比特派官网app下载地址|wikileaks

作者: 比特派官网app下载地址
2024-03-07 21:59:40

WikiLeaks | Founding, History, Chelsea Manning, & Controversies | Britannica

WikiLeaks | Founding, History, Chelsea Manning, & Controversies | Britannica

Search Britannica

Click here to search

Search Britannica

Click here to search

Login

Subscribe

Subscribe

Home

Games & Quizzes

History & Society

Science & Tech

Biographies

Animals & Nature

Geography & Travel

Arts & Culture

Money

Videos

On This Day

One Good Fact

Dictionary

New Articles

History & Society

Lifestyles & Social Issues

Philosophy & Religion

Politics, Law & Government

World History

Science & Tech

Health & Medicine

Science

Technology

Biographies

Browse Biographies

Animals & Nature

Birds, Reptiles & Other Vertebrates

Bugs, Mollusks & Other Invertebrates

Environment

Fossils & Geologic Time

Mammals

Plants

Geography & Travel

Geography & Travel

Arts & Culture

Entertainment & Pop Culture

Literature

Sports & Recreation

Visual Arts

Companions

Demystified

Image Galleries

Infographics

Lists

Podcasts

Spotlights

Summaries

The Forum

Top Questions

#WTFact

100 Women

Britannica Kids

Saving Earth

Space Next 50

Student Center

Home

Games & Quizzes

History & Society

Science & Tech

Biographies

Animals & Nature

Geography & Travel

Arts & Culture

Money

Videos

WikiLeaks

Table of Contents

WikiLeaks

Table of Contents

Introduction & Top QuestionsFrom the founding of WikiLeaks to ClimategateWikiLeaks and Chelsea ManningEdward Snowden and the Sony Pictures hackWikiLeaks and its links to Russian intelligence

References & Edit History

Quick Facts & Related Topics

Images

Related Questions

What was the first publication on WikiLeaks?

Who controls the Internet?

Is the Internet “making us stupid”?

Is cancel culture (or “callout culture”) good for society?

Read Next

Who Invented the Internet?

Timeline of the 2000s

Inventions that Helped Shape How We Interact with Knowledge and Information

What’s the Difference Between the Deep Web and the Dark Web?

How Does Wi-Fi Work?

Discover

7 Surprising Uses for Mummies

9 Things You Might Not Know About Adolf Hitler

12 Greek Gods and Goddesses

The Seven Sacraments of the Roman Catholic church

9 of the World’s Deadliest Snakes

Did Marie-Antoinette Really Say “Let Them Eat Cake”?

What Is the “Ides” of March?

Home

Technology

The Web & Communication

Science & Tech

WikiLeaks

media organization and Web site

Actions

Cite

verifiedCite

While every effort has been made to follow citation style rules, there may be some discrepancies.

Please refer to the appropriate style manual or other sources if you have any questions.

Select Citation Style

MLA

APA

Chicago Manual of Style

Copy Citation

Share

Share

Share to social media

Facebook

Twitter

URL

https://www.britannica.com/topic/WikiLeaks

Give Feedback

External Websites

Feedback

Corrections? Updates? Omissions? Let us know if you have suggestions to improve this article (requires login).

Feedback Type

Select a type (Required)

Factual Correction

Spelling/Grammar Correction

Link Correction

Additional Information

Other

Your Feedback

Submit Feedback

Thank you for your feedback

Our editors will review what you’ve submitted and determine whether to revise the article.

External Websites

Official Site of WikiLeaks

Ohio State University - Origins - WikiLeaks, and the Past and Present of American Foreign Relations

Ohio State University - Origins - WikiLeaks, and the Past and Present of American Foreign Relations

Print

print

Print

Please select which sections you would like to print:

Table Of Contents

Cite

verifiedCite

While every effort has been made to follow citation style rules, there may be some discrepancies.

Please refer to the appropriate style manual or other sources if you have any questions.

Select Citation Style

MLA

APA

Chicago Manual of Style

Copy Citation

Share

Share

Share to social media

Facebook

Twitter

URL

https://www.britannica.com/topic/WikiLeaks

Feedback

External Websites

Feedback

Corrections? Updates? Omissions? Let us know if you have suggestions to improve this article (requires login).

Feedback Type

Select a type (Required)

Factual Correction

Spelling/Grammar Correction

Link Correction

Additional Information

Other

Your Feedback

Submit Feedback

Thank you for your feedback

Our editors will review what you’ve submitted and determine whether to revise the article.

External Websites

Official Site of WikiLeaks

Ohio State University - Origins - WikiLeaks, and the Past and Present of American Foreign Relations

Ohio State University - Origins - WikiLeaks, and the Past and Present of American Foreign Relations

Written by

Michael Ray

Michael Ray oversees coverage of European history and military affairs for Britannica. He earned a B.A. in history from Michigan State University in 1995. He was a teacher in the Chicago suburbs and Seoul,...

Michael Ray

Fact-checked by

The Editors of Encyclopaedia Britannica

Encyclopaedia Britannica's editors oversee subject areas in which they have extensive knowledge, whether from years of experience gained by working on that content or via study for an advanced degree. They write new content and verify and edit content received from contributors.

The Editors of Encyclopaedia Britannica

Last Updated:

Mar 5, 2024

Article History

Table of Contents

Julian Assange

See all media

Category:

Science & Tech

Date:

2006 - present

(Show more)

Areas Of Involvement:

whistleblower

wiki

(Show more)

Related People:

Julian Assange

Chelsea Manning

(Show more)

See all related content →

Recent News

Mar. 4, 2024, 4:39 AM ET (Deutsche Welle)

Germany's Scholz speaks out against Assange extradition

Feb. 26, 2024, 12:31 PM ET (ABC News (U.S.))

WikiLeaks’ Assange faces wait to find out whether he can challenge extradition to the US

Feb. 26, 2024, 4:02 AM ET (ABC News (U.S.))

WikiLeaks founder Assange faces his last legal roll of the dice in Britain to avoid US extradition

Feb. 21, 2024, 7:37 PM ET (AP)

WikiLeaks’ Assange faces wait to find out whether he can challenge extradition to the US

Feb. 20, 2024, 3:59 PM ET (AP)

WikiLeaks founder Assange faces his last legal roll of the dice in Britain to avoid US extradition

Show More

Show Less

Top Questions

What is WikiLeaks?WikiLeaks is a media organization and website that functions as a clearinghouse for classified or otherwise privileged information.Who founded WikiLeaks?WikiLeaks was founded by Australian computer programmer and activist Julian Assange in 2006. Assange was inspired to create WikiLeaks by Daniel Ellsberg’s 1971 release of the Pentagon Papers.What was the first publication on WikiLeaks?The first document posted to the WikiLeaks website, in December 2006, was a message from a Somali rebel leader encouraging the use of hired gunmen to assassinate government officials. The document’s authenticity was never verified, but the story of WikiLeaks and questions regarding the ethics of its methods soon overshadowed it.WikiLeaks, media organization and website that functioned as a clearinghouse for classified or otherwise privileged information. WikiLeaks was founded in 2006 by Australian computer programmer and activist Julian Assange. From the founding of WikiLeaks to Climategate Assange, a noted computer hacker, pleaded guilty to a host of cybercrime charges in 1991, but, because of his youth, he received only minimal punishment. He was inspired to create WikiLeaks by Daniel Ellsberg’s 1971 release of the Pentagon Papers. Observing that two years had elapsed between Ellsberg’s obtaining the Pentagon Papers and their publication in The New York Times, Assange sought to streamline the whistleblowing process. In 2006 he created the basic design for the site on a computer in Australia, but wikileaks.org soon moved to servers in Sweden (later adding redundant systems in other countries) because of that country’s robust press-protection laws. Although WikiLeaks relied on volunteer labour for much of its daily operation, it deviated from the traditional “wiki” formula in that its content was not editable by end users. WikiLeaks received its first batch of sensitive documents not from a whistleblower but from The Onion Router (Tor), an encryption network designed to allow users to transmit data anonymously. A WikiLeaks volunteer mined the data emerging from Tor, eventually collecting more than a million documents and providing the site with its first scoop—a message from a Somali rebel leader encouraging the use of hired gunmen to assassinate government officials. It was posted to the site in December 2006. The document’s authenticity was never verified, but the story of WikiLeaks and questions regarding the ethics of its methods soon overshadowed it. In November 2007 the site posted the standard operating procedures for the U.S. military’s detention facility at Guantánamo Bay, Cuba. The following year the wikileaks.org site was briefly shut down as a result of legal action in the United States, but mirrors of the site, registered in Belgium (wikileaks.be), Germany (wikileaks.de), and the Christmas Islands (wikileaks.cx), were unaffected. It was not the site’s only legal challenge. After WikiLeaks published internal material from the Scientology movement in 2008, that group threatened suit on the grounds of copyright infringement. WikiLeaks responded by releasing thousands of Scientology documents. In 2009 the site made news when it released a cache of internal e-mails from East Anglia University’s Climatic Research Unit. Global warming skeptics seized on “Climategate” as proof of a conspiracy to silence debate on the subject or conceal data. A subsequent series of investigations found shortcomings in the peer review process but cleared the scientists of intentional wrongdoing.

Get a Britannica Premium subscription and gain access to exclusive content.

Subscribe Now

WikiLeaks and Chelsea Manning In 2010 WikiLeaks posted a flurry of documents—almost half a million in total—relating to the U.S. wars in Iraq and Afghanistan. While much of the information was already in the public domain, the administration of U.S. Pres. Barack Obama criticized the leaks as a threat to U.S. national security. The site also made public an edited video, filmed in 2007 from the gun camera of a U.S. attack helicopter, that depicted the killing of a dozen people, including two Reuters employees. In November 2010 WikiLeaks released selections from a trove of some 250,000 classified diplomatic cables between the U.S. State Department and its embassies and consulates around the world. Those documents dated mostly from 2007 to 2010 but included some dating back as far as 1966. Among the wide-ranging topics covered in those secret documents were behind-the-scenes U.S. efforts to politically and economically isolate Iran, primarily in response to fears of Iran’s development of nuclear weapons. Chelsea ManningChelsea Manning, undated photo provided by the U.S. Army.(more)In the wake of those leaks, lawmakers in the United States pushed for the prosecution of Assange and any journalists or government insiders who had collaborated with WikiLeaks. The first formal charges were filed in May 2010, when Chelsea Manning, a low-level U.S. Army intelligence analyst, was arrested in connection with the release of the 2007 helicopter video. Investigators later accused Manning of the diplomatic cable leak as well. After a lengthy pretrial detention, Manning pleaded guilty to 10 charges. Military prosecutors pursued additional charges, and in July 2013 Manning was found guilty of numerous counts of espionage and theft. Although Manning was acquitted of aiding the enemy, the most serious of the charges, in August 2013 Manning was sentenced to 35 years in prison. In December 2010 wikileaks.org faced a flurry of setbacks. It was forced off-line once again when the site’s domain name provider terminated its account in the wake of a series of distributed denial-of-service attacks; as with previous service interruptions, WikiLeaks remained available on mirror sites or by directly linking to its IP address. Days later Assange was arrested by British police on an outstanding Swedish warrant for alleged sex crimes. That same week the organization’s fundraising efforts took an enormous hit when PayPal, Visa, and Mastercard suspended online payment processing for donations to WikiLeaks, a move that Assange characterized as a “financial blockade.” WikiLeaks began publishing another round of secret files from the Guantánamo Bay facility in April 2011. The documents contained detailed information about the majority of prisoners detained at Guantánamo from 2002 to 2008, including photographs, health records, and assessments of the potential threat posed by each prisoner. The files also indicated that dozens of detainees had passed through radicalized British mosques prior to their departure for Afghanistan and, ultimately, their capture by U.S. forces. In August 2011 the German newspapers Der Freitag and Der Spiegel uncovered a massive cache of unedited WikiLeaks documents in a password-protected file that was circulating on the Internet. The password was easily discovered, and the raw documents—the entirety of the U.S. diplomatic cable collection—could be viewed online. WikiLeaks responded to this revelation by posting more than 130,000 unedited cables onto its website. This was a radical departure from the organization’s previous methods, which involved redacting the names of sources or informants in the interest of preserving the safety of those individuals. Edward Snowden and the Sony Pictures hack Stating that the “blockade” enacted by financial companies in December 2010 had crippled WikiLeaks operations, in October 2011 Assange announced that the organization would stop publishing and focus its efforts on fundraising. During this time Assange remained under house arrest pending the resolution of his extradition hearing, and he began recording The World Tomorrow (later called The Julian Assange Show), an interview program that debuted on the state-run Russian satellite network RT in April 2012. With his extradition appeal having been denied and the Swedish arrest warrant pending, in June 2012 Assange applied for asylum in Ecuador and sought refuge in that country’s embassy in London. While Assange remained within the embassy, WikiLeaks resumed the publication of documents to its website. Among these were a massive collection of confidential e-mails from Syrian government officials and an overview of U.S. military detention policies. When National Security Agency whistleblower Edward Snowden fled to Hong Kong, WikiLeaks staffers facilitated his travel to Moscow. They remained with Snowden during his monthlong stay in the international transit zone of a Moscow airport and assisted with his application for asylum in Russia. In July 2013 Assange launched the WikiLeaks Party and announced his candidacy for a seat in the Australian Senate. Promoting a platform of “transparency, accountability, and justice,” the party fielded a total of seven candidates in Senate races in the Australian states of Victoria, New South Wales, and Western Australia. An interparty feud reduced the number of candidates to six prior to the September 7, 2013, general election, and, in that event, the WikiLeaks Party won less than 1 percent of the national vote. Although it failed to capture a single seat in the Senate, Assange, then in his second year of confinement within the Ecuadoran embassy, stated that the party would continue. In 2015 the party was deregistered by the Australian Electoral Commission. In November 2014 Sony Pictures Entertainment was the target of a massive data breach, and a group calling itself the Guardians of Peace soon began releasing sensitive company information in small batches. The hack was eventually attributed to North Korea. The following April, WikiLeaks published more than 200,000 of the stolen documents in a searchable database, a move that was immediately criticized by Sony. WikiLeaks and its links to Russian intelligence In March 2016 WikiLeaks unveiled a searchable archive of some 30,000 e-mail messages and attachments retrieved from a private server maintained by Hillary Clinton during her tenure as U.S. secretary of state (2009–13). The collection was made public by the State Department through the Freedom of Information Act. In July 2016, just days before the Democratic Party officially nominated Clinton as its candidate in the 2016 U.S. presidential race, WikiLeaks published more than 60,000 Democratic National Committee (DNC) e-mail messages and documents. The internal communication revealed that top DNC officials had a marked preference for Clinton over her rival for the Democratic nomination, Bernie Sanders, and DNC chair Debbie Wasserman Shultz resigned as a result. A probe by U.S. intelligence services and the Federal Bureau of Investigation later concluded that individuals with ties to the Russian government had hacked the DNC in an attempt to gain information that would bolster support for Republican Party presidential candidate Donald Trump. WikiLeaks had originally followed a policy of redacting personal or sensitive information from documents prior to release, but the DNC hack database contained credit card information as well as Social Security and passport numbers. Assange publicly declared his opposition to Clinton, but he denied any connection with Russia, although he made regular appearances on RT in the months prior to the November 2016 U.S. presidential election.

