
 

En vedette (20)

What's the point about wikileaks?
What's the point about wikileaks?What's the point about wikileaks?
What's the point about wikileaks?
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
Disclosure of wikileaks
Disclosure of wikileaksDisclosure of wikileaks
Disclosure of wikileaks
 
Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaks
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
ၿမန္မာ့သမိုင္း ႏွင့္ ႏိုင္ငံေရး
ၿမန္မာ့သမိုင္း ႏွင့္ ႏိုင္ငံေရးၿမန္မာ့သမိုင္း ႏွင့္ ႏိုင္ငံေရး
ၿမန္မာ့သမိုင္း ႏွင့္ ႏိုင္ငံေရး
 
Web security
Web securityWeb security
Web security
 
Accessing reliable information in Myanmar
Accessing reliable information in MyanmarAccessing reliable information in Myanmar
Accessing reliable information in Myanmar
 
What wikileaks has taught us about the web- Euan Semple
What wikileaks has taught us about the web- Euan SempleWhat wikileaks has taught us about the web- Euan Semple
What wikileaks has taught us about the web- Euan Semple
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
Myanmar 2015 and beyond 
Myanmar 2015 and beyond Myanmar 2015 and beyond 
Myanmar 2015 and beyond 
 
Power point wikileaks
Power point wikileaksPower point wikileaks
Power point wikileaks
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
The Law of Whistleblowing
The Law of WhistleblowingThe Law of Whistleblowing
The Law of Whistleblowing
 
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
 
WikiLeaks and Information Policy
WikiLeaks and Information PolicyWikiLeaks and Information Policy
WikiLeaks and Information Policy
 
Wikileaks: the hacker's game
Wikileaks: the hacker's gameWikileaks: the hacker's game
Wikileaks: the hacker's game
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
Wikileaks
WikileaksWikileaks
Wikileaks
 

Similaire à Wikileaks

ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
 ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
arnit1
 
WikiLeaks is a nonprofit organization which uses its website to publ.docx
WikiLeaks is a nonprofit organization which uses its website to publ.docxWikiLeaks is a nonprofit organization which uses its website to publ.docx
WikiLeaks is a nonprofit organization which uses its website to publ.docx
gauthierleppington
 
WikiLeaks is an international non-profit organization that publishes.docx
WikiLeaks is an international non-profit organization that publishes.docxWikiLeaks is an international non-profit organization that publishes.docx
WikiLeaks is an international non-profit organization that publishes.docx
gauthierleppington
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
Pw Carey
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
raghuarr
 
9694 thinking skills wikileaks
9694 thinking skills wikileaks9694 thinking skills wikileaks
9694 thinking skills wikileaks
mayorgam
 

Similaire à Wikileaks (20)

ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
 ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
 
Zimmer wikileaks
Zimmer wikileaksZimmer wikileaks
Zimmer wikileaks
 
Wiki leaks
Wiki leaksWiki leaks
Wiki leaks
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
Social Hacking
Social HackingSocial Hacking
Social Hacking
 
Wikileaks script
Wikileaks scriptWikileaks script
Wikileaks script
 
The undeclared war against wikileaks
The undeclared war against wikileaksThe undeclared war against wikileaks
The undeclared war against wikileaks
 
WikiLeaks is a nonprofit organization which uses its website to publ.docx
WikiLeaks is a nonprofit organization which uses its website to publ.docxWikiLeaks is a nonprofit organization which uses its website to publ.docx
WikiLeaks is a nonprofit organization which uses its website to publ.docx
 
wikileaks.docx
wikileaks.docxwikileaks.docx
wikileaks.docx
 
5 minutes translation (4)
5 minutes translation  (4)5 minutes translation  (4)
5 minutes translation (4)
 
WikiLeaks is an international non-profit organization that publishes.docx
WikiLeaks is an international non-profit organization that publishes.docxWikiLeaks is an international non-profit organization that publishes.docx
WikiLeaks is an international non-profit organization that publishes.docx
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
 
Wikileaks brochure
Wikileaks brochureWikileaks brochure
Wikileaks brochure
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
 
Inside the Wikileaks Headquarters
 Inside the Wikileaks Headquarters Inside the Wikileaks Headquarters
Inside the Wikileaks Headquarters
 
DARK OVERLORD 9-11 TERRORIST BLACKMAILERS
DARK OVERLORD 9-11 TERRORIST BLACKMAILERSDARK OVERLORD 9-11 TERRORIST BLACKMAILERS
DARK OVERLORD 9-11 TERRORIST BLACKMAILERS
 
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of WhistleblowingETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
 
9694 thinking skills wikileaks
9694 thinking skills wikileaks9694 thinking skills wikileaks
9694 thinking skills wikileaks
 

