How to Encrypt Files, Folders and Drives on Windows | TechSpot

One of the best ways to protect your privacy is to encrypt important information on your computer. Whether you need to send personal information to someone, or simply want to make sure that no one who gets access to your computer can see stuff you would rather keep private, encryption is the way to go.

Editor's Note:Guest author Heinrich Long is a writer at Restore Privacy, a blog dedicated to inform about best online privacy practices, secure your electronic devices, unblock restricted content and defeat censorship.

As a Windows 10 user, you have numerous options for encrypting information. In this guide we will show you ways to encrypt individual files, file folders, and even entire disk drives. Each approach has its own benefits and drawbacks, so we'll cover those, too. That way, you'll have a better sense of which type of encryption you will need for various situations. Before we go further, here are a couple of points to keep in mind:

Now let's talk about when to use the three types of encryption that you can use:

As the name implies, individual file encryption refers to encrypting one file at a time. Each file has its own password or key.

Individual file encryption is great for files you plan to share or store in the cloud. Windows 10 users can encrypt individual files using a tool like 7-zip. You can also encrypt individual Microsoft Office files from within their apps, although this is better suited to casual person use than protection against serious adversaries.

Next up is folder level encryption. This approach involves encrypting everything that is stored in a folder. Passwords or keys are assigned to the folder, not individual files.

Folder encryption is a great organizational tool. For example, you could create a different encrypted folder for each member of your family. Give Sally only the password for her folder, and Jimmy only the password for his, and each can have their own private space on the same device.

Note that storing a file in an encrypted folder doesn't prevent you from also encrypting files individually.

Hard drive or disk encryption protects the entire drive at once. To use a device with an encrypted hard drive you would need to enter the password or key when you logged on, or nothing on the disk would be accessible.

This kind of encryption is a good first line of defense in case of theft. If someone stole your laptop, or ripped the drives out of one of your servers, they would need to defeat the hard drive encryption to get any data at all.

You can still apply folder level encryption and individual file encryption to an encrypted disk.

Before we dive into the details of file encryption, we need to make an important note on passwords. You need to be using a good password manager, along with good password hygiene.

Why is that? Well, if you lose or forget the password for accessing your encrypted files, then they'll probably be gone for good. A good password manager is critical. We've reviewed many options, including 1Password, LastPass, and many more.

See our guide on the best password managers for the top recommendations and step-by-step information for good password management. Now that we've hit the basics, it is time for some specifics. Let's start with...

Your options for encrypting files and folders on Windows 10 devices depend on which version of Windows 10 you have. Windows 10 Pro and Enterprise users have a built-in encryption tool called the Encrypting File System (EFS). Any Windows 10 user, including those with the Home edition, can also use third-party apps such as 7-zip for file and folder encryption.

Beyond these options, Microsoft Office apps have a basic file locking / encryption feature built in, as does Adobe Acrobat. We'll round out our coverage of Windows 10 encryption by taking a look at these.

The Encrypting File System (EFS) is built into the Professional and Enterprise versions of Windows 10. It is treated as an Advanced feature of the Windows File Explorer. This makes a lot of sense, since used carelessly, EFS can leave you with files you can never access again.

EFS does all its encryption work in the background, including automatically creating a File Encryption Key (FEK), and encrypting that key so only the account that encrypted the file can decrypt it. All this happens automatically and transparently.

Aside from a lock symbol that appears in the File Explorer next to a file or folder that is encrypted, there is no easy way to tell that a file or folder is encrypted with EFS.

Unfortunately, EFS has some quirks that make it a less than ideal choice for many uses. Knowing what these are will help you decide whether EFS is the answer to your Windows 10 file encryption needs:

If these quirks haven't scared you away, here's how to encrypt files and folders with EFS:

That is all you need to do, from now on, the encrypted file or folder will appear encrypted to anyone other than the user account that encrypted the item in the first place.

7-zip is a freeware file compression program that can also encrypt files and folders using AES-256 encryption, which is the industry standard for most encrypted systems. If you plan to use 7-zip to encrypt files or folders you should know that the process creates an encrypted copy of the file or folder. The original, unencrypted file or folder is unchanged.

If you are creating the encrypted item because you plan to send it somewhere, or store it in the cloud or something like that, this is fine. But if your goal is to protect the files and folders on your own device, this isn't ideal.

In the rest of this section, we'll first look at how to encrypt files and folders with 7-zip. After that we'll talk about what else you need to do if your goal is to protect the files and folders on your own device. The following instructions assume you already have 7-zip installed on your system. If not, you can download it here.

The result of encrypting something with 7-zip the way we did here is a zipped archive that is AES-256 encrypted. This archive appears in the same folder as the file or folder that you encrypted, alongside the original file or folder. What this means to you depends on what you plan to do with the encrypted file or folder.

If you created the archive to share copies of the file or folder, this is fine. Just send the archive to the recipient. Assuming they have 7-zip or a similar program on their system (and you securely conveyed the password to them somehow), they will be able to unzip the archive, then double-click the file to enter the password in a dialog box like this one:

Once they do that, the operating system should open the file in whatever app is appropriate, and the recipient can view it, or save it, or do whatever is necessary with it. Note that they will still have the encrypted files on their system as well.

If you created the archive to protect the files or folders on your system, you should skip down to the section titled, "Eliminate any possible unencrypted copies of the file" once you are done encrypting files and follow the instructions there to make sure no unencrypted copies of things are lying around where some snoop can find them.

Some applications now have options to encrypt the types of files they themselves use. For example, Microsoft Word can encrypt Word files, and Adobe Acrobat can encrypt PDF files. We'll demonstrate this below.

Let's use Microsoft Word to show how it is done by encrypting a simple Word document.

From now on, the only way to view this document will be by entering the password when prompted from within a Microsoft Office application that supports the unencrypted file type. But please see the next section to eliminate any possible unencrypted copies of the file on your computer.

If you use 7-zip or Microsoft Office to encrypt files, it is likely that Windows 10 still has one or more temporary copies of the unencrypted files stashed on the disk. To be safe, you will want to delete all temporary files once you are done encrypting things.

When it comes to disk encryption on Windows 10, BitLocker Device Encryption is the tool that Microsoft provides. Built into Windows 10 Pro and Enterprise, BitLocker Device Encryption does exactly what it sounds like - it encrypts all the storage devices in your system.

This sounds ideal, but there are some drawbacks to using BitLocker.

Happily for us, there is a great alternative available. Called VeraCrypt, it addresses all of the drawbacks we just saw:

VeraCrypt is Free, Open Source Software (FOSS), which we really like. Without getting into the OpenSource vs Proprietary software argument that plagues the computer world, from our perspective, FOSS software is generally considered more secure, and of course is free to use. Once VeraCrypt is installed, all you need to do is enter your VeraCrypt password whenever you start the computer.

Given all that, you know where we're going with this. In the following section we'll walk you through installing VeraCrypt on one of our lab machines. Ready?

While installing VeraCrypt is much simpler than the alternative, there is more to it than just launching an installer and pressing Okay a few times. And if you mess up, there is a chance you will lose files or even access to the entire disk drive.

We suggest you read through the instructions that follow before starting the process. If you are not confident you can complete the steps shown, or if you have a bad habit of losing important passwords, it is better to skip this type of encryption.

Here are the steps to install VeraCrypt on Windows 10:

Encrypting important information is one of the best things you can do to protect yourself from everyone who is trying so hard to get their hands on your personal information.

In this guide we covered techniques that Windows 10 users can use to encrypt individual files, folders, and entire drives on their Windows systems. While no one can guarantee that your data will be 100% safe against any and all attacks, the simple act of encrypting your most important data can make a big difference.