On October 7, 2016, a damaging video recording surfaced in which Trump boasted that his celebrity allowed him to grope women with impunity. Less than an hour later, WikiLeaks published a trove of e-mail messages from the personal account of Clinton campaign chair John Podesta. Investigators determined that access to Podesta’s Gmail account had been obtained via a spear-phishing attack carried out by Russian hackers. At that point, even people who had supported WikiLeaks began to criticize the organization for its lack of curation of leaked materials, its evolution into a de facto anti-Clinton research operation, and its role in an apparent cyberwar campaign orchestrated by Russian Pres. Vladimir Putin. After Trump’s victory, the U.S. Office of the Director of National Intelligence published a declassified summary of its findings, and it identified individuals within the GRU, Russia’s military intelligence service, that it believed were responsible for the hacking attacks on Podesta and the DNC. Assange continued to deny that WikiLeaks had received any material directly from the Russian government. Michael Ray

Wikileaks 为何遭到如此封杀? - 知乎

Wikileaks 为何遭到如此封杀? - 知乎首页知乎知学堂发现等你来答​切换模式登录/注册朱利安·保罗·阿桑奇(Julian Paul Assange)维基解密Wikileaks 为何遭到如此封杀?从各国政府到 App Store,似乎人人皆诛之?显示全部 ​关注者100被浏览40,849关注问题​写回答​邀请回答​添加评论​分享​4 个回答默认排序郭磊​法律话题下的优秀答主​ 关注 Wikileaks不再是一个简单的泄密者,更接近于一个全球机密和内幕信息(很多是缺少审核的)的集散与发布平台,过去,一个单一情报被泄露造成的伤害,正在被无所畏惧,拥有极高全球关注度的Wikileaks,十倍、二十倍的加以放大。他们接受情报的种类和渠道已经超越了公共和外交层面,据悉他们手中掌握着一些令商业银行和投资公司们感到难堪的信息。这意味着任何与它相关的大机构,都有可能成为泄密的对象,甚至引火烧身。Wikileaks不是一匹脱缰的野马,但那些试图限制、绞杀它的势力,实际上早就处于一种“脱缰”状态了。 发布于 2010-12-26 16:35​赞同 72​​2 条评论​分享​收藏​喜欢收起​Gefrierend有文化的混混​ 关注自从人类穿上了衣服,就出现了另外一群人,他们有个有趣又合理的想法,“我想揭开别人的底裤看一看”—阿桑奇。这自然引来了愤怒的反对—“我穿过那么多衣服,凭什么你只关心我的底裤?”“看什么!我的底裤是忠诚的鲜红!”“呸呸,自由的天蓝色底裤才是正确!”“我穿的,是父辈的底裤!”“底裤下面是什么,你看看自己的不就知道了?”阿桑奇一脱裤子—“我没穿底裤…”底裤的颜色、款式重要吗?未必,不勒蛋就好。阿桑奇这种“流氓”有意义吗?当然!底裤要勤洗勤换,不然,你的根就烂掉了!发布于 2016-12-14 02:21​赞同 9​​添加评论​分享​收藏​喜欢收起​​

