SlideShare une entreprise Scribd logo
1  sur  38
Thet
Aung
What is WiKiLeaks



        WikiLeaks is an international new media
        non-profit organization that publishes
        submissions of otherwise unavailable documents
        from anonymous news sources and leaks.
Who run this?
   The Guardian newspaper describes
    Julian Assange as
    “an Australian Internet activist, as its
    director.”
Goal
   To ensure that whistleblowers and
    journalists are not jailed for emailing
    sensitive or classified documents
History
   First appeared on the Internet in
    December 2006

   January 2007, the website stated that
    it had over 1.2 million leaked
    documents
Administration
   Revenue stream is donations
   Planning to add an auction model to
    sell early access to documents.
   Receives no money for personnel
    costs
   Only for hardware, travelling and
    bandwidth
Leaks
First document in December 2006
   Apparent Somali assassination order
   A decision to assassinate government
    officials signed by Sheikh Hassan
    Dahir Aweys
Leaks
April 2010

   Video from a 2007 incident in which
    Iraqi civilians and journalists were
    killed by U.S. forces, on a website
    called Collateral Murder.
Leaks
July 2010

   Afghan War Diary, a compilation of
    more than 76,900 documents about
    the War in Afghanistan not previously
    available for public review.
Leaks
October 2010

   A package of almost 400,000
    documents called the Iraq War Logs in
    coordination with major commercial
    media organisations.
Leaks
November 2010,

   Releasing U.S. State department
    diplomatic cables.
Technology used by
WiKiLeaks
   MediaWiKi
   Freenet
   Tor
   PGP
Technical changes
   First user-editable wiki site

   Traditional publication model

   No longer accepts either user comments or
    edits.

   Multiple servers and different domain names

   Number of denial-of-service attacks

   Disconnection from different Domain Name
    System (DNS) providers.
DDOS
Hosting
   An uncensorable system for
    untraceable mass document leaking
   Hosted by PRQ, a Sweden-based
    company
   “Highly secure, no-questions-asked
    hosting services”
Hosting
   Swedish constitution, which gives the
    information providers total legal protection.

   It is forbidden according to Swedish law for
    any administrative authority to make inquiries
    about the sources of any type of newspaper.

   These laws, and the hosting by PRQ, make it
    difficult to take WikiLeaks offline.
Hosting
17 August 2010
   Swedish Pirate Party will be hosting and managing
    many of WikiLeaks' new servers.
   The party donates servers and bandwidth to WikiLeaks
    without charge.
   Technicians of the party will make sure that the servers
    are maintained and working.
   Some servers are hosted in an underground nuclear
    bunker in Stockholm.
Bulletproof Hosting
   Own servers at undisclosed locations
   Keeps no logs
   Uses military-grade encryption
   Protect sources and other confidential
    information.
Moving around
   Target of a denial-of-service attack

   Move to Amazon's servers

   Ousted without a public statement

    from the company

   Decided to move to OVH in France
Moving around
   French government, and OVH legality of
    hosting WikiLeaks.

   The court in Lille immediately declined to
    force OVH to shut down the WikiLeaks site

   The court in Paris stated it would need more
    time to examine the highly technical issue
After the US diplomatic cables
leak
   American owned EveryDNS dropped
    WikiLeaks from its entries on 2
    December 2010


   Citing DDoS attacks that “threatened
    the stability of its infrastructure”
After the US diplomatic cables
leak
   The Wau Holland Foundation that had
    been redirecting donations to WikiLeaks.
   PayPal alleged that the account violated
    its “Acceptable Use Policy”, specifically
    that it was used for “activities that
    encourage, promote, facilitate or instruct
    others to engage in illegal activity”
After the US diplomatic cables
leak
   6 December, the Swiss bank, PostFinance
    announced that it had frozen the assets of
    Assange that it holds, totalling 31,000 euros

   On the same day, MasterCard announced that “it
    is taking action to ensure that WikiLeaks can no
    longer accept MasterCard-branded products”,
    adding “MasterCard rules prohibit customers
    from directly or indirectly engaging in or
    facilitating any action that is illegal”

   The next day, Visa Inc. announced it was
    suspending payments to WikiLeaks, pending
    “further investigations”
After the US diplomatic cables
leak
   Hundreds of mirrors of the WikiLeaks site appeared

   Anonymous group of internet activists, called on supporters to
    attack the websites of companies who do not support
    WikiLeaks.

