Leaked Files – WikiLeaks

2. Act normal

If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. In particular, you should try to stick to your normal routine and behaviour.

If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.

In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media (USB sticks, memory cards and SSD drives) retain data even after a secure erasure. If you used flash media to store sensitive data, it is important to destroy the media.

If you do this and are a high-risk source you should make sure there are no traces of the clean-up, since such traces themselves may draw suspicion.

If a legal action is brought against you as a result of your submission, there are organisations that may help you. The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. You can find more details at https://www.couragefound.org.

Excerpt from:

Leaked Files - WikiLeaks

Julian Assange, WikiLeaks founder, given chance to appeal against U.S …

London A U.K. court has ruled that Julian Assange will not be immediately extradited to face charges in the United States, giving the U.S. government three weeks to "offer assurances" that the American justice system will abide by several specific tenets in its handling of the WikiLeaks founder's case.

The British court said Assange "has a real prospect of success on 3 of the 9 grounds of appeal" he has argued. Specifically, the court demanded that U.S. justice officials confirm he will be "permitted to rely on the First Amendment to the United States Constitution (which protects free speech), that he is not prejudiced at trial (including sentence) by reason of his nationality, that he is afforded the same First Amendment protections as a United States citizen and that the death penalty is not imposed."

The court said that if those U.S. government assurances are not given within the three week timeframe, Assange will be granted leave appeal in the U.K. If the assurances are given, there will be another U.K. court hearing on May 20 to make a final decision on granting Assange leave to appeal.

"Mr. Assange will not, therefore, be extradited immediately," the court said in its judgment on Tuesday.

This is the final appeal option available to Assange in U.K. courts.

He can, however, if the appeals process in the U.K. is exhausted, file an appeal with the European Court of Human Rights to consider his case. That court could order the U.K. not to extradite him as it deliberates. An appeal to the European Court of Human Rights would be Assange's final option to try to prevent his extradition to the U.S.

Assange has been imprisoned for almost five years in the U.K., and spent many years before that avoiding U.K. authorities by holing himself up in the Ecuadorian Embassy in London.

If extradited to the U.S., Assange faces a potential 175 years in prison for publishing classified information about the wars in Afghanistan and Iraq on the WikiLeaks website.

WikiLeaks published thousands of leaked documents, many relating to the wars in Iraq and Afghanistan, and Assange is alleged to have conspired to obtain and disclose sensitive U.S. national defense information.

In 2019, a federal grand jury in Virginia indicted Assange on 18 charges over the publication of classified documents. The charges include 17 counts of espionage and one charge of computer intrusion. Assange could face up to 10 years in prison for every count of espionage he's convicted of, and five years for the computer intrusion charge, according to the Department of Justice.

In a statement, the U.S. Department of Justice said Assange was complicit in the actions of Chelsea Manning, a former U.S. Army intelligence analyst, in "unlawfully obtaining and disclosing classified documents related to the national defense."

Assange denies any wrongdoing, and his lawyer says his life is at risk if he is extradited to the U.S.

Haley Ott is the CBS News Digital international reporter, based in the CBS News London bureau.

Read this article:

Julian Assange, WikiLeaks founder, given chance to appeal against U.S ...

WikiLeaks – Wikiwand

Dear Wikiwand AI, let's keep it short by simply answering these key questions:

Can you list the top facts and stats about WikiLeaks?

Summarize this article for a 10 year old

SHOW ALL QUESTIONS

WikiLeaks () is a media organisation and publisher that operates as a non-profit and is funded by donations[13] and media partnerships. It has published classified documents and other media provided by anonymous sources.[14] It was founded in 2006 by Julian Assange, an Australian editor, publisher, and activist, who is currently challenging extradition to the United States over his work with WikiLeaks.[15] Since September 2018, Kristinn Hrafnsson has served as its editor-in-chief.[16][17] Its website states that it has released more than ten million documents and associated analyses.[18] WikiLeaks' most recent publication of original documents was in 2019 and its most recent publication was in 2021.[19] Beginning in November 2022, many of the documents on the organisation's website could not be accessed.[19][20][21][22] In 2023, Assange said that WikiLeaks was no longer able to publish due to his imprisonment and the effect that US government surveillance and WikiLeaks' funding restrictions were having on potential whistleblowers.[23]

News leak publishing organisation

WikiLeaks has released document caches and media that exposed serious violations of human rights and civil liberties by various governments. It released footage of the 12July 2007 Baghdad airstrike which it titled Collateral Murder, in which Iraqi Reuters journalists and several civilians were killed by a U.S. helicopter crew.[24] WikiLeaks has published diplomatic cables from the United States and Saudi Arabia,[25][26] and emails from the governments of Syria[27][28] and Turkey.[29][30][31] WikiLeaks has also published documents exposing corruption in Kenya[32][33] and at Samherji[34] and cyber warfare and surveillance tools created by the CIA,[35][36] and surveillance of the French president by the National Security Agency.[37][38] During the 2016 U.S. presidential election campaign, WikiLeaks released emails from the Democratic National Committee (DNC) and from Hillary Clinton's campaign manager, showing that the party's national committee had effectively acted as an arm of the Clinton campaign during the primaries, seeking to undercut the campaign of Bernie Sanders. These releases resulted in the resignation of the chairwoman of the DNC and caused significant harm to the Clinton campaign.[39] During the campaign, WikiLeaks promoted false conspiracy theories about Hillary Clinton, the Democratic Party and the murder of Seth Rich.[40][41][42]

WikiLeaks has won awards and been commended for exposing state and corporate secrets, increasing transparency, assisting freedom of the press, and enhancing democratic discourse while challenging powerful institutions. WikiLeaks and some of its supporters say the organisation's publications have a perfect record of publishing authentic documents. The organisation has been the target of campaigns to discredit it, including aborted ones by Palantir and HBGary. WikiLeaks has also had its donation systems interrupted by payment processors. As a result, the Wau Holland Foundation helps process WikiLeaks' donations.

The organisation has been criticised for inadequately curating content and violating personal privacy. WikiLeaks has, for instance, revealed Social Security numbers, medical information, credit card numbers and details of suicide attempts.[43][44][45] News organisations, activists, journalists and former members have also criticised WikiLeaks over allegations of anti-Clinton and pro-Trump bias, various associations with the Russian government, buying and selling of leaks, and a lack of internal transparency. Journalists have also criticised the organisation for promotion of conspiracy theories, and what they describe as exaggerated and misleading descriptions of the contents of leaks. The CIA and Congress defined the organisation as a "non-state hostile intelligence service" after the release of Vault 7.[46]

Oops something went wrong:

Here is the original post:
WikiLeaks - Wikiwand

WikiLeaks founder Assange begins final attempt to avoid … – PBS

LONDON (AP) Julian Assanges lawyers opened a final U.K. legal challenge Tuesday to stop the WikiLeaks founder from being sent to the United States to face spying charges, arguing that American authorities are seeking to punish him for exposing serious criminal acts by the U.S. state

READ MORE: UK government approves Julian Assanges extradition to the U.S.

Lawyer Edward Fitzgerald said there is a risk Assange will suffer a flagrant denial of justice if he is sent to the U.S. At a two-day High Court hearing, Assanges attorneys are asking judges to grant a new appeal, his last legal roll of the dice in Britain

Assange himself was not in court. Judge Victoria Sharp said he was granted permission to come from Belmarsh Prison, where he has been held for five years, but had chosen not to attend. Fitzgerald said the 52-year-old Australian was unwell but did not elaborate on his health.

Assange has been fighting extradition for more than a decade, including seven years in self-exile in the Ecuadorian Embassy in London and the last five years in the high-security prison on the outskirts of the British capital.

He has been indicted on 17 charges of espionage and one charge of computer misuse over his websites publication of classified U.S. documents almost 15 years ago. American prosecutors say Assange helped U.S. Army intelligence analyst Chelsea Manning steal diplomatic cables and military files that WikiLeaks later published, putting lives at risk.

To his supporters, Assange is a secrecy-busting journalist who exposed U.S. military wrongdoing in Iraq and Afghanistan. They argue that the prosecution is politically motivated and he wont get a fair trial in the U.S.

Hundreds of supporters holding Free Julian Assange signs and chanting there is only one decision no extradition held a noisy protest outside the ne-Gothic High Court in London. Rallies were also held in cities around the world, including Brussels and Berlin.

Assanges wife Stella Assange told the crowd the case was about the right to be able to speak freely without being put in prison and hounded and terrorized by the state.

Referring to the Russian opposition leader Alexei Navalny, who died in prison last week, she said: What happened to Navalny can happen to Julian, and will happen to Julian if he is extradited.

Stella Assange, who married the WikiLeaks founder in prison in 2022 said last week that his health has deteriorated during years of confinement and if hes extradited, he will die.

READ MORE: Assange lawyer dismisses U.S. promises over extradition

If the judges rule against Assange, he can ask the European Court of Human Rights to block his extradition though supporters worry he could be put on a plane to the U.S. before that happens, because the British government has already signed an extradition order.

Assanges lawyers say he could face up to 175 years in prison if convicted, though American authorities have said the sentence is likely to be much shorter than that.

While several of Assanges arguments against extradition have already been rejected by British courts, his lawyers are trying to make new points to secure an appeal.

He is being prosecuted for engaging in ordinary journalistic practice of obtaining and publishing classified information, lawyer Fitzgerald said in court, arguing that publication of leaked documents is a common journalistic practice, protected by well-established principles of free speech.

The attorneys argued that the prosecution of Assange is politically motivated retaliation for WikiLeaks exposure of criminality on the part of the U.S. government on an unprecedented scale.

The U.S. was prepared to go to any lengths (including misusing its own criminal justice system) to sustain impunity for U.S. officials in respect of the torture/war crimes committed in its infamous war on terror, and to suppress those actors and courts willing and prepared to try to bring those crimes to account, Assanges lawyers said in written arguments. Mr. Assange was one of those targets.

Assanges lawyers also want judges to reconsider allegations that the CIA developed plans to kidnap or kill Assange while he was in the Ecuadorian Embassy. A lower-court judge has dismissed the claims, but Assange attorney Mark Summers said Tuesday there is compelling evidence now in existence that the plot was real.

There was a plot to kidnap Mr. Assange, to rendition him to America, or else straightforwardly murder him, the lawyer claimed.

James Lewis, a lawyer for the U.S., said Assange was being prosecuted because he is alleged to have committed serious criminal offences.

He argued in written submissions that Assanges actions threatened damage to the strategic and national security interests of the United States and put individuals named in the documents including Iraqis and Afghans who had helped U.S. forces at risk of serious physical harm.

READ MORE: WikiLeaks founder Assange denied bail in UK

Assanges legal troubles began in 2010, when he was arrested in London at the request of Sweden, which wanted to question him about allegations of rape and sexual assault made by two women. In 2012, Assange jumped bail and sought refuge inside the Ecuadorian Embassy, where he was beyond the reach of the authorities but was also effectively a prisoner in the tiny diplomatic mission.

The relationship between Assange and his hosts eventually soured, and he was evicted from the embassy in April 2019. British police immediately arrested him for breaching bail in 2012, and he remains in prison. Sweden dropped the sex crimes investigations in November 2019 because so much time had elapsed.

