Security Experts:

Connect with us

Hi, what are you looking for?



WikiLeaks Set 21st Century Model for Cyber-Leak Journalism

Using cryptography and virtual drop boxes, Julian Assange’s WikiLeaks created a revolutionary new model for media to lure massive digitized leaks from whistleblowers, exposing everything from US military secrets to wealthy tax-dodgers’ illicit offshore accounts.

Using cryptography and virtual drop boxes, Julian Assange’s WikiLeaks created a revolutionary new model for media to lure massive digitized leaks from whistleblowers, exposing everything from US military secrets to wealthy tax-dodgers’ illicit offshore accounts.

Assange’s arrest in London Thursday on a US extradition request to face charges of computer crimes could spell the end of 13-year-old WikiLeaks.

But his legacy will live long in the world’s media.

News outlets and journalists everywhere can now offer to potential sources encrypted apps and secure virtual mailboxes to receive secrets that were once divulged by discreet whispers, furtive phone calls and unmarked manila envelopes.

Skilled at hacking and cryptography — and motivated by a deep distrust of traditional institutions — Australia-born Assange took a cypherpunk’s libertarian streak to the challenge of government secrecy.

In 2006 he built an online platform that offered an anonymous, encrypted path to leak computerized files without fear of exposure.

– ‘We liberated cryptography’ –

Leaks have forever been crucial currency in journalism. But no one had before created a convenient, relatively easy-to-use electronic drop box that could almost instantly, with absolute secrecy, take delivery of gigabytes of documents.

And he did it at a ripe time, as the connected world emerged and social media took off.

For Assange, it was the democratization of powers that had before belonged to governments alone. “Cryptography was then the exclusive property of states,” he wrote in 2013.

“By writing our own software and disseminating it far and wide we liberated cryptography, democratized it and spread it through the frontiers of the new internet.”

WikiLeaks’ first release in December 2006 was an apparent assassination order by a Somali rebel leader that may or may not have been authentic.

But it drew attention. Over the next year, WikiLeaks obtained documents baring the Kenyan leader’s corruption, the secret operating rules for the US Guantanamo Bay prison camp, and offshore banking records from a Swiss bank.

It began scooping mainstream media on stories from secret climate discussions to Iran’s nuclear activities and Icelandic banking fraud.

– The Manning files –

In 2010 US army intelligence official Chelsea Manning — a transgender woman then known as Bradley — began secretly feeding hundreds of thousands of classified files to WikiLeaks.

They showed possible war crimes by US forces in Iraq and Afghanistan, including a never-before-seen video of a US helicopter attack in Iraq that killed 18 people, including civilians and two Reuters journalists.

The stunning leak could not have been carried out in the old days of faxes and printers and it put WikiLeaks into the mainstream.

Assange partnered with The New York Times, The Guardian, Der Spiegel, and others to help sort through and make sense of the Manning material. WikiLeaks won awards and Assange was put on the cover of Time magazine.

“What WikiLeaks demonstrated was the potential for a stateless transparency organization to get around the ability of the most powerful governments in the world to suppress information,” said Micah Sifry, author of a 2011 book on WikiLeaks.

– WikiLeaks copycats –

Almost as soon as he hit that peak, Assange’s star began to fade.

Political pressure to counter WikiLeaks was huge. A multi-country effort got major credit card and payment firms to cut WikiLeaks’ financial lifeline of donations.

And he began to fall out with collaborators, a victim of his domineering personality that made WikiLeaks a one-man show, and his insistence that leaked material be published unedited, including that information that could harm people — soldiers in the field, human rights activists and others.

But by 2012 others were already adopting his model of setting up encrypted, anonymous paths for leakers to hand over documents.

WikiLeaks copycat sites opened in different countries. Journalists became trained in the use of encryption and secret file transfers.

“Exposing the secrets of the US government was a powerful signal that nobody could keep information under control in the internet age,” said Sifry.

US whistleblower Edward Snowden did not deliver his trove of hundreds of thousands of top-secret intelligence and military documents to a media drop-box in 2013.

But he used encrypted communications that Assange helped popularize to communicate with the journalists he collaborated with.

In 2013 the Freedom of the Press Foundation, which had aided WikiLeaks with financing, developed a new anonymous drop box free for anyone to use: SecureDrop.

The New Yorker, an early adopter, explained its value to leakers: “As it’s set up, even we won’t be able to figure out where files sent to us come from. If anyone asks us, we won’t be able to tell them.”

SecureDrop is important to the most successful WikiLeaks-like operation, the International Consortium of Investigative Journalists.

In recent years it has obtained from leakers millions of financial account files detailing money laundering and tax avoidance from offshore banking centers — the “Panama Papers” and “Paradise Papers.”

The top of the ICIJ’s web page offers links to SecureDrop and other encrypted tools for sharing information.

And it has one simple invitation for its users: “Leak to us.”

Related: Julian Assange – A Decade of Stunning Leaks of U.S. Secrets

Written By

AFP 2023

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.