   Operation Payback

   The Associated Free Press reported that attempts to shut
    down the wikileaks.org

   The site surviving via the so-called Streisand effect, whereby
    attempts to censor information online leads to it being
    replicated in many places
After the US diplomatic cables
leak
   XIPWIRE established a way to donate
    to WikiLeaks, and waived their fees
Verification of submissions
   Never released a misattributed
    document
   Documents are assessed before
    release
   Misleading leaks “are already well-
    placed in the mainstream media”
Verification of submissions
   Submitted documents are vetted by a
    group of five reviewers, with expertise
    in different fields
   Assange has the final decision about
    the assessment of a document
Insurance file
   On 29 July 2010 WikiLeaks added a 1.4 GB
    "Insurance File" to the Afghan War Diary
    page.
   The file is AES encrypted
   To serve as insurance in case the WikiLeaks
    website or its spokesman Julian Assange are
    incapacitated
   The passphrase could be published
Insurance file
   “If anything happens to Assange or the website,
    a key will go out to unlock the files. There would
    then be no way to stop the information from
    spreading like wildfire because so many people
    already have copies.”

   “What most folks are speculating is that the
    insurance file contains unreleased information
    that would be especially embarrassing to the US
    government if it were released.”
WikiLeaks has won a number of awards

   2008 Economist magazine New Media
    Award

   June 2009, WikiLeaks and Julian
    Assange won Amnesty International's UK
    Media Award (in the category "New
    Media")

   May 2010, the New York Daily News
    listed WikiLeaks first in a ranking of
    "websites that could totally change the
    news".
Criticism
U.S. Secretary of State Hillary Clinton
   “This disclosure is not just an attack
    on America's foreign policy interests, it
    is an attack on the international
    community”
Criticism
The President of Iran,
Mahmoud Ahmadinejad
   “To show concern with Iran by Arab states
    was a planned leak by the United States to
    discredit his government, though he did not
    indicate whether he believed WikiLeaks was
    in collusion with the United States or was
    simply an unwitting facilitator.”
Criticism
Former Canadian government adviser
Tom Flanagan
   “I think Assange should be
    assassinated.”
Criticism
Russian investigative reporter
Andrei Soldatov
   “WikiLeaks is motivated by anger over
    declining funding and resources for
    investigative reporting.”
Upcoming leaks
   5GB from Bank of America
   Assange commented on the possible
    impact of the release that “it could
    take down a bank or two.”
   Stock price fell by three percent
WikiLeaks had information
            thermo-nuclear device
            which it would release
            if the organisation needs
             to defend itself
References
 The WikiLeaks Debate
By Rob Grace
http://lawandsecurity.foreignpolicyblogs.co
  m

 On the WikiLeaks debate
Benjamin Cunningham
http://blogs.praguepost.com/politics

 WikiLeaks From Wikipedia
http://en.wikipedia.org/wiki/WikiLeaks
Wikileaks

Contenu connexe

Tendances

Resources: Media Literacy and Managing Misinformation
Resources: Media Literacy and Managing MisinformationResources: Media Literacy and Managing Misinformation
Resources: Media Literacy and Managing MisinformationDamian Radcliffe
 
Surveillance technologies a primer
Surveillance technologies  a primerSurveillance technologies  a primer
Surveillance technologies a primerHector Dominguez
 
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of WhistleblowingETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of WhistleblowingMichael Heron
 
Two step flow
Two step flow Two step flow
Two step flow kerry17
 
English 2201: What's News? Satire, Hoaxes & Fake News
English 2201: What's News? Satire, Hoaxes & Fake NewsEnglish 2201: What's News? Satire, Hoaxes & Fake News
English 2201: What's News? Satire, Hoaxes & Fake NewsTrudy Morgan-Cole
 
NSA Snooping Scandal
NSA Snooping ScandalNSA Snooping Scandal
NSA Snooping ScandalArun Prasaath
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacyjulia594
 
Media and international communications
Media and international communicationsMedia and international communications
Media and international communicationsCarolina Matos
 
Cambridge analytica facebook
Cambridge analytica facebookCambridge analytica facebook
Cambridge analytica facebookRohan Hirani
 