Masthead credit: eamesBot

Original post:
How to Encrypt Files, Folders and Drives on Windows | TechSpot

‘The Godfather of A.I.’ Leaves Google and Warns of Danger Ahead – The New York Times

  1. 'The Godfather of A.I.' Leaves Google and Warns of Danger Ahead  The New York Times
  2. AI 'godfather' Geoffrey Hinton warns of dangers as he quits Google  BBC
  3. AI 'godfather' Geoffrey Hinton quits Google to spread awareness against dangers of artificial intelligence  Economic Times

Here is the original post:
'The Godfather of A.I.' Leaves Google and Warns of Danger Ahead - The New York Times

Will AI take over jobs? Answer is yes at IBM as it pauses hiring 7800 – The Washington Post

  1. Will AI take over jobs? Answer is yes at IBM as it pauses hiring 7800  The Washington Post
  2. IBMs CEO expects A.I. to be so good at back office work that he plans to pause hiring humans for those jobs  Fortune
  3. SAP to Embed IBM Watson Artificial Intelligence into SAP Solutions  IBM Newsroom

Go here to see the original:
Will AI take over jobs? Answer is yes at IBM as it pauses hiring 7800 - The Washington Post

WikiLeaks – Wikipedia

News leak publishing organisation

WikiLeaks () is an NGO owned by Icelandic company Sunshine Press Productions ehf[3][4][5][6] that runs a website that has published news leaks[7] and classified media provided by anonymous sources.[8] It was founded by Julian Assange, an Australian editor, publisher, and activist, who is currently fighting extradition to the United States over his work with WikiLeaks.[9] Since September 2018, Kristinn Hrafnsson has served as its editor-in-chief.[10][11] Its website stated in 2015 that it had released online 10 million documents since beginning in 2006 in Iceland.[12] WikiLeaks' most recent publication was in 2021 and its most recent publication of original documents was in 2019.[13] Beginning in November 2022, many of the documents could not be accessed.[13][14][15][16]

The organisation has released document caches that exposed serious violations of human rights and civil liberties, including the Collateral Murder footage from the 12 July 2007 Baghdad airstrike in which Iraqi Reuters journalists were among several civilians killed by a U.S. helicopter crew.[17] WikiLeaks has also published leaks such as diplomatic cables from the United States and Saudi Arabia,[18][19] emails from the governments of Syria[20][21] and Turkey,[22][23][24] corruption in Kenya[25][26] and at Samherji.[27] WikiLeaks has also published documents exposing surveillance by the Central Intelligence Agency,[28][29] National Security Agency[30][31] and private corporations. During the 2016 U.S. presidential election campaign, WikiLeaks released emails from the Democratic National Committee and from Hillary Clinton's campaign manager, showing that the party's national committee favoured Clinton in the primaries. These releases resulted in the resignation of Debbie Wasserman Schultz as chairwoman of the Democratic National Committee (DNC) and caused significant harm to the Clinton campaign.[32] During the campaign, WikiLeaks promoted false conspiracy theories about Hillary Clinton, the Democratic Party and the murder of Seth Rich.[33][34][35]

WikiLeaks has won a number of awards and has been commended for exposing state and corporate secrets, increasing transparency, assisting freedom of the press, and enhancing democratic discourse while challenging powerful institutions. WikiLeaks and some of its supporters say the organisation's publications have a perfect authenticity record. The organisation has been the target of campaigns to discredit it, including aborted ones by Palantir and HBGary. WikiLeaks has also had its donation systems disrupted by problems with its payment processors. As a result, the Wau Holland Foundation helps process WikiLeaks' donations.

The organisation has been criticised for inadequately curating its content and violating the personal privacy of individuals. WikiLeaks has, for instance, revealed Social Security numbers, medical information, credit card numbers and details of suicide attempts.[36][37][38] Various news organisations, activists, journalists and former members have also criticised the organisation over allegations of anti-semitism, an anti-Clinton and pro-Trump bias, various associations with the Russian government, a history of buying and selling leaks, and a lack of internal transparency. Journalists have also criticised the organisation for promoting false flag conspiracy theories, and its exaggerated and misleading descriptions of the contents of leaks. The CIA defined the organisation as a "non-state hostile intelligence service" after the release of Vault 7.[39]

The inspiration for WikiLeaks was Daniel Ellsberg's release of the Pentagon Papers in 1971. Assange built WikiLeaks to shorten the time between a leak and its coverage by the media. WikiLeaks was established in Australia but its servers were soon moved to Sweden and other countries that provided more legal protection for the media.[40]

The wikileaks.org domain name was registered on 4 October 2006.[2] The website was established and published its first document in December 2006.[41][42] It once described its founders as a mixture of Asian dissidents, journalists, mathematicians, and start-up company technologists from the United States, Taiwan, Europe, Australia, and South Africa.[43][44] In January 2007, WikiLeaks organizer James Chen[45][46][47] told TIME that "We are serious people working on a serious project... three advisors have been detained by Asian government, one of us for over six years."[44] Before his arrest, WikiLeaks was usually represented in public by Julian Assange, who has described himself as "the heart and soul of this organisation, its founder, philosopher, spokesperson, original coder, organiser, financier, and all the rest".[48][49]

Assange formed an informal advisory board in the early days of WikiLeaks, filling it with journalists, political activists and computer specialists to give WikiLeaks credibility and exposure.[50] Members of the advisory board included Phillip Adams, Julian Assange, Wang Dan, Suelette Dreyfus, CJ Hinke, Tashi Namgyal Khamsitsang, Ben Laurie, Xiao Qiang, Chico Whitaker, Wang Youcai, and John Young.[50][51]

Most of the members told Wired that they hadn't done much advising and had little involvement with WikiLeaks.[50] Several members said they didn't know they were mentioned on the site, or how they got there.[52] Computer security expert Ben Laurie said he had been a member of the board "since before the beginning", but he wasn't "really sure what the advisory board means."[50] Former board member Phillip Adams criticised the board, saying that Assange "has never asked for advice. The advisory board was pretty clearly window dressing, so he went for people identified with progressive policies around the place."[53] Assange responded by calling the advisory board "pretty informal".[53]

When asked to join their initial advisory board, Steven Aftergood of the Federation of American Scientists declined and told TIME that "they have a very idealistic view of the nature of leaking and its impact. They seem to think that most leakers are crusading do-gooders who are single-handedly battling one evil empire or another."[54]

In January 2007, John Young was dropped from the WikiLeaks network after questioning plans for a multimillion dollar fundraising goal.[55] He accused the organisation of being a CIA conduit and published 150 pages of WikiLeaks emails.[50][56][57] According to Wired, the emails are full of rhetoric and arguments over creating a profile for themselves, political impact and transparency around the world.[50][58][59]

In February 2010, WikiLeaks helped propose the Icelandic Modern Media Initiative legislation to establish a "journalism safe haven" in Iceland.[60] In June, the parliament voted unanimously for the resolution.[61]

A series of resignations of key members of WikiLeaks began in September 2010, started by Assange's unliteral decision to release the Iraq War logs the next month, his internal conflicts with other members and his response to sexual assault allegations.[62][63][64][65] According to Herbert Snorrason, "We found out that the level of redactions performed on the Afghanistan documents was not sufficient. I announced that if the next batch did not receive full attention, I would not be willing to cooperate."[65]

On 25 September 2010, after being suspended by Assange for "disloyalty, insubordination and destabilisation", Daniel Domscheit-Berg, the German spokesman for WikiLeaks, told Der Spiegel that he was resigning, saying "WikiLeaks has a structural problem. I no longer want to take responsibility for it, and that's why I am leaving the project."[66][65] Assange accused Domscheit-Berg of leaking information to Newsweek, with Domscheit-Berg claiming that the WikiLeaks team was unhappy with Assange's management and handling of the Afghan war document releases.[65][67] Daniel Domscheit-Berg wanted greater transparency in WikiLeaks finances and the leaks released to the public.[68][69][70] When Domscheit-Berg resigned, several other staffers also broke with Assange[65][71] to start OpenLeaks, a new leak organisation and website with a different management and distribution philosophy.[66][72]

WikiLeaks and other sources later alleged that Domscheit-Berg had copied and then deleted over 3500 unpublished whistleblower communications with some communications[73] containing hundreds of documents,[74][75][76] including the US government's No Fly List,[78] 5 GB of Bank of America leaks, insider information from 20 neo-Nazi organisations,[78] evidence of torture and government abuse of a Latin American country and US intercept information for "over a hundred Internet companies".[81][82] Assange stated that Domscheit-Berg had deleted video files of the Granai massacre by a US Bomber. WikiLeaks had scheduled the video for publication before its deletion.[83]