Plus de Thet Aung Min Latt

Plus de Thet Aung Min Latt (15)

Leaflet varcamp 2022
Leaflet varcamp 2022Leaflet varcamp 2022
Leaflet varcamp 2022
 
Myanmar 2015 political landscape
Myanmar 2015 political landscapeMyanmar 2015 political landscape
Myanmar 2015 political landscape
 
Analysing and Managing
Analysing and Managing Analysing and Managing
Analysing and Managing
 
Analyzing and Managing Political and Business Risks in Myanmar
Analyzing and Managing Political and Business Risks in MyanmarAnalyzing and Managing Political and Business Risks in Myanmar
Analyzing and Managing Political and Business Risks in Myanmar
 
SQL Server Replication Transactional Replication from MSSQL 200x to MYSQL 5.x
SQL Server Replication Transactional Replication  from MSSQL 200x to MYSQL 5.xSQL Server Replication Transactional Replication  from MSSQL 200x to MYSQL 5.x
SQL Server Replication Transactional Replication from MSSQL 200x to MYSQL 5.x
 
How to market yourself
How to market yourselfHow to market yourself
How to market yourself
 
Version controls for php project with visual svn server and tortoisesvn client
Version controls for php project with visual svn server and tortoisesvn clientVersion controls for php project with visual svn server and tortoisesvn client
Version controls for php project with visual svn server and tortoisesvn client
 
IT job interview
IT job interviewIT job interview
IT job interview
 
The social media developer
The social media developer The social media developer
The social media developer
 
Mobile government for Barcamp Yangon 2012
Mobile government for Barcamp Yangon 2012Mobile government for Barcamp Yangon 2012
Mobile government for Barcamp Yangon 2012
 
Myanmar e-democracy
Myanmar e-democracyMyanmar e-democracy
Myanmar e-democracy
 
The role of new media in social change of myanmar
The role of new media in social change of myanmarThe role of new media in social change of myanmar
The role of new media in social change of myanmar
 
Social Media and a New Model of Civic Engagement
Social Media and a New Model of Civic EngagementSocial Media and a New Model of Civic Engagement
Social Media and a New Model of Civic Engagement
 
New media and development
New media and developmentNew media and development
New media and development
 
Social media strategy for Education sector
Social media strategy for Education sectorSocial media strategy for Education sector
Social media strategy for Education sector
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Dernier (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