Facebook and cambridge analytica scandal
Facebook and cambridge analytica scandalFacebook and cambridge analytica scandal
Facebook and cambridge analytica scandalSajibHossain17
 
Investigative jounnalisn ppt 1.2345
Investigative jounnalisn ppt 1.2345Investigative jounnalisn ppt 1.2345
Investigative jounnalisn ppt 1.2345AfeefuRehman
 
Fake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sitesFake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sitesPetter Bae Brandtzæg
 

Tendances (20)

Resources: Media Literacy and Managing Misinformation
Resources: Media Literacy and Managing MisinformationResources: Media Literacy and Managing Misinformation
Resources: Media Literacy and Managing Misinformation
 
Investigative Journalism
Investigative JournalismInvestigative Journalism
Investigative Journalism
 
Surveillance technologies a primer
Surveillance technologies  a primerSurveillance technologies  a primer
Surveillance technologies a primer
 
Fake news
Fake newsFake news
Fake news
 
Reuters ppt
Reuters pptReuters ppt
Reuters ppt
 
Cambridge analytica
Cambridge analyticaCambridge analytica
Cambridge analytica
 
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of WhistleblowingETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
 
Two step flow
Two step flow Two step flow
Two step flow
 
Social Media & Politics
Social Media & PoliticsSocial Media & Politics
Social Media & Politics
 
Fact-checking in the newsroom: best practices, open questions
Fact-checking in the newsroom: best practices, open questionsFact-checking in the newsroom: best practices, open questions
Fact-checking in the newsroom: best practices, open questions
 
English 2201: What's News? Satire, Hoaxes & Fake News
English 2201: What's News? Satire, Hoaxes & Fake NewsEnglish 2201: What's News? Satire, Hoaxes & Fake News
English 2201: What's News? Satire, Hoaxes & Fake News
 
NSA Snooping Scandal
NSA Snooping ScandalNSA Snooping Scandal
NSA Snooping Scandal
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Media and international communications
Media and international communicationsMedia and international communications
Media and international communications
 
Cambridge analytica facebook
Cambridge analytica facebookCambridge analytica facebook
Cambridge analytica facebook
 
Defamation
DefamationDefamation
Defamation
 
Media Censorship
Media CensorshipMedia Censorship
Media Censorship
 
Facebook and cambridge analytica scandal
Facebook and cambridge analytica scandalFacebook and cambridge analytica scandal
Facebook and cambridge analytica scandal
 
Investigative jounnalisn ppt 1.2345
Investigative jounnalisn ppt 1.2345Investigative jounnalisn ppt 1.2345
Investigative jounnalisn ppt 1.2345
 
Fake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sitesFake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sites
 

En vedette

What's the point about wikileaks?
What's the point about wikileaks?What's the point about wikileaks?
What's the point about wikileaks?Joris Berthelot
 
Disclosure of wikileaks
Disclosure of wikileaksDisclosure of wikileaks
Disclosure of wikileaksSachin sharma
 
Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaksMichael Zimmer
 
ၿမန္မာ့သမိုင္း ႏွင့္ ႏိုင္ငံေရး
ၿမန္မာ့သမိုင္း ႏွင့္ ႏိုင္ငံေရးၿမန္မာ့သမိုင္း ႏွင့္ ႏိုင္ငံေရး
ၿမန္မာ့သမိုင္း ႏွင့္ ႏိုင္ငံေရးThet Aung Min Latt
 
Accessing reliable information in Myanmar
Accessing reliable information in MyanmarAccessing reliable information in Myanmar
Accessing reliable information in MyanmarThet Aung Min Latt
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet SecurityAna Meskovska
 
Power point wikileaks
Power point wikileaksPower point wikileaks
Power point wikileaksdanna16
 
The Law of Whistleblowing
The Law of WhistleblowingThe Law of Whistleblowing
The Law of WhistleblowingKathleen Clark
 
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...Kathleen Clark
 
Wikileaks: the hacker's game
Wikileaks: the hacker's gameWikileaks: the hacker's game
Wikileaks: the hacker's gamemjneutel
 
WikiLeaks Presentation
WikiLeaks PresentationWikiLeaks Presentation
WikiLeaks PresentationEmily Blegvad
 