Domscheit-Berg said he took the files from WikiLeaks because he didn't trust its security. In Domscheit-Berg's book he wrote: "To this day, we are waiting for Julian to restore security, so that we can return the material to him, which was on the submission platform."[84][85][86] In August 2011, Domscheit-Berg claimed he permanently deleted the files "in order to ensure that the sources are not compromised."[87] He said that WikiLeaks' claims about the Bank of America files were "false and misleading."[88] According to Domscheit-Berg, the Bank of America files were lost because of an IT problem when one of WikiLeaks storage drives crashed and they lost it.[74]

The Architect left with Domscheit-Berg, taking the code[89] behind the submission system with him.[90][84][85] WikiLeaks submissions stayed offline until 2015.[91][92] Herbert Snorrason, a 25-year-old Icelandic university student, resigned after he challenged Assange on his decision to suspend Domscheit-Berg and was bluntly rebuked.[65] Iceland MP Birgitta Jnsdttir also left WikiLeaks, citing lack of transparency, lack of structure, and poor communication flow in the organisation.[93] James Ball left WikiLeaks over disputes about Assange's handling of finances, and allegations including antisemitism against fellow WikiLeaks member Israel Shamir.[94][95][96] According to the British newspaper, The Independent, at least a dozen key supporters of WikiLeaks left the website during 2010.[97]

Writing for The Guardian in 2010, Nick Davies said there were low-level attempts to smear WikiLeaks, including online accusations against Assange. In 2010, Wikileaks published a US military document containing a plan to "destroy the center of gravity" of Wikileaks by attacking its trustworthiness. It suggests the identification and exposure of WikiLeaks' sources to "deter others from using WikiLeaks".[98][99]

In 2010 the Bank of America employed the services of a collection of information security firms, known as Team Themis, when the bank became concerned about information that WikiLeaks held about it and was planning to release. Team Themis included private intelligence and security firms HBGary Federal, Palantir Technologies and Berico Technologies.[100][101][102][103][104] In 2011 hacktivist group Anonymous released emails it had obtained from HBGary Federal. Among other things, the emails revealed that Team Themis had planned to expose the workings of WikiLeaks using disinformation and cyberattacks. The plans were not implemented and, after the emails were published, Palantir CEO Alex Karp issued a public apology for his company's role.[101][105]

In December 2010, PayPal suspended the WikiLeaks account after the State Department sent them a letter.[106] Mastercard and Visa Europe also decided to stop accepting payments to WikiLeaks. Bank of America, Amazon and Swiss bank PostFinance had previously stopped dealing with WikiLeaks. Datacell, the IT company that enabled WikiLeaks to accept credit and debit card donations, said Visa's action was the result of political pressure.[106][107] WikiLeaks called this the Banking Blockade.[108]

Cyber attacks and legal restrictions have forced WikiLeaks to change hosts several times.[109][110][111]

In July 2012, WikiLeaks claimed credit for a fake New York Times website and article by Bill Keller.[112][113][114][115] The hoax prompted criticism from commentors and the public, who said it hurt WikiLeaks' credibility. Glenn Greenwald wrote that it might have been satire but "it doesnt strike me as a good idea for a group that relies on its credibility when it comes to the authenticity of what they publish and which thus far has had a stellar record in that regard to be making boastful claims that they published forged documents. I understand and appreciate the satire, but in this case, it directly conflicts with, and undermines, the primary value of WikiLeaks."[113][116][117] WikiLeaks said they wanted to bring attention to the banking blockade.[112]

In January 2013 shortly after he died, WikiLeaks said that Aaron Swartz had helped WikiLeaks and talked to talked Julian Assange in 2010 and 2011. WikiLeaks also said they had "strong reasons to believe, but cannot prove" he may have been a source, possibly breaking WikiLeaks' rules about source anonymity. Wikileaks may have made the statements to imply that Swartz was targetted by the US Attorney's Office and Secret Service in order to get at WikiLeaks.[118][119]

In 2013, the organisation assisted Edward Snowden (who is responsible for the 2013 mass surveillance disclosures) in leaving Hong Kong. Sarah Harrison, a WikiLeaks activist, accompanied Snowden on the flight. Scott Shane of The New York Times stated that the WikiLeaks involvement "shows that despite its shoestring staff, limited fund-raising from a boycott by major financial firms, and defections prompted by Mr. Assange's personal troubles and abrasive style, it remains a force to be reckoned with on the global stage."[120]

In September 2013, Julian Assange announced the creation of the WikiLeaks Counterintelligence Unit. The project surveilled 19 surveillance contractors to understand their business dealings. According to Assange, they were "tracking the trackers" to "counter threats against investigative journalism and the public's right to know."[121][122]

The WikiLeaks Party was created in 2013 in part to support Julian Assange's failed bid for a Senate seat in Australia in the 2013 election, where they won 0.66% of the national vote.[123] Assange said the party would advance WikiLeaks' objectives of promoting openness in government and politics and that it would combat intrusions on individual privacy.[123][124][125][126] In December 2013, a delegation from the party, including its chairman John Shipton, visited Syria and met with President Bashar al-Assad with the goals of demonstrating "solidarity with the Syrian people and their nation" and improving the party's understanding of the country's civil war. The meeting with Assad was criticized by the Australian Prime Minister, Foreign Minister and many WikiLeaks supporters.[127][128] Shipton stated that the meeting with al-Assad was "just a matter of good manners" and that the delegation had also met with members of the Syrian opposition.[128] However, these meetings with the opposition have not been verified. The WikiLeaks Party was deregistered by the Australian Electoral Commission on 23 July 2015 for lack of members under s.137(4) of the Electoral Act.[129][130][131]

In the wake of the Charlie Hebdo shooting in January 2015, the WikiLeaks Twitter account wrote that "the Jewish pro-censorship lobby legitimized attacks", referring to the trial of Maurice Sinet.[132] In July 2016, the same account suggested that triple parentheses, or (((echoes))) a tool used by neo-Nazis to identify Jews on Twitter, appropriated by several Jews online out of solidarity had been used as a way for "establishment climbers" to identify one another.[133][134] In leaked internal conversations, the WikiLeaks Twitter account commented on Associated Press reporter Raphael Satter who had written an article critical of WikiLeaks. WikiLeaks tweeted that "[Satter]'s always ben(sic) a rat. But he's jewish and engaged with the ((()))) issue".[135]

In 2015, WikiLeaks began issuing "bounties" of up to $100,000 for leaks.[136] Assange had said in 2010 that WikiLeaks didn't but "would have no problem giving sources cash" and that there were systems in Belgium to let them.[137] WikiLeaks has issued crowd-sourced rewards for the TTIP chapters, the TPP[136] and information on the Kunduz Massacre.[138] WikiLeaks has issued other bounties for leaks on Troika Crisis Planning,[140] LabourLeaks,[141] Trump-Comey tapes,[142] evidence of Obama administration officials destroying information,[143] 2016 U.S. Presidential election-related information,[144] information to get a reporter at The Intercept fired over the Reality Winner case,[145] the U.S. Senate torture report,[146] and documents and Sweden's vote on placing Saudi Arabia on the UN Women's Rights Commission.[147] WikiLeaks has defended the practice with their vetting record, saying "police rewards produce results. So do journalistic rewards."

Its website stated in 2015 that it had released 10 million documents online.[12]

In 2016 and 2017, WikiLeaks promoted several false conspiracy theories. Most of them were related to the 2016 United States presidential election.

