Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

WikiLeaks Set 21st Century Model for Cyber-Leak Journalism

Using cryptography and virtual drop boxes, Julian Assange’s WikiLeaks created a revolutionary new model for media to lure massive digitized leaks from whistleblowers, exposing everything from US military secrets to wealthy tax-dodgers’ illicit offshore accounts.

Using cryptography and virtual drop boxes, Julian Assange’s WikiLeaks created a revolutionary new model for media to lure massive digitized leaks from whistleblowers, exposing everything from US military secrets to wealthy tax-dodgers’ illicit offshore accounts.

Assange’s arrest in London Thursday on a US extradition request to face charges of computer crimes could spell the end of 13-year-old WikiLeaks.

But his legacy will live long in the world’s media.

News outlets and journalists everywhere can now offer to potential sources encrypted apps and secure virtual mailboxes to receive secrets that were once divulged by discreet whispers, furtive phone calls and unmarked manila envelopes.

Skilled at hacking and cryptography — and motivated by a deep distrust of traditional institutions — Australia-born Assange took a cypherpunk’s libertarian streak to the challenge of government secrecy.

In 2006 he built an online platform that offered an anonymous, encrypted path to leak computerized files without fear of exposure.

– ‘We liberated cryptography’ –

Leaks have forever been crucial currency in journalism. But no one had before created a convenient, relatively easy-to-use electronic drop box that could almost instantly, with absolute secrecy, take delivery of gigabytes of documents.

Advertisement. Scroll to continue reading.

And he did it at a ripe time, as the connected world emerged and social media took off.

For Assange, it was the democratization of powers that had before belonged to governments alone. “Cryptography was then the exclusive property of states,” he wrote in 2013.

“By writing our own software and disseminating it far and wide we liberated cryptography, democratized it and spread it through the frontiers of the new internet.”

WikiLeaks’ first release in December 2006 was an apparent assassination order by a Somali rebel leader that may or may not have been authentic.

But it drew attention. Over the next year, WikiLeaks obtained documents baring the Kenyan leader’s corruption, the secret operating rules for the US Guantanamo Bay prison camp, and offshore banking records from a Swiss bank.

It began scooping mainstream media on stories from secret climate discussions to Iran’s nuclear activities and Icelandic banking fraud.

– The Manning files –

In 2010 US army intelligence official Chelsea Manning — a transgender woman then known as Bradley — began secretly feeding hundreds of thousands of classified files to WikiLeaks.

They showed possible war crimes by US forces in Iraq and Afghanistan, including a never-before-seen video of a US helicopter attack in Iraq that killed 18 people, including civilians and two Reuters journalists.

The stunning leak could not have been carried out in the old days of faxes and printers and it put WikiLeaks into the mainstream.

Assange partnered with The New York Times, The Guardian, Der Spiegel, and others to help sort through and make sense of the Manning material. WikiLeaks won awards and Assange was put on the cover of Time magazine.

“What WikiLeaks demonstrated was the potential for a stateless transparency organization to get around the ability of the most powerful governments in the world to suppress information,” said Micah Sifry, author of a 2011 book on WikiLeaks.

– WikiLeaks copycats –

Almost as soon as he hit that peak, Assange’s star began to fade.

Political pressure to counter WikiLeaks was huge. A multi-country effort got major credit card and payment firms to cut WikiLeaks’ financial lifeline of donations.

And he began to fall out with collaborators, a victim of his domineering personality that made WikiLeaks a one-man show, and his insistence that leaked material be published unedited, including that information that could harm people — soldiers in the field, human rights activists and others.

But by 2012 others were already adopting his model of setting up encrypted, anonymous paths for leakers to hand over documents.

WikiLeaks copycat sites opened in different countries. Journalists became trained in the use of encryption and secret file transfers.

“Exposing the secrets of the US government was a powerful signal that nobody could keep information under control in the internet age,” said Sifry.

US whistleblower Edward Snowden did not deliver his trove of hundreds of thousands of top-secret intelligence and military documents to a media drop-box in 2013.

But he used encrypted communications that Assange helped popularize to communicate with the journalists he collaborated with.

In 2013 the Freedom of the Press Foundation, which had aided WikiLeaks with financing, developed a new anonymous drop box free for anyone to use: SecureDrop.

The New Yorker, an early adopter, explained its value to leakers: “As it’s set up, even we won’t be able to figure out where files sent to us come from. If anyone asks us, we won’t be able to tell them.”

SecureDrop is important to the most successful WikiLeaks-like operation, the International Consortium of Investigative Journalists.

In recent years it has obtained from leakers millions of financial account files detailing money laundering and tax avoidance from offshore banking centers — the “Panama Papers” and “Paradise Papers.”

The top of the ICIJ’s web page offers links to SecureDrop and other encrypted tools for sharing information.

And it has one simple invitation for its users: “Leak to us.”

Related: Julian Assange – A Decade of Stunning Leaks of U.S. Secrets

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

Former DoD CISO Jack Wilmer has been named CEO of defensive and offensive cyber solutions provider SIXGEN.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...