En vedette (20)

What's the point about wikileaks?
What's the point about wikileaks?What's the point about wikileaks?
What's the point about wikileaks?
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
Disclosure of wikileaks
Disclosure of wikileaksDisclosure of wikileaks
Disclosure of wikileaks
 
Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaks
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
ၿမန္မာ့သမိုင္း ႏွင့္ ႏိုင္ငံေရး
ၿမန္မာ့သမိုင္း ႏွင့္ ႏိုင္ငံေရးၿမန္မာ့သမိုင္း ႏွင့္ ႏိုင္ငံေရး
ၿမန္မာ့သမိုင္း ႏွင့္ ႏိုင္ငံေရး
 
Web security
Web securityWeb security
Web security
 
Accessing reliable information in Myanmar
Accessing reliable information in MyanmarAccessing reliable information in Myanmar
Accessing reliable information in Myanmar
 
What wikileaks has taught us about the web- Euan Semple
What wikileaks has taught us about the web- Euan SempleWhat wikileaks has taught us about the web- Euan Semple
What wikileaks has taught us about the web- Euan Semple
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
Myanmar 2015 and beyond 
Myanmar 2015 and beyond Myanmar 2015 and beyond 
Myanmar 2015 and beyond 
 
Power point wikileaks
Power point wikileaksPower point wikileaks
Power point wikileaks
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
The Law of Whistleblowing
The Law of WhistleblowingThe Law of Whistleblowing
The Law of Whistleblowing
 
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
American Law Institute's Principles of Government Ethics - COGEL New Orleans ...
 
WikiLeaks and Information Policy
WikiLeaks and Information PolicyWikiLeaks and Information Policy
WikiLeaks and Information Policy
 
Wikileaks: the hacker's game
Wikileaks: the hacker's gameWikileaks: the hacker's game
Wikileaks: the hacker's game
 
WikiLeaks Presentation
WikiLeaks PresentationWikiLeaks Presentation
WikiLeaks Presentation
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 

Similaire à Wikileaks

ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
 ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docxarnit1
 
Wikileaks script
Wikileaks scriptWikileaks script
Wikileaks script043cyeung
 
The undeclared war against wikileaks
The undeclared war against wikileaksThe undeclared war against wikileaks
The undeclared war against wikileaksgorin2008
 
WikiLeaks is a nonprofit organization which uses its website to publ.docx
WikiLeaks is a nonprofit organization which uses its website to publ.docxWikiLeaks is a nonprofit organization which uses its website to publ.docx
WikiLeaks is a nonprofit organization which uses its website to publ.docxgauthierleppington
 
wikileaks.docx
wikileaks.docxwikileaks.docx
wikileaks.docxwrite5
 
WikiLeaks is an international non-profit organization that publishes.docx
WikiLeaks is an international non-profit organization that publishes.docxWikiLeaks is an international non-profit organization that publishes.docx
WikiLeaks is an international non-profit organization that publishes.docxgauthierleppington
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...Pw Carey
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...Pw Carey
 
Wikileaks brochure
Wikileaks brochureWikileaks brochure
Wikileaks brochure043cyeung
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaignraghuarr
 
Inside the Wikileaks Headquarters
 Inside the Wikileaks Headquarters Inside the Wikileaks Headquarters
Inside the Wikileaks HeadquartersNubia **
 
DARK OVERLORD 9-11 TERRORIST BLACKMAILERS
DARK OVERLORD 9-11 TERRORIST BLACKMAILERSDARK OVERLORD 9-11 TERRORIST BLACKMAILERS
DARK OVERLORD 9-11 TERRORIST BLACKMAILERSVogelDenise
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaignraghuarr
 
9694 thinking skills wikileaks
9694 thinking skills wikileaks9694 thinking skills wikileaks
9694 thinking skills wikileaksmayorgam
 
G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...
G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...
G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...Pw Carey
 

Similaire à Wikileaks (20)

ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
 ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
 
Zimmer wikileaks
Zimmer wikileaksZimmer wikileaks
Zimmer wikileaks
 
Wiki leaks
Wiki leaksWiki leaks
Wiki leaks
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
Social Hacking
Social HackingSocial Hacking
Social Hacking
 