WikiLeaks promoted conspiracy theories about the murder of Seth Rich.[148][149][150] Unfounded conspiracy theories, spread by some right-wing figures and media outlets, hold that Rich was the source of leaked emails and was killed for working with WikiLeaks.[151] WikiLeaks fuelled such theories when it offered a $20,000 reward for information on Rich's killer and when Assange implied that Rich was the source of the DNC leaks,[152] although no evidence supports that claim.[153][154] Special Counsel Robert Mueller's report into Russian interference in the 2016 election said that Assange "implied falsely" that Rich was the source in order to obscure that Russia was the actual source.[155][156][157][158]

WikiLeaks popularised conspiracy theories about the Democratic Party and Hillary Clinton, such as tweeting articles which suggested Clinton campaign chairman John Podesta engaged in satanic rituals,[33][159][160] implying that the Democratic Party had Seth Rich killed,[34] claiming that Hillary Clinton wanted to drone strike Assange,[161] suggesting that Clinton wore earpieces to debates and interviews,[162] promoting thinly sourced theories about Clinton's health and according to Bloomberg creating "anti-Clinton theories out of whole cloth",[35][163][164] and promoting a conspiracy theory from a Donald Trump-related Internet community tying the Clinton campaign to child kidnapper Laura Silsby.[165]

On the day the Vault 7 documents were first released, WikiLeaks described UMBRAGE as "a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation," and tweeted, "CIA steals other groups virus and malware facilitating false flag attacks."[166] A conspiracy theory soon emerged alleging that the CIA framed the Russian government for interfering in the 2016 U.S. elections. Conservative commentators such as Sean Hannity and Ann Coulter speculated about this possibility on Twitter, and Rush Limbaugh discussed it on his radio show.[167] Russian foreign minister Sergey Lavrov said that Vault 7 showed that "the CIA could get access to such 'fingerprints' and then use them."[166]

Cybersecurity writers, such as Ben Buchanan and Kevin Poulsen, were sceptical of those theories.[168][169] Poulsen wrote, "The leaked catalog isn't organized by country of origin, and the specific malware used by the Russian DNC hackers is nowhere on the list."[168]

In April 2017, the WikiLeaks Twitter account suggested that the Khan Shaykhun chemical attack, which international human rights organisations and governments of the United States, United Kingdom, Turkey, Saudi Arabia, France, and Israel attributed to the Syrian government, was a false flag attack.[170] WikiLeaks stated that "while western establishment media beat the drum for more war in Syria the matter is far from clear", and shared a video by a Syrian activist who claimed that Islamist extremists were probably behind the chemical attack, not the Syrian government.[170]

On 17 October 2016, WikiLeaks announced that a "state party" had severed the Internet connection of Julian Assange at the Ecuadorian embassy. WikiLeaks blamed United States Secretary of State John Kerry of pressuring the Ecuadorian government in severing Assange's Internet, an accusation which the United States State Department denied.[171] The Ecuadorian government stated that it had "temporarily" severed Assange's Internet connection because of WikiLeaks' release of documents "impacting on the U.S. election campaign," although it also stated that this was not meant to prevent WikiLeaks from operating.[172]

The United States Senate Select Committee on Intelligence concluded that in 2016, "WikiLeaks actively sought, and played, a key role in the Russian influence campaign and very likely knew it was assisting a Russian intelligence influence effort."[7]

In 2018, 11,000 messages from a private chat with WikiLeaks and key supporters from May 2015 through November 2017 leaked. The messages showed WikiLeaks plotting against critics with online attack campaigns and false identities, and contain political bias, sexism, misogyny, and anti-Semitism.[135][173][174] The messages were leaked by a former associate of Assange who had created the group at WikiLeaks' request.[175] Later that year, "tens of thousands" of files from WikiLeaks laptops leaked to the Associated Press.[8]

In January 2019, WikiLeaks sent journalists a "confidential legal communication not for publication" with a list of 140 things not to say about Julian Assange that WikiLeaks said were "false and defamatory".[176][177] Soon after the list leaked online, WikiLeaks posted a heavily edited version of it.[178] The group was criticised and mocked for the list and their handling of it.[179][180][181][182]

WikiLeaks describes itself as "an uncensorable system for untraceable mass document leaking"[183] and "a project of the Sunshine Press,"[3][5][184] a non-profit organisation based in Iceland.[185][186] In 2010, Julian Assange and Kristinn Hrafnsson registered Sunshine Press Productions ehf[6] as a business without a headquarters in Iceland.[187][188] Assange serves as the Director of Sunshine Press Productions ehf and is on the board of directors with Hrafnsson and Ingi Ragnar Ingason.[189][190][191] Gavin MacFadyen was a deputy board member.[190] According to a January 2010 interview, the WikiLeaks team then consisted of five people working full-time and about 800 people who worked occasionally, none of whom were compensated.[137]

In November 2022, many of WikiLeaks releases disappeared from the website, bringing the number of documents from around 10 million to around 3,000. Other reported issues with the site included the websites search ability not working and a broken submission page.[192][193]

WikiLeaks established an editorial policy that accepted only documents that were "of political, diplomatic, historical or ethical interest" (and excluded "material that is already publicly available").[194] This coincided with early criticism that having no editorial policy would drive out good material with spam and promote "automated or indiscriminate publication of confidential records".[195] The original FAQ is no longer in effect, and no one can post or edit documents on WikiLeaks. Now, submissions to WikiLeaks are reviewed by anonymous WikiLeaks reviewers, and documents that do not meet the editorial criteria are rejected. By 2008, the revised FAQ stated: "Anybody can post comments to it. [...] Users can publicly discuss documents and analyse their credibility and veracity."[196] After the 2010 reorganisation, posting new comments on leaks was no longer possible.[197]

According to WikiLeaks, the goal of the organisation is "to bring important news and information to the public One of our most important activities is to publish original source material alongside our news stories so readers and historians alike can see evidence of the truth." It also seeks to ensure that journalists and whistleblowers are not prosecuted for emailing sensitive or classified documents. The online "drop box" is described by the WikiLeaks website as "an innovative, secure and anonymous way for sources to leak information to [WikiLeaks] journalists".[198]

An embargo agreement made by WikiLeaks in 2012 included a timeline for when emails could be written about, due in part to "elections around the world and legal matters WikiLeaks and Julian are involved in."[199][200] In 2017, WikiLeaks told Foreign Policy that they sometimes scheduled releases around high-profile events.[201]

In response to a question in 2010 about whether WikiLeaks would release information that he knew might get someone killed, Assange said that he had instituted a "harm-minimization policy." This policy meant that people named in some documents might be contacted before publication to warn them, but that there were also times were members of WikiLeaks might have "blood on our hands."[42] One member of WikiLeaks told The New Yorker they were initially uncomfortable with Assange's editorial policy, but changed her mind because she thought no one had been unjustly harmed.[42]

In an August 2010 open letter, the non-governmental organisation Reporters Without Borders praised WikiLeaks' past usefulness in exposing "serious violations of human rights and civil liberties" but criticised the organisation over a perceived absence of editorial control, stating "Journalistic work involves the selection of information. The argument with which you defend yourself, namely that WikiLeaks is not made up of journalists, is not convincing."[202]

In a 2013 resolution, the International Federation of Journalists, a trade union of journalists, called WikiLeaks a "new breed of media organisation" that "offers important opportunities for media organisations".[203] Harvard professor Yochai Benkler praised WikiLeaks as a new form of journalistic enterprise,[204] testifying at the court-martial of Chelsea Manning that "WikiLeaks did serve a particular journalistic function," and that the "range of the journalist's privilege" is "a hard line to draw".[205]

Others do not consider WikiLeaks to be journalistic in nature. Media ethicist Kelly McBride of the Poynter Institute for Media Studies wrote in 2011: "WikiLeaks might grow into a journalist endeavor. But it's not there yet."[206] Bill Keller of The New York Times considers WikiLeaks to be a "complicated source" rather than a journalistic partner.[206] Prominent First Amendment lawyer Floyd Abrams writes that WikiLeaks is not a journalistic organisation, but instead "an organization of political activists; a source for journalists; and a conduit of leaked information to the press and the public".[207] In support of his opinion, referring to Assange's statements that WikiLeaks reads only a small fraction of information before deciding to publish it, Abrams wrote: "No journalistic entity I have ever heard ofnonesimply releases to the world an elephantine amount of material it has not read."[207]

WikiLeaks is a self-described not-for-profit organisation, funded largely by volunteers, and is dependent on private donations, exclusivity contracts[137] and concessions from their media partners.[208] Its main financing methods include conventional bank transfers and online payment systems. According to Assange, WikiLeaks' lawyers often work pro bono. Assange has said that in some cases legal aid has been donated by media organisations such as the Associated Press, the Los Angeles Times, and the National Newspaper Publishers Association.[137] Assange said in early 2010 that WikiLeaks' only revenue consists of donations, but it has considered other options including auctioning early access to documents.[137] In September 2010, Assange said that WikiLeaks received millions of dollars in media partnerships, explaining they "win concessions in relation to the number of journalists that will be put on it and how big they'll run with it."[208]