维基解密(解密网站)_百度百科

(解密网站)_百度百科 网页新闻贴吧知道网盘图片视频地图文库资讯采购百科百度首页登录注册进入词条全站搜索帮助首页秒懂百科特色百科知识专题加入百科百科团队权威合作下载百科APP个人中心维基解密是一个多义词,请在下列义项上选择浏览(共2个义项)添加义项收藏查看我的收藏0有用+10维基解密播报讨论上传视频解密网站维基解密(又称维基泄密、维基揭秘 [1];英语:WikiLeaks),是通过协助知情人让组织、企业、政府在阳光下运作的、无国界、非盈利的互联网媒体。朱利安·阿桑奇,一个澳大利亚互联网积极分子,通常被视为维基解密的创建者、主编和总监。Kristinn Hrafnsson Joseph Farrell and Sarah Harrison是其组织的其他成员中仅有的几个被公众获知的与维基解密有关的人。Kristinn Hrafnsson 也和阿桑奇, Ingi Ragnar Ingason以及Gavin MacFadyen等人同为阳光媒体产品部职员。这个国际性非营利媒体组织,专门公开来自匿名来源和网络泄露的文件。网站成立于2006年12月,由阳光媒体(The Sunshine Press)运作。在成立一年后,网站宣称其文档数据库成长至逾120万份。维基解密大量发布机密文件的做法使其饱受争议。支持者认为维基解密捍卫了民主和新闻自由,而反对者则认为大量机密文件的泄露威胁了相关国家的国家安全,并影响国际外交。中文名维基解密外文名WikiLeaks别    名维基泄密、维基揭秘 [1]创始人朱利安·保罗·阿桑奇分    类国际性非营利媒体组织网站成立时间2006年12月目录1官方简介2参与人员3首次公开4网站运营▪服务器▪解密困境▪黑客支持▪破产传闻▪经济来源▪网站隐秘▪传播方式5曝光内容▪公布线人▪文件公开6创始人7获得奖项8各国态度9相关质疑10社会影响11其他相关12法律现状官方简介播报编辑维基解密(Wikileaks)试图成为大规模文档解密与分析的不可追查和不被审查的来源。我们的主要兴趣在于揭露那些仍然在亚洲、前苏联集团、撒哈拉以南非洲与中东地区存在的暴政。同时,对于其他地区所有期望得到帮助的人,维基解密也是他们揭露政府和公司不道德行为的好地方。维基解密的目标是发挥最大的政治影响力。维基解密使用与维基百科一样易于使用的界面。已经从持不同政见者社群和匿名消息源接受了超过120万份文档。维基解密坚信,政府活动的透明度是减少腐败、建设更好的政府与强大民主国家的关键。各国政府皆可从本国人民与世界人民的监督中受益。维基解密还相信,监督需要公开的信息。历史上,信息曾是代价昂贵的,人的生命和人权曾因此受到践踏。但是,随着技术的进步 ,在互联网上,加密技术的发展使得传达敏感信息的风险降低。维基解密所提供的泄漏文档比任何传媒或情报机构提供的更能起到监督作用。维基解密为全球社群坚持不懈地研究任何文档,以确认其可信性、合理性、真实性和有效性提供了一个论坛。社区成员可以解读泄露文档,并向公众进行适当的解释。在具有里程碑意义的五角大楼档案裁决中,美国联邦最高法院判决道:“只有自由不受限制的媒体,才能有效揭露政府腐败” 。我们同意这种说法。我们认为,保持一个政府诚实不仅仅是该国人民的责任,对于其他国家的人民也有权利监督别国政府。这就是为什么建立这样一个全球性的匿名文档揭露途径的时机已经到来。 [4]参与人员播报编辑维基解密创始人阿桑奇(11张)维基解密曾宣称网站是由来自美国、中国台湾、欧洲、澳大利亚和南非的政治异见者、记者、数学家以及小型公司的技术人员所创立。包括《纽约客》(2010年6月7日)杂志在内的多家媒体指出,澳洲籍的网络行动人士朱利安·保罗·阿桑奇是网站的主导者。 Advisory Board(顾问委员会)的成员包括有记者、受到政治迫害的代表者、反贪污分子、人权分子、律师、还有密码学者。维基解密(Wikileaks) 目前有超过1,200位的人登记参与。除了分享资料之外,维基解密(Wikileaks) 需要更多能以组织形态参与的人。 [2]首次公开播报编辑维基解密首次公开出现在互联网上是在2007年1月。当时网站声明该网站是“由来自美国、中国台湾、欧洲、澳大利亚和南非的政治异见者、记者、数学家以及公司技术人员所创立”。.维基解密每天接到约30份用户匿名提交的文档,一般他们会先经过顾问和志愿者团队的可信度审核后,以原始的、未经编辑的形式把那些可信的材料贴出来,并附上评论。维基解密页面维基解密网站托管在以坚持客户匿名著称的瑞典网络服务提供商,这家公司可以承受法律压力和网络攻击。然后送到位于比利时的服务器上,再送到“另一个法律上较为友善的国家”,然后这些文件被删除,转存到其他地方。有一批匿名的工程师提供技术维护,整个流程和提交的文件都被加密,并使用经过修改的Tor网络匿名传输,整个系统即使核心成员也无法全部进入。此外,维基解密还在系统中一直传递许多虚假的提交文件,以使真正的文件难以被发现。该网站经常披露一些揭露政府和企业腐败行为的“内部文件”。该网站声称:在这里,检举人、新闻记者和博客可以揭发各种腐败行为,而不用担心雇主和政府的报复。“维基解密”网站成立于2006年,专门公布机密“内部”文件,其宣称要揭发政府或企业的腐败甚至是不法的内幕,追求信息透明化。“维基解密”已卷入大约100场官司。网站运营播报编辑服务器停止支持美国亚马逊网络服务公司1日突然宣布停止为维基揭秘网提供服务器支持,维基揭秘网的主页一度无法登录。美国媒体2日报道称,维基揭秘网重新与瑞典最大的网络服务供应商BahnhofAB公司展开了合作。维基解密机房(18张)为维基揭秘网提供服务器支持的主机位于瑞典一个被弃用的防空洞内。该防空洞修建于冷战时期,犹如谍战大片中展示的一样,它有着坚固的钢铁大门,而且还能承受核攻击,如今它被开发成了一个地下数据中心。BahnhofAB公司总裁卡隆曾形容该防空洞是斯德哥尔摩民防工程的“心脏”。BahnhofAB公司此前也曾为维基揭秘网提供过服务器支持,但后来由于受到电脑黑客攻击,维基揭秘网转而与美国亚马逊公司进行合作。恢复访问维基解密(WikiLeaks)主站点在被域名解析服务提供商EveryDNS停止服务近10天后,2010年12月15日后已经在美国恢复访问。英国互联网监控公司Netcraft称,维基解密由Silicon Valley Web Hosting提供主机服务,由Dynadot提供域名解析服务。据称,从上周五起,该网站已经恢复运行。Netcraft安全分析师保罗·穆顿(Paul Mutton)称,维基解密并不包含任何内容,而是将用户重新导向该网站位于俄罗斯的一个镜像站点。尽管如此,鉴于维基解密在美国饱受攻击,该网站在美国恢复访问仍令人感到惊奇。2010年12月3日,EveryDNS宣布,由于维基解密在公布美国国务院保密文件后,遭遇大规模的DDoS(分布式拒绝服务)攻击,导致流量剧增,被迫停止向该网站提供域名解析服务,以免其他50万个使用EveryDNS服务的网站受到影响。在此之前,亚马逊称维基解密违反了服务条款,不再向该网站提供主机服务。PayPal、万事达和Visa也以类似理由先后冻结了该网站的账户。上述公司均表示,他们的行动并非出于政府施压。但是有人对此表示怀疑。美国参议院国土安全与政府事务委员会主席约瑟夫·李伯曼(Joseph Lieberman)称,在亚马逊停止向维基解密提供服务前,该委员会曾与亚马逊进行沟通。为了应对EveryDNS的行为,维基解密已在全球多个国家建立了超过1000个镜像站点。为了防止DNS提供商停止提供域名解析服务,维基解密与包括瑞士、加拿大和马来西亚在内的8个国家的不同DNS提供商签署服务合同。解密困境来源于媒体亚马逊终止了与维基解密的服务器租赁合同,后者只好在欧洲地区租用服务器。根据最新的消息,维基解密服务器的新家位于瑞典一个名叫Pionen White的三防掩体之内。维基解密账户被停恐“断粮” 支付商或迫于美国压力美国拍卖网站EBay旗下的网络支付处理商PayPal4日宣布,由于维基揭秘网站违反公司的服务政策,因此决定停止维基揭秘的账户和服务;这意味着维基揭秘将无法通过PayPal获得资金。PayPal发言人表示,由于美国政府宣布维基揭秘的行为触犯了法律,公司因此决定停止维基揭秘的账户和汇款服务。该发言人表示,PayPal并没有与任何政府机构进行过接洽,是独立做出上述决定的。而据英国广播公司报道,维基揭秘在微博网站推特上指责PayPal在“美国政府压力”下做出这一决定。美联社报道说,经测试证实4日开始已无法通过这个帐户向维基揭秘网站捐钱。这个帐户据信是维基揭秘获得资助的最保险可靠的渠道。它的背后是德国一个以一位知名黑客名字命名的基金会。如今这一渠道关闭之后,维基揭秘面临“断粮”的危险。黑客支持黑客发起攻击2010年12月10日消息,维基解密风波掀起全球网络战,有黑客组织声称召集了四千名精英,攻击针对维基解密的机构。一个名叫“匿名者”的黑客组织,透过即时通讯工具Twitter召集四千名同路人,为维基解密发动"偿还行动",指示大家前往一个网址,下载一种设计精密的攻击软件,作为参与这场网战的武器。到目前为止,有多个网站受到攻击,包括对维基解密创办人阿桑奇提出指控的瑞典检控方、拒绝向维基解密提供汇款服务的万事达和Visa信用卡公司,另外,互联网付款公司Paypal,早前也因停止为维基解密提供服务,而遭受黑客攻击。越来越多的与维基解密及被拘留的创始人阿桑奇(Julian Assange)发生纠葛的组织和个人遭到在线攻击,这似乎是为该网站进行报复的黑客所为。周三攻击加剧,此前一天阿桑奇在伦敦被捕,并被拒绝保释,这与他在瑞典遭到的不正当性行为指控相关。包括万事达信用卡(MasterCard Inc.)、Visa信用卡(Visa Inc.)和瑞典检察官办公室在内的一系列组织都报告自己的网站出现技术问题,似乎是遭到所谓拒绝服务攻击,即浏览量突然激增,使电脑不能显示网页。遭袭网站升级2010年12月12日消息,据国外媒体报道,PayPal、Visa等曾遭维基解密支持者袭击的各大网站已开始升级网络防卫系统,以应对类似黑客袭击事件。PayPal安全部主任接受外媒采访时说,我们已加强了反黑客的应对措施,网站数据可以从一个网站转移到另一个网站,PayPal的网站虽然受到一定影响,速度稍慢,但是并没有完全崩溃。而万事达(MasterCard Inc.)网站和Visa表示被袭击的网站上并没有公司业务,只有电子宣传册等文件,重要的客户信息和业务程序并没有受到影响。据PayPal安全部门主任迈克尔?巴雷特(Michael Barrett)介绍,被黑客袭击的事实给他们提出了一个问题:公司是否充分利用了可用资源来预防类似事件。为此他们加强了防御系统:PayPal网站上添加了另外一种备用付款模式;首页显示每分钟完成的交易数量和通信量等信息,该部分信息由20个工作站负责监控;加强了容易受到攻击的防御层硬件;PayPal的信息安全工作是以前是全球为基础,现将世界各部门的分工明确化;在客户终端方面加强防护软件和硬件,效果显著,但是仍存在安装繁琐等问题需要进一步研究。据悉,虽然黑客袭击仍在继续,但正在运行的新增防御功能已经发挥作用,成功的拦截了干扰通信,PayPal网站上显示的数据表格已经恢复到正常水平。另外FBI已经介入此事调查.签名支持阿桑奇2010年12月14日消息,“维基解密”网站创始人阿桑奇即将在伦敦二次出庭受审,日前,全球约60万维基解密网站支持者在网上签名请愿,希望伦敦法院不要打击阿桑奇及其合作者。  这项请愿行动是由全球采取行动组织Avaaz面向全球发起的,目的是向伦敦法院及有关方面请愿,“立即停止打击‘维基解密’,不要惩罚阿桑奇及其合作者”,“尊重信息自由、新闻自由”。截至格林尼治标准时间13日下午4时,已经有59.4万人在这份网上请愿书上签名,估计截止到13日16时签名者人数早已突破60万。阿桑奇即将于15日下午在威斯敏斯特地方法院第二次出庭,届时律师将陪伴他一同出庭,并再次向法庭申请保释。据悉,阿桑奇的不少支持者已经计划在其出庭时守候在法院外,以抗议对其的持续拘押。“维基解密”网站因为披露了数十万份美国外交密电使华盛顿陷入尴尬境地,美国总统奥巴马谴责“维基解密”的做法“糟糕、悲哀”。因泄密文件中涉及全球多个国家的政治密事,该网站在多国遭到封杀。不过“维基解密”也想出了各种办法逃过封杀,仍在稳定运营中。破产传闻2011年10月25日,根据《每日邮报》报道,美国维基解密网站创始人朱利安·阿桑奇(Julian Assange)日前警告称,由于受到美国金融机构的“经济封杀”,维基解密网站可能于年底破产。阿桑奇说,维基解密网站已经停止公布信息,正集中全力筹集网站运营的资金。他将维基解密网站遭遇的困境归咎于美国银行、万事达、 Visa、PayPal以及西方各国的联合“非法经济封杀”。这种封杀导致网站在过去11个月中,损失了95%的捐赠收入。阿桑奇说:“我们现在必须集中所有资源对抗银行封锁。如果这种金融攻击行为没人阻止,它将成为一种危险而不民主行为的先例。以后任何与强大的金融公司或其政治盟友发生冲突的组织,都可能遭到这种司法程序之外的惩罚。如果公布有关战争真相的行为引发华盛顿圈内人的攻击,那么所有发布维基解密网站提供的材料的媒体都面临着遭封锁的处境。”阿桑奇说,如果这种经济封锁继续下去,维基解密网站恐怕无法维持到2012年。维基解密网站的律师已经在英、美、丹麦、比利时、冰岛以及澳大利亚开始诉前行动,他们也希望欧盟竞争委员会(European Competition Authority)公开调查Visa以及万事达等公司的错误行为。 [10]经济来源维基解密的运营成本并不高,主要用于打官司和服务器。据官方视频介绍每年有100万用于打官司,服务器维护20万。但每年由于账户被冻结等原因造成的损失则多达惊人的1500万。而其主要的经济来源是志愿者和团体的的捐助以及团队成员自掏腰包。网站隐秘该网站自打运营以来,就让不少国家的政府和企业头痛不已。“维基解密”虽然致力于揭露机密,但它自己却“深藏不露”:该网站没有公布自己的办公地址和电话号码,也没列举该网站的主要运营者的姓名,甚至连办公邮箱都没留。外界既不知道它的总部在哪,更不知雇员是哪些人。美国情报部门曾怀疑朱利安·阿桑奇的“维基泄密”是受“国际七三学社”指使,朱利安·阿桑奇似乎参与了2012年白宫泄密事件,但此猜测遭到“国际七三学社”总部否认。“维基解密”没有总部或传统的基础设施,该网站依靠服务器和数十个国家的支持者做了很多事情。它的创始者说,那些上传材料的人也都是匿名。由于它本身具有秘密特征,“维基解密”相对而言很少受到审查者、律师或地方政府的压力。这个全球性的“泄密机器”也不受传统的新闻伦理以及平衡报道原则的限制。该网站的运营费用据说每年为30万美元,其中绝大部分用于支付服务器和技术支持的费用。借助于本身的超高人气,该网站正想方设法吸引新的捐助者以及基金会的支持。 [2]传播方式用户可以通过表单匿名上传材料,然后“维基解密”给予核实。作为给嵌入表单的回报,这些网站将得到经过核实的保密文档,并首发报道。“维基解密”可以在自己的网站上转发这些新闻故事,并自由传播。截止到2009年“维基解密”提供三种文档提交方式:上传到网站,email和邮件。截止到2009年10月末,该机构已经发布了120多万份文档。“维基解密”称此举很可能会改善调查性报道的质量,减少政府腐败,重建企业伦理文化。曝光内容播报编辑公布线人维基解密网站公布上千名线人身份遭媒体谴责2011年9月2日,沉寂了半年多的维基解密网站因公布约13.4万份美国国务院外交电报而再次成为世人关注的焦点。与以往不同的是,这次公布的电报均未经编辑,众多秘密消息源的姓名全部遭曝光。2010年年底,维基解密网站曾向《纽约时报》以及其他一些媒体提供了251287份美国250多个驻外大使馆和领事馆与美国国务院互发的秘密电报,这些媒体在进行公开报道时,删除了被认为可能遭到报复的消息源的人名。2011年9月15日,维基解密网站提出要原封不动地公开所有电报内容,被合作媒体拒绝,于是从8月30日开始,维基解密在短短几天内就在其网站公开了约13.4万份未经处理的电报。这些电报大多是美国驻各国大使、参赞等外交官发给美国国务院的最新情况汇报。英国《卫报》透露,新解密的电报中至少公开了1000名“线人”的真实身份或他们的代号,令这些人处于极其危险的境地。对于维基解密的一意孤行,英国《卫报》、美国《纽约时报》、法国《世界报》、西班牙《国家报》和德国《明镜周刊》这五家曾刊登维基解密外交密电的媒体联合予以谴责。2011年9月2日,《卫报》发表了这份谴责声明。声明说,对维基解密公布未经处理的美国国务院电报的行为他们深感痛惜,他们之前与网站的合作是基于保护消息源原则的。 [11]文件公开2006年12月,维基解密发布了它创建以来的第一份文件,由索马里反对派领导人谢赫·哈桑·达赫·阿威斯签署的一份“秘密文件”,声称将对政府官员处以死刑,因为他们雇佣“罪犯”来袭击他人。这份文件是在中国黑客通过Tor网络传送的信息中找到的。阿桑奇声称他们一般都会在文件公开前尽可能通知文件中涉及到的人物,但是难免还是会造成一些伤害。泄露美军机密文件2010年3月,据报有一份由美国军方反谍报机构在2008年制作的军方机密报告称,WikiLeaks网站的行为已经对美国军方机构的“情报安全和运作安全”构成了严重的威胁。这份机密报告称,该网站上泄漏的一些机密可能会“影响到美国军方在国内和海外的运作安全。”该报告是在3月15日被泄露到了网上。2010年4月,WikiLeaks发放了美军在2007年于巴格达滥杀平民的片段。2010年7月25日,WikiLeaks通过英国《卫报》、德国《明镜》和美国《纽约时报》公布了92000份美军有关阿富汗战争的军事机密文件。2010年8月25日,WikiLeaks再度发表一份美国中央情报局的分析备忘录,里面主要是述及“如果恐怖分子号召美国公民在美国组织攻击活动并作为攻击基地,会有何相关影响”作分析。2010年10月23日,WikiLeaks公布了391,832份美军关于伊拉克战争的机密文件。泄露美国外交电报2010年11月28日,维基解密网站泄露了25万份美国驻外使馆发给美国国务院的秘密文传电报。内容包括中东、伊朗、朝鲜半岛问题、中国官方黑客入侵事件和美国外交官员对一些国家元首的直白评价等。2010年11月29日,《纽约时报》引述WikiLeaks公布的机密文件指出,美国认为Google于2010年1月表示遭受网络攻击是来自中国,该遭骇事件是中国官方操作,使得Google在2010年3月22日宣布,中文搜索服务从中国大陆移转到香港,并扬言退出中国市场。重要的泄密英国《每日电讯报》2010年7月26日梳理了“维基解密”近几年来所泄露的几大秘密。 [12]1.美军袭击伊平民视频 该视频显示,驻伊美军在直升机上朝人群开火,造成包括2名路透社记者在内的15人死亡。2.关塔那摩监狱手册(2007年) 该手册内容显示,监狱管理士兵有权阻止红十字会工作人员探视囚犯。表现良好的在押人员可获得一卷手纸。3.气候学家擅自更改数据(2009) 超过1000封英格兰东安格利亚大学气候研究所的邮件内容显示,气候学家擅自更改气候数据,以证明全球气候变暖主要是由人类活动造成的。4.佩林私人邮件账号(2008年)5.50万条9·11短信(2009年)6.极右政党“英国国家党”的匿名成员名单(2009年下半年)7.数十万份与阿富汗战争、伊拉克战争有关的文件(2010年初)维基解密曝必和必拓“搅黄”力拓与中铝合作维基解密的一份绝密美国外交电报内文显示,澳大利亚财长史旺(WayneSwan)的办公室主任曾告知大使馆官员,称必和必拓公司曾精心部署了一次破坏它的竞争对手力拓公司与中国国企中铝公司的一份价值不菲的合约,可谓技高一筹。必和必拓称对上述市场传言不作评论。阿拉伯国家高官为美国当间谍阿桑奇在专访中宣称,大量在阿拉伯国家担任要职的高官与美国情报局CIA有密切的接触,他们经常访问美国在这些国家的使馆。他说,“这些重要官员是美国在这些国家的间谍”,不过,阿桑奇没有公布这些人的名字。公布美国新监控项目受害国名字“维基解密”网站2014年5月20日宣布,将公开美国国安局新监控项目中受监控国的名字。此前,美国政府试图压制这一消息的发布。美国新闻网站TheIntercept19日刊文称,基于斯诺登的泄密材料,相信国安局一直暗中实施一项新的监控计划,旨在大量截取两个海外国家的通信信息,并记录下所有通话内容。该网站只公布了其中一个受害国名字——巴哈马,称美窃听该国的全部通话记录,受害国民达250万人次。该网站称,公布另一受害国名字或将导致“暴力冲突升级”,因此不予公开。 [13]伊拉克战争纪录2010年4月,维基解密在一个名为“平行谋杀”(Collateral Murder)的网站上公开了2007年巴格达空袭时,伊拉克平民遭美国军方杀害的影片,同年7月,维基解密再发表阿富汗战争日记,内容包含超过76,900份关于阿富汗战争的文档,在此之前这些文档都不曾对大众公开。同年10月,维基解密和主要商业媒体公司合作,又公开了超过400,000份文档,称为伊拉克战争纪录。棱镜门泄密事件在斯诺登披露安全局监控美国和外国公民电子通信的绝密计划"棱镜"之后,维基解密开始与斯诺登合作。 [5]“维基解密”网站创始人朱利安·阿桑奇2013年6月22 日发表声明,呼吁国际社会向爱德华·斯诺登提供支持。根据“维基解密”的声明,阿桑奇指责奥巴马违背了其建立透明政府的承诺,背叛了以斯诺登和布拉德利·曼宁为代表的有技术头脑的年轻一代,是真正的“叛国者”。曼宁先前任驻伊拉克美军陆军情报分析员,2010 年 5 月遭拘押。美国检察部门指控他从军用网络系统内窃取机密文件并提供给“维基解密”。 [6]“棱镜门”事件揭秘者斯诺登2013年7月1日通过“维基解密”网站发表声明, 抨击美国总统奥巴马和美国政府,并威胁向外界披露更多机密。 [7]阿桑奇在接受美国广播公司ABC采访时声明说,无论美中情局前雇员斯诺登出逃的结局如何,将继续公布有关美国特工部门国家安全局的机密文件。 [5]据美国福克斯新闻网2013年7月1日报道,维基解密网站披露,美国“棱镜门”事件泄密者爱德华·斯诺登(Edward Snowden)在向厄瓜多尔和冰岛申请庇护后,又向19个国家寻求庇护。根据维基解密网站曝光的名单,这19个国家包括奥地利、玻利维亚、巴西、中国、古巴、芬兰、法国、德国、印度、意大利、爱尔兰、荷兰、尼加拉瓜、挪威、波兰、俄罗斯、西班牙、瑞士、委内瑞拉。 [8]当地时间2021年1月4日,英国伦敦一家地方法院法官将就是否同意美国政府引渡“维基解密”网站创始人朱利安·阿桑奇案,作出裁决。 [9]曝陈水扁曝陈水扁金援巴拿马4500万美元 不曾查核巴拿马《新闻报》(La Prensa)根据维基解密的美国驻巴拿马大使馆机密电文,2011年5月22日在头版及内页报道,陈水扁指定将捐款交给巴国前总统莫斯科索的白手套“南海基金会”,且不曾进行查核。  据台湾《中国时报》报道,该报道引述台湾“驻巴外交人员”称,1999年至2008年任总统的莫斯科索曾向他们施压索贿,直到他们屈服为止。莫斯科索说访台时,陈水扁问她台湾可以帮助哪些工程。斯科索提出更新圣托玛斯医院、新建外交部大厦等计划。陈水扁同意全数援赠,但必须透过一个当时并不存在的私人基金会来收受款项。电文指当时“台湾大使”胡正尧向美方说,台湾并没有规定捐款必须经由私人基金会收受。但据了解,胡正尧不仅同意向基金会拨付巨款,新当选总统杜里荷斯就职前还提醒“台湾大使馆”,停止向“南海基金会”拨付数十万美元款项,而胡正尧并未接受。杜里荷斯就任后透过多米尼加总统转告台北,限令胡正尧在十日内离职,否则将宣布“断交”。该报第五版以“台湾不诚实的捐款”为题的报道,引述前公使阿瑞卡说:“几百万台湾捐赠给巴拿马的钱,被前总统和她的姊姊(前第一夫人)鲁比。莫斯科索中饱私囊,其中一部分盖了空置的‘长嘴鸟博物馆’,而这些款项原是要用做社会福利。”台湾的捐款在“南海基金会Mar del Sur”曝光后引爆丑闻,这个私人基金会的董事几乎都是莫斯科索的亲信,这些人挪用了台湾原来要捐给慈善工作的4500万美元,总审计部也无权监督。创始人播报编辑朱利安·阿桑奇维基解密创始人是朱利安·保罗·阿桑奇(Julian Paul Assange)。1971年出生于澳大利亚昆士兰。2006年,朱利安决定创建“维基解密”,在他看来,信息的透明和自由交流会有效的阻止非法治理。2019年4月11日,厄瓜多尔撤销了对“维基解密”创始人阿桑奇的政治庇护,英国警方随后逮捕了阿桑奇。以后将被引渡到美国。 [3]获得奖项播报编辑维基解密曾获得数个奖项,包括2008年的《经济学人》杂志“新媒体奖”。维基解密在2008年发表了《肯尼亚:鲜血的哭泣 - 司法审判之外的杀戮和失踪》(Kenya: The Cry of Blood – Extra Judicial Killings and Disappearances)文件,这篇由肯尼亚国际人权协会所发表之关于肯尼亚警察滥杀的报道,在2009年6月获得了国际特赦组织所颁发的英国媒体奖(“新媒体”类型)。在2010年5月,《纽约每日新闻报》将WikiLeaks列为“彻底改变新闻界的网站”中的第一名。各国态度播报编辑美国在2010年泄露美国外交电报时,维基解密网站每天持续受到DDoS攻击,维基解密官方推特声称这些攻击是由美国政府主导。维基解密网站所利用的亚马逊(Amazon)网站托管服务、PayPal转帐服务皆被关闭或终止,EveryDNS也终止了“”的域名服务。美国同时禁止联邦政府雇员与特约员工阅读维基解密披露的文件,并通知部分大学生不要散播机密。中华人民共和国外交部敦促美国解决泄密问题。俄罗斯维基解密曾威胁准备公布关于俄罗斯的秘密,但俄罗斯对外情报局官员发出强硬声明称,维基解密网站如果披露俄罗斯机密,将会永远消失。 [14]相关质疑播报编辑“9·11”恐怖袭击事件手机短信2009年11月26日,台湾“中广新闻网”报道,维基解密公布了逾50万条美国民众在“9·11”恐怖袭击事件当天发送出去的手机短信,其中包括美国联邦政府以及地方官员的短信。不过,绝大多数短信都来自民众,其中许多人的亲友在世贸大楼或附近工作,恐怖袭击发生后,他们纷纷发短信询问亲人的安危。维基解密秘密工作地点维基解密表示,这批短信是匿名人士提供的。纽约警方和消防单位表示,无法证实911当天他们的内部通讯是否曾遭到拦截。美国电话公司认为,如果手机短信真的被拦截,那么是何人要这样做、怎么做到的、并为何选择将其公布在网站上,其动机不得不让人怀疑。标榜反腐败 常曝内部文件阿富汗战争一家非官方的国际解密网站公布了大量与驻阿富汗美军行动计划有关的秘密文件,其中包括未公开的阿富汗平民死亡数字及塔利班获得的高性能武器等许多方面的细节。美国政府对此作出反应,表达“愤怒”和谴责,称这一做法将给美国的国家安全带来重大影响。美国“维基解密”网站于2010年7月25日公布了大约9.2万份美军在阿富汗行动的秘密文件。“维基解密”说,为把危害减少到最低限度,它决定推迟公布另外大约1.5万份文件。这一事件被形容为是美军历史上最大的一次泄密事件,因为无论是涉及到的文件之数量,还是文件所产生的严重影响,都是有史以来极为罕见的。英国《卫报》、美国《纽约时报》和德国《明镜周刊》于当地时间25晚同时刊登了“维基解密”所提供的涉密文件。“维基解密”此次披露文件所覆盖的时间从2004年1月至2009年12月,内容几乎覆盖了自塔利班政权被推翻以来的整个阿富汗战事,其中许多内容并没有过时。这些被“维基解密”组织所泄露出来的秘密文件显示,北约和美国方面一直担心和怀疑阿富汗反叛武装组织得到了邻国巴基斯坦和伊朗暗中的支持,并认定巴基斯坦情报部门表面上配合联军,暗中却支持阿富汗叛军对付联军,甚至披露了巴情报高官于2008年曾秘密会晤塔利班人员,密谋暗杀阿富汗总统卡尔扎伊;同时表明塔利班已经拥有具有热能跟踪的便携式地对空导弹,而这一消息迄今并没有公开,因为担心会影响到驻阿联军的士气。此外,文件还显示:美国陆海军组成了一支特别部队,即“373特遣部队”,专门在阿富汗等地开展抓捕和暗杀塔利班头目及其组织首脑的行动,美军规定“373特遣部队”的士兵们可以不经请示、不经审判就地击毙那些组织头目。与此同时,文件还披露了在一些塔利班路边炸弹攻击事件和美军攻击行动失误中丧生的阿富汗平民的数字,这些数字此前也一直没有被公开过,文件里甚至还有误杀阿富汗平民的过程描述,比如射杀平民车辆、袭击婚礼现场等。反应:美国政府强烈谴责上述文件在网站曝光之后,美国官方立即作出了强烈的反应。白宫谴责这一事件为“极不负责任之举”。美国国家安全事务顾问琼斯说,这些文件泄密“可能会给美军及其盟军士兵的生命构成威胁并危及美国的国家安全”。但琼斯同时表示,“这起不负责任的泄露行为,将不会影响我们加深与阿富汗和巴基斯坦伙伴关系、打击共同敌人的承诺,并继续支持阿富汗和巴基斯坦两国人民的意愿。”社会影响播报编辑阿巴政府严重不安“维基解密”还披露了阿富汗政府试图与塔利班激进分子和解的内幕。自从2010年1月的阿富汗问题国际会议结束以来,卡尔扎伊总统一直在积极落实一个计划,也就是重新接纳那些放下武器、支持宪法并切断同国际恐怖组织联系的激进分子,同他们和解。巴基斯坦官员长期以来一直表示支持这个计划,甚至还提出,由于在20多年前苏联占领阿富汗时期,巴基斯坦曾支持过这些激进组织,所以巴基斯坦可以利用这层关系,帮助双方进行调解。阿富汗官员表示对这些文件未经允许而被公布表示失望。阿富汗总统发言人奥马尔在喀布尔谴责了这起事件,他说,怎么也想不明白,为什么这么多文件会被泄漏到外面。但他对记者说,这些信息不是什么新东西,阿富汗政府正在研究这些文件。奥马尔说:“大部分内容都不是新的,过去已经讨论过了。其中大部分内容是我们经常与国际合作伙伴讨论的问题。这将有助于提高人们的警觉。”不过,阿富汗政治分析家达维说,如果泄漏文件中的内容属实,那么巴基斯坦就是在玩一场令人担忧的“两面派游戏”,特别是因为它还在从美国获得数十亿美元的援助。达维说,这些文件显示,巴基斯坦三军情报局的代表曾直接同塔利班会面,帮助塔利班组织针对联军和阿富汗军队的袭击,并策划刺杀阿富汗领导人。达维说,巴基斯坦可能希望除掉那些同情阿富汗总统卡尔扎伊的人,这样,如果卡尔扎伊想同塔利班激进分子达成协议的话,就必须寻求伊斯兰堡的帮助。他说:“巴基斯坦当然能削弱卡尔扎伊,当然能动摇他在阿富汗的地位,减弱阿富汗各部落和各种族对他的支持。”巴基斯坦官员则否认该报告中指认的巴基斯坦情报机构与塔利班勾结合作的断言。巴基斯坦驻阿富汗大使称,被公布的美军在阿富汗文件中的大部分内容都是已知的,没有什么新内容。白宫和其同盟此举被认为是为了淡化此次机密文件泄露造成的政治和军事影响。巴基斯坦驻美国大使富坎尼则谴责维基解密不负责任,强调巴国打击武装分子不遗余力,美国行政与立法部门强调所泄漏的文件只能反映过去的状况,与现实已经脱节。一些观察员认为,巴基斯坦秘密情报部门如今仍然不愿意斩断这个联系,因为它认为,在西方从阿富汗撤军后,如果巴基斯坦想对阿富汗施加影响的话,塔利班还是用的着的。澳洲ISTS卷入旋涡(国际七三学社)“维基解密”背后是一个很大的谜团,可怕的不是朱利安·阿桑奇和泄密网站,而是为泄密网站提供情报的网,有分析家认为,这是一个庞大的情报体系,不是一般的组织所能为,美国中情局只是想通过朱利安·阿桑奇找到背后的网,毋庸置疑,美国人想到一个庞大的联谊会——国际七三学社,因为这个学社的成员遍及世界所有国家,成员有数十万之多,朱利安·阿桑奇正是七十年代出生的人,有消息称朱利安·阿桑奇是这个学社的骨干成员。所以,“维基解密”引发澳洲ISTS(国际七三学社)许多成员遭受调查。美国全军封杀U盘为防止军事机密泄露,美国军方下令禁止全军使用USB存储器、CD光盘等移动存储介质,违者将以军法论处。美国空军网络部门指挥官理查德·韦伯少将2010年12月3日发布“网络控制令”,要求所有人员“立即停止在所有系统、服务器和连接国防部秘密网络的电脑上使用移动存储介质。”报道称,美军其他军种也收到类似命令。报道称,军方此举是为防范军事机密再次被“维基解密”一类的网站泄露。早在两年前,美国军方曾下令禁止使用移动存储介质,理由是防止病毒传播。但由于禁止使用移动存储设备给军方数据传输带来很大麻烦,2010年2月,该禁令被取消,结果为“维基解密”大开方便之门。从2010年4月开始,“维基解密”网站陆续公开数十万份有关伊拉克和阿富汗战争的军事文件。经美国军方调查,文件的泄露者是曾在伊拉克服役的美军情报分析员布拉德利·曼宁,作案工具就是移动存储设备。他从军方网络下载大量机密文件,并刻录在一张标为“Lady Gaga”的CD中,之后他将机密文件传输给“维基解密”网站。“维基解密”事件发生后,美军方采取大量措施,一份8月份内部报告显示,五角大楼已限制所有机密电脑向移动设备复制文件的权限。截止到2010年12月,美军大约60%的计算机与主机安全系统连接,监视任何异常行为。维基解密被称为美国外交史911迄今外交史上最大规模的泄密事件2011年11月28日如期发生。当天,“维基解密”网站曝光逾25万份据称是美国国务院的机密文件,将诸多美国外交内幕和盘托出,事件引发的影响,被称为美国外交的“9·11”。作为一家专门揭密的网站,“维基解密”2011年7月和10月曾分别公布9万多份阿富汗战争机密文件和近40万份伊拉克战争机密文件。前者将驻阿富汗美军滥杀平民的种种细节曝光,后者则指仅在2004年至2009年期间,伊拉克战争就造成10.9万人死亡,其中包括6.6万名平民。此外,身份盗窃在当今的互联网已经是个非常现实的问题,催生出了一个以非法监控个人信用记录和身份为基础的完整地下行业。甚至还有更多的迹象证明,互联网是敌对国家间的新战场:2009年4月,《华尔街日报》报道称,美国的电力网络曾受到“来自俄罗斯以及其他国家间谍的入侵”。7月,美国《基督教科学箴言报》报道称,朝鲜向韩国及美国发起了大规模网络进攻,白宫、五角大楼及其他“高级别机构”遭到攻击。2008年,俄罗斯与格鲁吉亚之间的战争也蔓延到了网络:格鲁吉亚指控俄罗斯在对格开战的同时,还向其政府网站发起了一系列网络进攻。安全专家警告称,“网络战”时代已经降临,由于互联网具有匿名的特点,所以想要确定罪犯几乎是不可能的事情。其他相关播报编辑与维基百科关系出于法律方面的原因,维基解密(Wikileaks) 与维基百科没有任何官方的正式关系。不过,维基解密(Wikileaks) 与维基百科使用了相同的维基用户界面和网站技术;并且,二者在鼓励任何人成为条目作者和编辑者方面,在以此方式下获得更广泛和更精确的共同创作成果方面,它们的指导哲学是完全一致的。二者皆依赖于消息灵通的公民组成的社区。不同的是维基百科是百科全书,而维基解密(Wikileaks)是解密档案。维基百科为维基解密(Wikileaks)提供了一个很好的范例。维基百科成功地为人们带来准确而更新及时的百科全书条目,让许多人都为之惊叹。维基百科证明了基于一群活跃的社区用户而进行的共同创作,是可以产生大量精准内容的,并且符合快速、民主、透明的原则。维基解密(Wikileaks)致力于提供快速而精确的,基于解密文档的信息传播、查证、分析、说明以及更深解读,以此造福世界各地的人们。 WikiLeaks(中文媒体译作:维基解密、维基揭密、维基泄密)是一个与维基百科或维基媒体基金会没有建立任何关系的站点。在2010年8月11日,维基百科创办人吉米·威尔士(Jimmy Wales)已于英国一份报章说明此项内容(《Jimmy Wales: people think I'm responsible for Wikileaks》)。维基解密域名之登记者为Wikia的员工,这些域名显示之内容是由Wikileaksorg提供,这或许有些误导。 此外,Wikia与维基媒体基金会是两个各自独立的组织,二者没有任何关系。根据维基百科创办人之声明:“Wikia并未提供服务给这些网域名称的网站。这些域名在网域名称服务器(DNS)内的CNAME记录均导向至wikileaksorg.这些网域名称在很久以前已合法转移给Wikileaks,但不知何故,Wikileaks从未完成移转的技术流程。Wikia已多次要求其尽速完成之,但并未有结果。Wikileaks创办人朱利安·阿桑奇(Julian Paul Assange)先生表示他目前忙得不可开交,以目前发生的有关新闻事件来看,其所言看起来属实。”2010年12月初,Wikia网域显示其为域名停放或页面不存在。2010年12月8日吉米·威尔士又在其用户讨论页回复了一条相关提问:就这个问题来说,当维基解密网页初公开时他们发布了一份新闻稿,宣传自己是“(泄露)秘密的维基百科”。当时我们对他们没有任何头绪,搞不懂是骗局、滥发信息或者其他什么的,为了保护域名而注册的域名。我们立刻联系了他们了解事情始末,而他们就误用维基百科的名字道歉并处理了问题……但他们尚未完成(域名)转移的设定。法律现状播报编辑法律背景维基解密的法律地位非常复杂。阿桑奇将维基解密视作一个保护告密者的中间组织。担心被曝光或受到惩罚的告密者可以泄密给维基解密,之后由维基解密帮他们泄密给媒体,这种方式胜过直接告诉媒体。它的服务器遍及欧洲且可以通过任何一个未受到信息审查过滤的网络接口接入。该组织总部位于瑞典,因为这里有全世界最严格的法律来保护这些重要的泄密者信息。维基解密宣布它不会恳求任何泄密信息。然而,阿桑奇曾在在马来西亚举行的Hack In The Box会议上要求一群黑客和安全研究员来帮助自己寻找在"2009泄密最高通缉令"清单上的文件。可能面临的犯罪指控美国司法部在外交电文泄露开始后不久就展开了针对维基解密的调查。司法部长Eric Holder证实该调查“不是暴力恐吓”,而是“一个积极的,持续的犯罪调查。”《华盛顿邮报》报道,司法部正在酝酿对其提出间谍罪指控,一份前任公诉人的提议指出其困难之处:第一次宪法修正案保护媒体言论自由。数个在最高法院进行判决的案例都表明了宪法支持非法获得信息并发布给公众的人其在获取过程中并没有违反法律的立场。联邦检察院也本打算以买卖国家财产罪控告阿桑奇,但因为外交电文要机密于物理财产,这种方式也面临障碍。任何对阿桑奇的指控都需要将阿桑奇引渡到美国,根据先前的从瑞典进行引渡的案例,这一步总是制造了复杂的司法流程和潜在的时间上的拖延。阿桑奇的一个律师说,另一方面,他们正在力争把阿桑奇引渡到瑞典因为他可能被引渡到美国。阿桑奇的律师马克-斯蒂文斯曾“听说来自瑞典作家的消息在弗吉尼亚州亚历山德里亚有一个高级陪审团”聚集并讨论有关维基解密案件的犯罪指控。在澳大利亚,当局和联邦警署没有声明维基解密所触犯的法律,但是总理吉拉德曾声明组建维基解密基金会和从外国窃取美国政府的保密文件是非法行为。吉拉德在之后的对其声明的解释中引用了那句“最初美国新兵对资料的盗窃行为的严重性胜过阿桑奇先生”。Spencer Zifcak,一个名为自由维多利亚的澳大利亚公民自由组织的主席,提醒人们,没有控告和完整的审判流程及结果就不能说维基解密是一个非法组织。当许多政府对阿桑奇发出威胁时,法律专家本-索尔驳斥道,把阿桑奇做为犯罪者或者恐怖分子的全球性的污蔑战争的目标没有任何法律基础。美国宪法权利中心发布了一份声明,在声明中用“多个法律触及不到或者谬误的案例”强调了有关拘捕阿桑奇的危险性。法律责任澳大利亚联邦警察对维基揭密网站及创始人阿桑奇进行调查,他们公布数十万美国秘密的外交文件违反了澳大利亚的法律。美国政府警告要起诉泄漏外交情报的人员新手上路成长任务编辑入门编辑规则本人编辑我有疑问内容质疑在线客服官方贴吧意见反馈投诉建议举报不良信息未通过词条申诉投诉侵权信息封禁查询与解封©2024 Baidu 使用百度前必读 | 百科协议 | 隐私政策 | 百度百科合作平台 | 京ICP证030173号 京公网安备110000020000