Wikileaks script
Wikileaks scriptWikileaks script
Wikileaks script
 
The undeclared war against wikileaks
The undeclared war against wikileaksThe undeclared war against wikileaks
The undeclared war against wikileaks
 
WikiLeaks is a nonprofit organization which uses its website to publ.docx
WikiLeaks is a nonprofit organization which uses its website to publ.docxWikiLeaks is a nonprofit organization which uses its website to publ.docx
WikiLeaks is a nonprofit organization which uses its website to publ.docx
 
wikileaks.docx
wikileaks.docxwikileaks.docx
wikileaks.docx
 
5 minutes translation (4)
5 minutes translation  (4)5 minutes translation  (4)
5 minutes translation (4)
 
WikiLeaks is an international non-profit organization that publishes.docx
WikiLeaks is an international non-profit organization that publishes.docxWikiLeaks is an international non-profit organization that publishes.docx
WikiLeaks is an international non-profit organization that publishes.docx
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
 
Wikileaks brochure
Wikileaks brochureWikileaks brochure
Wikileaks brochure
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
 
Inside the Wikileaks Headquarters
 Inside the Wikileaks Headquarters Inside the Wikileaks Headquarters
Inside the Wikileaks Headquarters
 
DARK OVERLORD 9-11 TERRORIST BLACKMAILERS
DARK OVERLORD 9-11 TERRORIST BLACKMAILERSDARK OVERLORD 9-11 TERRORIST BLACKMAILERS
DARK OVERLORD 9-11 TERRORIST BLACKMAILERS
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
 
9694 thinking skills wikileaks
9694 thinking skills wikileaks9694 thinking skills wikileaks
9694 thinking skills wikileaks
 
G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...
G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...
G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...
 

Plus de Thet Aung Min Latt

Myanmar 2015 political landscape
Myanmar 2015 political landscapeMyanmar 2015 political landscape
Myanmar 2015 political landscapeThet Aung Min Latt
 
Analyzing and Managing Political and Business Risks in Myanmar
Analyzing and Managing Political and Business Risks in MyanmarAnalyzing and Managing Political and Business Risks in Myanmar
Analyzing and Managing Political and Business Risks in MyanmarThet Aung Min Latt
 
SQL Server Replication Transactional Replication from MSSQL 200x to MYSQL 5.x
SQL Server Replication Transactional Replication  from MSSQL 200x to MYSQL 5.xSQL Server Replication Transactional Replication  from MSSQL 200x to MYSQL 5.x
SQL Server Replication Transactional Replication from MSSQL 200x to MYSQL 5.xThet Aung Min Latt
 
Version controls for php project with visual svn server and tortoisesvn client
Version controls for php project with visual svn server and tortoisesvn clientVersion controls for php project with visual svn server and tortoisesvn client
Version controls for php project with visual svn server and tortoisesvn clientThet Aung Min Latt
 
Mobile government for Barcamp Yangon 2012
Mobile government for Barcamp Yangon 2012Mobile government for Barcamp Yangon 2012
Mobile government for Barcamp Yangon 2012Thet Aung Min Latt
 
The role of new media in social change of myanmar
The role of new media in social change of myanmarThe role of new media in social change of myanmar
The role of new media in social change of myanmarThet Aung Min Latt
 
Social Media and a New Model of Civic Engagement
Social Media and a New Model of Civic EngagementSocial Media and a New Model of Civic Engagement
Social Media and a New Model of Civic EngagementThet Aung Min Latt
 
Social media strategy for Education sector
Social media strategy for Education sectorSocial media strategy for Education sector
Social media strategy for Education sectorThet Aung Min Latt
 

Plus de Thet Aung Min Latt (15)

Leaflet varcamp 2022
Leaflet varcamp 2022Leaflet varcamp 2022
Leaflet varcamp 2022
 
Myanmar 2015 political landscape
Myanmar 2015 political landscapeMyanmar 2015 political landscape
Myanmar 2015 political landscape
 
Analysing and Managing
Analysing and Managing Analysing and Managing
Analysing and Managing
 
Analyzing and Managing Political and Business Risks in Myanmar
Analyzing and Managing Political and Business Risks in MyanmarAnalyzing and Managing Political and Business Risks in Myanmar
Analyzing and Managing Political and Business Risks in Myanmar
 