A U.K. district court judge rejected the U.S. extradition request in 2021 on the grounds that Assange was likely to kill himself if held under harsh U.S. prison conditions. Higher courts overturned that decision after getting assurances from the U.S. about his treatment. The British government signed an extradition order in June 2022.

Meanwhile, the Australian parliament last week called for Assange to be allowed to return to his homeland.

The judges, Sharp and Jeremy Johnson, could deliver a verdict at the end of the two-day hearing on Wednesday, but theyre more likely to take several weeks to consider their decision.

See the rest here:
WikiLeaks founder Assange begins final attempt to avoid ... - PBS

Vault 7 – Wikipedia

CIA files on cyber war and surveillance

Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, detailing the activities and capabilities of the United States Central Intelligence Agency (CIA) to perform electronic surveillance and cyber warfare. The files, dating from 2013 to 2016, include details on the agency's software capabilities, such as the ability to compromise cars, smart TVs,[1] web browsers (including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera),[2][3] and the operating systems of most smartphones (including Apple's iOS and Google's Android), as well as other operating systems such as Microsoft Windows, macOS, and Linux.[4][5] A CIA internal audit identified 91 malware tools out of more than 500 tools in use in 2016 being compromised by the release.[6] The tools were developed by the Operations Support Branch of the C.I.A.[7]

The release of Vault 7 led the CIA to redefine WikiLeaks as a non-state hostile intelligence service.[8] In July 2022 former CIA software engineer Joshua Schulte was convicted of leaking the documents to WikiLeaks.[9]

During January and February 2017, the United States Justice Department was negotiating through Julian Assange's attorney Adam Waldman[a] for immunity and safe passage for Assange to leave the Ecuadorian Embassy in London and to travel to the United States both to discuss risk minimization of future WikiLeaks releases including redactions and to testify that Russia was not the source for the WikiLeaks releases in 2016.[b] In mid February 2017, Waldman, who was pro bono, asked Senator Mark Warner who was co-chairman of the United States Senate Intelligence Committee[c] if he had any questions to ask Assange. Warner contacted FBI Director James Comey and told Waldman "stand down and end the negotiations with Assange," with which Waldman complied. However, David Laufman who was Waldman's counterpart with the Justice Department replied, "That's B.S. You're not standing down and neither am I." According to Ray McGovern on 28 March 2017, Waldman and Laufman were very near an agreement between the Justice Department and Assange for "risk mitigation approaches relating to CIA documents in WikiLeaks' possession or control, such as the redaction of Agency personnel in hostile jurisdictions," in return for "an acceptable immunity and safe passage agreement" but a formal agreement was never reached and the very damaging disclosure about "Marble Framework" was released by WikiLeaks on 31 March 2017.[13][14]

In February 2017, WikiLeaks began teasing the release of "Vault 7" with a series of cryptic messages on Twitter, according to media reports.[15] Later on in February, WikiLeaks released classified documents describing how the CIA monitored the 2012 French presidential election.[16] The press release for the leak stated that it was published "as context for its forthcoming CIA Vault 7 series."[17]

In March 2017, US intelligence and law enforcement officials said to the international wire agency Reuters that they had been aware of the CIA security breach which led to Vault 7 since late 2016. Two officials said they were focusing on "contractors" as the possible source of the leaks.[18]

In 2017, federal law enforcement identified CIA software engineer Joshua Adam Schulte as a suspected source of Vault 7.[19][20] Schulte plead not guilty and was convicted in July 2022 of leaking the documents to WikiLeaks.

On 13 April 2017, CIA director Mike Pompeo declared WikiLeaks to be a "hostile intelligence service."[21] In September 2021, Yahoo! News reported that in 2017 in the wake of the Vault 7 leaks, the CIA considered kidnapping or assassinating Assange, spying on associates of WikiLeaks, sowing discord among its members, and stealing their electronic devices. After many months of deliberation, all proposed plans had been scrapped due to a combination of legal and moral objections. Per the 2021 Yahoo News article, a former Trump national security official stated, "We should never act out of a desire for revenge".[22]

According to a government witness during Joshua Schulte's retrial, some pages and information in Vault 7 were created by WikiLeaks to replace missing information.[23]

The first batch of documents named "Year Zero" was published by WikiLeaks on 7 March 2017, consisting of 7,818 web pages with 943 attachments, purportedly from the Center for Cyber Intelligence,[24] which contained more pages than former NSA contractor and leaker, Edward Snowden's NSA release at the time.[25] WikiLeaks had released Year Zero online in a locked archive earlier that week, and revealing the passphrase on the 7th. The passphrase referred to a President Kennedy quote that he wanted to splinter the CIA in a thousand pieces and scatter it to the winds.[26]

WikiLeaks did not name the source, but said that the files had "circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive."[1] According to WikiLeaks, the source "wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons" since these tools raise questions that "urgently need to be debated in public, including whether the C.I.A.'s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency."[1]

WikiLeaks attempted to redact names and other identifying information from the documents before their release,[1] but faced criticism for leaving some key details unredacted.[27] WikiLeaks also attempted to allow for connections between people to be drawn via unique identifiers generated by WikiLeaks.[28][29] It also said that it would postpone releasing the source code for the cyber weapons, which is reportedly several hundred million lines long, "until a consensus emerges on the technical and political nature of the C.I.A.'s program and how such 'weapons' should be analyzed, disarmed and published."[1] WikiLeaks founder Julian Assange claimed this was only part of a larger series.[25]

The CIA released a statement saying, "The American public should be deeply troubled by any WikiLeaks disclosure designed to damage the Intelligence Community's ability to protect America against terrorists or other adversaries. Such disclosures not only jeopardize US personnel and operations, but also equip our adversaries with tools and information to do us harm."[30]

In a statement issued on 19 March 2017, Assange said the technology companies who had been contacted had not agreed to, disagreed with, or questioned what he termed as WikiLeaks' standard industry disclosure plan. The standard disclosure time for a vulnerability is 90 days after the company responsible for patching the software is given full details of the flaw.[31] According to WikiLeaks, only Mozilla had been provided with information on the vulnerabilities, while "Google and some other companies" only confirmed receiving the initial notification. WikiLeaks stated: "Most of these lagging companies have conflicts of interest due to their classified work with US government agencies. In practice such associations limit industry staff with US security clearances from fixing holes based on leaked information from the CIA. Should such companies choose to not secure their users against CIA or NSA attacks users may prefer organizations such as Mozilla or European companies that prioritize their users over government contracts".[32][33]

On 23 March 2017 WikiLeaks published the second release of Vault 7 material, entitled "Dark Matter". The publication included documentation for several CIA efforts to hack Apple's iPhones and Macs.[34][35][36] These included the Sonic Screwdriver malware that could use the Thunderbolt interface to bypass Apple's password firmware protection.[37]

On 31 March 2017, WikiLeaks published the third part of its Vault 7 documents, entitled "Marble". It contained 676 source code files for the CIA's Marble Framework. It is used to obfuscate, or scramble, malware code in an attempt to make it so that anti-virus firms or investigators cannot understand the code or attribute its source. According to WikiLeaks, the code also included a de-obfuscator to reverse the obfuscation effects.[38][39]

On 7 April 2017, WikiLeaks published the fourth set of its Vault 7 documents, dubbed "Grasshopper". The publication contains 27 documents from the CIA's Grasshopper framework, which is used by the CIA to build customized and persistent malware payloads for the Microsoft Windows operating systems. Grasshopper focused on Personal Security Product (PSP) avoidance. PSPs are antivirus software such as MS Security Essentials, Symantec Endpoint or Kaspersky IS.[39][40]

On 14 April 2017, WikiLeaks published the fifth part of its Vault 7 documents, titled "HIVE". Based on the CIA top-secret virus program created by its "Embedded Development Branch" (EDB). The six documents published by WikiLeaks are related to the HIVE multi-platform CIA malware suite. A CIA back-end infrastructure with a public-facing HTTPS interface used by CIA to transfer information from target desktop computers and smartphones to the CIA, and open those devices to receive further commands from CIA operators to execute specific tasks, all the while hiding its presence behind unsuspicious-looking public domains through a masking interface known as "Switchblade" (also known as Listening Post (LP) and Command and Control (C2)).[41]

On 21 April 2017, WikiLeaks published the sixth part of its Vault 7 material, code-named "Weeping Angel", a hacking tool co-developed by the CIA and MI5 used to exploit a series of early smart TVs for the purpose of covert intelligence gathering. Once installed in suitable televisions with a USB stick, the hacking tool enables those televisions' built-in microphones and possibly video cameras to record their surroundings, while the televisions falsely appear to be turned off. The recorded data is then either stored locally into the television's memory or sent over the internet to the CIA. Allegedly both the CIA and MI5 agencies collaborated to develop that malware in Joint Development Workshops. Security expert Sarah Zatko said about the data "nothing in this suggests it would be used for mass surveillance," and Consumer Reports said that only some of the earliest smart TVs with built-in microphones and cameras were affected.[42][43][44]

As of this part 6 publication, "Weeping Angel" is the second major CIA hacking tool which notably references the British television show, Doctor Who, alongside "Sonic Screwdriver" in "Dark Matter".[45][46]

On 28 April 2017, WikiLeaks published the seventh part of its Vault 7 materials, dubbed "Scribbles". The leak includes documentation and source code of a tool intended to track documents leaked to whistleblowers and journalists by embedding web beacon tags into classified documents to trace who leaked them.[47] The tool affects Microsoft Office documents, specifically "Microsoft Office 2013 (on Windows 8.1 x64), documents from Office versions 97-2016 (Office 95 documents will not work) and documents that are not locked, encrypted, or password-protected".[48] When a CIA watermarked document is opened, an invisible image within the document that is hosted on the agency's server is loaded, generating a HTTP request. The request is then logged on the server, giving the intelligence agency information about who is opening it and where it is being opened. However, if a watermarked document is opened in an alternative word processor the image may be visible to the viewer. The documentation also states that if the document is viewed offline or in protected view, the watermarked image will not be able to contact its home server. This is overridden only when a user enables editing.[49]

On 5 May 2017, WikiLeaks published the eighth part of its Vault 7 documents, titled "Archimedes". According to U.S. SANS Institute instructor Jake Williams, who analyzed the published documents, Archimedes is a virus previously codenamed "Fulcrum". According to cyber security expert and ENISA member Pierluigi Paganini, the CIA operators use Archimedes to redirect local area network (LAN) web browser sessions from a targeted computer through a computer controlled by the CIA before the sessions are routed to the users. This type of attack is known as man-in-the-middle (MitM). With their publication WikiLeaks included a number of hashes that they claim can be used to potentially identify the Archimedes virus and guard against it in the future. Paganini stated that potential targeted computers can search for those hashes on their systems to check if their systems had been attacked by the CIA.[50]