Julian Assange | Biography & Facts | Britannica

Julian Assange | Biography & Facts | Britannica

Search Britannica

Click here to search

Search Britannica

Click here to search

Login

Subscribe

Subscribe

Home

Games & Quizzes

History & Society

Science & Tech

Biographies

Animals & Nature

Geography & Travel

Arts & Culture

Money

Videos

On This Day

One Good Fact

Dictionary

New Articles

History & Society

Lifestyles & Social Issues

Philosophy & Religion

Politics, Law & Government

World History

Science & Tech

Health & Medicine

Science

Technology

Biographies

Browse Biographies

Animals & Nature

Birds, Reptiles & Other Vertebrates

Bugs, Mollusks & Other Invertebrates

Environment

Fossils & Geologic Time

Mammals

Plants

Geography & Travel

Geography & Travel

Arts & Culture

Entertainment & Pop Culture

Literature

Sports & Recreation

Visual Arts

Companions

Demystified

Image Galleries

Infographics

Lists

Podcasts

Spotlights

Summaries

The Forum

Top Questions

#WTFact

100 Women

Britannica Kids

Saving Earth

Space Next 50

Student Center

Home

Games & Quizzes

History & Society

Science & Tech

Biographies

Animals & Nature

Geography & Travel

Arts & Culture

Money

Videos

Julian Assange

Table of Contents

Julian Assange

Table of Contents

IntroductionEarly life and creation of WikiLeaksEarly WikiLeaks activity and legal issuesAsylum in the Ecuadoran embassy and impact on the 2016 U.S. presidential election

References & Edit History

Quick Facts & Related Topics

Images

Quizzes

Computers and Technology Quiz

Related Questions

What was the first publication on WikiLeaks?

Who are the most well-known computer scientists?

Is computer science used in video games?

How do I learn computer science?

Read Next

7 Notorious Women Criminals

Unusual Counting Systems

Influential Computer Programming Languages

Is Zero an Even or an Odd Number?

9 Modern Corporate Criminals

Discover

What Is the “Ides” of March?

The 10 Greatest Basketball Players of All Time

Was Napoleon Short?

Have Any U.S. Presidents Decided Not to Run For a Second Term?

12 Greek Gods and Goddesses

Inventors and Inventions of the Industrial Revolution

7 Surprising Uses for Mummies

Home

Science

Mathematics

Science & Tech

Julian Assange

Australian computer programmer

Actions

Cite

verifiedCite

While every effort has been made to follow citation style rules, there may be some discrepancies.

Please refer to the appropriate style manual or other sources if you have any questions.

Select Citation Style

MLA

APA

Chicago Manual of Style

Copy Citation

Share

Share

Share to social media

Facebook

Twitter

URL

https://www.britannica.com/biography/Julian-Assange

Give Feedback

External Websites

Feedback

Corrections? Updates? Omissions? Let us know if you have suggestions to improve this article (requires login).