In 2010, Assange said the organisation was registered as a library in Australia, a foundation in France, and a newspaper in Sweden, and that it also used two United States-based non-profit 501c3 organisations for funding purposes.[209]

In January 2010, WikiLeaks temporarily shut down its website while management appealed for donations.[210] Previously published material was no longer available, although some could still be accessed on unofficial mirror websites.[211] WikiLeaks stated that it would resume full operation once the operational costs were paid.[210] WikiLeaks saw this as a kind of work stoppage "to ensure that everyone who is involved stops normal work and actually spends time raising revenue".[137] While the organisation initially planned for funds to be secured by 6 January 2010, it was not until 3 February 2010 that WikiLeaks announced that its minimum fundraising goal had been achieved.[212]

The Wau Holland Foundation, one of the WikiLeaks' main funding channels, stated that they received more than 900,000 in public donations between October 2009 and December 2010, of which 370,000 has been passed on to WikiLeaks. Hendrik Fulda, vice-president of the Wau Holland Foundation, said that every new WikiLeaks publication brought "a wave of support", and that donations were strongest in the weeks after WikiLeaks started publishing leaked diplomatic cables.[213][214] According to Assange, WikiLeaks' media partnerships for the cables earned them almost $2 million three months after they started publishing.[208] WikiLeaks was paid 150,000 by Al Jazeera and Channel 4 for two five-minute video clips about the Iraq War Logs.[215][216] In December 2010, the Wau Holland Foundation stated that Julian Assange and three other permanent employees had begun to receive salaries.[217]

During 2010, WikiLeaks received over $1.9 million in donations. About $930,000 came through PayPal donations, with the rest coming through bank transfers.[218] In 2011, donations dropped sharply and WikiLeaks received only around $180,000 in donations, while their expenses increased from $519,000 to $850,000.[219] In 2011, Al Jazeera offered WikiLeaks $1.3 million for access to data.[220] During September 2011, WikiLeaks began auctioning items on eBay to raise funds.[221] Wikileaks started accepting bitcoin in 2011 as a currency which could not be blocked by financial intuitions or a government.[222][223][224] In 2012, WikiLeaks raised only $68,000 through the Wau Holland Foundation and had expenses more than $507,000.[219] In 2013, WikiLeaks and Wau Holland Foundation agreed on a new framework contract which Wau Holland Foundation would only cover direct costs such as server, ISP, project coordination and translation costs.[225] Between January and May, Wau Holland Foundation was only able to cover $47,000 in essential infrastructure for WikiLeaks, but not an additional $400,000 that was submitted "to cover publishing campaigns and logistics in 2012".[219]

On 22 January 2010, the Internet payment intermediary PayPal suspended WikiLeaks' donation account and froze its assets. WikiLeaks said that this had happened before, and was done for "no obvious reason".[226][227] In August 2010, the internet payment company Moneybookers closed WikiLeaks' account due to publicity over its release of the Afghan war logs and because WikiLeaks had been added to the official US watchlist and an Australian government blacklist.[228] In December 2010, PayPal suspended WikiLeaks' account, thereby stopping donations through PayPal. PayPal said it had taken action after the US State Department sent a letter to Wikileaks stating that Wikileaks' activities were illegal in the US.[106] Hendrik Fulda, vice-president of the Wau Holland Foundation, said that the Foundation had been receiving twice as many donations through PayPal as through normal banks before PayPal's decision to suspend WikiLeaks' account.[213] Mastercard and Visa Europe also decided to stop accepting payments to WikiLeaks. Bank of America, Amazon and Swiss bank PostFinance had previously stopped dealing with WikiLeaks. Datacell, the IT company that enabled WikiLeaks to accept credit and debit card donations, threatened Mastercard and Visa with legal action to enforce the resumption of payments to WikiLeaks. Datacell said Visa's action was the result of political pressure.[106][107]

In October 2011, Assange said that the financial blockade by Bank of America, Visa, MasterCard, PayPal and Western Union, had cost WikiLeaks ninety-five per cent of its revenue.[229] In 2012, an Icelandic district court ruled that Valitor, the Icelandic partner of Visa and MasterCard, was violating the law when it stopped accepting credit card donations to WikiLeaks. The court ruled that donations to WikiLeaks must resume within 14 days or Valitor would be fined US$6,000 a day.[107] In November 2012, the European Union's European Commission said they wouldn't open a formal investigation into Mastercard and Visa and blocking donations for WikiLeaks because it was unlikely to have violated EU anti-trust rules.[230]

In response to the financial blockade of Wikileaks, Glenn Greenwald and others created the Freedom of the Press Foundation in order "to block the US government from ever again being able to attack and suffocate an independent journalistic enterprise the way it did with WikiLeaks".[231]

In 2014, Sunshine Press Productions ehf began receiving funds from Wau Holland Foundation for WikiLeaks.[232] From 2014-2017 WikiLeaks was reimbursed for project coordination, technical preparation, removing metadata, reviewing information, communicating with media partners costs and a new submission platform and document search.[232][233][234][235] The DNC emails and Podesta emails were not funded by the Wau Holland Foundation.[236] By October 2017, WikiLeaks founder Julian Assange said the organisation had made a 50,000% return on Bitcoin.[237] By that December, they had raised at least $25 million in Bitcoin.[238][239]

In 2018, the Wau Holland Foundation reimbursed Sunshine Press Productions for WikiLeaks' publications, as well as public relations and $50,000 for legal expenses in the Democratic National Committee v. Russian Federation lawsuit.[240]

In 2010, the website was available on multiple servers, different domain names and had an official dark web version (available on the Tor Network) as a result of a number of denial-of-service attacks and its elimination from different Domain Name System (DNS) providers.[241][242]

Until August 2010, WikiLeaks was hosted by PRQ, a company based in Sweden providing "highly secure, no-questions-asked hosting services". PRQ was reported by The Register website to have "almost no information about its clientele and maintains few if any of its own logs".[243] That month, WikiLeaks reached an agreement with the Swedish Pirate Party to host several of their servers.[244][245][246] Later, WikiLeaks was hosted mainly by the Swedish Internet service provider Bahnhof in the Pionen facility, a former nuclear bunker in Sweden.[247][248] Other servers were spread around the world with the main server located in Sweden.[249]

After the site became the target of a denial-of-service attack on its old servers, WikiLeaks moved its website to Amazon's servers.[109] Amazon later removed the website from its servers.[109] In a public statement, Amazon said that WikiLeaks was not following its terms of service. The company stated: "There were several parts they were violating. For example, our terms of service state that 'you represent and warrant that you own or otherwise control all of the rights to the content ... that use of the content you supply does not violate this policy and will not cause injury to any person or entity.' It's clear that WikiLeaks doesn't own or otherwise control all the rights to this classified content."[110] WikiLeaks was then moved to servers at OVH, a private web-hosting service in France.[250] After criticism from the French government, a judge in Paris ruled that there was no need for OVH to cease hosting WikiLeaks without more information.[251]

WikiLeaks used EveryDNS, but was dropped by the company after distributed denial-of-service (DDoS) attacks against WikiLeaks hurt the quality of service for its other customers. Supporters of WikiLeaks waged verbal and DDoS attacks on EveryDNS. Because of a typographical error in blogs mistaking EveryDNS for competitor EasyDNS, the sizeable Internet backlash hit EasyDNS. Despite that, EasyDNS began providing WikiLeaks with DNS service on "two 'battle hardened' servers" to protect the quality of service for its other customers.[111]

WikiLeaks has used heavily encrypted files[252][253] to protect their publications against censorship,[254] to pre-release publications,[255] and as protection against arrest.[256][257] The files have been described as "insurance",[252][258][259] a "dead man's switch",[254] "a kind of doomsday option",[256][257] and a "poison pill".[260] The insurance files sometimes come with pre-commitment hashes.[261][clarification needed]

WikiLeaks staff have said that "insurance files are encrypted copies of unpublished documents submitted to us. We do this periodically, and especially at moments of high pressure on us, to ensure the documents can not be lost and history preserved. You will not be able to see the contents of any of our insurance files, until and unless the we are in a position where we must release the key. But you can download them and help spread them to ensure their safe keeping."[262]