On 12 May 2017, WikiLeaks published part nine of its Vault 7 materials, "AfterMidnight" and "Assassin". AfterMidnight is a piece of malware installed on a target personal computer and disguises as a DLL file, which is executed while the user's computer reboots. It then triggers a connection to the CIA's Command and Control (C2) computer, from which it downloads various modules to run. As for Assassin, it is very similar to its AfterMidnight counterpart, but deceptively runs inside a Windows service process. CIA operators reportedly use Assassin as a C2 to execute a series of tasks, collect, and then periodically send user data to the CIA Listening Post(s) (LP). Similar to backdoor Trojan behavior. Both AfterMidnight and Assassin run on Windows operating system, are persistent, and periodically beacon to their configured LP to either request tasks or send private information to the CIA, as well as automatically uninstall themselves on a set date and time.[51]

On 19 May 2017, WikiLeaks published the tenth part of its Vault 7 documents, titled "Athena". The published user guide, demo, and related documents were created between September 2015 and February 2016. They are all about a malware allegedly developed for the CIA in August 2015, roughly one month after Microsoft released Windows 10 with their firm statements about how difficult it was to compromise. Both the primary "Athena" malware and its secondary malware named "Hera" are similar in theory to Grasshopper and AfterMidnight malware but with some significant differences. One of those differences is that Athena and Hera were developed by the CIA with a New Hampshire private corporation called Siege Technologies. During a Bloomberg 2014 interview the founder of Siege Technologies confirmed and justified their development of such malware. Athena malware completely hijacks Windows' Remote Access services, while Hera hijacks Windows Dnscache service. Both Athena and Hera also affect all current versions of Windows including, but not limited to, Windows Server 2012 and Windows 10. Another difference is in the types of encryption used between the infected computers and the CIA Listening Posts (LP). As for the similarities, they exploit persistent DLL files to create a backdoor to communicate with CIA's LP, steal private data, then send it to CIA servers, or delete private data on the target computer, as well as Command and Control (C2) for CIA operatives to send additional malicious software to further run specific tasks on the attacked computer. All of the above designed to deceive computer security software. Beside the published detailed documents, WikiLeaks did not provide any evidence suggesting the CIA used Athena or not.[52]

On 1 June 2017, WikiLeaks published part 11 of its Vault 7 materials, "Pandemic". This tool serves as a persistent implant affecting Windows machines with shared folders. It functions as a file system filter driver on an infected computer, and listens for Server Message Block traffic while detecting download attempts from other computers on a local network. "Pandemic" will answer a download request on behalf of the infected computer. However, it will replace the legitimate file with malware. In order to obfuscate its activities, "Pandemic" only modifies or replaces the legitimate file in transit, leaving the original on the server unchanged. The implant allows 20 files to be modified at a time, with a maximum individual file size of 800MB. While not stated in the leaked documentation, it is possible that newly infected computers could themselves become "Pandemic" file servers, allowing the implant to reach new targets on a local network.[53]

On 15 June 2017, WikiLeaks published part 12 of its Vault 7 materials, entitled "Cherry Blossom".[54] Cherry Blossom used a command and control server called Cherry Tree and custom router firmware called FlyTrap to monitor internet activity of targets, scan for email addresses, chat usernames, MAC addresses and VoIP numbers" and redirect traffic.[55]

On 22 June 2017, WikiLeaks published part 13 of its Vault 7 materials, the manuals for "Brutal Kangaroo".[56] Brutal Kangaroo was a project focused on CIA malware designed to compromise air-gapped computer networks with infected USB drives. Brutal Kangaroo included the tools Drifting Deadline, the main tool, Shattered Assurance, a server that automates thumb drive infection, Shadow, a tool to coordinate compromised machines, and Broken Promise, a tool for exfiltrating data from the air-gapped networks.[57]

On 28 June 2017, WikiLeaks published part 14 of its Vault 7 materials, the manual for the project entitled "Elsa".[58] Elsa was a tool used for tracking Windows devices on nearby WiFi networks.[59]

On 29 June 2017, WikiLeaks published part 15 of its Vault 7 materials, the manual for the project entitled "OutlawCountry".[60] OutlawCountry was a kernel module for Linux 2.6 that let CIA agents spy on Linux servers and redirect outgoing traffic from a Linux computer to a chosen site.[61]

On 6 July 2017, WikiLeaks published part 16 of its Vault 7 materials, the manual for the project entitled "BothanSpy".[62] BothanSpy was a CIA hacking tool made to steal SSH credentials from Windows computers.[63]

On 13 July 2017, WikiLeaks published part 17 of its Vault 7 materials, the manual for the project entitled "Highrise".[64] The Highrise hacking tool, also known as Tidecheck, was used to intercept and redirect SMS messages to Android phones using versions 4.0 through 4.3. Highrise could also be used as an encrypted communications channel between CIA agents and supervisors.[65]

On 19 July 2017, WikiLeaks published part 18 of the Vault 7 materials, documents from Raytheon Blackbird Technologies for the "UMBRAGE Component Library" (UCL) project reports on malware and their attack vectors. According to WikiLeaks, it analysed malware attacks in the wild and gave "recommendations to the CIA development teams for further investigation and PoC development for their own malware projects." It mostly contained Proof-of-Concept ideas partly based on public documents.[66][67]

On 27 July 2017, WikiLeaks published part 19 of its Vault 7 materials, manuals for the project entitled "Imperial".[68] Imperial included three tools named Achilles, Aeris and SeaPea. Achilles was a tool for turning MacOS DMG install files into trojan malware. Aeris was a malware implant for POSIX systems, and SeaPea was an OS X rootkit.[69]

On 3 August 2017, WikiLeaks published part 20 of its Vault 7 materials, manuals for the project entitled "Dumbo".[70] Dumbo was a tool that the Agency used to disable webcams, microphones, and other surveillance tools over WiFi and bluetooth to allow field agents to perform their missions.[71]

On 10 August 2017, WikiLeaks published part 21 of its Vault 7 materials, the manual for the project CouchPotato.[72] CouchPotato was a tool for intercepting and saving remote video streams, which let the CIA tap into other people's surveillance systems.[73]

On 24 August 2017, WikiLeaks published part 22 of its Vault 7 materials from the CIA's "ExpressLane" project. These documents highlighted one of the cyber operations the CIA conducts against other services it liaises with, including the National Security Agency (NSA), the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI).

ExpressLane, a covert information collection tool, was used by the CIA to exfiltrate the biometric data collection systems of services it liaises with. ExpressLane was installed and run under the cover of upgrading the biometric software of liaison services by the CIA's Office of Technical Services (OTS) agents without their knowledge.[74]

On 31 August 2017, WikiLeaks published part 23 of the Vault 7 documents, the manual for the project Angelfire.[75] Angelfire was a malware framework made to infect computers running Windows XP and Windows 7, made of five parts. Solartime was the malware that modified the boot sector to load Wolfcreek, which was a self-loading driver that loaded other drivers. Keystone was responsible for loading other malware. BadMFS was a covert file system that hid the malware, and Windows Transitory File System was a newer alternative to BadMFS. The manual included a long list of problems with the tools.[76]

Protego, part 24 of the Vault 7 documents, was published on 7 September 2017. According to WikiLeaks, Protego "is a PIC-based missile control system that was developed by Raytheon."[77]

On 9 November, 2017, WikiLeaks began publishing Vault 8, which it described as "source code and analysis for CIA software projects including those described in the Vault7 series." The stated intention of the Vault 8 publication was to "enable investigative journalists, forensic experts and the general public to better identify and understand covert CIA infrastructure components."[78][79] The only Vault 8 release has been the source code and development logs for Hive, a covert communications platform for CIA malware.[78] WikiLeaks published the Hive documentation as part of Vault 7 on 14 April 2017.

In October 2021, a new backdoor based on the Hive source code was discovered being used "to collect sensitive information and provide a foothold for subsequent intrusions." Researchers called it xdr33 and released a report on it in January 2022.[80][81][82] The malware targets an unspecified F5 appliance and allowed hackers to upload and download files.[83] It also allowed network traffic spying and execute commands on the appliance.[82][84]

WikiLeaks said that the documents came from "an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence (CCI) in Langley, Virginia."[85] The documents allowed WikiLeaks to partially determine the structure and organization of the CCI. The CCI reportedly has an entire unit devoted to compromising Apple products.[86]

The cybersecurity firm Symantec analyzed Vault 7 documents and found some of the described software closely matched cyberattacks by "Longhorn," which it had monitored since 2014. Symantec had previously suspected that "Longhorn" was government-sponsored and had tracked its usage against 40 targets in 16 countries.[87][88]

The first portion of the documents made public on 7 March 2017, Vault 7 "Year Zero", revealed that a top secret CIA unit used the German city of Frankfurt as the starting point for hacking attacks on Europe, China and the Middle East. According to the documents, the U.S. government uses its Consulate General Office in Frankfurt as a hacker base for cyber operations. WikiLeaks documents reveal the Frankfurt hackers, part of the Center for Cyber Intelligence Europe (CCIE), were given cover identities and diplomatic passports to obfuscate customs officers to gain entry to Germany.[86][89]

The chief Public Prosecutor General of the Federal Court of Justice in Karlsruhe Peter Frank announced on 8 March 2017 that the government was conducting a preliminary investigation to see if it will launch a major probe into the activities being conducted out of the consulate and also more broadly whether people in Germany were being attacked by the CIA.[90] Germany's foreign minister Sigmar Gabriel from the Social Democratic Party responded to the documents of Vault 7 "Year Zero" that the CIA used Frankfurt as a base for its digital espionage operations, saying that Germany did not have any information about the cyber attacks.[91]

The documents reportedly revealed that the agency had amassed a large collection of cyberattack techniques and malware produced by other hackers. This library was reportedly maintained by the CIA's Remote Devices Branch's UMBRAGE group, with examples of using these techniques and source code contained in the "Umbrage Component Library" git repository.

On the day the Vault 7 documents were first released, WikiLeaks described UMBRAGE as "a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation," and tweeted, "CIA steals other groups virus and malware facilitating false flag attacks."[92] According to WikiLeaks, by recycling the techniques of third-parties through UMBRAGE, the CIA can not only increase its total number of attacks,[93] but can also mislead forensic investigators by disguising these attacks as the work of other groups and nations.[1][86] Among the techniques borrowed by UMBRAGE was the file wiping implementation used by Shamoon. According to PC World, some of the techniques and code snippets have been used by CIA in its internal projects, whose end result cannot be inferred from the leaks. PC World commented that the practice of planting "false flags" to deter attribution was not a new development in cyberattacks: Russian, North Korean and Israeli hacker groups are among those suspected of using false flags.[94]

A conspiracy theory soon emerged alleging that the CIA framed the Russian government for interfering in the 2016 U.S. elections. Conservative commentators such as Sean Hannity and Ann Coulter speculated about this possibility on Twitter, and Rush Limbaugh discussed it on his radio show.[95] Russian foreign minister Sergey Lavrov said that Vault 7 showed that "the CIA could get access to such 'fingerprints' and then use them."[92]

Cybersecurity writers and experts, such as Ben Buchanan and Kevin Poulsen, were skeptical of those theories.[16][96] Poulsen said the theories were "disinformation" being taken advantage of by Russia and spread by bots. He also wrote, "The leaked catalog isn't organized by country of origin, and the specific malware used by the Russian DNC hackers is nowhere on the list." Robert M. Lee, who founded the cybersecurity firm Dragos, said the "narrative emerged far too quickly to have been organic."[16]