Feedback Type

Select a type (Required)

Factual Correction

Spelling/Grammar Correction

Link Correction

Additional Information

Other

Your Feedback

Submit Feedback

Thank you for your feedback

Our editors will review what you’ve submitted and determine whether to revise the article.

External Websites

GlobalSecurity.org - Julian Assange

The First Amendment Encyclopedia - Biography of Julian Assange

Britannica Websites

Articles from Britannica Encyclopedias for elementary and high school students.

Julian Assange - Student Encyclopedia (Ages 11 and up)

Print

print

Print

Please select which sections you would like to print:

Table Of Contents

Cite

verifiedCite

While every effort has been made to follow citation style rules, there may be some discrepancies.

Please refer to the appropriate style manual or other sources if you have any questions.

Select Citation Style

MLA

APA

Chicago Manual of Style

Copy Citation

Share

Share

Share to social media

Facebook

Twitter

URL

https://www.britannica.com/biography/Julian-Assange

Feedback

External Websites

Feedback

Corrections? Updates? Omissions? Let us know if you have suggestions to improve this article (requires login).

Feedback Type

Select a type (Required)

Factual Correction

Spelling/Grammar Correction

Link Correction

Additional Information

Other

Your Feedback

Submit Feedback

Thank you for your feedback

Our editors will review what you’ve submitted and determine whether to revise the article.

External Websites

GlobalSecurity.org - Julian Assange

The First Amendment Encyclopedia - Biography of Julian Assange

Britannica Websites

Articles from Britannica Encyclopedias for elementary and high school students.

Julian Assange - Student Encyclopedia (Ages 11 and up)

Written by

Michael Ray

Michael Ray oversees coverage of European history and military affairs for Britannica. He earned a B.A. in history from Michigan State University in 1995. He was a teacher in the Chicago suburbs and Seoul,...

Michael Ray

Fact-checked by

The Editors of Encyclopaedia Britannica

Encyclopaedia Britannica's editors oversee subject areas in which they have extensive knowledge, whether from years of experience gained by working on that content or via study for an advanced degree. They write new content and verify and edit content received from contributors.

The Editors of Encyclopaedia Britannica

Last Updated:

Mar 5, 2024

Article History

Table of Contents

Julian Assange

See all media

Category:

Science & Tech

Born:

July 3, 1971, Townsville, Queensland, Australia (age 52)

(Show more)

Founder:

WikiLeaks

(Show more)

See all related content →

Recent News

Mar. 4, 2024, 5:23 AM ET (Yahoo Movies Canada)

Auction to raise money for Julian Assange's fight against extradition to US

Feb. 26, 2024, 12:17 PM ET (ABC News (U.S.))

WikiLeaks’ Assange faces wait to find out whether he can challenge extradition to the US

Feb. 21, 2024, 7:37 PM ET (AP)

WikiLeaks’ Assange faces wait to find out whether he can challenge extradition to the US

Feb. 20, 2024, 3:59 PM ET (AP)

WikiLeaks founder Assange faces his last legal roll of the dice in Britain to avoid US extradition

Feb. 19, 2024, 2:43 AM ET (AP)

WikiLeaks founder Assange may be near the end of his long fight to stay out of the US

Show More

Show Less

Julian Assange (born July 3, 1971, Townsville, Queensland, Australia) Australian computer programmer who founded the media organization WikiLeaks. Practicing what he called “scientific journalism”—i.e., providing primary source materials with a minimum of editorial commentary—Assange, through WikiLeaks, released thousands of internal or classified documents from an assortment of government and corporate entities.

Early life and creation of WikiLeaks

Assange’s family moved frequently when he was a child, and he was educated with a combination of homeschooling and correspondence courses. As a teenager, he demonstrated an uncanny aptitude with computers, and, using the hacking nickname “Mendax,” he infiltrated a number of secure systems, including those at NASA and the Pentagon. In 1991 Australian authorities charged him with 31 counts of cybercrime; he pleaded guilty to most of them. At sentencing, however, he received only a small fine as punishment, and the judge ruled that his actions were the result of youthful inquisitiveness. Over the next decade, Assange traveled, studied physics at the University of Melbourne (he withdrew before earning a degree), and worked as a computer security consultant.

Britannica Quiz

Computers and Technology Quiz

Assange created WikiLeaks in 2006 to serve as a clearinghouse for sensitive or classified documents. Its first publication, posted to the WikiLeaks Web site in December 2006, was a message from a Somali rebel leader encouraging the use of hired gunmen to assassinate government officials. The document’s authenticity was never verified, but the story of WikiLeaks and questions regarding the ethics of its methods soon overshadowed it. WikiLeaks published a number of other scoops, including details about the U.S. military’s detention facility at Guantánamo Bay in Cuba, a secret membership roster of the British National Party, internal documents from the Scientology movement, and private e-mails from the University of East Anglia’s Climatic Research Unit.

Early WikiLeaks activity and legal issues

Julian AssangeJulian Assange at a conference in Tønsberg, Norway, March 2010.(more)In 2010 WikiLeaks posted almost half a million documents obtained from U.S. Army intelligence analyst Bradley Manning (later called Chelsea Manning)—mainly relating to the U.S. wars in Iraq and Afghanistan. While much of the information was already in the public domain, Pres. Barack Obama’s administration criticized the leaks as a threat to U.S. national security. In November of that year, WikiLeaks began publishing an estimated 250,000 confidential U.S. diplomatic cables. Those classified documents dated mostly from 2007 to 2010, but they included some dating back as far as 1966. Among the wide-ranging topics covered were behind-the-scenes U.S. efforts to politically and economically isolate Iran, primarily in response to fears of Iran’s development of nuclear weapons. Reaction from governments around the world was swift, and many condemned the publication. Assange became the target of much of that ire, and some American politicians called for him to be pursued as a terrorist.

Assange also faced prosecution in Sweden, where he was wanted in connection with sexual assault charges. (It was the second arrest warrant issued for Assange for those alleged crimes; the first warrant was dismissed in August 2010 because of lack of evidence.) Assange was arrested in London in December 2010 and held without bond, pending possible extradition to Sweden. He was eventually released on bail, and in February 2011 a British judge ruled that the extradition should proceed, a decision that was appealed by Assange’s attorneys. In December 2011 the British High Court found that Assange’s extradition case was “of general public importance” and recommended that it be heard by the Supreme Court. This decision allowed Assange to petition the Supreme Court directly for a final hearing on the matter.

In May 2011 Assange was awarded the Sydney Peace Foundation’s gold medal, an honour that had previously been bestowed on Nelson Mandela and the Dalai Lama, for his “exceptional courage in pursuit of human rights.” Assange’s memoir, Julian Assange: The Unauthorised Autobiography, was published against his wishes in September 2011. Assange had received a sizable advance payment for the book, but he withdrew his support for the project after sitting for some 50 hours of interviews, and the resulting manuscript, although at times enlightening, read very much like the early draft that it was.

Get a Britannica Premium subscription and gain access to exclusive content.

Subscribe Now

While Britain’s Supreme Court continued to weigh the matter of Assange’s extradition, he remained under house arrest on the estate of a WikiLeaks supporter in rural Norfolk. From this location, Assange recorded a series of interviews that were collected as The World Tomorrow, a talk show that debuted online and on the state-funded Russian satellite news network RT in April 2012. Hosting the program from a makeshift broadcast studio, Assange began the series with an interview with Hezbollah leader Hassan Nasrallah, Nasrallah’s first with a Western journalist since the 34-day war between Hezbollah and Israel in 2006.

Asylum in the Ecuadoran embassy and impact on the 2016 U.S. presidential election

In June 2012, after his extradition appeal was denied by the Supreme Court, Assange sought refuge in the Ecuadoran embassy. He applied for asylum on the grounds that extradition to Sweden could lead to eventual prosecution in the United States for actions related to WikiLeaks. Assange claimed that such a trial would be politically motivated and would potentially subject him to the death penalty. In August Assange’s request was granted, but he remained confined within the embassy as British and Ecuadoran officials attempted to resolve the issue. Assange began his second year within the walls of the embassy by launching a bid for a seat in the Australian Senate. His WikiLeaks Party, founded in July 2013, performed poorly in the September 7, 2013, Australian general election; it captured less than 1 percent of the national vote and failed to win any seats in the Senate. In August 2015 Swedish prosecutors dropped their investigation of three of the allegations against Assange, as they had been unable to interview him prior to the expiration of a five-year statute of limitations. Swedish authorities continued to pursue an investigation into the outstanding allegation of rape, however, and Assange remained within the Ecuadoran embassy in London.

In 2016 Assange became an active player in the U.S. presidential race, when WikiLeaks began publishing internal communications from the Democratic Party and the campaign of Democratic candidate Hillary Clinton. Assange made no secret of his personal hostility toward Clinton, and the leaks were clearly timed to do maximum damage to her campaign. Numerous independent cybersecurity experts and U.S. law enforcement agencies confirmed that the data had been obtained by hackers associated with Russian intelligence agencies. Despite this evidence, Assange denied that the information had come from Russia. In January 2017 a declassified U.S. intelligence report stated that Assange and WikiLeaks had been key parts of a sophisticated hybrid warfare campaign orchestrated by Russia against the United States. In May 2017, as Assange approached his fifth year under de facto house arrest in the Ecuadoran embassy in London, Swedish prosecutors announced that they had discontinued their investigation into the rape charges against him.

On April 11, 2019, Ecuador withdrew its offer of asylum to Assange, citing repeated violations of both international law and the terms that it had imposed upon him regarding his tenure in the embassy. After securing a written agreement from the British government that Assange “would not be extradited to a country where he could face torture or the death penalty,” Ecuadoran Pres. Lenín Moreno allowed British police to enter the embassy and arrest Assange. While he was no longer subject to investigation in Sweden, Assange was still wanted for failing to appear in British court. He was also the target of an outstanding extradition warrant from the United States for computer crimes.Michael Ray

WikiLeaks Timeline: 12 Years Of Disruption : NPR

WikiLeaks Timeline: 12 Years Of Disruption : NPR

Accessibility links

Skip to main content

Keyboard shortcuts for audio player

Open Navigation Menu

Newsletters

NPR Shop

Close Navigation Menu

Home

News

Expand/collapse submenu for News

National

World

Politics

Business

Health

Science

Climate

Race

Culture

Expand/collapse submenu for Culture

Books

Movies

Television

Pop Culture

Food

Art & Design

Performing Arts

Life Kit

Gaming

Music

Expand/collapse submenu for Music

Tiny Desk

Hip-Hop 50

All Songs Considered

Music Features

Live Sessions

Podcasts & Shows

Expand/collapse submenu for Podcasts & Shows

Daily

Morning Edition

Weekend Edition Saturday

Weekend Edition Sunday

All Things Considered

Fresh Air

Up First

Featured

The NPR Politics Podcast

Throughline

Trump's Trials

Pop Culture Happy Hour

More Podcasts & Shows

Search

Newsletters

NPR Shop

Tiny Desk

Hip-Hop 50

All Songs Considered

Music Features

Live Sessions

About NPR

Diversity

Organization

NPR Network

Support

Careers

Connect

Press

Ethics

WikiLeaks Timeline: 12 Years Of Disruption The impact of WikiLeaks on the world's politics, journalism and culture has been transformative. Here are the highlights.

National Security

12 Years Of Disruption: A WikiLeaks Timeline

April 11, 20192:11 PM ET

David Welna

Enlarge this image

WikiLeaks founder Julian Assange appears at the window of the balcony prior to making an address to the media at the Embassy of Ecuador in London on May 19, 2017.

Justin Tallis/AFP/Getty Images

hide caption

toggle caption

Justin Tallis/AFP/Getty Images

WikiLeaks founder Julian Assange appears at the window of the balcony prior to making an address to the media at the Embassy of Ecuador in London on May 19, 2017.

Justin Tallis/AFP/Getty Images

WikiLeaks was already established as an online outlet for posting secret documents from anonymous leakers well before its massive disclosure of U.S. government and military information in 2010. That was the year WikiLeaks' Australian founder, Julian Assange, faced allegations that led to his seeking asylum in Ecuador's London embassy.

National Security

Julian Assange Arrested, Faces U.S. Charges Related To 2010 WikiLeaks Releases

Here is a timeline of WikiLeaks' key disclosures and related developments. 2007 November: WikiLeaks posts a U.S. Army manual of standard operating procedures for soldiers overseeing al-Qaida suspects held captive at Camp Delta in Guantanamo Bay, Cuba. 2008 September: Two months before the U.S. presidential election, WikiLeaks posts leaked emails from the Yahoo account of Republican vice presidential contender Sarah Palin. 2009 November: WikiLeaks posts more than half-a-million pager messages it claims were sent on Sept. 11, 2001. 2010 April: WikiLeaks posts a classified U.S. military video of a U.S. Apache helicopter gunship firing on what the military says were believed to be armed fighters in New Baghdad, Iraq. Among the 18 killed were two Reuters journalists.

May: Pfc. Bradley (later known as Chelsea) Manning is arrested by the U.S. military and then court-martialed in June, charged with leaking the combat video posted on WikiLeaks as well as classified State Department documents by downloading those documents to a personal computer. July: WikiLeaks posts what it calls "The Afghan War Logs," more than 75,000 classified documents that record previously undisclosed civilian casualties inflicted by the U.S. and coalition forces, details of the pursuit of Osama bin Laden and accounts of stepped-up fighting by the Taliban. August: WikiLeaks founder Julian Assange faces an arrest warrant over allegations of rape and molestation during a visit to Sweden; police question him in Stockholm, where he denies the allegations. October: WikiLeaks posts nearly 400,000 classified military documents it calls "The Iraq War Logs"; they detail the involvement of Iraqi security forces in the torture of prisoners of war, document higher civilian death tolls and describe Iran's support for Iraqi insurgents. November: WikiLeaks posts the first 250,000 of more than 3 million leaked U.S. diplomatic cables from nearly 300 American consulates and embassies worldwide that span the years from 1966 to 2010. December: Assange is arrested in London to face extradition for the Swedish allegations; he is released and put under house arrest after posting bail.

2011 February: WikiLeaks posts seven cables from the U.S. Embassy in Cairo, amid violent clashes between Egyptian security forces and pro-democracy demonstrators; the documents discuss Egypt's human rights and civil liberties violations. April: WikiLeaks posts "The Guantanamo Files," some 800 classified military documents detailing the official allegations of terrorist actions by the men held captive in Guantanamo Bay, Cuba. October: After being removed from Amazon's servers and being allegedly cut off from major credit card companies as well as PayPal and Western Union, WikiLeaks suspends publication of leaked documents to "aggressively fundraise." 2012 February: WikiLeaks starts posting a trove of what it claims are 5 million leaked emails from Stratfor, a private company that describes itself as a "global intelligence company." June: Assange takes refuge in Ecuador's London embassy, where he seeks political asylum. July: WikiLeaks begins posting more than 2 million leaked emails, dating back to 2006, from 680 Syrian government officials and firms. August: Assange is granted political asylum at Ecuador's London embassy; a military judge condemns Manning to a 35-year prison sentence; Manning announces gender transition and asks to be known as Chelsea. 2013 Throughout the year: WikiLeaks posts leaked documents detailing the private negotiations for major trade deals, including the Trans-Pacific Partnership and the Transatlantic Trade and Investment Partnership. 2015 June: WikiLeaks posts leaked documents from the Saudi foreign ministry. July: WikiLeaks begins posting leaked National Security Agency documents revealing American surveillance of German Chancellor Angela Merkel, French President François Hollande, U.N. Secretary-General Ban Ki-moon, as well as two prime ministers, Israel's Benjamin Netanyahu and Italy's Silvio Berlusconi. 2016 July: WikiLeaks posts nearly 20,000 emails and 8,000 attachments from leaders of the Democratic National Committee; Assange later denies allegations that Russian intelligence services were the source of the leak. October: WikiLeaks posts more than 2,000 hacked emails from the account of John Podesta, who at the time was campaign chairman for Democratic presidential nominee Hillary Clinton.

