• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Wikileaks
 

Wikileaks

on

  • 675 views

About Wkikileaks and technology that run @ back

About Wkikileaks and technology that run @ back

Statistics

Views

Total Views
675
Views on SlideShare
672
Embed Views
3

Actions

Likes
1
Downloads
46
Comments
0

2 Embeds 3

http://www.linkedin.com 2
https://www.linkedin.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Wikileaks Wikileaks Presentation Transcript

    • ThetAung
    • What is WiKiLeaks WikiLeaks is an international new media non-profit organization that publishes submissions of otherwise unavailable documents from anonymous news sources and leaks.
    • Who run this? The Guardian newspaper describes Julian Assange as “an Australian Internet activist, as its director.”
    • Goal To ensure that whistleblowers and journalists are not jailed for emailing sensitive or classified documents
    • History First appeared on the Internet in December 2006 January 2007, the website stated that it had over 1.2 million leaked documents
    • Administration Revenue stream is donations Planning to add an auction model to sell early access to documents. Receives no money for personnel costs Only for hardware, travelling and bandwidth
    • LeaksFirst document in December 2006 Apparent Somali assassination order A decision to assassinate government officials signed by Sheikh Hassan Dahir Aweys
    • LeaksApril 2010 Video from a 2007 incident in which Iraqi civilians and journalists were killed by U.S. forces, on a website called Collateral Murder.
    • LeaksJuly 2010 Afghan War Diary, a compilation of more than 76,900 documents about the War in Afghanistan not previously available for public review.
    • LeaksOctober 2010 A package of almost 400,000 documents called the Iraq War Logs in coordination with major commercial media organisations.
    • LeaksNovember 2010, Releasing U.S. State department diplomatic cables.
    • Technology used byWiKiLeaks MediaWiKi Freenet Tor PGP
    • Technical changes First user-editable wiki site Traditional publication model No longer accepts either user comments or edits. Multiple servers and different domain names Number of denial-of-service attacks Disconnection from different Domain Name System (DNS) providers.
    • DDOS
    • Hosting An uncensorable system for untraceable mass document leaking Hosted by PRQ, a Sweden-based company “Highly secure, no-questions-asked hosting services”
    • Hosting Swedish constitution, which gives the information providers total legal protection. It is forbidden according to Swedish law for any administrative authority to make inquiries about the sources of any type of newspaper. These laws, and the hosting by PRQ, make it difficult to take WikiLeaks offline.
    • Hosting17 August 2010 Swedish Pirate Party will be hosting and managing many of WikiLeaks new servers. The party donates servers and bandwidth to WikiLeaks without charge. Technicians of the party will make sure that the servers are maintained and working. Some servers are hosted in an underground nuclear bunker in Stockholm.
    • Bulletproof Hosting Own servers at undisclosed locations Keeps no logs Uses military-grade encryption Protect sources and other confidential information.
    • Moving around Target of a denial-of-service attack Move to Amazons servers Ousted without a public statement from the company Decided to move to OVH in France
    • Moving around French government, and OVH legality of hosting WikiLeaks. The court in Lille immediately declined to force OVH to shut down the WikiLeaks site The court in Paris stated it would need more time to examine the highly technical issue
    • After the US diplomatic cablesleak American owned EveryDNS dropped WikiLeaks from its entries on 2 December 2010 Citing DDoS attacks that “threatened the stability of its infrastructure”
    • After the US diplomatic cablesleak The Wau Holland Foundation that had been redirecting donations to WikiLeaks. PayPal alleged that the account violated its “Acceptable Use Policy”, specifically that it was used for “activities that encourage, promote, facilitate or instruct others to engage in illegal activity”
    • After the US diplomatic cablesleak 6 December, the Swiss bank, PostFinance announced that it had frozen the assets of Assange that it holds, totalling 31,000 euros On the same day, MasterCard announced that “it is taking action to ensure that WikiLeaks can no longer accept MasterCard-branded products”, adding “MasterCard rules prohibit customers from directly or indirectly engaging in or facilitating any action that is illegal” The next day, Visa Inc. announced it was suspending payments to WikiLeaks, pending “further investigations”
    • After the US diplomatic cablesleak Hundreds of mirrors of the WikiLeaks site appeared Anonymous group of internet activists, called on supporters to attack the websites of companies who do not support WikiLeaks. Operation Payback The Associated Free Press reported that attempts to shut down the wikileaks.org The site surviving via the so-called Streisand effect, whereby attempts to censor information online leads to it being replicated in many places
    • After the US diplomatic cablesleak XIPWIRE established a way to donate to WikiLeaks, and waived their fees
    • Verification of submissions Never released a misattributed document Documents are assessed before release Misleading leaks “are already well- placed in the mainstream media”
    • Verification of submissions Submitted documents are vetted by a group of five reviewers, with expertise in different fields Assange has the final decision about the assessment of a document
    • Insurance file On 29 July 2010 WikiLeaks added a 1.4 GB "Insurance File" to the Afghan War Diary page. The file is AES encrypted To serve as insurance in case the WikiLeaks website or its spokesman Julian Assange are incapacitated The passphrase could be published
    • Insurance file “If anything happens to Assange or the website, a key will go out to unlock the files. There would then be no way to stop the information from spreading like wildfire because so many people already have copies.” “What most folks are speculating is that the insurance file contains unreleased information that would be especially embarrassing to the US government if it were released.”
    • WikiLeaks has won a number of awards 2008 Economist magazine New Media Award June 2009, WikiLeaks and Julian Assange won Amnesty Internationals UK Media Award (in the category "New Media") May 2010, the New York Daily News listed WikiLeaks first in a ranking of "websites that could totally change the news".
    • CriticismU.S. Secretary of State Hillary Clinton “This disclosure is not just an attack on Americas foreign policy interests, it is an attack on the international community”
    • CriticismThe President of Iran,Mahmoud Ahmadinejad “To show concern with Iran by Arab states was a planned leak by the United States to discredit his government, though he did not indicate whether he believed WikiLeaks was in collusion with the United States or was simply an unwitting facilitator.”
    • CriticismFormer Canadian government adviserTom Flanagan “I think Assange should be assassinated.”
    • CriticismRussian investigative reporterAndrei Soldatov “WikiLeaks is motivated by anger over declining funding and resources for investigative reporting.”
    • Upcoming leaks 5GB from Bank of America Assange commented on the possible impact of the release that “it could take down a bank or two.” Stock price fell by three percent
    • WikiLeaks had information  thermo-nuclear device  which it would release  if the organisation needs to defend itself
    • References The WikiLeaks DebateBy Rob Gracehttp://lawandsecurity.foreignpolicyblogs.co m On the WikiLeaks debateBenjamin Cunninghamhttp://blogs.praguepost.com/politics WikiLeaks From Wikipediahttp://en.wikipedia.org/wiki/WikiLeaks