On 29 July 2010 WikiLeaks added an "Insurance file" to the Afghan War Diary page. The file is AES encrypted.[263][264] There has been speculation that it was intended to serve as insurance in case the WikiLeaks website or its spokesman Julian Assange are incapacitated, upon which the passphrase could be published.[265][266] After the first few days' release of the US diplomatic cables starting 28 November 2010, the US television broadcasting company CBS predicted that "If anything happens to Assange or the website, a key will go out to unlock the files. There would then be no way to stop the information from spreading like wildfire because so many people already have copies."[267] CBS correspondent Declan McCullagh stated, "What most folks are speculating is that the insurance file contains unreleased information that would be especially embarrassing to the US government if it were released."[267]

In August 2013, WikiLeaks posted three insurance files as torrents, totalling 400 gigabytes.[254][268] WikiLeaks said they "encrypted versions of upcoming publication data ("insurance") from time to time to nullify attempts at prior restraint."[254]

In June 2016, WikiLeaks posted an 88 gigabyte insurance file.[citation needed] On 16 October 2016, WikiLeaks tweeted an insurance file about Ecuador.[269] In November, they posted insurance files for the US, the UK and Ecuador,[270] and an unlabelled 90 gigabyte insurance file was posted.[261][additional citation(s) needed]

In January 2017, On 7 March 2017, WikiLeaks posted an encrypted file containing the Vault 7 Year Zero release.[271] WikiLeaks had planned to release them later, but released them online later that day because of cyber attacks.[272] The password, SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds, was a reference to an alleged quote by President Kennedy.[255]

In June 2009, the website said it had more than 1,200 registered volunteers.[43] According to Daniel Domscheit-Berg, WikiLeaks exaggerated the number of volunteers.[273][216]

Daniel Domscheit-Berg, Sarah Harrison, Kristinn Hrafnsson and Joseph Farrell are notable people who have been involved in the project.[274][65] Harrison is also a member of Sunshine Press Productions along with Assange and Ingi Ragnar Ingason.[275][190] Gavin MacFadyen was acknowledged by Assange as a beloved director of WikiLeaks shortly after his death in 2016.[276] Jacob Appelbaum is the only known American who is known to have been member of WikiLeaks, acting as a senior editor and spokesman.[277][278][279] Gottfrid Svartholm had worked with WikiLeaks as a technical consultant and managed infrastructure critical to the organization.[280][281] He was also listed as part of the "decryption and transmission team" on Collateral Murder and credited for "networking" and helped with several other unknown endeavors.[282][283] Rop Gonggrijp, Birgitta Jnsdttir, Smri McCarthy and Herbert Snorrason are WikiLeaks volunteers and members who the US government has tried to surveill with court orders.[284][285] WikiLeaks was represented in Russia by Israel Shamir and in Sweden by his son Johannes Wahlstrm.[286][287][96]

According to colleagues and former WikiLeaks insiders, the WikiLeaks dropbox architecture was rebuilt by a WikiLeaks programmer known to most insiders as "The Architect".[288][289][85] He also instructed another WikiLeaks technician, and some of colleagues thought he was a computer genius.[90][290][291] According to Andy Greenberg, insiders told him "when The Architect joined WikiLeaks it was a mess. It was two creaking servers without all the flashy security that Assange had promised in interviews with the media. The Architect rebuilt it from scratch."[288] According to Wired, "WikiLeaks had been running on a single server with sensitive backend components like the submission and e-mail archives connected to the public-facing Wiki page. The Architect separated the platforms and set up a number of servers in various countries."[84]

In August 2011, WikiLeaks volunteer Sigurdur Thordarson, working in his home country Iceland, contacted the FBI and, after presenting a copy of Assange's passport at the American embassy, became the first informant to work for the FBI from inside WikiLeaks, and gave the FBI several hard drives he had copied from Assange and core WikiLeaks members.[292][293] In November 2011, WikiLeaks dismissed Thordarson due to his embezzlement of $50,000, to which charge (along with several other offences) he later pleaded guilty in an Icelandic court.[294] According to Thordarson, a few months after his dismissal by WikiLeaks the FBI agreed to pay him $5,000 as compensation for work missed while meeting with agents.[295]

Alexa O'Brien briefly worked for WikiLeaks in 2014, later saying she found working for the organization was not a good fit.[296] On 26 September 2018, it was announced that Julian Assange had appointed Kristinn Hrafnsson as editor-in-chief of WikiLeaks with Assange continuing as its publisher.[11][297]

WikiLeaks restructured its process for contributions after its first document leaks did not gain much attention. Assange stated this was part of an attempt to take the voluntary effort typically seen in Wiki projects and "redirect it to ... material that has real potential for change".[298] Before this, the Wikileaks FAQ, under "How will Wikileaks operate?", read as of February 2007:[299]

To the user, Wikileaks will look very much like Wikipedia. Anybody can post to it, anybody can edit it. No technical knowledge is required. Leakers can post documents anonymously and untraceably. Users can publicly discuss documents and analyze their credibility and veracity. Users can discuss interpretations and context and collaboratively formulate collective publications. Users can read and write explanatory articles on leaks along with background material and context. The political relevance of documents and their verisimilitude will be revealed by a cast of thousands.

WikiLeaks originally used a "wiki" communal publication method, which ended by May 2010.[197]

In 2010 Assange said WikiLeaks received some submissions through the postal mail.[300] That year, Julian Assange said that the servers were located in Sweden and the other countries "specifically because those nations offer legal protection to the disclosures made on the site". He talks about the Swedish constitution, which gives the informationproviders total legal protection.[249] It is forbidden, according to Swedish law, for any administrative authority to make inquiries about the sources of any type of newspaper.[301] These laws, and the hosting by PRQ, were meant to make it difficult for any authority to eliminate WikiLeaks; they place a burden of proof upon any complainant whose suit would circumscribe WikiLeaks' liberty. Furthermore, "WikiLeaks maintains its own servers at undisclosed locations, keeps no logs and uses military-grade encryption to protect sources and other confidential information." Such arrangements have been called "bulletproof hosting".[243]

According to some, The Architect was the engineer who rebuilt the WikiLeaks submission system "from scratch" and instructed another WikiLeaks technician.[288][289][85] According to Andy Greenberg and Wired, when The Architect joined WikiLeaks, it "was a mess" running on one or two servers "without all the flashy security that Assange had promised in interviews with the media." The Architect rebuilt it from scratch and separated the sensitive platforms from the public-facing Wiki "and set up a number of servers in various countries."[288][84]

During the 2010 reorganisation, The Architect left with Domscheit-Berg, taking the code[89] behind the submission system with him.[90][84][85][302] Assange said that the submission system was temporarily down because its backlog was too big.[303] WikiLeaks later said it was down because of Domscheit-Berg's "acts of sabotage" when he left the organisation, which had forced WikiLeaks to "overhaul the entire submission system", and the staff lacked time to do so.[84]

WikiLeaks submissions stayed offline for four and a half years, until May 2015.[91][92] While it was offline, WikiLeaks announced they were building a state-of-the-art secure submission system. The launch of the new system was delayed by security concerns in 2011.[304] During this time, WikiLeaks continued to publish documents. These publications originated from material which had been directly shared with WikiLeaks by hackers, or were the result of Wikileaks organising and republishing already-public leaks.[91] A former WikiLeaks associate said that Andy Mller-Maguhn and a colleague administered the submission server in 2016, though Mller-Maguhn denies this.[305] That October, WikiLeaks suggested "lawyer to lawyer" as an alternate submission method, naming Margaret Ratner Kunstler.[306][307]

By October 2021, WikiLeaks' secure chat stopped working and by February 2022, WikiLeaks' submission system and email server were offline.[308] In July 2022, a broken version of the submission system briefly relaunched with expired PGP keys and went offline after it was reported on by The Daily Dot.[309]

The legal issues surrounding WikiLeaks are complex.[clarification needed]

In August 2010, the internet payment company Moneybookers closed WikiLeaks' account due to publicity over its release of the Afghan war logs and because WikiLeaks had been added to the official US watchlist and an Australian government blacklist.[228]