2017 January: Outgoing President Barack Obama commutes Manning's prison sentence, allowing her to be freed in May. March: WikiLeaks starts posting what it calls "Vault 7," which it claims to be a collection of thousands of internal Central Intelligence Agency documents that detail a covert hacking program carried out by the agency as well as malware and software it uses to spy on smart TVs, the operating systems of most smartphones and Web browsers. September: WikiLeaks starts posting the first of what it says are 650,000 leaked critical documents from surveillance contractors working in a Russia ruled by President Vladimir Putin. October: CIA Director Mike Pompeo says the U.S. is "working to take down" WikiLeaks, which he calls "an enormous threat." December: Assange is granted Ecuadorian citizenship. 2018 April: The Democratic National Committee files a lawsuit against WikiLeaks for its role in publishing the DNC's hacked emails. May: Manning's conviction under the Espionage Act is upheld by a U.S. Army Court of Criminal Appeals. November: A document written by a U.S. attorney inadvertently discloses that Assange has been charged under seal by the U.S. 2019 March: Manning is jailed after refusing to testify to a grand jury about what she leaked to WikiLeaks. April: Ecuadorian President Lenín Moreno accuses WikiLeaks of intercepting his private phone calls and hacking photos of his bedroom, his meals and his wife and daughters dancing; Moreno provided no evidence, and WikiLeaks calls the charges "bogus." Assange is arrested at Ecuador's London embassy by British police, accused of skipping bail. The U.S. Justice Department unseals an indictment of Assange dated March 6, 2018, that charges him with "conspiracy to commit computer intrusion."

Facebook

Flipboard

Email

Read & Listen

Home

News

Culture

Music

Podcasts & Shows

Connect

Newsletters

Facebook

Instagram

Press

Public Editor

Corrections

Contact & Help

About NPR

Overview

Diversity

NPR Network

Accessibility

Ethics

Finances

Get Involved

Support Public Radio

Sponsor NPR

NPR Careers

NPR Shop

NPR Events

NPR Extra

Terms of Use

Privacy

Your Privacy Choices

Text Only

Sponsor MessageBecome an NPR sponsor

如何看待wikileaks最新解密的vault 7文件? - 知乎

如何看待wikileaks最新解密的vault 7文件? - 知乎首页知乎知学堂发现等你来答​切换模式登录/注册黑客 (Hacker)维基解密中央情报局计算机安全Vault 7如何看待wikileaks最新解密的vault 7文件?https://wikileaks.org/ciav7p1/ 这些CIA的黑客软件有什么影响显示全部 ​关注者118被浏览7,809关注问题​写回答​邀请回答​好问题​添加评论​分享​1 个回答默认排序知乎用户CIA报告显示美国政府(USG?不确定,欢迎指正)在美国制造的产品上留下漏洞并刻意使其处于开启状态。不言而喻的野蛮行径。什么信息让这次的泄密显得可信?程序和部门名称,例如JQJ(IOC)crypt series,都是真实的。非内部人士无从知晓。(wikileaks发布的)标题错误地暗示了CIA入侵了这些app(Signal,Telegram,WhatsApp,Confide encryption)。然而这些文件显示IOS和安卓才是被入侵的对象,问题更严重了。险从何来?除非将这些被CIA开启的漏洞关闭,否则任何黑客都可以随意利用它们。来来来,这些东西能帮你搞个CIA的大新闻:由于美国政府花钱购买暗门使得美国软件处于危险状态的公开证据。(图中说这些致命漏洞也被国外政府用来监视记者和人权团体)证据显示CIA和FBI明知美国制造的智能手机有着致命弱点却仍纵容漏洞处于开启状态,以达到监视目的。=======================================================================阿登同学和维基解密上一次指摘俄罗斯政府是什么时候?不过我也不由得想起了某文件宣称14天后公布美国本土的利益输送情报,但也后来没有下文了。发布于 2017-03-08 11:33​赞同 20​​4 条评论​分享​收藏​喜欢收起​​

Everything You Need to Know About Wikileaks | MIT Technology Review

Everything You Need to Know About Wikileaks | MIT Technology Review

You need to enable JavaScript to view this site.

Skip to ContentMIT Technology ReviewFeaturedTopicsNewslettersEventsPodcastsSign inSubscribeMIT Technology ReviewFeaturedTopicsNewslettersEventsPodcastsSign inSubscribePolicyEverything You Need to Know About WikileaksTwo experts lay out the facts surrounding the controversy.By Jonathan Zittrainarchive pageMolly Sauterarchive pageDecember 9, 2010What is Wikileaks?Wikileaks is a self-described “not-for-profit media organization,” launched in 2006 for the purposes of disseminating original documents from anonymous sources and leakers. Its website says: “Wikileaks will accept restricted or censored material of political, ethical, diplomatic or historical significance. We do not accept rumor, opinion, other kinds of first hand accounts or material that is publicly available elsewhere.”More-detailed information about the history of the organization can be found on Wikipedia (with all the caveats that apply to a rapidly changing Wiki topic). Wikipedia incidentally has nothing to do with Wikileaks—both share the word “Wiki” in the title, but they’re not affiliated.Who is Julian Assange, and what is his role in the Wikileaks organization?

Julian Assange is an Australian citizen who is said to have served as the editor-in-chief and spokesperson for Wikileaks since its founding in 2006. Before that, he was described as an advisor. Sometimes he is cited as its founder. The media and popular imagination currently equate him with Wikileaks itself, with uncertain accuracy.In 2006, Assange wrote a series of essays that have recently been tapped as an explanation of his political philosophy. A close reading of these essays shows that Assange’s personal philosophy is in opposition to what he calls secrecy-based, authoritarian conspiracy governments, in which category he includes the US government and many others not conventionally thought of as authoritarian. Thus, as opposed to espousing a philosophy of radical transparency, Assange is not “about letting sunlight into the room so much as about throwing grit in the machine.” For further analysis, check out Aaron Bady’s original blog post.

Why is Wikileaks so much in the public eye right now?At the end of November 2010, Wikileaks began to slowly release a trove of what it says are 251,287 diplomatic cables acquired from an anonymous source. These documents came on the heels of the release of the “Collateral Murder” video in April 2010, and Afghan and Iraq War logs in July 2010 and October 2010, which totaled 466,743 documents. The combined 718,030 are said to originate from a single source, thought to be U.S. Army intelligence analyst Pfc. Bradley Manning, who was arrested in May 2010, but that’s not confirmed.Has Wikileaks released classified material in the past?Yes, under an evolving set of models.Berkman Fellow Ethan Zuckerman has some interesting thoughts on the development of Wikileaks and its practices over the years, which will be explained in greater detail when the Berkman Center podcast about Wikileaks is released later this week. In the meantime, here’s a capsule version.Wikileaks has moved through three phases since its founding in 2006. In its first phase, during which it released several substantial troves of documents related to Kenya in 2008, Wikileaks operated very much with a standard wiki model: the public readership could actively post and edit materials, and it had a say in the types of materials that were accepted and how such materials were vetted. The documents released in that first phase were more or less a straight dump to the Web: very little organized redacting occurred on the part of Wikileaks.Wikileaks’s second phase was exemplified with the release of the “Collateral Murder” video in April 2010. The video was a highly curated, produced and packaged political statement. It was meant to illustrate a political point of view, not merely to inform.The third phase is the one we currently see with the release of the diplomatic cables: Wikileaks working in close conjunction with a select group of news organizations to analyze, redact and release the cables in a curated manner, rather than dumping them on the Internet or using them to illustrate a singular political point of view.

What news organizations have access to the diplomatic cables and how did they get them?According to the Associated Press, Wikileaks gave four news organizations (Le Monde, El Pais, The Guardian and Der Spiegel) all 251,287 classified documents before anything was released to the public. The Guardian subsequently shared its trove with The New York Times.So have all 251,287 documents been released to the public?No. Each of the five news organizations is hosting the text of at least some of the documents in various forms with or without the relevant metadata (country of origin, classification level, reference ID). The Guardian and Der Spiegel have performed analyses of the metadata of the entire trove, excluding the body text. The Guardian’s analysis is available for download from its website.Wikileaks itself has released (as of December 7, 2010) 960 documents out of the total 251,287. The Associated Press has reported that Wikileaks is only releasing cables in coordination with the actions of the five selected news organizations. Julian Assange made similar statements in an interview with Guardian readers on December 3, 2010. Cables are being released daily as the five news organizations publish articles related to the content.Is each of the five news organizations hosting all the documents that Wikileaks has released?No. Each of the five news organizations hosts a different selection of the released documents, in different forms, which may or may not overlap. It’s not clear how much they’re coordinating on releasing new documents, since each appears to have a full set and normally newspapers would be eager to scoop one another.How are the five news organizations releasing the cables?

Le Monde has created an application, developed in conjunction with Linkfluence, that hosts the searchable text of several hundred cables. The text can be searched by the sender (country of origin, office or official), date range, persons of interest cited in the docs, classification status, or any combination of the above. Only the untranslated, English text of the cables can be accessed and cut-and-paste is not available.El Pais offers access to more than 200 cables, available in the original English or in Spanish translation, searchable by country of origin and key terms and subjects (such as “Google and China”). These searches also return El Pais articles written on a given subject, often placed ahead of the cables in the search listings. The paper also offers a “How to read a diplomatic cable” feature, explaining what all the abbreviations and technical verbiage mean in plain speak, posted on November 28, 2010.

The Guardian offers the cable data in several forms: It has performed an analysis of metadata of the entire 251,287-document trove, and made it available in several forms (spreadsheets hosted on Google Docs and in downloadable form) as well as infographics.The Guardian also hosts at least 422 cables on its website, searchable by subject, originating country, and countries referenced.The New York Times hosts what it calls a “selection of the documents from a cache of a quarter-million confidential American diplomatic cables that WikiLeaks intends to make public starting on November 28. The webpage goes on to say “A small number of names and passages in some of the cables have been removed by The New York Times to protect diplomats’ confidential sources, to keep from compromising American intelligence efforts or to protect the privacy of ordinary citizens.”The documents are not searchable and are organized by general subject.Who is responsible for redacting the documents? What actions did Wikileaks take to ensure that individuals were not put in danger by publication of the documents?According to the Associated Press and statements released by Wikileaks and Julian Assange, Wikileaks is currently relying on the expertise of the five news organizations to redact the cables as they are released, and it is following their redactions as it releases the documents on its website. (This cannot be verified without examining the original documents, which we have not done—nor are we linking to them here.) According to the BBC, Julian Assange approached the U.S. State Department for guidance on redacting the documents prior to their release. One can imagine the State Department’s dilemma there: assist and risk legitimating the enterprise; don’t assist and risk poor redaction. In a public letter, Harold Koh, legal adviser to the Department of State, declined to assist the organization and demanded the return of the documents.

Are the documents hosted anywhere else on the Internet? What is the “insurance” file?In late July 2010, Wikileaks is said to have posted to its Afghan War Logs site, and to a torrent site an encrypted file with “insurance” in the name. The file, which apparently can still be found on various peer-to-peer networks, is 1.4 gigabytes and is encrypted with AES256, a very strong encryption standard which would make it virtually impossible to open without the password. What is in the insurance file is not known. It has been speculated that it contains the unredacted cables provided by the original source(s), as well as other, previously unreleased information held by Wikileaks. There is further speculation, which has been indirectly boosted by Julian Assange, that the key to the file will be distributed in the event of either the death of Assange or the destruction of Wikileaks as a functioning organization. However, none of these things is known. All that is known for sure is that it’s a really big file with heavy encryption that’s already in a number of people’s hands and floating around for others to get.What happens if Wikileaks gets shut down? Can it be shut down?It depends on what’s meant by “Wikileaks” and what’s meant by “shut down.”

Julian Assange has made statements suggesting that if Wikileaks becomes nonfunctional as an organization, the key to the encrypted “insurance” file will be released (the key itself is not a big document and could presumably fit into Twitter messages). The actual machination of how such a “dead man’s switch” would release the key is not known. If the key were released, and if the encrypted insurance file contains unredacted and unreleased secret documents, then those decrypted files would be available to many people nearly instantaneously. Wikileaks claimed in August that the insurance file had been downloaded more than 100,000 times.Wikileaks apparently maintains a small paid staff—who and where is not exactly on a “people” page, though there used to be a physical P.O. box in Australia where documents could be sent—and is additionally supported by volunteers, speculated to be at most a few thousand. So, would it be possible for a motivated organization to disrupt its real-world infrastructure? Yes, probably. However, at this point, it is not practical to recover the information the organization has already distributed (which includes the entire trove of diplomatic cables to the press as well as whatever is in the encrypted insurance file), as well as any other undistributed information the organization might seek to release. So in terms of the recovery of leaked information, the downfall of Wikileaks as an organization would matter little.Furthermore, there appear to be currently more than 1,000 sites mirroring Wikileaks and its content. Wikileaks has made available downloadable files containing its entire archive of released materials to date.Why did wikileaks.org stop working as a way to find the site?For a traditional website to work it needs a domain name like “website.com” so that people can find it easily with a Web browser. The domain name system (“DNS”) is hierarchical—information is spread from a zone containing several top-level (root) servers down to zones containing lower-level servers—but the top level servers do not determine everything held by servers lower down. Domain names can stop working for any number of reasons. One common assumption is is that the Internet Corporation for Assigned Names and Numbers (ICANN), which manages certain top-level protocol and parameter assignments for the Internet, intervened in the case of Wikileqaks. It did not.A little technical discussion to explain why: The root zone orchestrated by ICANN is a very small file — just a mapping between each top-level domain (“TLD”) like .org or .ch to the IP address(es) of servers designated to say more about that TLD (one server, not in ICANN’s hands, keeps track of names under .org, one for names under .ch, etc.). So the only thing ICANN could do is to all-or-nothing delete .org or .ch, making every domain name with that ending disappear temporarily.Note that wikileaks.org went down not because of anything done to its DNS entry within the list kept by the registry that manages.org domains (full disclosure: I’m on the board of Trustees for the non-profit Internet Society (ISOC) which is the parent to the Public Interest Registry, which keeps track of names in .org). Instead, the name server to which its entry pointed (even lower down the DNS chain) was attacked with a flood of traffic by unknown parties and EveryDNS, the operator of that name server, chose to stop answering queries about Wikileaks in the hopes that the attack would stop. (Apparently it did.) A website also needs hosting, and Wikileaks has apparently had to shift its hosting at least once after being dropped by a chosen provider: Amazon’s commodity hosting service shut down the site for terms of service violations after being contacted by U.S. Senator Joseph Lieberman.On a more technical level, the Wikileaks website can come under attack, and its means of collecting money can be made much more difficult.Jonathan Zittrain is a professor of law and professor of computer science at Harvard, and co-founder of its Berkman Center for Internet & Society; Molly Sauter is a research assistant at the Berkman Center. Further updates will appear at www.jz.org hideby Jonathan Zittrain & Molly SauterSharelinkedinlink opens in a new windowtwitterlink opens in a new windowfacebooklink opens in a new windowemaillink opens in a new windowPopular10 Breakthrough Technologies 2024The EditorsScientists are finding signals of long covid in blood. They could lead to new treatments.Cassandra WillyardAI for everything: 10 Breakthrough Technologies 2024Will Douglas HeavenOpenAI teases an amazing new generative video model called SoraWill Douglas HeavenDeep DivePolicyThree technology trends shaping 2024’s electionsThe biggest story of this year will be elections in the US and all around the globe

By Tate Ryan-Mosleyarchive pageFour lessons from 2023 that tell us where AI regulation is goingWhat we should expect in the coming 12 months in AI policy

By Tate Ryan-Mosleyarchive pageYes, remote learning can work for preschoolersThe largest-ever humanitarian intervention in early childhood education shows that remote learning can produce results comparable to a year of in-person teaching.

By Anya Kamenetzarchive pageThe FTC’s unprecedented move against data brokers, explainedIt could signal more aggressive action from policy makers to curb the corrosive effects that data brokers have on personal privacy.

By Tate Ryan-Mosleyarchive pageStay connectedIllustration by Rose WongGet the latest updates fromMIT Technology ReviewDiscover special offers, top stories,

upcoming events, and more.Enter your emailPrivacy PolicyThank you for submitting your email!Explore more newslettersIt looks like something went wrong.

We’re having trouble saving your preferences.