According to a study by Kim Zetter in The Intercept, UMBRAGE was probably much more focused on speeding up development by repurposing existing tools, rather than on planting false flags.[93] Robert Graham, CEO of Errata Security told The Intercept that the source code referenced in the UMBRAGE documents is "extremely public", and is likely used by a multitude of groups and state actors. Graham added: "What we can conclusively say from the evidence in the documents is that they're creating snippets of code for use in other projects and they're reusing methods in code that they find on the internet. ... Elsewhere they talk about obscuring attacks so you can't see where it's coming from, but there's no concrete plan to do a false flag operation. They're not trying to say 'We're going to make this look like Russia'."[97]

The documents describe the Marble framework, a string obfuscator used to hide text fragments in malware from visual inspection. Some outlets reported that foreign languages were used to cover up the source of CIA hacks, but technical analysis refuted the idea.[98][99][100] According to WikiLeaks, it reached 1.0 in 2015 and was used by the CIA throughout 2016.[100]

In its release, WikiLeaks said "Marble" was used to insert foreign language text into the malware to mask viruses, trojans and hacking attacks, making it more difficult for them to be tracked to the CIA and to cause forensic investigators to falsely attribute code to the wrong nation. The source code revealed that Marble had examples in Chinese, Russian, Korean, Arabic and Persian.[100]

Analysts called WikiLeaks' description of Marble's main purpose inaccurate, telling The Hill its main purpose was probably to avoid detection by antivirus programs.[101]

Marble also contained a deobfuscator tool with which the CIA could reverse text obfuscation.[100][102]

Security researcher Nicholas Weaver from International Computer Science Institute in Berkeley told the Washington Post: "This appears to be one of the most technically damaging leaks ever done by WikiLeaks, as it seems designed to directly disrupt ongoing CIA operations."[103][104]

HammerDrill is a CD/DVD collection tool that collects directory walks and files to a configured directory and filename pattern as well as logging CD/DVD insertion and removal events.[105]

After WikiLeaks released the first installment of Vault 7, "Year Zero", Apple stated that "many of the issues leaked today were already patched in the latest iOS," and that the company will "continue work to rapidly address any identified vulnerabilities."[106]

On 23 March 2017, WikiLeaks released "Dark Matter", the second batch of documents in its Vault 7 series, detailing the hacking techniques and tools all focusing on Apple products developed by the Embedded Development Branch (EDB) of the CIA. The leak also revealed the CIA had been targeting the iPhone since 2008, and that some projects attacked Apple's firmware.[107] The "Dark Matter" archive included documents from 2009 and 2013. Apple issued a second statement assuring that based on an "initial analysis, the alleged iPhone vulnerability affected iPhone 3G only and was fixed in 2009 when iPhone 3GS was released." Additionally, a preliminary assessment showed "the alleged Mac vulnerabilities were previously fixed in all Macs launched after 2013".[108][109]

WikiLeaks said on 19 March 2017 on Twitter that the "CIA was secretly exploiting" a vulnerability in a huge range of Cisco router models discovered thanks to the Vault 7 documents.[110][111] The CIA had learned more than a year ago how to exploit flaws in Cisco's widely used internet switches, which direct electronic traffic, to enable eavesdropping. Cisco quickly reassigned staff from other projects to turn their focus solely on analyzing the attack and to figure out how the CIA hacking worked, so they could help customers patch their systems and prevent criminal hackers or spies from using similar methods.[112]

On 20 March, Cisco researchers confirmed that their study of the Vault 7 documents showed the CIA had developed malware which could exploit a flaw found in 318 of Cisco's switch models and alter or take control of the network.[113] Cisco issued a warning on security risks, patches were not available, but Cisco provided mitigation advice.[111]

The electronic tools can reportedly compromise both Apple's iOS and Google's Android operating systems. By adding malware to the Android operating system, the tools could gain access to secure communications made on a device.[114]

According to WikiLeaks, once an Android smartphone is penetrated the agency can collect "audio and message traffic before encryption is applied".[1] Some of the agency's software is reportedly able to gain access to messages sent by instant messaging services.[1] This method of accessing messages differs from obtaining access by decrypting an already encrypted message.[114] While the encryption of messengers that offer end-to-end encryption, such as Telegram, WhatsApp and Signal, wasn't reported to be cracked, their encryption can be bypassed by capturing input before their encryption is applied, by methods such as keylogging and recording the touch input from the user.[114]

Commentators, among them Snowden and cryptographer and security pundit Bruce Schneier, observed that Wikileaks incorrectly implied that the messaging apps themselves, and their underlying encryption, had been compromised - an implication which was in turn reported for a period by the New York Times and other mainstream outlets.[1][115]

One document reportedly showed that the CIA was researching ways to infect vehicle control systems. WikiLeaks stated, "The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations."[86] This statement brought renewed attention to conspiracy theories surrounding the death of Michael Hastings.[116]

The documents refer to a "Windows FAX DLL injection" exploit in Windows XP, Windows Vista and Windows 7 operating systems.[24] This would allow a user with malicious intents to hide its own malware under the DLL of another application. However, a computer must have already been compromised through another method for the injection to take place.[117][bettersourceneeded]

On 7 March 2017, Edward Snowden commented on the importance of the release, stating that it reveals the United States Government to be "developing vulnerabilities in US products" and "then intentionally keeping the holes open", which he considers highly reckless.[118] On 7 March 2017, Nathan White, Senior Legislative Manager at the Internet advocacy group Access Now, writes:[119]

Today, our digital security has been compromised because the CIA has been stockpiling vulnerabilities rather than working with companies to patch them. The United States is supposed to have a process that helps secure our digital devices and services the 'Vulnerabilities Equities Process.' Many of these vulnerabilities could have been responsibly disclosed and patched. This leak proves the inherent digital risk of stockpiling vulnerabilities rather than fixing them.

On 8 March 2017, Lee Mathews, a contributor to Forbes, wrote that most of the hacking techniques described in Vault 7 were already known to many cybersecurity experts.[120] On 8 March 2017, some noted that the revealed techniques and tools are most likely to be used for more targeted surveillance[121][122] revealed by Edward Snowden.[123]

On 8 April 2017, Ashley Gorski, an American Civil Liberties Union staff attorney called it "critical" to understand that "these vulnerabilities can be exploited not just by our government but by foreign governments and cyber criminals around the world." Justin Cappos, professor in the Computer Science and Engineering department at New York University asks "if the government knows of a problem in your phone that bad guys could use to hack your phone and have the ability to spy on you, is that a weakness that they themselves should use for counterterrorism, or for their own spying capabilities, or is it a problem they should fix for everyone?".[124]

On 8 April 2017, Cindy Cohn, executive director of the San Francisco-based international nonprofit digital rights group Electronic Frontier Foundation, said: "If the C.I.A. was walking past your front door and saw that your lock was broken, they should at least tell you and maybe even help you get it fixed." "And worse, they then lost track of the information they had kept from you so that now criminals and hostile foreign governments know about your broken lock."[125] Furthermore, she stated that the CIA had "failed to accurately assess the risk of not disclosing vulnerabilities. Even spy agencies like the CIA have a responsibility to protect the security and privacy of Americans."[126] "The freedom to have a private conversation free from the worry that a hostile government, a rogue government agent or a competitor or a criminal are listening is central to a free society". While not as strict as privacy laws in Europe, the Fourth Amendment to the US constitution does guarantee the right to be free from unreasonable searches and seizures.[127]

On 12 May 2017 Microsoft President and Chief Legal Officer Brad Smith wrote "This is an emerging pattern in 2017. We have seen vulnerabilities stored by the CIA show up on WikiLeaks," In other words, Smith expressed concern about the fact that the CIA have stockpiled such computer vulnerabilities, which in turn were stolen from them, as a result the privacy and security of their customers around the world were potentially negatively affected for an extended period.[51][128]

Read the original:

Vault 7 - Wikipedia

WikiLeaks – Wikipedia

News leak publishing organisation

WikiLeaks () is an NGO owned by Icelandic company Sunshine Press Productions ehf[3][4][5][6] that runs a website that has published news leaks[7] and classified media provided by anonymous sources.[8] It was founded by Julian Assange, an Australian editor, publisher, and activist, who is currently fighting extradition to the United States over his work with WikiLeaks.[9] Since September 2018, Kristinn Hrafnsson has served as its editor-in-chief.[10][11] Its website stated in 2015 that it had released online 10 million documents since beginning in 2006 in Iceland.[12] WikiLeaks' most recent publication was in 2021 and its most recent publication of original documents was in 2019.[13] Beginning in November 2022, many of the documents could not be accessed.[13][14][15][16]

The organisation has released document caches that exposed serious violations of human rights and civil liberties, including the Collateral Murder footage from the 12 July 2007 Baghdad airstrike in which Iraqi Reuters journalists were among several civilians killed by a U.S. helicopter crew.[17] WikiLeaks has also published leaks such as diplomatic cables from the United States and Saudi Arabia,[18][19] emails from the governments of Syria[20][21] and Turkey,[22][23][24] corruption in Kenya[25][26] and at Samherji.[27] WikiLeaks has also published documents exposing surveillance by the Central Intelligence Agency,[28][29] National Security Agency[30][31] and private corporations. During the 2016 U.S. presidential election campaign, WikiLeaks released emails from the Democratic National Committee and from Hillary Clinton's campaign manager, showing that the party's national committee favoured Clinton in the primaries. These releases resulted in the resignation of Debbie Wasserman Schultz as chairwoman of the Democratic National Committee (DNC) and caused significant harm to the Clinton campaign.[32] During the campaign, WikiLeaks promoted false conspiracy theories about Hillary Clinton, the Democratic Party and the murder of Seth Rich.[33][34][35]

WikiLeaks has won a number of awards and has been commended for exposing state and corporate secrets, increasing transparency, assisting freedom of the press, and enhancing democratic discourse while challenging powerful institutions. WikiLeaks and some of its supporters say the organisation's publications have a perfect authenticity record. The organisation has been the target of campaigns to discredit it, including aborted ones by Palantir and HBGary. WikiLeaks has also had its donation systems disrupted by problems with its payment processors. As a result, the Wau Holland Foundation helps process WikiLeaks' donations.