In December 2010, the Australian Prime Minister Julia Gillard said that "I absolutely condemn the placement of this information on the WikiLeaks website - it's a grossly irresponsible thing to do and an illegal thing to do".[310] After criticism and a revolt within her party, she said she was referring to "the original theft of the material by a junior U.S. serviceman rather than any action by Mr Assange".[311][312]

The Australian Federal Police later said that the release of the cables by WikiLeaks breached no Australian laws.[313]

On 2 September 2011, Australia's attorney general, Robert McClelland released a statement that the US diplomatic cables published by Wikileaks identified at least one ASIO officer, and that it was a crime in Australia to publish information which could identify an intelligence officer. McClelland said that "On occasions before this week, WikiLeaks redacted identifying features where the safety of individuals or national security could be put at risk. It appears this hasn't occurred with documents that have been distributed across the internet this week." According to The Guardian and Al Jazeera, this meant "Julian Assange could face prosecution in Australia."[314][315]

In 2014, WikiLeaks published information about political bribery allegations, violating a gag order in Australia.[14][10] According to Peter Bartlett, a media lawyer in Australia, WikiLeaks was outside Australia's jurisdiction but "if Assange ever comes back to Australia, you would expect that he would immediately be charged with breaking a suppression order."[10]

In early February 2008, the Julius Baer Group sued WikiLeaks in California to have documents removed from their website. Judge Jeffrey White forced Dynadot, the domain registrar of wikileaks.org, to disassociate the site's domain name records with its servers, preventing use of the domain name to reach the site. Initially, the bank only wanted the documents to be removed (WikiLeaks had failed to name a contact person). After civil rights challenges, the judge lifted the injunction[316] and the bank dropped the case on 5 March 2008.[317]

On 20 April 2018, the Democratic National Committee filed a multimillion-dollar lawsuit in federal district court in Manhattan against Russia, the Trump campaign, WikiLeaks and Julian Assange, alleging a conspiracy to disrupt the 2016 United States presidential election in Trump's favour.[318] The suit was dismissed with prejudice on 30 July 2019. In his judgement, Judge John Koeltl said that WikiLeaks "did not participate in any wrongdoing in obtaining the materials in the first place" and therefore was within the law in publishing the information.[319] The federal judge also wrote "The DNC's interest in keeping 'donor lists' and 'fundraising strategies' secret is dwarfed by the newsworthiness of the documents as a whole...If WikiLeaks could be held liable for publishing documents concerning the DNC's political financial and voter-engagement strategies simply because the DNC labels them 'secret' and trade secrets, then so could any newspaper or other media outlet".[320]

The US Justice Department began a criminal investigation of WikiLeaks and Julian Assange soon after the leak of diplomatic cables in 2010 began.[321] The Washington Post reported that the department was considering charges under the Espionage Act of 1917, an action which former prosecutors characterised as "difficult" because of First Amendment protections for the press.[321][322] Several Supreme Court cases (e.g. Bartnicki v. Vopper) have established previously that the American Constitution protects the re-publication of illegally gained information provided the publishers did not themselves violate any laws in acquiring it.[323]

Regarding legal threats against WikiLeaks and Assange, legal expert Ben Saul said that Assange is the target of a global smear campaign to demonise him as a criminal or as a terrorist, without any legal basis.[324][325] The US Center for Constitutional Rights issued a statement expressing alarm at the "multiple examples of legal overreach and irregularities" in his arrest.[326]

In 2010, the NSA added Assange to its Manhunting Timeline.[327] In August 2010, the Pentagon had concluded that the Afghan War documents leak broke the law. A letter from the Department of Defence general counsel said that "it is the view of the Department of Defence that WikiLeaks obtained this material in circumstances that constitute a violation of US law, and that as long as WikiLeaks holds this material, the violation of the law is ongoing."[328] In November 2010, Harold Koh, the Legal Adviser of the Department of State, wrote that the United States diplomatic cables leak "were provided in violation of US law and without regard for the grave consequences of this action" and "as long as WikiLeaks holds such material, the violation of the law is ongoing".[329][330]

In 2011, a WikiLeaks volunteer became an FBI informant[331][332][333] and Google was served with search warrants for the contents of two WikiLeaks volunteers' email accounts.[334] The NSA discussed categorising WikiLeaks as a "malicious foreign actor" for surveillance purposes.[327][335]

On 14 December 2010 the United States Department of Justice issued a subpoena directing Twitter to provide information for accounts registered to or associated with WikiLeaks.[336] Twitter decided to notify its users.[337]

By 2013, Jrmie Zimmermann, Smri McCarthy, Jacob Appelbaum, David House and Jennifer Robinson had been detained and interrogated or approached when attempts were made to recruit them as informants, often using heavy handed tactics.[338]

In 2013, it was revealed that Google had been served with search warrants for the contents of email accounts belonging to WikiLeaks volunteers Herbert Snorrason and Smari McCarthy.[339][340] In 2015, it was revealed that Google had been served with search warrants for the contents of email accounts belonging to WikiLeaks staff members Sarah Harrison, Joseph Farrell, and Kristinn Hrafnsson as part of a criminal investigation with alleged offences including espionage, conspiracy to commit espionage, the theft or conversion of property belonging to the United States government, violation of the Computer Fraud and Abuse Act, and criminal conspiracy.[341][342] According to Daniel Domscheit-Berg in 2010, the WikiLeaks email accounts for Kristinn Hrafnsson and a young WikiLeaks staffer had automatically forwarded to their Google account, opening the organisation to surveillance risks.[343][344]

In April 2017, prosecutors began drafting a memo that considered charging members of WikiLeaks with conspiracy, theft of government property or violating the Espionage Act.[345] That month, CIA director Mike Pompeo called WikiLeaks "a non-state hostile intelligence service often abetted by state actors like Russia". The official designation of Wikileaks and Julian Assange as a non-state hostile intelligence service was discussed in mid-2017 during preparation of the Intelligence Authorization Act for Fiscal Year 2018. It was eventually incorporated into the National Defense Authorization Act for Fiscal Year 2020 that became law in December 2019. The Act says "It is the sense of Congress that WikiLeaks and the senior leadership of WikiLeaks resemble a non-state hostile intelligence service often abetted by state actors and should be treated as such a service by the United States." In the opinion of some former officials, the designation allowed the CIA to launch and plan operations that did not require presidential approval or congressional notice.[346][347][348][349]

In September 2021, Yahoo! News reported that in 2017 in the wake of the Vault 7 leaks, the CIA discussed plans to kidnap or assassinate Julian Assange. They also planned to spy on associates of WikiLeaks, sow discord among its members, and steal their electronic devices. "[T]op intelligence officials lobbied the White House" to designate Wikileaks as an "information broker" to allow for more investigative tools against it, "potentially paving the way" for its prosecution. Laura Poitras described attempts to classify herself and Assange as "information brokers" rather than journalists as "bone-chilling and a threat to journalists worldwide".[350] Former CIA Director Mike Pompeo stated that the US officials who had spoken to Yahoo should be prosecuted for exposing CIA activities.[351]

In November 2018, an accidental filing with Assange's name was seen to indicate there were undisclosed charges against him.[352] On 11 April 2019, Assange was charged in a computer hacking conspiracy.[353] On 23 May, a superseding indictment was filed with charges of Conspiracy to Receive National Defense Information, Obtaining National Defense Information, Disclosure of National Defense Information, and Conspiracy to Commit Computer Intrusion.[354] On 24 June 2020, another superseding indictment was filed which added to the allegations but not the charges.[355]

After the indictment against Assange was unsealed, the Department of Justice continued to investigate Wikileaks. The day after charging Assange, prosecutors contacted Domscheit-Berg. Prosecutors also spoke with David House for about 90 minutes, who had previously testified to the grand jury in exchange for immunity. House testified about helping run political operations for WikiLeaks and that Assange wanted him "to help achieve favorable press for Chelsea Manning." According to House, the grand jury "wanted full insight into WikiLeaks, what its goals were and why I was associated with it. ... It was all related to disclosures around the war logs." House said he had contact with Assange until 2013 and with WikiLeaks until 2015.[356][357][358] Chelsea Manning and Jeremy Hammond refused to testify for the grand jury.[359][360]

Read more:

WikiLeaks - Wikipedia

Meet RedPajama: An AI Project to Create Fully Open-Source Large Language Models Beginning with the Release of a 1.2 Trillion Token Dataset -…

Meet RedPajama: An AI Project to Create Fully Open-Source Large Language Models Beginning with the Release of a 1.2 Trillion Token Dataset  MarkTechPost

Read the original post:
Meet RedPajama: An AI Project to Create Fully Open-Source Large Language Models Beginning with the Release of a 1.2 Trillion Token Dataset -...