Try refreshing this page and updating them one

more time. If you continue to get this message,

reach out to us at

customer-service@technologyreview.com with a list of newsletters you’d like to receive.The latest iteration of a legacyFounded at the Massachusetts Institute of Technology in 1899, MIT Technology Review is a world-renowned, independent media company whose insight, analysis, reviews, interviews and live events explain the newest technologies and their commercial, social and political impact.READ ABOUT OUR HISTORYAdvertise with MIT Technology ReviewElevate your brand to the forefront of conversation around emerging technologies that are radically transforming business. From event sponsorships to custom content to visually arresting video storytelling, advertising with MIT Technology Review creates opportunities for your brand to resonate with an unmatched audience of technology and business elite.ADVERTISE WITH US© 2024 MIT Technology ReviewAboutAbout usCareersCustom contentAdvertise with usInternational EditionsRepublishingMIT NewsHelpHelp & FAQMy subscriptionEditorial guidelinesPrivacy policyTerms of ServiceWrite for usContact ustwitterlink opens in a new windowfacebooklink opens in a new windowinstagramlink opens in a new windowrsslink opens in a new windowlinkedinlink opens in a new window

维基解密 - 知乎

维基解密 - 知乎首页知乎知学堂发现等你来答​切换模式登录/注册维基解密维基解密(又称维基泄密、维基揭秘;英语:WikiLeaks),是通过协助知情人让组织、企业、政府在阳光下运作的、无国界、非盈利的互联网媒体。 朱利安·保罗·阿桑奇,一个澳大利亚的互联网积极分子,通…查看全部内容关注话题​管理​分享​百科讨论精华视频等待回答​切换为时间排序教资面试解密Ep1:维基解密,教资面试报名不得不了解的秘密Gabi领资料和加群,请

https://www.craft.do/s/iyUGI8tZuwyt1z

教资面试可以打印准考证啦!是不是后悔了?考试第一天和第二天的题目是否一样?Gabi老师维基解密面试,不看后悔半年,看了面试必过!教资面试所有人…阅读全文​​赞同 9​​25 条评论​分享​收藏​喜欢​ 举报如何看待维基解密创始人阿桑奇于 2019 年 4 月 11 日在伦敦被捕?西风独自凉看好看电影,写最佳影评维基爆料坏了希拉里的好事,川普赢得大选,白左乃至整个欧洲斯坦对阿桑奇恨之入骨: [图片] 希拉里甚至提议用无人机干掉阿桑奇,罪恶是文明的基石嘛,呵呵。 阿桑奇有点像堂吉诃德,他挑战的是民主党、欧洲斯坦等巨无霸…… 为什么早不抓晚不抓? 结束通俄门调查之后,美国强烈要求引渡阿桑奇(维基解密最新消息),作为打击白左的利器,他比任何时候都要吃香——厄瓜多尔一直待价而沽,现在价钱终于谈妥: [图片] 阿桑奇若能提供民主党全委会…阅读全文​​赞同 115​​12 条评论​分享​收藏​喜欢如何评价阿桑奇身体健康状况严重恶化?千秋凛然英雄气学生怕是,没希望了。 各国统治者不会让他活着走出监狱的。 这是一位理想主义的战士! 一位本来能靠才华过上富足生活,却为了人类的福祉,不惜以生命撕开恶魔伪装的人! 弱者要隐私,强者要透明,这个世界正好他妈是反着的! 唯有敬仰! 不知他的理想何日能实现,不知千千万万理想主义者前仆后继所追求的东西何时能到来!阅读全文​​赞同 139​​9 条评论​分享​收藏​喜欢阿桑奇是英雄还是危险分子?彼得·克鲁泡特金民社安康大丈夫当如是也 [图片]阅读全文​​赞同 43​​添加评论​分享​收藏​喜欢维基解密阿桑奇被捕了,接下来他将面临什么?大师兄留学让留学真正成为全民选择对于阿桑奇接下来的命运,他是否会被引渡到美国,谁也说不准。 点击卡片了解更多哦。 昨天,英国伦敦发生了一件震惊世界的大事,英国该不该逮捕阿桑奇? 关注“英国大师兄”,后台回复“教材” 领取20.5G全英文名校教材 回复“雅思”,领取最新雅思福利礼包 昨天,英国伦敦发生了一件震惊世界的大事,维基解密创始人阿桑奇在伦敦被英国警察逮捕。 英国的各大主流媒体几乎都头版头条对这一大事件进行了报道。 [图片] 所有报道几乎都采用…阅读全文​​赞同 29​​10 条评论​分享​收藏​喜欢Wikileaks点赞“灵魂烹饪”发现,1994年纪录片惊人相似Reincarnated.Ra[图片] Wikileaks对网友关于“灵魂烹饪”和Marina Abramovic的对于邪教仪式与行为艺术区分的自我解读点了个赞。 [图片] 细心网友发现了Marina Abramovic对希拉里的捐款达到了2700美金的最高个人上线。 见多识广的美国人民表示早知道了,这次Wikileaks证实了他们的猜测。 https://twitter.com/wikileaks/status/794473977162924032 无独有偶,其实早在1994年就有纪录片推出了关于华盛顿特区的儿童性侵行为与恋童圈子,直达白宫高层。越战老兵与16年的参议员John DeCamp冒死调查。 [图片] 想…阅读全文​​赞同 339​​117 条评论​分享​收藏人民英雄阿桑奇对美国大选的公开声明只增笑耳JasonSimple and direct作者:zj wolf 维基解密网站主页新刊登了如下声明(2016年11月8日) https://wikileaks.org/Assange-Statement-on-the-US-Election.html Assange Statement on the US Election 8 November 2016 By Julian Assange In recent months, WikiLeaks and I personally have come under enormous pressure to stop publishing what the Clinton campaign says about itself to itself. That pressure has come from the campaign’s allies, including the Obama administration, an…阅读全文​​赞同 114​​10 条评论​分享​收藏维基解密有哪些最新猛料?图卢编程爱好者维基解密当年曝光美军机密火速成名的时候,维基百科的创始人还特意出来澄清,我们和他们没关系。题主这么一问,估计吉米·威尔士又要笑cry 了。 Wiki 这个词指代的是可协作文本系统,早年间但凡是想做在线协作内容社区的,都喜欢拿来做域名。阅读全文​​赞同 26​​1 条评论​分享​收藏​喜欢杜特尔特怒喷索罗斯:人权属于索罗斯Reincarnated.Ra[图片] http://www.reuters.com/article/us-philippines-duterte-idUSKBN12Z223 菲律宾总统杜特尔特在星期五晚上关于毒品战争的声明中宣布毒品情况已经大大改观,并感谢中国对于缉毒的大力支持。这个新上任的总统在演讲中却不停抨击美国。 中国替菲律宾捐建了一个很大的戒毒中心。“现在谁帮了菲律宾?中国。”杜特尔特说道。“美国呢?他们说了啥?‘杜特尔特,停止未经法律审判的杀戮。我们会让你负责的。’” “我说了:‘你们可以去地狱了。你们都是屎。你们把菲律宾人当狗看。。。…阅读全文​​赞同 145​​44 条评论​分享​收藏澳总理为维基揭秘创始人阿桑奇发声,促美国结束对其追捕,该事件的具体情况是什么?刘某某兜无碎银几两,偏爱指点江山;身止百十斤肉,妄言民族大义。其实看到斯诺登宣誓成为俄罗斯公民并获得保护那一刻,我就想到了阿桑奇。 同样是西方虚伪民主和美国恶行的揭露者,甚至阿桑奇提供的美军在阿富汗和伊拉克的暴行更直接更有力,为什么他会被遗忘? 个人认为,其他时候就算了,但在斯诺登成为俄罗斯公民而举世瞩目的时候,还在英国伦敦监狱里面的阿桑奇不该被遗忘。 简单描述一下阿桑奇的事吧: 朱利安.阿桑奇,1971年7月出生在澳大利亚汤斯维尔; 1987年开始学习编程,主攻黑客技…阅读全文​​赞同 72​​3 条评论​分享​收藏​喜欢阿桑奇被捕有哪些罪名成立?一头雾水资深潜水员(1)瑞典抓阿桑奇的罪名是”涉嫌性侵和强奸“(allegations of sexual assault and rape) 但当初瑞典抓阿桑奇的罪名成立吗? 任何当时关心过瑞典案的人都很容易看出那是一出典型的“女色设局”。其发生在曼宁爆料几个月之后,奥巴马司法部正考虑如何抓捕阿桑奇并与瑞典官方接触后发生的。事实上阿桑奇在“女色设局”之前就公开预言美国正在想办法引渡他(奥巴马政府的司法部长霍德要修理阿桑奇的话已泄露出来),尽管不知道以…阅读全文​​赞同 47​​14 条评论​分享​收藏​喜欢应该如何评价阿桑奇和他的维基解密?WarOH协虎用通俗的语言科普军史故事、武器装备,传播军史正能量2010年,一段伊拉克战争的视频在全世界互联网上流传,视频内容是美国陆军航空部队在伊拉克的屠杀。 该事件发生于2007年夏天,美国陆军航空兵两架“阿帕奇”在巴格达“剿匪”,他们直接向地上的居民扫射,打死平民十几人。这些视频本来都是美国陆军的高度机密,是绝不可能外传的,事件发生后美国政府严查泄密事件,最后找到了一个网站——维基解密。 [图片] 维基解密,这个如今大名鼎鼎的网站在当年还比较冷门, 其创始人是澳大利亚著名…阅读全文​​赞同 38​​2 条评论​分享​收藏​喜欢希拉里谋杀Scalia跟进:另一封邮件是交易合同Reincarnated.Ra在此声明:此栏目十分政治不正确外加阴谋论,对于已经发生过的被“证明”的真相毫无兴趣。比如谁都知道的希特勒用4个炉子奥斯维辛集中营杀了多达几百万犹太人这种事情,泰坦尼克号是自然事故之类的是不会报道的。喜欢阴谋论的低智商小朋友请像我一样戴好Tinfoil Hat。理客中IQ200们还请带着你们“希拉里真做出这种事早就被告了”的思维到别的栏目刷蓝瘦香菇,屑屑。 ----------------------------------------------------------…阅读全文​​赞同 130​​55 条评论​分享​收藏阿桑奇被捕,如何看待维基解密与阿桑奇?彼得·克鲁泡特金民社安康“自由”的西方逮捕阿桑奇,因为他追求的是真正的自由,而敌人只是用虚伪的“自由”来欺骗人民。那不仅是阿桑奇的敌人,更是全人类的敌人。 —— 忠告 全世界所有热爱自由、热爱正义、热爱真理的人——应该支持他。自由无国界。支持他就是支持自己。阿桑奇遭遇了卑劣的背叛,但是阿桑奇从未背叛自由与人民,自由与人民也绝不会背叛阿桑奇。 一个无一兵一卒一官一职的人,却令全世界反动势力所忌惮、视之为眼中刺肉中钉。这是其作…阅读全文​​赞同 650​​24 条评论​分享​收藏​喜欢如何看待维基解密创始人阿桑奇于 2019 年 4 月 11 日在伦敦被捕?王子君手中钱、脚下路、steamdeck的重量,均不使我心安谢邀。 在权力面前英雄是什么?工具。 现在工具的价值已经用尽,工具人的使命结束了。 斯诺登能喘着气离开香港,阿桑奇能够躲在厄瓜多尔大使馆7年,背后都是有着艰深错杂的大国博弈。否则,我们就把国家机关想的太弱小,太无能了。 官僚体制虽然在维系工种上一贯表现的臃肿低效,但是一旦这套系统被动员起来解决某些问题,配合国家所拥有的资源,其效率往往令人咋舌。 这就是国家意志。 阿桑奇从获得庇护那一天,就已经注定了被…阅读全文​​赞同 4055​​146 条评论​分享​收藏​喜欢应该如何评价阿桑奇和他的维基解密?dzdxy是阿桑奇和他的同伴们在提醒我们正身处一个满是谎言和荒谬的世界。但即便如此,他还是要遭受牢狱之灾。难道这本身不是一件更大的丑闻? 不用说阿桑奇这类名人了。还有许多无政府主义者,比如正在遭受意大利41 BIS特别隔离监禁的无政府主义者阿尔弗雷多·科斯皮托(Alfredo Cospito)同志,他被以“政治大屠杀”的荒谬理由判决。法西斯分子杀害青年会被释放,但无政府主义者的反抗则成了“政治大屠杀”。 41 BIS对于革命者来说就像…阅读全文​​赞同 31​​添加评论​分享​收藏​喜欢奥巴马。。。撒谎可不是好孩子!Reincarnated.Ra最新Wikileaks邮件有一份劲爆泄密: 2015年邮件门爆发的时候有人采访了奥巴马问他是不是知晓希拉里使用私人邮箱。奥巴马回答了不知道。 [图片] https://twitter.com/katherinemiller/status/574350749280432129/photo/1 这一条链接竟然出现在了Wikileaks的邮件里!具体就是希拉里团队也观察到了奥巴马的言论,但他们知道奥巴马曾发给希拉里不是政府gov结尾的邮箱来讨论重大问题,所以奥巴马这个不知情肯定站不住脚,得赶紧把相关邮件删光! [图片] WikiLeaks - The Podesta Emails 现在问题来了:…阅读全文​​赞同 133​​18 条评论​分享​收藏怎样让阿桑奇(维基解密创始人)免受牢狱之灾?Punk rabbiT非线性黑客,懂的比你多阿桑奇被英国关的都不成人形了,他父亲上次去看望说他身体状况还不如他,说实话他的健康都是个问题了,释放就别想了,阿桑奇唯一有可能活命的机会就是当初直接去俄罗斯,跟斯诺登一样,但是他选择了躲进英国厄瓜多尔的大使馆,其实就已经是个死人了阅读全文​​赞同 96​​17 条评论​分享​收藏​喜欢浏览量6170 万讨论量4.7 万 帮助中心知乎隐私保护指引申请开通机构号联系我们 举报中心涉未成年举报网络谣言举报涉企虚假举报更多 关于知乎下载知乎知乎招聘知乎指南知乎协议更多京 ICP 证 110745 号 · 京 ICP 备 13052560 号 - 1 · 京公网安备 11010802020088 号 · 京网文[2022]2674-081 号 · 药品医疗器械网络信息服务备案(京)网药械信息备字(2022)第00334号 · 广播电视节目制作经营许可证:(京)字第06591号 · 服务热线:400-919-0001 · Investor Relations · © 2024 知乎 北京智者天下科技有限公司版权所有 · 违法和不良信息举报:010-82716601 · 举报邮箱:jubao@zhihu.

How Has WikiLeaks Managed to Keep Its Web Site Up and Running? | Scientific American

How Has WikiLeaks Managed to Keep Its Web Site Up and Running? | Scientific American

Skip to main contentScientific AmericanSign inDecember 7, 20108 min readHow Has WikiLeaks Managed to Keep Its Web Site Up and Running?Despite cyber attacks, the loss of key service providers and threats from government officials worldwide, the controversial site continues to add to its online cache of cablegate documentsBy Larry GreenemeierTechnologyOn supporting science journalismIf you're enjoying this article, consider supporting our award-winning journalism by subscribing. By purchasing a subscription you are helping to ensure the future of impactful stories about the discoveries and ideas shaping our world today.The arrest of WikiLeaks founder Julian Assange in London Tuesday may have brought an end to the standoff between the 39-year-old Australian and European law enforcement, but the organization he leads has vowed to continue releasing sensitive documents. Just how WikiLeaks has been able to continue posting classified material from U.S. and other nations' diplomats and officials—despite numerous cyber attacks against the Web site and the defection of key service providers—is a bit of Internet trickery commonly deployed by legitimate and criminal online organizations alike to protect themselves from traffic spikes and from being shut down. Such is the persistence of information in the Internet Age.

PRQ.se, the Swedish Internet service provider hosting the original wikiLeaks.org Web site, has reported denial-of-service (DOS) attacks against its servers hosting WikiLeaks material. In a DOS attack computers are programmed to flood Internet servers with requests for data to the extent that those servers cannot function. WikiLeaks has since moved its Web site to the wikiLeaks.ch address. The organization last week was cut off from its provider of domain name system (DNS) service, which is used to route Internet traffic from a Web address, such as wikiLeaks.org, to the actual Internet Protocol (IP) address where WikiLeaks's data resides. EveryDNS.net dropped wikiLeaks.org as a client on December 2, citing the danger that the cyber attacks aimed at that site poses to the service's 500,000 other clients.