The organisation has been criticised for inadequately curating its content and violating the personal privacy of individuals. WikiLeaks has, for instance, revealed Social Security numbers, medical information, credit card numbers and details of suicide attempts.[36][37][38] Various news organisations, activists, journalists and former members have also criticised the organisation over allegations of anti-semitism, an anti-Clinton and pro-Trump bias, various associations with the Russian government, a history of buying and selling leaks, and a lack of internal transparency. Journalists have also criticised the organisation for promoting false flag conspiracy theories, and its exaggerated and misleading descriptions of the contents of leaks. The CIA defined the organisation as a "non-state hostile intelligence service" after the release of Vault 7.[39]

The inspiration for WikiLeaks was Daniel Ellsberg's release of the Pentagon Papers in 1971. Assange built WikiLeaks to shorten the time between a leak and its coverage by the media. WikiLeaks was established in Australia but its servers were soon moved to Sweden and other countries that provided more legal protection for the media.[40]

The wikileaks.org domain name was registered on 4 October 2006.[2] The website was established and published its first document in December 2006.[41][42] It once described its founders as a mixture of Asian dissidents, journalists, mathematicians, and start-up company technologists from the United States, Taiwan, Europe, Australia, and South Africa.[43][44] In January 2007, WikiLeaks organizer James Chen[45][46][47] told TIME that "We are serious people working on a serious project... three advisors have been detained by Asian government, one of us for over six years."[44] Before his arrest, WikiLeaks was usually represented in public by Julian Assange, who has described himself as "the heart and soul of this organisation, its founder, philosopher, spokesperson, original coder, organiser, financier, and all the rest".[48][49]

Assange formed an informal advisory board in the early days of WikiLeaks, filling it with journalists, political activists and computer specialists to give WikiLeaks credibility and exposure.[50] Members of the advisory board included Phillip Adams, Julian Assange, Wang Dan, Suelette Dreyfus, CJ Hinke, Tashi Namgyal Khamsitsang, Ben Laurie, Xiao Qiang, Chico Whitaker, Wang Youcai, and John Young.[50][51]

Most of the members told Wired that they hadn't done much advising and had little involvement with WikiLeaks.[50] Several members said they didn't know they were mentioned on the site, or how they got there.[52] Computer security expert Ben Laurie said he had been a member of the board "since before the beginning", but he wasn't "really sure what the advisory board means."[50] Former board member Phillip Adams criticised the board, saying that Assange "has never asked for advice. The advisory board was pretty clearly window dressing, so he went for people identified with progressive policies around the place."[53] Assange responded by calling the advisory board "pretty informal".[53]

When asked to join their initial advisory board, Steven Aftergood of the Federation of American Scientists declined and told TIME that "they have a very idealistic view of the nature of leaking and its impact. They seem to think that most leakers are crusading do-gooders who are single-handedly battling one evil empire or another."[54]

In January 2007, John Young was dropped from the WikiLeaks network after questioning plans for a multimillion dollar fundraising goal.[55] He accused the organisation of being a CIA conduit and published 150 pages of WikiLeaks emails.[50][56][57] According to Wired, the emails are full of rhetoric and arguments over creating a profile for themselves, political impact and transparency around the world.[50][58][59]

In February 2010, WikiLeaks helped propose the Icelandic Modern Media Initiative legislation to establish a "journalism safe haven" in Iceland.[60] In June, the parliament voted unanimously for the resolution.[61]

A series of resignations of key members of WikiLeaks began in September 2010, started by Assange's unliteral decision to release the Iraq War logs the next month, his internal conflicts with other members and his response to sexual assault allegations.[62][63][64][65] According to Herbert Snorrason, "We found out that the level of redactions performed on the Afghanistan documents was not sufficient. I announced that if the next batch did not receive full attention, I would not be willing to cooperate."[65]

On 25 September 2010, after being suspended by Assange for "disloyalty, insubordination and destabilisation", Daniel Domscheit-Berg, the German spokesman for WikiLeaks, told Der Spiegel that he was resigning, saying "WikiLeaks has a structural problem. I no longer want to take responsibility for it, and that's why I am leaving the project."[66][65] Assange accused Domscheit-Berg of leaking information to Newsweek, with Domscheit-Berg claiming that the WikiLeaks team was unhappy with Assange's management and handling of the Afghan war document releases.[65][67] Daniel Domscheit-Berg wanted greater transparency in WikiLeaks finances and the leaks released to the public.[68][69][70] When Domscheit-Berg resigned, several other staffers also broke with Assange[65][71] to start OpenLeaks, a new leak organisation and website with a different management and distribution philosophy.[66][72]

WikiLeaks and other sources later alleged that Domscheit-Berg had copied and then deleted over 3500 unpublished whistleblower communications with some communications[73] containing hundreds of documents,[74][75][76] including the US government's No Fly List,[78] 5 GB of Bank of America leaks, insider information from 20 neo-Nazi organisations,[78] evidence of torture and government abuse of a Latin American country and US intercept information for "over a hundred Internet companies".[81][82] Assange stated that Domscheit-Berg had deleted video files of the Granai massacre by a US Bomber. WikiLeaks had scheduled the video for publication before its deletion.[83]

Domscheit-Berg said he took the files from WikiLeaks because he didn't trust its security. In Domscheit-Berg's book he wrote: "To this day, we are waiting for Julian to restore security, so that we can return the material to him, which was on the submission platform."[84][85][86] In August 2011, Domscheit-Berg claimed he permanently deleted the files "in order to ensure that the sources are not compromised."[87] He said that WikiLeaks' claims about the Bank of America files were "false and misleading."[88] According to Domscheit-Berg, the Bank of America files were lost because of an IT problem when one of WikiLeaks storage drives crashed and they lost it.[74]

The Architect left with Domscheit-Berg, taking the code[89] behind the submission system with him.[90][84][85] WikiLeaks submissions stayed offline until 2015.[91][92] Herbert Snorrason, a 25-year-old Icelandic university student, resigned after he challenged Assange on his decision to suspend Domscheit-Berg and was bluntly rebuked.[65] Iceland MP Birgitta Jnsdttir also left WikiLeaks, citing lack of transparency, lack of structure, and poor communication flow in the organisation.[93] James Ball left WikiLeaks over disputes about Assange's handling of finances, and allegations including antisemitism against fellow WikiLeaks member Israel Shamir.[94][95][96] According to the British newspaper, The Independent, at least a dozen key supporters of WikiLeaks left the website during 2010.[97]

Writing for The Guardian in 2010, Nick Davies said there were low-level attempts to smear WikiLeaks, including online accusations against Assange. In 2010, Wikileaks published a US military document containing a plan to "destroy the center of gravity" of Wikileaks by attacking its trustworthiness. It suggests the identification and exposure of WikiLeaks' sources to "deter others from using WikiLeaks".[98][99]

In 2010 the Bank of America employed the services of a collection of information security firms, known as Team Themis, when the bank became concerned about information that WikiLeaks held about it and was planning to release. Team Themis included private intelligence and security firms HBGary Federal, Palantir Technologies and Berico Technologies.[100][101][102][103][104] In 2011 hacktivist group Anonymous released emails it had obtained from HBGary Federal. Among other things, the emails revealed that Team Themis had planned to expose the workings of WikiLeaks using disinformation and cyberattacks. The plans were not implemented and, after the emails were published, Palantir CEO Alex Karp issued a public apology for his company's role.[101][105]

In December 2010, PayPal suspended the WikiLeaks account after the State Department sent them a letter.[106] Mastercard and Visa Europe also decided to stop accepting payments to WikiLeaks. Bank of America, Amazon and Swiss bank PostFinance had previously stopped dealing with WikiLeaks. Datacell, the IT company that enabled WikiLeaks to accept credit and debit card donations, said Visa's action was the result of political pressure.[106][107] WikiLeaks called this the Banking Blockade.[108]

Cyber attacks and legal restrictions have forced WikiLeaks to change hosts several times.[109][110][111]

In July 2012, WikiLeaks claimed credit for a fake New York Times website and article by Bill Keller.[112][113][114][115] The hoax prompted criticism from commentors and the public, who said it hurt WikiLeaks' credibility. Glenn Greenwald wrote that it might have been satire but "it doesnt strike me as a good idea for a group that relies on its credibility when it comes to the authenticity of what they publish and which thus far has had a stellar record in that regard to be making boastful claims that they published forged documents. I understand and appreciate the satire, but in this case, it directly conflicts with, and undermines, the primary value of WikiLeaks."[113][116][117] WikiLeaks said they wanted to bring attention to the banking blockade.[112]

In January 2013 shortly after he died, WikiLeaks said that Aaron Swartz had helped WikiLeaks and talked to talked Julian Assange in 2010 and 2011. WikiLeaks also said they had "strong reasons to believe, but cannot prove" he may have been a source, possibly breaking WikiLeaks' rules about source anonymity. Wikileaks may have made the statements to imply that Swartz was targetted by the US Attorney's Office and Secret Service in order to get at WikiLeaks.[118][119]

In 2013, the organisation assisted Edward Snowden (who is responsible for the 2013 mass surveillance disclosures) in leaving Hong Kong. Sarah Harrison, a WikiLeaks activist, accompanied Snowden on the flight. Scott Shane of The New York Times stated that the WikiLeaks involvement "shows that despite its shoestring staff, limited fund-raising from a boycott by major financial firms, and defections prompted by Mr. Assange's personal troubles and abrasive style, it remains a force to be reckoned with on the global stage."[120]

In September 2013, Julian Assange announced the creation of the WikiLeaks Counterintelligence Unit. The project surveilled 19 surveillance contractors to understand their business dealings. According to Assange, they were "tracking the trackers" to "counter threats against investigative journalism and the public's right to know."[121][122]

The WikiLeaks Party was created in 2013 in part to support Julian Assange's failed bid for a Senate seat in Australia in the 2013 election, where they won 0.66% of the national vote.[123] Assange said the party would advance WikiLeaks' objectives of promoting openness in government and politics and that it would combat intrusions on individual privacy.[123][124][125][126] In December 2013, a delegation from the party, including its chairman John Shipton, visited Syria and met with President Bashar al-Assad with the goals of demonstrating "solidarity with the Syrian people and their nation" and improving the party's understanding of the country's civil war. The meeting with Assad was criticized by the Australian Prime Minister, Foreign Minister and many WikiLeaks supporters.[127][128] Shipton stated that the meeting with al-Assad was "just a matter of good manners" and that the delegation had also met with members of the Syrian opposition.[128] However, these meetings with the opposition have not been verified. The WikiLeaks Party was deregistered by the Australian Electoral Commission on 23 July 2015 for lack of members under s.137(4) of the Electoral Act.[129][130][131]

In the wake of the Charlie Hebdo shooting in January 2015, the WikiLeaks Twitter account wrote that "the Jewish pro-censorship lobby legitimized attacks", referring to the trial of Maurice Sinet.[132] In July 2016, the same account suggested that triple parentheses, or (((echoes))) a tool used by neo-Nazis to identify Jews on Twitter, appropriated by several Jews online out of solidarity had been used as a way for "establishment climbers" to identify one another.[133][134] In leaked internal conversations, the WikiLeaks Twitter account commented on Associated Press reporter Raphael Satter who had written an article critical of WikiLeaks. WikiLeaks tweeted that "[Satter]'s always ben(sic) a rat. But he's jewish and engaged with the ((()))) issue".[135]

In 2015, WikiLeaks began issuing "bounties" of up to $100,000 for leaks.[136] Assange had said in 2010 that WikiLeaks didn't but "would have no problem giving sources cash" and that there were systems in Belgium to let them.[137] WikiLeaks has issued crowd-sourced rewards for the TTIP chapters, the TPP[136] and information on the Kunduz Massacre.[138] WikiLeaks has issued other bounties for leaks on Troika Crisis Planning,[140] LabourLeaks,[141] Trump-Comey tapes,[142] evidence of Obama administration officials destroying information,[143] 2016 U.S. Presidential election-related information,[144] information to get a reporter at The Intercept fired over the Reality Winner case,[145] the U.S. Senate torture report,[146] and documents and Sweden's vote on placing Saudi Arabia on the UN Women's Rights Commission.[147] WikiLeaks has defended the practice with their vetting record, saying "police rewards produce results. So do journalistic rewards."