Bitcoin Drops to $27.3K, Ether Edges Toward $1.8K Amid Investors’ Interest Rate Concerns – CoinDesk

  1. Bitcoin Drops to $27.3K, Ether Edges Toward $1.8K Amid Investors' Interest Rate Concerns  CoinDesk
  2. Bitcoin Prices Fall Further. Regulators Are Keeping Up the Pressure.  Barron's
  3. First Mover Asia: What's Next After Bitcoin's Retreat  CoinDesk

Go here to see the original:
Bitcoin Drops to $27.3K, Ether Edges Toward $1.8K Amid Investors' Interest Rate Concerns - CoinDesk

Internet Censorship: Definition, Types, & How It Can Affect You – Dataprot

Internet censorship is a big deal. The days of complete cyber freedom are all but gone, with companies and governments interfering with the web. Their involvement is ruining the cyberworld for the rest of us in various ways, with censorship being the most prominent.

Internet censorship is the control or suppression of what can be accessed, published, or viewed online. It happens when governments, organizations, or individuals restrict or block access to web content. In this article, well be explaining how censorship happens, its impact on the internet, and how to avoid it.

Some countries censor the internet because they dont want their citizens to see things that might upset them or make them think differently. They also might do this to keep people from organizing protests or speaking out against the government.

Their goal, usually, is to make it difficult to get accurate information about whats going on in the world or stop people from being able to share their opinions freely.

But, the government internet censorship can happen for a variety of other reasons, including political, religious, or moral grounds and restricting media freedom.

While government-level censorship is meant to shut down dissidents, there are other reasons why organizations and groups of people restrict internet access to others. An organization may block certain websites to protect its members from offensive or inappropriate content or simply to increase productivity by limiting access to entertainment and social media sites.

Censorship of the internet happens in one of two directions:

Different things can be censored, like specific pictures, words, or whole websites and internet protocols. There are also different ways to censor things - blocking either full access to the material or limiting searches for censored terms.

One type of censorship is when a government makes it illegal to say certain things. For instance, in China, the government has made it illegal to talk about certain topics online, like democracy or human rights. They do this by censoring websites that discuss these topics and punishing people who break the rules. Governments work with ISPs to put those restrictions into motion, either by outright blocking access to websites or redirecting traffic to similar, regulated sites.

Another type of censorship is when social media companies block certain content from their platforms. For example, Facebook has been criticized for censoring body positivity and sex education posts. Likewise, YouTube has been accused of censoring videos about LGBTQ+ rights, mental health, and COVID-19 awareness. In this case, platforms issue take-down notices, followed by the removal of said content.

Its not uncommon for governments to even force tech companies to impose content restrictions based on their own propaganda. In such a case, the government would strong-arm content hosts into submission by threatening outright bans of their platforms. As a counterpoint, Twitter has started clearly marking government-related profiles, so users can see at a glance whether the profile could be a part of a propaganda machine. Its not much, but at least it helps fight the censorship on the internet.

Lastly, censorship can happen on a smaller scale within a single institution. For example, a school may restrict access to certain parts of the internet or even key phrases. That way, the students cannot use the schools computers to visit inappropriate websites like adult websites or social networks.

Similarly, employers may put blocks on specific apps, services, and websites, so the employees can only access the software and websites they allow them to. While well be discussing how to avoid content blocks and censorship using free VPNs and similar tactics, we strongly advise caution in such situations.

Some countries have rigid censorship laws, while others have none at all. China is well-known for its internet restrictions, which some call the great firewall of China. The Chinese government blocks access to many websites and social media platforms, like Facebook and Twitter. Googles search engine, as well as all other Google products, is also banned in China. The government is censoring search results and blocks certain words from being used online.

In Saudi Arabia, the government filters content based on religious and moral values. It usually blocks websites that contain pornography or material that could be considered offensive to Islam. In Iran, the government blocks websites that are critical of the regime or that contain information that could be used to foment dissent.

In Russia, a new law requires internet service providers to censor websites that the government decides are extremist. This can include foreign websites that have critical opinions of the government in question or that provide information about protests or other forms of defiance.

Censorship can also happen in less obvious ways. For example, many countries require internet companies to collect data about their users activities. This data can be used to track people and see what theyre doing online. Needless to say that such laws disrupt net neutrality.

Increased censorship can have a number of negative effects. For starters, it limits peoples ability to access information and ideas. This can lead to a loss of knowledge and opportunities for education and personal growth.

Additionally, digital censorship can stifle creativity and critical thinking. Having no access to the online world can restrain peoples ability to freely express themselves. When people are only exposed to one side of an issue, it can be challenging to develop a well-rounded opinion. Seeing only one aspect of the whole picture can also lead to misinformation.

Censorship can create an atmosphere of fear and mistrust. People may grow afraid of expressing their opinions or sharing their ideas, which can lead to a feeling of isolation and disconnection.

Since the early days of the internet, people have been fighting for online freedom. The internet has become an essential part of our lives, so much so that internet access has been declared a basic human right by the UN Resolution in 2016. Censoring the internet denies us that basic right.

Access to the internet means access to information, education, and communication. It allows us to connect with friends and family and participate in the global community. It is essential for businesses and for the economy, which the pandemic years especially confirmed to be true. When regulations on the type of content we can access are imposed, serious issues may arise, such as when restrictions infringe on medical websites that people need.

Cyberspace is also a powerful tool for democracy and human rights. The UN recognized the importance of the internet in a Resolution passed in 2016, declaring it a basic human right. The general belief is that the internet is something all people should have access to. Restricting access to parts of the internet is threading on human rights, rights to community, learning, and prospering in this modern world.

If you live in a country with restricted internet, there are several ways to bypass the restrictions and gain access to all internet content.

Web proxies are the simplest, fastest way to get around censorship and regional restrictions on the internet. They work by routing your traffic through a different server so that the website you are trying to visit doesnt know your true IP address. This can be used to get around simple content filters, like the ones your school or workplace may have in place.

Web proxies are not perfect, however. They can be slow, and they dont always work with every website. Additionally, your traffic is still going through another server, which means that the proxy owner could be snooping on your traffic and detecting phony IP addresses. More important - your internet service provider and, thus, the government, can still know what you were browsing.

Another way to get access to censored websites is to use a virtual private network. VPNs create a private, secure connection between two devices, which can be used to access restricted websites. When you use a VPN that doesnt log data, your traffic is encrypted, so your ISP or anyone else cant see what youre doing online. Even more important, theres no data saved on the providers side as if youve never used the service at all.

While VPNs are legal in most parts of the world, some countries block them and can even issue a fine if you get caught. If youre using a VPN in a country where they are not allowed or just worried about the repercussions, you may need to use a different method to access restricted websites.

Lastly, you might only need to switch your internet browser to a more secure one. Tor is a free browser that allows you to surf the internet anonymously. By encrypting traffic and bouncing it through a distributed network of relays, Tor makes it difficult for anyone to track a users online activity.

The main downside to using Tor is that it can be slow. Because traffic is routed through multiple relays, each with its own bandwidth limitations, Tor users may experience slowdowns when browsing the web. Additionally, some websites may block traffic from known Tor relays, making them inaccessible to Tor users.

Internet censorship, as explained, can be a difficult issue to navigate. On the one hand, its important to protect people from offensive or harmful material. On the other hand, it is important to allow people to freely access information and express themselves.

Lastly, as the internet is now considered a basic human right, imposing restrictions of such kind is a sign of dictatorship and not a signal that the government actually cares about pressing issues.

Go here to read the rest:

Internet Censorship: Definition, Types, & How It Can Affect You - Dataprot