SQL Server Replication Transactional Replication from MSSQL 200x to MYSQL 5.x
SQL Server Replication Transactional Replication  from MSSQL 200x to MYSQL 5.xSQL Server Replication Transactional Replication  from MSSQL 200x to MYSQL 5.x
SQL Server Replication Transactional Replication from MSSQL 200x to MYSQL 5.x
 
How to market yourself
How to market yourselfHow to market yourself
How to market yourself
 
Version controls for php project with visual svn server and tortoisesvn client
Version controls for php project with visual svn server and tortoisesvn clientVersion controls for php project with visual svn server and tortoisesvn client
Version controls for php project with visual svn server and tortoisesvn client
 
IT job interview
IT job interviewIT job interview
IT job interview
 
The social media developer
The social media developer The social media developer
The social media developer
 
Mobile government for Barcamp Yangon 2012
Mobile government for Barcamp Yangon 2012Mobile government for Barcamp Yangon 2012
Mobile government for Barcamp Yangon 2012
 
Myanmar e-democracy
Myanmar e-democracyMyanmar e-democracy
Myanmar e-democracy
 
The role of new media in social change of myanmar
The role of new media in social change of myanmarThe role of new media in social change of myanmar
The role of new media in social change of myanmar
 
Social Media and a New Model of Civic Engagement
Social Media and a New Model of Civic EngagementSocial Media and a New Model of Civic Engagement
Social Media and a New Model of Civic Engagement
 
New media and development
New media and developmentNew media and development
New media and development
 
Social media strategy for Education sector
Social media strategy for Education sectorSocial media strategy for Education sector
Social media strategy for Education sector
 