Its website stated in 2015 that it had released 10 million documents online.[12]

In 2016 and 2017, WikiLeaks promoted several false conspiracy theories. Most of them were related to the 2016 United States presidential election.

WikiLeaks promoted conspiracy theories about the murder of Seth Rich.[148][149][150] Unfounded conspiracy theories, spread by some right-wing figures and media outlets, hold that Rich was the source of leaked emails and was killed for working with WikiLeaks.[151] WikiLeaks fuelled such theories when it offered a $20,000 reward for information on Rich's killer and when Assange implied that Rich was the source of the DNC leaks,[152] although no evidence supports that claim.[153][154] Special Counsel Robert Mueller's report into Russian interference in the 2016 election said that Assange "implied falsely" that Rich was the source in order to obscure that Russia was the actual source.[155][156][157][158]

WikiLeaks popularised conspiracy theories about the Democratic Party and Hillary Clinton, such as tweeting articles which suggested Clinton campaign chairman John Podesta engaged in satanic rituals,[33][159][160] implying that the Democratic Party had Seth Rich killed,[34] claiming that Hillary Clinton wanted to drone strike Assange,[161] suggesting that Clinton wore earpieces to debates and interviews,[162] promoting thinly sourced theories about Clinton's health and according to Bloomberg creating "anti-Clinton theories out of whole cloth",[35][163][164] and promoting a conspiracy theory from a Donald Trump-related Internet community tying the Clinton campaign to child kidnapper Laura Silsby.[165]

On the day the Vault 7 documents were first released, WikiLeaks described UMBRAGE as "a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation," and tweeted, "CIA steals other groups virus and malware facilitating false flag attacks."[166] A conspiracy theory soon emerged alleging that the CIA framed the Russian government for interfering in the 2016 U.S. elections. Conservative commentators such as Sean Hannity and Ann Coulter speculated about this possibility on Twitter, and Rush Limbaugh discussed it on his radio show.[167] Russian foreign minister Sergey Lavrov said that Vault 7 showed that "the CIA could get access to such 'fingerprints' and then use them."[166]

Cybersecurity writers, such as Ben Buchanan and Kevin Poulsen, were sceptical of those theories.[168][169] Poulsen wrote, "The leaked catalog isn't organized by country of origin, and the specific malware used by the Russian DNC hackers is nowhere on the list."[168]

In April 2017, the WikiLeaks Twitter account suggested that the Khan Shaykhun chemical attack, which international human rights organisations and governments of the United States, United Kingdom, Turkey, Saudi Arabia, France, and Israel attributed to the Syrian government, was a false flag attack.[170] WikiLeaks stated that "while western establishment media beat the drum for more war in Syria the matter is far from clear", and shared a video by a Syrian activist who claimed that Islamist extremists were probably behind the chemical attack, not the Syrian government.[170]

On 17 October 2016, WikiLeaks announced that a "state party" had severed the Internet connection of Julian Assange at the Ecuadorian embassy. WikiLeaks blamed United States Secretary of State John Kerry of pressuring the Ecuadorian government in severing Assange's Internet, an accusation which the United States State Department denied.[171] The Ecuadorian government stated that it had "temporarily" severed Assange's Internet connection because of WikiLeaks' release of documents "impacting on the U.S. election campaign," although it also stated that this was not meant to prevent WikiLeaks from operating.[172]

The United States Senate Select Committee on Intelligence concluded that in 2016, "WikiLeaks actively sought, and played, a key role in the Russian influence campaign and very likely knew it was assisting a Russian intelligence influence effort."[7]

In 2018, 11,000 messages from a private chat with WikiLeaks and key supporters from May 2015 through November 2017 leaked. The messages showed WikiLeaks plotting against critics with online attack campaigns and false identities, and contain political bias, sexism, misogyny, and anti-Semitism.[135][173][174] The messages were leaked by a former associate of Assange who had created the group at WikiLeaks' request.[175] Later that year, "tens of thousands" of files from WikiLeaks laptops leaked to the Associated Press.[8]

In January 2019, WikiLeaks sent journalists a "confidential legal communication not for publication" with a list of 140 things not to say about Julian Assange that WikiLeaks said were "false and defamatory".[176][177] Soon after the list leaked online, WikiLeaks posted a heavily edited version of it.[178] The group was criticised and mocked for the list and their handling of it.[179][180][181][182]

WikiLeaks describes itself as "an uncensorable system for untraceable mass document leaking"[183] and "a project of the Sunshine Press,"[3][5][184] a non-profit organisation based in Iceland.[185][186] In 2010, Julian Assange and Kristinn Hrafnsson registered Sunshine Press Productions ehf[6] as a business without a headquarters in Iceland.[187][188] Assange serves as the Director of Sunshine Press Productions ehf and is on the board of directors with Hrafnsson and Ingi Ragnar Ingason.[189][190][191] Gavin MacFadyen was a deputy board member.[190] According to a January 2010 interview, the WikiLeaks team then consisted of five people working full-time and about 800 people who worked occasionally, none of whom were compensated.[137]

In November 2022, many of WikiLeaks releases disappeared from the website, bringing the number of documents from around 10 million to around 3,000. Other reported issues with the site included the websites search ability not working and a broken submission page.[192][193]

WikiLeaks established an editorial policy that accepted only documents that were "of political, diplomatic, historical or ethical interest" (and excluded "material that is already publicly available").[194] This coincided with early criticism that having no editorial policy would drive out good material with spam and promote "automated or indiscriminate publication of confidential records".[195] The original FAQ is no longer in effect, and no one can post or edit documents on WikiLeaks. Now, submissions to WikiLeaks are reviewed by anonymous WikiLeaks reviewers, and documents that do not meet the editorial criteria are rejected. By 2008, the revised FAQ stated: "Anybody can post comments to it. [...] Users can publicly discuss documents and analyse their credibility and veracity."[196] After the 2010 reorganisation, posting new comments on leaks was no longer possible.[197]

According to WikiLeaks, the goal of the organisation is "to bring important news and information to the public One of our most important activities is to publish original source material alongside our news stories so readers and historians alike can see evidence of the truth." It also seeks to ensure that journalists and whistleblowers are not prosecuted for emailing sensitive or classified documents. The online "drop box" is described by the WikiLeaks website as "an innovative, secure and anonymous way for sources to leak information to [WikiLeaks] journalists".[198]

An embargo agreement made by WikiLeaks in 2012 included a timeline for when emails could be written about, due in part to "elections around the world and legal matters WikiLeaks and Julian are involved in."[199][200] In 2017, WikiLeaks told Foreign Policy that they sometimes scheduled releases around high-profile events.[201]

In response to a question in 2010 about whether WikiLeaks would release information that he knew might get someone killed, Assange said that he had instituted a "harm-minimization policy." This policy meant that people named in some documents might be contacted before publication to warn them, but that there were also times were members of WikiLeaks might have "blood on our hands."[42] One member of WikiLeaks told The New Yorker they were initially uncomfortable with Assange's editorial policy, but changed her mind because she thought no one had been unjustly harmed.[42]

In an August 2010 open letter, the non-governmental organisation Reporters Without Borders praised WikiLeaks' past usefulness in exposing "serious violations of human rights and civil liberties" but criticised the organisation over a perceived absence of editorial control, stating "Journalistic work involves the selection of information. The argument with which you defend yourself, namely that WikiLeaks is not made up of journalists, is not convincing."[202]

In a 2013 resolution, the International Federation of Journalists, a trade union of journalists, called WikiLeaks a "new breed of media organisation" that "offers important opportunities for media organisations".[203] Harvard professor Yochai Benkler praised WikiLeaks as a new form of journalistic enterprise,[204] testifying at the court-martial of Chelsea Manning that "WikiLeaks did serve a particular journalistic function," and that the "range of the journalist's privilege" is "a hard line to draw".[205]

Others do not consider WikiLeaks to be journalistic in nature. Media ethicist Kelly McBride of the Poynter Institute for Media Studies wrote in 2011: "WikiLeaks might grow into a journalist endeavor. But it's not there yet."[206] Bill Keller of The New York Times considers WikiLeaks to be a "complicated source" rather than a journalistic partner.[206] Prominent First Amendment lawyer Floyd Abrams writes that WikiLeaks is not a journalistic organisation, but instead "an organization of political activists; a source for journalists; and a conduit of leaked information to the press and the public".[207] In support of his opinion, referring to Assange's statements that WikiLeaks reads only a small fraction of information before deciding to publish it, Abrams wrote: "No journalistic entity I have ever heard ofnonesimply releases to the world an elephantine amount of material it has not read."[207]

WikiLeaks is a self-described not-for-profit organisation, funded largely by volunteers, and is dependent on private donations, exclusivity contracts[137] and concessions from their media partners.[208] Its main financing methods include conventional bank transfers and online payment systems. According to Assange, WikiLeaks' lawyers often work pro bono. Assange has said that in some cases legal aid has been donated by media organisations such as the Associated Press, the Los Angeles Times, and the National Newspaper Publishers Association.[137] Assange said in early 2010 that WikiLeaks' only revenue consists of donations, but it has considered other options including auctioning early access to documents.[137] In September 2010, Assange said that WikiLeaks received millions of dollars in media partnerships, explaining they "win concessions in relation to the number of journalists that will be put on it and how big they'll run with it."[208]

In 2010, Assange said the organisation was registered as a library in Australia, a foundation in France, and a newspaper in Sweden, and that it also used two United States-based non-profit 501c3 organisations for funding purposes.[209]

In January 2010, WikiLeaks temporarily shut down its website while management appealed for donations.[210] Previously published material was no longer available, although some could still be accessed on unofficial mirror websites.[211] WikiLeaks stated that it would resume full operation once the operational costs were paid.[210] WikiLeaks saw this as a kind of work stoppage "to ensure that everyone who is involved stops normal work and actually spends time raising revenue".[137] While the organisation initially planned for funds to be secured by 6 January 2010, it was not until 3 February 2010 that WikiLeaks announced that its minimum fundraising goal had been achieved.[212]

The Wau Holland Foundation, one of the WikiLeaks' main funding channels, stated that they received more than 900,000 in public donations between October 2009 and December 2010, of which 370,000 has been passed on to WikiLeaks. Hendrik Fulda, vice-president of the Wau Holland Foundation, said that every new WikiLeaks publication brought "a wave of support", and that donations were strongest in the weeks after WikiLeaks started publishing leaked diplomatic cables.[213][214] According to Assange, WikiLeaks' media partnerships for the cables earned them almost $2 million three months after they started publishing.[208] WikiLeaks was paid 150,000 by Al Jazeera and Channel 4 for two five-minute video clips about the Iraq War Logs.[215][216] In December 2010, the Wau Holland Foundation stated that Julian Assange and three other permanent employees had begun to receive salaries.[217]