The U.S. government has spent the past week sticking its fingers in the dike that Wikileaks breached. The Library of Congress on December 3 confirmed that it is blocking access to the WikiLeaks site across its computer systems, including those for use by patrons in the reading rooms. "The Library decided to block Wikileaks because applicable law obligates federal agencies to protect classified information. Unauthorized disclosures of classified documents do not alter the documents' classified status or automatically result in declassification of the documents," according to a statement on the Library of Congress Web site. Many, but not all, of the documents published as part of "cablegate" contain classified information.

Yet, by keeping copies of its Web site hosted at 507 different locations, or "mirror sites," worldwide, WikiLeaks persists. In general, the organization encrypts its data and keeps the source of its whistle-blower submissions anonymous. In addition, at any given time WikiLeaks computers are feeding hundreds of thousands of fake submissions throughout its network to obscure the real documents, their points of origin and their destinations, The New Yorker reported in June.

A posting on the WikiLeaksTwitter feed Tuesday morning read: "Today's actions against our editor-in-chief, Julian Assange, won't affect our operations: We will release more cables tonight as normal." Meanwhile, Assange fights extradition to Sweden, where he is accused of one count of rape, one charge of unlawful coercion and two allegations of sexual molestation stemming from a trip to that country in August.

To better understand how WikiLeaks has been able to keep its Web site functioning despite having incurred the ire of the U.S. government and many of its allies, Scientific American spoke with Hemanshu Nigam, a former U.S. Department of Justice prosecutor of child and computer crimes who has also held high-level cyber security positions at Microsoft and News Corp. Nigam, who in May founded his own online safety, security and privacy firm called SSP Blue, points out that WikiLeaks's resilience is an important reminder of the care that must be taken by governments and individuals alike with important information, that once shared, rarely ever goes away completely.

[An edited transcript of the interview follows.]

The cat-and-mouse game that WikiLeaks is playing with authorities worldwide is a prime example of the persistence of information on the Internet. Of course, the cat is fully out of the bag now that media outlets are reporting extensively on the contents of the leaked files, but why couldn't the U.S. government or some other entity simply shut down direct access to WikiLeaks's cablegate files?

You can shut down a Web site, but there's no question an individual intent on distributing that information will already have thought about keeping a copy of it in multiple other locations, either online or offline. When you run a Web site, if you're worried about an attack on that Web site, whether it's a distributed denial-of-service attack or some sort of virus attack, the best solution to those worries is to create backup plans. There could be a copy of that information sitting on a thumb drive that everyone buys at Costco for really cheap nowadays. It could be backed up on a CD. It could be stored with a cloud network storage company that can be accessed from anywhere. That's why this is a pretty significant challenge for the government to try to shut down a site—the task is, frankly, impossible.

What can be done to stem the tide of information?

If you think [Assange] has done something criminal in nature and against national security, then focus on the arrest and prosecution, and focus on recovering the diplomatic damage that's already been done.

Over the past week, the WikiLeaks Web site has been brought down due to distributed denial-of-service [DOS] attacks, and then subsequently brought back online. What tools and techniques are available to Web sites to enable them to route and re-route access?

One tool is redirection, where you could have 10 different Web site addresses set up that send you to a particular location. [For example, readers who visit SciAm.com will automatically be redirected to ScientificAmerican.com.] Another option is to set up mirror sites—if the core Web server goes down, there's another Web server at a different location that will have the exact same look, feel and content. Redirects and mirror sites are common and they're necessary in order to run a legitimate business online.

Beyond the proactive steps that can be taken, the Web keeps a cache of data even after it has been taken offline. Google is a perfect example of a data cache—it doesn't actually go out on the Internet and crawl with its crawling capabilities to go find what you're looking for and bring it back to you each time you do a search. It's already done that; it's spent hours and hours of background computing time crawling the Web, sorting it and organizing it, putting it in a way that when you search for something, Google goes into its own cached data set to find it. The history maintained by your Web browser is another example of a data cache. In addition, some Web searches will return listings containing a "cached" hyperlink. When you click on that link, the original site may not exist, but the cache may still be there. It can take anywhere from three months to a year for Web browsers to re-crawl the Internet and update their cache to shed deleted Web pages.

Malicious hackers use these methods as well as proxy servers to obfuscate the location of their data and avoid prosecution. Are there legitimate uses for proxies, redirection, mirror sites and data caches?

A lot of legitimate sites use proxy servers, for example, because they keep data requests from being bottlenecked at a single server and make data flow faster. This can also be used to hide your location, which is useful when you're operating a controversial site and are worried about it being attacked or vandalized online. You could be standing up for a cause that you believe in such as gay rights and you have a Web site dedicated to that, but you're worried that people against your cause will try to take your site down. Then you would want to try to use proxies and route the data traffic to other locations, jump from one router to another and put the site behind a caching wall. You use multiple layers of security to protect yourself. Of course, proxy servers are also used by those doing things that are illegal to help avoid prosecution.

EveryDNS.net, a provider of domain name system [DNS] service that routes Internet traffic from domain names to IP addresses, dropped the wikiLeaks.org account last week. EveryDNS.net does not host content, however, so what did this action mean for WikiLeaks?

Basically if you don't have a DNS provider, nobody can find you. When you punch in wikiLeaks.org, your system says, I need to go find wikiLeaks.org, so it goes to a DNS provider that says, "I can point you to that direction." When you take that away that DNS provider there's nobody telling the computer where to go to retrieve it. You in essence go dark.

EveryDNS.net indicated on its Web site that  having WikiLeaks as a client—and providing DNS services for the site's content—put other clients at a security risk. Could cyber attacks against wikiLeaks.org actually endanger other EveryDNS.net sites?

I think this is a positive statement [by EveryDNS.net] and has a lot to do with them being worried about their reputation and being seen as aligned with a guy who may be charged pretty soon with crimes against the United States. This is what I would drop into the category of corporate reputation management. From a security perspective, I don't think there's really a worry here, unless what they're worried about is a potential anti-WikiLeaks attacker saying, "I'm going to go after all of your clients simply because you are supporting wikiLeaks.org."

All of the documents posted to WikiLeaks's Web site thus far amount to a few gigabytes of data. Now WikiLeaks claims to have a 1.4-gigabyte "insurance" file, or poison pill, (containing information about BP and Guantánamo Bay) protected by a 256-digit key encryption to use in the event founder Julian Assange is prosecuted or the Web site is permanently shuttered. Why is this significant? What would it take to decrypt such a heavily protected file?

Use of 256-digit key encryption is [a level of encryption that is] more than serious—it's ridiculous. Here's a guy who's backed into a corner and who's telling the world that he has the button to what in his mind is a nuclear bomb. What he's saying is, "I have a file that is guarded heavily that you can't break into but I can." He's set it up in a way that there is nothing that can be done to destroy or tamper with the file—it would take you years to decrypt 256-digit encryption.

What does the WikiLeaks incident tell people about the way information lives on the Internet, and what lesson should be learned here?

The message is loud and clear to individuals, businesses and the government. On your laptop you should have a sentence taped to the top of your screen that says, "Before I hit send, do I want to see this on the front page of The New York Times or in Scientific American?" Once you hit send and send it to the Internet world, it's going to be persistent—and in many ways permanent. If you don't put certain information onto the public Net, you're not going to have this problem in the first place. The message to the government is that as much as it wants to embrace the digital world it still needs to take almost a pause and look at the data they have and consider whether that data should be stored in digital form. If it is going to go into digital form, then there's a very long list of security measures that the government needs to be focused on. The government really needs to be on a red-alert status when it comes to protecting their top-secret information.Rights & PermissionsLarry Greenemeier is the associate editor of technology for Scientific American, covering a variety of tech-related topics, including biotech, computers, military tech, nanotech and robots.More by Larry GreenemeierExpand Your World with ScienceLearn and share the most exciting discoveries, innovations and ideas shaping our world today.SubscribeSign up for our newslettersSee the latest storiesRead the latest issueFollow Us:Return & Refund PolicyAboutPress RoomFAQsContact UsInternational EditionsAdvertiseSA Custom MediaTerms of UsePrivacy PolicyCalifornia Consumer Privacy StatementUse of cookies/Do not sell my dataScientific American is part of Springer Nature, which owns or has commercial relations with thousands of scientific publications (many of them can be found at www.springernature.com/us). Scientific American maintains a strict policy of editorial independence in reporting developments in science to our readers.© 2024 SCIENTIFIC AMERICAN, A DIVISION OF SPRINGER NATURE AMERICA, INC.ALL RIGHTS RESERVED.

Wikileaks: 8 biggest leaks in its history | TechRadar

Wikileaks: 8 biggest leaks in its history | TechRadar

Skip to main content

Open menu

Close menu

Tech Radar

TechRadar the technology experts

Search

Search TechRadar

RSS

US EditionAsiaSingaporeEuropeDanmarkSuomiNorgeSverigeUKItaliaNederlandBelgië (Nederlands)FranceDeutschlandEspañaNorth AmericaUS (English)CanadaMéxicoAustralasiaAustraliaNew Zealand

Phones

Computing

TVs

Streaming

Health

Audio

Cameras

More

Home

News

Best

Reviews

Opinion

How to

Versus

Deals

Coupons

Tech Radar Pro

Tech Radar Gaming

TrendingApple Vision Pro reviewSamsung Galaxy S24 Ultra reviewSamsung Galaxy S24 reviewGalaxy RingWordle hintsBest VPN

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Computing

Internet

Wi-Fi & Broadband

Wikileaks: 8 biggest leaks in its history

News

By Marc Chacksfield published 29 November 2010

From BNP lists to the Iraq War documents

Wikileaks - leakiest site around

Page 1 of 2:

BNP, Scientology and Sarah Palin

BNP, Scientology and Sarah Palin

Web censorship, climate and the Bilderbergers

The most important website in the world right now isn't Facebook, Google or Twitter but one that's lifting the lid on the machinations of governments the world over. It's also shining a light on racist political parties and trying to out those who are actively censoring the web.Wikileaks, for good or bad, is offering up the truth in a way that's not been seen before.Its motto is "to publish fact-based stories without fear or favour" and it's a site run by volunteers who seemingly seek nothing but fact.This week saw the biggest leak yet for the site. A total of 251,287 United States embassy cables were put onto torrents for anyone to download.According to Wikileaks, it's "the largest set of confidential documents ever to be released into the public domain."The documents go as far back as 1966 and offering them up to the public has seen the US and many other countries go into diplomatic crisis overload.But this isn't the first time Wikileaks has managed to deliver documents that have embarrassed whole countries and it certainly won't be the last.Below are 8 of the biggest leaks from a website that's only been around for four short years, but has already left a legacy that will last for decades to come.1. Scientology exposedIt's one of the most secretive religions in the world. Founded by sci-fi author L Ron Hubbard in 1952 and now seen as the religion of choice by the Hollywood elite, the methods of the Church of Scientology have been shrouded in secrecy for a long time.Wikileaks changed all this by posting "the collected secret 'bibles' of Scientology" – a whole host of documents that explained the hierarchy within Scientology.The religion and its lawyers were not best pleased.2. BNP membership list releasedFor some reason, not everybody in the British National Party is happy to have their name associated with the BNP.This became apparent when Wikileaks (and other blogs) published details of every member of the far-right political part, including addresses and what they did for a living.The document meant that anybody who downloaded the information could CTRL+F their way to finding out who in their hometown was paying the BNP to pedal its non-immigration stance.Teachers were exposed, as were members of the UK police force, which was bad news for the officers – it's illegal to be in the police and support the party.3. Afghan War logsThe leaking of the Afghan War Logs put Wikileaks firmly in the public conscience, mainly due to the US government publicly condemning the information that was made available to the public.Talk of torture, the death of civilians and a multitude of cover-ups did not make for light reading, but did show off the true horror of what was seen by many as an unwinnable war.4. Sarah Palin's email account gets hackedPalin's latest slip of the tongue made her North Korea's latest fan recently, but it was her outed Yahoo email accounts that caused even more embarrassment back in 2008.According to information given to Wikileaks, Palin was using her private Yahoo account to send work messages – a minor faux pas, but one that is strictly forbidden when you're part of the US government.Considering she may well be running for President in the near future, we really hope she doesn't make the same mistake again. Or at least updates her personal email to something a bit hipper, like Gmail.

1

2

Current page:

BNP, Scientology and Sarah Palin

Next Page Web censorship, climate and the Bilderbergers

Get daily insight, inspiration and deals in your inboxGet the hottest deals available in your inbox plus news, reviews, opinion, analysis and more from the TechRadar team.Contact me with news and offers from other Future brandsReceive email from us on behalf of our trusted partners or sponsorsBy submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.

Marc ChacksfieldSocial Links NavigationMarc Chacksfield is the Editor In Chief, Shortlist.com at DC Thomson. He started out life as a movie writer for numerous (now defunct) magazines and soon found himself online - editing a gaggle of gadget sites, including TechRadar, Digital Camera World and Tom's Guide UK. At Shortlist you'll find him mostly writing about movies and tech, so no change there then.

More about wi fi broadbandDo you dread trying to change your router settings? Login problems could soon be a thing of the pastGoogle’s Nest Wi-Fi routers have vanished from the Google Store - could a Wi-Fi 7 model be inbound?LatestWe have a technology skills mismatch problem and only IT can fix itSee more latest ►

Most PopularFinal Fantasy 14's massive graphical overhaul will bring in new players but ease worries about the game's future, says directorBy Demi WilliamsMarch 06, 2024Forget Windows and macOS — Linux market share reaches a new high as users search for an alternativeBy Luke HughesMarch 06, 2024Ghost of Tsushima Director’s Cut is coming to PC later this yearBy Dashiell WoodMarch 06, 2024Another big reason to install iOS 17.4 right now – it fixes two major security threatsBy Alex BlakeMarch 06, 2024Google TV is now streaming over 35 Oscar nominee movies for free – here’s the full listBy Amelia SchwankeMarch 06, 2024The UK is “on track to become the world’s next Silicon Valley” as Jeremy Hunt reveals the Spring Budget, but cybersecurity gets no mentionBy Benedict CollinsMarch 06, 2024These two ransomware giants are joining forces to hit more victims across the worldBy Sead FadilpašićMarch 06, 2024Your Roku TV and streaming stick will stop working unless you agree to controversial new termsBy Amelia SchwankeMarch 06, 2024Elden Ring players seemingly uncover the 'small element' related to Shadow of the Erdtree mentioned by director MiyazakiBy Demi WilliamsMarch 06, 2024Dodge flexes its muscle with the first all-electric Charger DaytonaBy Leon PoultneyMarch 06, 2024Warner Bros. outlines its future strategy, plans on focusing on its biggest franchises and live-service games instead of 'volatile' AAA titlesBy Demi WilliamsMarch 06, 2024

MOST POPULARMOST SHARED1If the Galaxy Z Fold 6 Ultra is real it could finally change my mind about foldable phones24 new movies coming to Max in March 2024 with over 90% on Rotten Tomatoes3VMware customers are jumping ship as Broadcom sales continue - here's where they're moving to4Octopus is undercutting Blackmagic with its low-cost Super 16 cine camera with Arri Alexa chops5This new Microsoft Teams update is a small one — but it could easily cost you your job1Nvidia CEO predicts the death of coding — Jensen Huang says AI will do the work, so kids don't need to learn2AI is going to change your phone – and your face. Here's how34 new movies coming to Max in March 2024 with over 90% on Rotten Tomatoes4VMware customers are jumping ship as Broadcom sales continue - here's where they're moving to5Octopus is undercutting Blackmagic with its low-cost Super 16 cine camera with Arri Alexa chops

TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.

About Us

Contact Future's experts

Contact Us

Terms and conditions

Privacy policy

Cookies policy

Advertise with us

Web notifications

Accessibility Statement

Careers

©

Future US, Inc. Full 7th Floor, 130 West 42nd Street,

New York,

NY 10036.