Dernier

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Wikileaks

  • 2. What is WiKiLeaks WikiLeaks is an international new media non-profit organization that publishes submissions of otherwise unavailable documents from anonymous news sources and leaks.
  • 3. Who run this?  The Guardian newspaper describes Julian Assange as “an Australian Internet activist, as its director.”
  • 4. Goal  To ensure that whistleblowers and journalists are not jailed for emailing sensitive or classified documents
  • 5. History  First appeared on the Internet in December 2006  January 2007, the website stated that it had over 1.2 million leaked documents
  • 6. Administration  Revenue stream is donations  Planning to add an auction model to sell early access to documents.  Receives no money for personnel costs  Only for hardware, travelling and bandwidth
  • 7. Leaks First document in December 2006  Apparent Somali assassination order  A decision to assassinate government officials signed by Sheikh Hassan Dahir Aweys
  • 8. Leaks April 2010  Video from a 2007 incident in which Iraqi civilians and journalists were killed by U.S. forces, on a website called Collateral Murder.
  • 9. Leaks July 2010  Afghan War Diary, a compilation of more than 76,900 documents about the War in Afghanistan not previously available for public review.
  • 10. Leaks October 2010  A package of almost 400,000 documents called the Iraq War Logs in coordination with major commercial media organisations.
  • 11. Leaks November 2010,  Releasing U.S. State department diplomatic cables.
  • 12. Technology used by WiKiLeaks  MediaWiKi  Freenet  Tor  PGP
  • 13. Technical changes  First user-editable wiki site  Traditional publication model  No longer accepts either user comments or edits.  Multiple servers and different domain names  Number of denial-of-service attacks  Disconnection from different Domain Name System (DNS) providers.
  • 14. DDOS
  • 15. Hosting  An uncensorable system for untraceable mass document leaking  Hosted by PRQ, a Sweden-based company  “Highly secure, no-questions-asked hosting services”
  • 16. Hosting  Swedish constitution, which gives the information providers total legal protection.  It is forbidden according to Swedish law for any administrative authority to make inquiries about the sources of any type of newspaper.  These laws, and the hosting by PRQ, make it difficult to take WikiLeaks offline.
  • 17. Hosting 17 August 2010  Swedish Pirate Party will be hosting and managing many of WikiLeaks' new servers.  The party donates servers and bandwidth to WikiLeaks without charge.  Technicians of the party will make sure that the servers are maintained and working.  Some servers are hosted in an underground nuclear bunker in Stockholm.
  • 18. Bulletproof Hosting  Own servers at undisclosed locations  Keeps no logs  Uses military-grade encryption  Protect sources and other confidential information.
  • 19. Moving around  Target of a denial-of-service attack  Move to Amazon's servers  Ousted without a public statement from the company  Decided to move to OVH in France
  • 20. Moving around  French government, and OVH legality of hosting WikiLeaks.  The court in Lille immediately declined to force OVH to shut down the WikiLeaks site  The court in Paris stated it would need more time to examine the highly technical issue
  • 21. After the US diplomatic cables leak  American owned EveryDNS dropped WikiLeaks from its entries on 2 December 2010  Citing DDoS attacks that “threatened the stability of its infrastructure”
  • 22. After the US diplomatic cables leak  The Wau Holland Foundation that had been redirecting donations to WikiLeaks.  PayPal alleged that the account violated its “Acceptable Use Policy”, specifically that it was used for “activities that encourage, promote, facilitate or instruct others to engage in illegal activity”
  • 23. After the US diplomatic cables leak  6 December, the Swiss bank, PostFinance announced that it had frozen the assets of Assange that it holds, totalling 31,000 euros  On the same day, MasterCard announced that “it is taking action to ensure that WikiLeaks can no longer accept MasterCard-branded products”, adding “MasterCard rules prohibit customers from directly or indirectly engaging in or facilitating any action that is illegal”  The next day, Visa Inc. announced it was suspending payments to WikiLeaks, pending “further investigations”
  • 24. After the US diplomatic cables leak  Hundreds of mirrors of the WikiLeaks site appeared  Anonymous group of internet activists, called on supporters to attack the websites of companies who do not support WikiLeaks.  Operation Payback  The Associated Free Press reported that attempts to shut down the wikileaks.org  The site surviving via the so-called Streisand effect, whereby attempts to censor information online leads to it being replicated in many places
  • 25. After the US diplomatic cables leak  XIPWIRE established a way to donate to WikiLeaks, and waived their fees
  • 26. Verification of submissions  Never released a misattributed document  Documents are assessed before release  Misleading leaks “are already well- placed in the mainstream media”
  • 27. Verification of submissions  Submitted documents are vetted by a group of five reviewers, with expertise in different fields  Assange has the final decision about the assessment of a document
  • 28. Insurance file  On 29 July 2010 WikiLeaks added a 1.4 GB "Insurance File" to the Afghan War Diary page.  The file is AES encrypted  To serve as insurance in case the WikiLeaks website or its spokesman Julian Assange are incapacitated  The passphrase could be published
  • 29. Insurance file  “If anything happens to Assange or the website, a key will go out to unlock the files. There would then be no way to stop the information from spreading like wildfire because so many people already have copies.”  “What most folks are speculating is that the insurance file contains unreleased information that would be especially embarrassing to the US government if it were released.”
  • 30. WikiLeaks has won a number of awards  2008 Economist magazine New Media Award  June 2009, WikiLeaks and Julian Assange won Amnesty International's UK Media Award (in the category "New Media")  May 2010, the New York Daily News listed WikiLeaks first in a ranking of "websites that could totally change the news".
  • 31. Criticism U.S. Secretary of State Hillary Clinton  “This disclosure is not just an attack on America's foreign policy interests, it is an attack on the international community”
  • 32. Criticism The President of Iran, Mahmoud Ahmadinejad  “To show concern with Iran by Arab states was a planned leak by the United States to discredit his government, though he did not indicate whether he believed WikiLeaks was in collusion with the United States or was simply an unwitting facilitator.”
  • 33. Criticism Former Canadian government adviser Tom Flanagan  “I think Assange should be assassinated.”
  • 34. Criticism Russian investigative reporter Andrei Soldatov  “WikiLeaks is motivated by anger over declining funding and resources for investigative reporting.”
  • 35. Upcoming leaks  5GB from Bank of America  Assange commented on the possible impact of the release that “it could take down a bank or two.”  Stock price fell by three percent
  • 36. WikiLeaks had information  thermo-nuclear device  which it would release  if the organisation needs to defend itself
  • 37. References  The WikiLeaks Debate By Rob Grace http://lawandsecurity.foreignpolicyblogs.co m  On the WikiLeaks debate Benjamin Cunningham http://blogs.praguepost.com/politics  WikiLeaks From Wikipedia http://en.wikipedia.org/wiki/WikiLeaks