During 2010, WikiLeaks received over $1.9 million in donations. About $930,000 came through PayPal donations, with the rest coming through bank transfers.[218] In 2011, donations dropped sharply and WikiLeaks received only around $180,000 in donations, while their expenses increased from $519,000 to $850,000.[219] In 2011, Al Jazeera offered WikiLeaks $1.3 million for access to data.[220] During September 2011, WikiLeaks began auctioning items on eBay to raise funds.[221] Wikileaks started accepting bitcoin in 2011 as a currency which could not be blocked by financial intuitions or a government.[222][223][224] In 2012, WikiLeaks raised only $68,000 through the Wau Holland Foundation and had expenses more than $507,000.[219] In 2013, WikiLeaks and Wau Holland Foundation agreed on a new framework contract which Wau Holland Foundation would only cover direct costs such as server, ISP, project coordination and translation costs.[225] Between January and May, Wau Holland Foundation was only able to cover $47,000 in essential infrastructure for WikiLeaks, but not an additional $400,000 that was submitted "to cover publishing campaigns and logistics in 2012".[219]

On 22 January 2010, the Internet payment intermediary PayPal suspended WikiLeaks' donation account and froze its assets. WikiLeaks said that this had happened before, and was done for "no obvious reason".[226][227] In August 2010, the internet payment company Moneybookers closed WikiLeaks' account due to publicity over its release of the Afghan war logs and because WikiLeaks had been added to the official US watchlist and an Australian government blacklist.[228] In December 2010, PayPal suspended WikiLeaks' account, thereby stopping donations through PayPal. PayPal said it had taken action after the US State Department sent a letter to Wikileaks stating that Wikileaks' activities were illegal in the US.[106] Hendrik Fulda, vice-president of the Wau Holland Foundation, said that the Foundation had been receiving twice as many donations through PayPal as through normal banks before PayPal's decision to suspend WikiLeaks' account.[213] Mastercard and Visa Europe also decided to stop accepting payments to WikiLeaks. Bank of America, Amazon and Swiss bank PostFinance had previously stopped dealing with WikiLeaks. Datacell, the IT company that enabled WikiLeaks to accept credit and debit card donations, threatened Mastercard and Visa with legal action to enforce the resumption of payments to WikiLeaks. Datacell said Visa's action was the result of political pressure.[106][107]

In October 2011, Assange said that the financial blockade by Bank of America, Visa, MasterCard, PayPal and Western Union, had cost WikiLeaks ninety-five per cent of its revenue.[229] In 2012, an Icelandic district court ruled that Valitor, the Icelandic partner of Visa and MasterCard, was violating the law when it stopped accepting credit card donations to WikiLeaks. The court ruled that donations to WikiLeaks must resume within 14 days or Valitor would be fined US$6,000 a day.[107] In November 2012, the European Union's European Commission said they wouldn't open a formal investigation into Mastercard and Visa and blocking donations for WikiLeaks because it was unlikely to have violated EU anti-trust rules.[230]

In response to the financial blockade of Wikileaks, Glenn Greenwald and others created the Freedom of the Press Foundation in order "to block the US government from ever again being able to attack and suffocate an independent journalistic enterprise the way it did with WikiLeaks".[231]

In 2014, Sunshine Press Productions ehf began receiving funds from Wau Holland Foundation for WikiLeaks.[232] From 2014-2017 WikiLeaks was reimbursed for project coordination, technical preparation, removing metadata, reviewing information, communicating with media partners costs and a new submission platform and document search.[232][233][234][235] The DNC emails and Podesta emails were not funded by the Wau Holland Foundation.[236] By October 2017, WikiLeaks founder Julian Assange said the organisation had made a 50,000% return on Bitcoin.[237] By that December, they had raised at least $25 million in Bitcoin.[238][239]

In 2018, the Wau Holland Foundation reimbursed Sunshine Press Productions for WikiLeaks' publications, as well as public relations and $50,000 for legal expenses in the Democratic National Committee v. Russian Federation lawsuit.[240]

In 2010, the website was available on multiple servers, different domain names and had an official dark web version (available on the Tor Network) as a result of a number of denial-of-service attacks and its elimination from different Domain Name System (DNS) providers.[241][242]

Until August 2010, WikiLeaks was hosted by PRQ, a company based in Sweden providing "highly secure, no-questions-asked hosting services". PRQ was reported by The Register website to have "almost no information about its clientele and maintains few if any of its own logs".[243] That month, WikiLeaks reached an agreement with the Swedish Pirate Party to host several of their servers.[244][245][246] Later, WikiLeaks was hosted mainly by the Swedish Internet service provider Bahnhof in the Pionen facility, a former nuclear bunker in Sweden.[247][248] Other servers were spread around the world with the main server located in Sweden.[249]

After the site became the target of a denial-of-service attack on its old servers, WikiLeaks moved its website to Amazon's servers.[109] Amazon later removed the website from its servers.[109] In a public statement, Amazon said that WikiLeaks was not following its terms of service. The company stated: "There were several parts they were violating. For example, our terms of service state that 'you represent and warrant that you own or otherwise control all of the rights to the content ... that use of the content you supply does not violate this policy and will not cause injury to any person or entity.' It's clear that WikiLeaks doesn't own or otherwise control all the rights to this classified content."[110] WikiLeaks was then moved to servers at OVH, a private web-hosting service in France.[250] After criticism from the French government, a judge in Paris ruled that there was no need for OVH to cease hosting WikiLeaks without more information.[251]

WikiLeaks used EveryDNS, but was dropped by the company after distributed denial-of-service (DDoS) attacks against WikiLeaks hurt the quality of service for its other customers. Supporters of WikiLeaks waged verbal and DDoS attacks on EveryDNS. Because of a typographical error in blogs mistaking EveryDNS for competitor EasyDNS, the sizeable Internet backlash hit EasyDNS. Despite that, EasyDNS began providing WikiLeaks with DNS service on "two 'battle hardened' servers" to protect the quality of service for its other customers.[111]

WikiLeaks has used heavily encrypted files[252][253] to protect their publications against censorship,[254] to pre-release publications,[255] and as protection against arrest.[256][257] The files have been described as "insurance",[252][258][259] a "dead man's switch",[254] "a kind of doomsday option",[256][257] and a "poison pill".[260] The insurance files sometimes come with pre-commitment hashes.[261][clarification needed]

WikiLeaks staff have said that "insurance files are encrypted copies of unpublished documents submitted to us. We do this periodically, and especially at moments of high pressure on us, to ensure the documents can not be lost and history preserved. You will not be able to see the contents of any of our insurance files, until and unless the we are in a position where we must release the key. But you can download them and help spread them to ensure their safe keeping."[262]

On 29 July 2010 WikiLeaks added an "Insurance file" to the Afghan War Diary page. The file is AES encrypted.[263][264] There has been speculation that it was intended to serve as insurance in case the WikiLeaks website or its spokesman Julian Assange are incapacitated, upon which the passphrase could be published.[265][266] After the first few days' release of the US diplomatic cables starting 28 November 2010, the US television broadcasting company CBS predicted that "If anything happens to Assange or the website, a key will go out to unlock the files. There would then be no way to stop the information from spreading like wildfire because so many people already have copies."[267] CBS correspondent Declan McCullagh stated, "What most folks are speculating is that the insurance file contains unreleased information that would be especially embarrassing to the US government if it were released."[267]

In August 2013, WikiLeaks posted three insurance files as torrents, totalling 400 gigabytes.[254][268] WikiLeaks said they "encrypted versions of upcoming publication data ("insurance") from time to time to nullify attempts at prior restraint."[254]

In June 2016, WikiLeaks posted an 88 gigabyte insurance file.[citation needed] On 16 October 2016, WikiLeaks tweeted an insurance file about Ecuador.[269] In November, they posted insurance files for the US, the UK and Ecuador,[270] and an unlabelled 90 gigabyte insurance file was posted.[261][additional citation(s) needed]

In January 2017, On 7 March 2017, WikiLeaks posted an encrypted file containing the Vault 7 Year Zero release.[271] WikiLeaks had planned to release them later, but released them online later that day because of cyber attacks.[272] The password, SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds, was a reference to an alleged quote by President Kennedy.[255]

In June 2009, the website said it had more than 1,200 registered volunteers.[43] According to Daniel Domscheit-Berg, WikiLeaks exaggerated the number of volunteers.[273][216]

Daniel Domscheit-Berg, Sarah Harrison, Kristinn Hrafnsson and Joseph Farrell are notable people who have been involved in the project.[274][65] Harrison is also a member of Sunshine Press Productions along with Assange and Ingi Ragnar Ingason.[275][190] Gavin MacFadyen was acknowledged by Assange as a beloved director of WikiLeaks shortly after his death in 2016.[276] Jacob Appelbaum is the only known American who is known to have been member of WikiLeaks, acting as a senior editor and spokesman.[277][278][279] Gottfrid Svartholm had worked with WikiLeaks as a technical consultant and managed infrastructure critical to the organization.[280][281] He was also listed as part of the "decryption and transmission team" on Collateral Murder and credited for "networking" and helped with several other unknown endeavors.[282][283] Rop Gonggrijp, Birgitta Jnsdttir, Smri McCarthy and Herbert Snorrason are WikiLeaks volunteers and members who the US government has tried to surveill with court orders.[284][285] WikiLeaks was represented in Russia by Israel Shamir and in Sweden by his son Johannes Wahlstrm.[286][287][96]

According to colleagues and former WikiLeaks insiders, the WikiLeaks dropbox architecture was rebuilt by a WikiLeaks programmer known to most insiders as "The Architect".[288][289][85] He also instructed another WikiLeaks technician, and some of colleagues thought he was a computer genius.[90][290][291] According to Andy Greenberg, insiders told him "when The Architect joined WikiLeaks it was a mess. It was two creaking servers without all the flashy security that Assange had promised in interviews with the media. The Architect rebuilt it from scratch."[288] According to Wired, "WikiLeaks had been running on a single server with sensitive backend components like the submission and e-mail archives connected to the public-facing Wiki page. The Architect separated the platforms and set up a number of servers in various countries."[84]

In August 2011, WikiLeaks volunteer Sigurdur Thordarson, working in his home country Iceland, contacted the FBI and, after presenting a copy of Assange's passport at the American embassy, became the first informant to work for the FBI from inside WikiLeaks, and gave the FBI several hard drives he had copied from Assange and core WikiLeaks members.[292][293] In November 2011, WikiLeaks dismissed Thordarson due to his embezzlement of $50,000, to which charge (along with several other offences) he later pleaded guilty in an Icelandic court.[294] According to Thordarson, a few months after his dismissal by WikiLeaks the FBI agreed to pay him $5,000 as compensation for work missed while meeting with agents.[295]

Alexa O'Brien briefly worked for WikiLeaks in 2014, later saying she found working for the organization was not a good fit.[296] On 26 September 2018, it was announced that Julian Assange had appointed Kristinn Hrafnsson as editor-in-chief of WikiLeaks with Assange continuing as its publisher.[11][297]

WikiLeaks restructured its process for contributions after its first document leaks did not gain much attention. Assange stated this was part of an attempt to take the voluntary effort typically seen in Wiki projects and "redirect it to ... material that has real potential for change".[298] Before this, the Wikileaks FAQ, under "How will Wikileaks operate?", read as of February 2007:[299]

To the user, Wikileaks will look very much like Wikipedia. Anybody can post to it, anybody can edit it. No technical knowledge is required. Leakers can post documents anonymously and untraceably. Users can publicly discuss documents and analyze their credibility and veracity. Users can discuss interpretations and context and collaboratively formulate collective publications. Users can read and write explanatory articles on leaks along with background material and context. The political relevance of documents and their verisimilitude will be revealed by a cast of thousands.