Wikileaks

  • 2. What is WiKiLeaks WikiLeaks is an international new media non-profit organization that publishes submissions of otherwise unavailable documents from anonymous news sources and leaks.
  • 3. Who run this?  The Guardian newspaper describes Julian Assange as “an Australian Internet activist, as its director.”
  • 4. Goal  To ensure that whistleblowers and journalists are not jailed for emailing sensitive or classified documents
  • 5. History  First appeared on the Internet in December 2006  January 2007, the website stated that it had over 1.2 million leaked documents
  • 6. Administration  Revenue stream is donations  Planning to add an auction model to sell early access to documents.  Receives no money for personnel costs  Only for hardware, travelling and bandwidth
  • 7. Leaks First document in December 2006  Apparent Somali assassination order  A decision to assassinate government officials signed by Sheikh Hassan Dahir Aweys
  • 8. Leaks April 2010  Video from a 2007 incident in which Iraqi civilians and journalists were killed by U.S. forces, on a website called Collateral Murder.
  • 9. Leaks July 2010  Afghan War Diary, a compilation of more than 76,900 documents about the War in Afghanistan not previously available for public review.
  • 10. Leaks October 2010  A package of almost 400,000 documents called the Iraq War Logs in coordination with major commercial media organisations.
  • 11. Leaks November 2010,  Releasing U.S. State department diplomatic cables.
  • 12. Technology used by WiKiLeaks  MediaWiKi  Freenet  Tor  PGP
  • 13. Technical changes  First user-editable wiki site  Traditional publication model  No longer accepts either user comments or edits.  Multiple servers and different domain names  Number of denial-of-service attacks  Disconnection from different Domain Name System (DNS) providers.
  • 14. DDOS
  • 15. Hosting  An uncensorable system for untraceable mass document leaking  Hosted by PRQ, a Sweden-based company  “Highly secure, no-questions-asked hosting services”
  • 16. Hosting  Swedish constitution, which gives the information providers total legal protection.  It is forbidden according to Swedish law for any administrative authority to make inquiries about the sources of any type of newspaper.  These laws, and the hosting by PRQ, make it difficult to take WikiLeaks offline.
  • 17. Hosting 17 August 2010  Swedish Pirate Party will be hosting and managing many of WikiLeaks' new servers.  The party donates servers and bandwidth to WikiLeaks without charge.  Technicians of the party will make sure that the servers are maintained and working.  Some servers are hosted in an underground nuclear bunker in Stockholm.
  • 18. Bulletproof Hosting  Own servers at undisclosed locations  Keeps no logs  Uses military-grade encryption  Protect sources and other confidential information.
  • 19. Moving around  Target of a denial-of-service attack  Move to Amazon's servers  Ousted without a public statement from the company  Decided to move to OVH in France
  • 20. Moving around  French government, and OVH legality of hosting WikiLeaks.  The court in Lille immediately declined to force OVH to shut down the WikiLeaks site  The court in Paris stated it would need more time to examine the highly technical issue
  • 21. After the US diplomatic cables leak  American owned EveryDNS dropped WikiLeaks from its entries on 2 December 2010  Citing DDoS attacks that “threatened the stability of its infrastructure”
  • 22. After the US diplomatic cables leak  The Wau Holland Foundation that had been redirecting donations to WikiLeaks.  PayPal alleged that the account violated its “Acceptable Use Policy”, specifically that it was used for “activities that encourage, promote, facilitate or instruct others to engage in illegal activity”
  • 23. After the US diplomatic cables leak  6 December, the Swiss bank, PostFinance announced that it had frozen the assets of Assange that it holds, totalling 31,000 euros  On the same day, MasterCard announced that “it is taking action to ensure that WikiLeaks can no longer accept MasterCard-branded products”, adding “MasterCard rules prohibit customers from directly or indirectly engaging in or facilitating any action that is illegal”  The next day, Visa Inc. announced it was suspending payments to WikiLeaks, pending “further investigations”
  • 24. After the US diplomatic cables leak  Hundreds of mirrors of the WikiLeaks site appeared  Anonymous group of internet activists, called on supporters to attack the websites of companies who do not support WikiLeaks.  Operation Payback  The Associated Free Press reported that attempts to shut down the wikileaks.org  The site surviving via the so-called Streisand effect, whereby attempts to censor information online leads to it being replicated in many places
  • 25. After the US diplomatic cables leak  XIPWIRE established a way to donate to WikiLeaks, and waived their fees
  • 26. Verification of submissions  Never released a misattributed document  Documents are assessed before release  Misleading leaks “are already well- placed in the mainstream media”
  • 27. Verification of submissions  Submitted documents are vetted by a group of five reviewers, with expertise in different fields  Assange has the final decision about the assessment of a document
  • 28. Insurance file  On 29 July 2010 WikiLeaks added a 1.4 GB "Insurance File" to the Afghan War Diary page.  The file is AES encrypted  To serve as insurance in case the WikiLeaks website or its spokesman Julian Assange are incapacitated  The passphrase could be published
  • 29. Insurance file  “If anything happens to Assange or the website, a key will go out to unlock the files. There would then be no way to stop the information from spreading like wildfire because so many people already have copies.”  “What most folks are speculating is that the insurance file contains unreleased information that would be especially embarrassing to the US government if it were released.”
  • 30. WikiLeaks has won a number of awards  2008 Economist magazine New Media Award  June 2009, WikiLeaks and Julian Assange won Amnesty International's UK Media Award (in the category "New Media")  May 2010, the New York Daily News listed WikiLeaks first in a ranking of "websites that could totally change the news".
  • 31. Criticism U.S. Secretary of State Hillary Clinton  “This disclosure is not just an attack on America's foreign policy interests, it is an attack on the international community”
  • 32. Criticism The President of Iran, Mahmoud Ahmadinejad  “To show concern with Iran by Arab states was a planned leak by the United States to discredit his government, though he did not indicate whether he believed WikiLeaks was in collusion with the United States or was simply an unwitting facilitator.”
  • 33. Criticism Former Canadian government adviser Tom Flanagan  “I think Assange should be assassinated.”
  • 34. Criticism Russian investigative reporter Andrei Soldatov  “WikiLeaks is motivated by anger over declining funding and resources for investigative reporting.”
  • 35. Upcoming leaks  5GB from Bank of America  Assange commented on the possible impact of the release that “it could take down a bank or two.”  Stock price fell by three percent
  • 36. WikiLeaks had information  thermo-nuclear device  which it would release  if the organisation needs to defend itself
  • 37. References  The WikiLeaks Debate By Rob Grace http://lawandsecurity.foreignpolicyblogs.co m  On the WikiLeaks debate Benjamin Cunningham http://blogs.praguepost.com/politics  WikiLeaks From Wikipedia http://en.wikipedia.org/wiki/WikiLeaks