WikiLeaks originally used a "wiki" communal publication method, which ended by May 2010.[197]

In 2010 Assange said WikiLeaks received some submissions through the postal mail.[300] That year, Julian Assange said that the servers were located in Sweden and the other countries "specifically because those nations offer legal protection to the disclosures made on the site". He talks about the Swedish constitution, which gives the informationproviders total legal protection.[249] It is forbidden, according to Swedish law, for any administrative authority to make inquiries about the sources of any type of newspaper.[301] These laws, and the hosting by PRQ, were meant to make it difficult for any authority to eliminate WikiLeaks; they place a burden of proof upon any complainant whose suit would circumscribe WikiLeaks' liberty. Furthermore, "WikiLeaks maintains its own servers at undisclosed locations, keeps no logs and uses military-grade encryption to protect sources and other confidential information." Such arrangements have been called "bulletproof hosting".[243]

According to some, The Architect was the engineer who rebuilt the WikiLeaks submission system "from scratch" and instructed another WikiLeaks technician.[288][289][85] According to Andy Greenberg and Wired, when The Architect joined WikiLeaks, it "was a mess" running on one or two servers "without all the flashy security that Assange had promised in interviews with the media." The Architect rebuilt it from scratch and separated the sensitive platforms from the public-facing Wiki "and set up a number of servers in various countries."[288][84]

During the 2010 reorganisation, The Architect left with Domscheit-Berg, taking the code[89] behind the submission system with him.[90][84][85][302] Assange said that the submission system was temporarily down because its backlog was too big.[303] WikiLeaks later said it was down because of Domscheit-Berg's "acts of sabotage" when he left the organisation, which had forced WikiLeaks to "overhaul the entire submission system", and the staff lacked time to do so.[84]

WikiLeaks submissions stayed offline for four and a half years, until May 2015.[91][92] While it was offline, WikiLeaks announced they were building a state-of-the-art secure submission system. The launch of the new system was delayed by security concerns in 2011.[304] During this time, WikiLeaks continued to publish documents. These publications originated from material which had been directly shared with WikiLeaks by hackers, or were the result of Wikileaks organising and republishing already-public leaks.[91] A former WikiLeaks associate said that Andy Mller-Maguhn and a colleague administered the submission server in 2016, though Mller-Maguhn denies this.[305] That October, WikiLeaks suggested "lawyer to lawyer" as an alternate submission method, naming Margaret Ratner Kunstler.[306][307]

By October 2021, WikiLeaks' secure chat stopped working and by February 2022, WikiLeaks' submission system and email server were offline.[308] In July 2022, a broken version of the submission system briefly relaunched with expired PGP keys and went offline after it was reported on by The Daily Dot.[309]

The legal issues surrounding WikiLeaks are complex.[clarification needed]

In August 2010, the internet payment company Moneybookers closed WikiLeaks' account due to publicity over its release of the Afghan war logs and because WikiLeaks had been added to the official US watchlist and an Australian government blacklist.[228]

In December 2010, the Australian Prime Minister Julia Gillard said that "I absolutely condemn the placement of this information on the WikiLeaks website - it's a grossly irresponsible thing to do and an illegal thing to do".[310] After criticism and a revolt within her party, she said she was referring to "the original theft of the material by a junior U.S. serviceman rather than any action by Mr Assange".[311][312]

The Australian Federal Police later said that the release of the cables by WikiLeaks breached no Australian laws.[313]

On 2 September 2011, Australia's attorney general, Robert McClelland released a statement that the US diplomatic cables published by Wikileaks identified at least one ASIO officer, and that it was a crime in Australia to publish information which could identify an intelligence officer. McClelland said that "On occasions before this week, WikiLeaks redacted identifying features where the safety of individuals or national security could be put at risk. It appears this hasn't occurred with documents that have been distributed across the internet this week." According to The Guardian and Al Jazeera, this meant "Julian Assange could face prosecution in Australia."[314][315]

In 2014, WikiLeaks published information about political bribery allegations, violating a gag order in Australia.[14][10] According to Peter Bartlett, a media lawyer in Australia, WikiLeaks was outside Australia's jurisdiction but "if Assange ever comes back to Australia, you would expect that he would immediately be charged with breaking a suppression order."[10]

In early February 2008, the Julius Baer Group sued WikiLeaks in California to have documents removed from their website. Judge Jeffrey White forced Dynadot, the domain registrar of wikileaks.org, to disassociate the site's domain name records with its servers, preventing use of the domain name to reach the site. Initially, the bank only wanted the documents to be removed (WikiLeaks had failed to name a contact person). After civil rights challenges, the judge lifted the injunction[316] and the bank dropped the case on 5 March 2008.[317]

On 20 April 2018, the Democratic National Committee filed a multimillion-dollar lawsuit in federal district court in Manhattan against Russia, the Trump campaign, WikiLeaks and Julian Assange, alleging a conspiracy to disrupt the 2016 United States presidential election in Trump's favour.[318] The suit was dismissed with prejudice on 30 July 2019. In his judgement, Judge John Koeltl said that WikiLeaks "did not participate in any wrongdoing in obtaining the materials in the first place" and therefore was within the law in publishing the information.[319] The federal judge also wrote "The DNC's interest in keeping 'donor lists' and 'fundraising strategies' secret is dwarfed by the newsworthiness of the documents as a whole...If WikiLeaks could be held liable for publishing documents concerning the DNC's political financial and voter-engagement strategies simply because the DNC labels them 'secret' and trade secrets, then so could any newspaper or other media outlet".[320]

The US Justice Department began a criminal investigation of WikiLeaks and Julian Assange soon after the leak of diplomatic cables in 2010 began.[321] The Washington Post reported that the department was considering charges under the Espionage Act of 1917, an action which former prosecutors characterised as "difficult" because of First Amendment protections for the press.[321][322] Several Supreme Court cases (e.g. Bartnicki v. Vopper) have established previously that the American Constitution protects the re-publication of illegally gained information provided the publishers did not themselves violate any laws in acquiring it.[323]

Regarding legal threats against WikiLeaks and Assange, legal expert Ben Saul said that Assange is the target of a global smear campaign to demonise him as a criminal or as a terrorist, without any legal basis.[324][325] The US Center for Constitutional Rights issued a statement expressing alarm at the "multiple examples of legal overreach and irregularities" in his arrest.[326]

In 2010, the NSA added Assange to its Manhunting Timeline.[327] In August 2010, the Pentagon had concluded that the Afghan War documents leak broke the law. A letter from the Department of Defence general counsel said that "it is the view of the Department of Defence that WikiLeaks obtained this material in circumstances that constitute a violation of US law, and that as long as WikiLeaks holds this material, the violation of the law is ongoing."[328] In November 2010, Harold Koh, the Legal Adviser of the Department of State, wrote that the United States diplomatic cables leak "were provided in violation of US law and without regard for the grave consequences of this action" and "as long as WikiLeaks holds such material, the violation of the law is ongoing".[329][330]

In 2011, a WikiLeaks volunteer became an FBI informant[331][332][333] and Google was served with search warrants for the contents of two WikiLeaks volunteers' email accounts.[334] The NSA discussed categorising WikiLeaks as a "malicious foreign actor" for surveillance purposes.[327][335]

On 14 December 2010 the United States Department of Justice issued a subpoena directing Twitter to provide information for accounts registered to or associated with WikiLeaks.[336] Twitter decided to notify its users.[337]

By 2013, Jrmie Zimmermann, Smri McCarthy, Jacob Appelbaum, David House and Jennifer Robinson had been detained and interrogated or approached when attempts were made to recruit them as informants, often using heavy handed tactics.[338]

In 2013, it was revealed that Google had been served with search warrants for the contents of email accounts belonging to WikiLeaks volunteers Herbert Snorrason and Smari McCarthy.[339][340] In 2015, it was revealed that Google had been served with search warrants for the contents of email accounts belonging to WikiLeaks staff members Sarah Harrison, Joseph Farrell, and Kristinn Hrafnsson as part of a criminal investigation with alleged offences including espionage, conspiracy to commit espionage, the theft or conversion of property belonging to the United States government, violation of the Computer Fraud and Abuse Act, and criminal conspiracy.[341][342] According to Daniel Domscheit-Berg in 2010, the WikiLeaks email accounts for Kristinn Hrafnsson and a young WikiLeaks staffer had automatically forwarded to their Google account, opening the organisation to surveillance risks.[343][344]

In April 2017, prosecutors began drafting a memo that considered charging members of WikiLeaks with conspiracy, theft of government property or violating the Espionage Act.[345] That month, CIA director Mike Pompeo called WikiLeaks "a non-state hostile intelligence service often abetted by state actors like Russia". The official designation of Wikileaks and Julian Assange as a non-state hostile intelligence service was discussed in mid-2017 during preparation of the Intelligence Authorization Act for Fiscal Year 2018. It was eventually incorporated into the National Defense Authorization Act for Fiscal Year 2020 that became law in December 2019. The Act says "It is the sense of Congress that WikiLeaks and the senior leadership of WikiLeaks resemble a non-state hostile intelligence service often abetted by state actors and should be treated as such a service by the United States." In the opinion of some former officials, the designation allowed the CIA to launch and plan operations that did not require presidential approval or congressional notice.[346][347][348][349]

In September 2021, Yahoo! News reported that in 2017 in the wake of the Vault 7 leaks, the CIA discussed plans to kidnap or assassinate Julian Assange. They also planned to spy on associates of WikiLeaks, sow discord among its members, and steal their electronic devices. "[T]op intelligence officials lobbied the White House" to designate Wikileaks as an "information broker" to allow for more investigative tools against it, "potentially paving the way" for its prosecution. Laura Poitras described attempts to classify herself and Assange as "information brokers" rather than journalists as "bone-chilling and a threat to journalists worldwide".[350] Former CIA Director Mike Pompeo stated that the US officials who had spoken to Yahoo should be prosecuted for exposing CIA activities.[351]

In November 2018, an accidental filing with Assange's name was seen to indicate there were undisclosed charges against him.[352] On 11 April 2019, Assange was charged in a computer hacking conspiracy.[353] On 23 May, a superseding indictment was filed with charges of Conspiracy to Receive National Defense Information, Obtaining National Defense Information, Disclosure of National Defense Information, and Conspiracy to Commit Computer Intrusion.[354] On 24 June 2020, another superseding indictment was filed which added to the allegations but not the charges.[355]

After the indictment against Assange was unsealed, the Department of Justice continued to investigate Wikileaks. The day after charging Assange, prosecutors contacted Domscheit-Berg. Prosecutors also spoke with David House for about 90 minutes, who had previously testified to the grand jury in exchange for immunity. House testified about helping run political operations for WikiLeaks and that Assange wanted him "to help achieve favorable press for Chelsea Manning." According to House, the grand jury "wanted full insight into WikiLeaks, what its goals were and why I was associated with it. ... It was all related to disclosures around the war logs." House said he had contact with Assange until 2013 and with WikiLeaks until 2015.[356][357][358] Chelsea Manning and Jeremy Hammond refused to testify for the grand jury.[359][360]

Read more:

WikiLeaks - Wikipedia