How to keep safe digitally in WikiLeaks age – USA TODAY

In this excerpt from their Facebook Live interview, USA TODAY's Elizabeth Weise and Jefferson Graham weigh in on tips to keep your digital lives safe in a Wkileaks era.

LOS ANGELES Hacking into your cellphone, router and even smart TVis far easier than any of usthought: the government, according to a stolen stash of documents,even has a guide on how to do it.

A telephone from the 1940s.(Photo: Elizabeth Weise)

As we saw this week, the latest data dump from Wikileaks allegedly showed how the CIA outlined ways the agency could potentially hack into our digital devicessmartphones, computers, TVs, Skype calls, text messages and more.

The CIA hasn't confirmed or denied the authenticity of these documents, but some of the big tech companies whose products were named in them Apple and Google, to name two took a close look at what they contained. Conclusion: Most of the techniques would have been stymied by recent updates to the operating systems.So download those updates!

As we do each weekend, we look back at the week's biggest tech headlines, and lead with the latest hacking scare.

We'd also like to offer some quick tips we discovered along the way this week to keep safe.

Cover the webcam on your laptop. Brett Molina points out that if Facebook co-founder Mark Zuckerberg and FBI Director James Comey think throwing tape over theirlaptop webcam is a wise way to keep hackers out of your business, you should, too.

Use a landline. Elizabeth Weise put together a 13-point list of ways to keep yourself digitally safe, and it includes the landline. Yes, the old, analog phone that many of us grew up withand have ditched. Weise reports that landlines are far harder to track than cellphones. (Many of us use cheaper, VOIP service as a home alternative to landlines, but alas, digital phone service in the home is just as easy to track as cellphones.)

--Two-Factor Authentication. On our Facebook Live broadcast devoted to digital safety tips, Weise pointedout that the 2-factor sign-in is a must for e-mail and social media accounts. It's a little harder--you essentially have to sign in twice before being allowed in, by typing in a code that comes usually via text, but it's worth it, she says, since hackers probably won't have access to your personal phone. (Watch the video clip on Two-factor directly below.)

How to keep your digital life safer in the Wikileaks era? USA TODAY's Elizabeth Weise and Jefferson Graham weigh in on 2-factor authentication for e-mail and social media on #TalkingTech.

Finally, while some were shocked to see this spelled out in black and white, the CIA/WikiLeaks news shouldnt be that surprisingany device thats connected as a two-way unit is vulnerable. Concerned about your digital safety? Turn off your Wi-Fi.

Meanwhile, the other memorable tech headlines of the week:

Facebook introduced yet another shameless clone of a popular feature from the Snapchat app this week. Snapchat Stories is a way for Snapchatters to show off a collection of photos and videos to friends that live for just 24 hours. Facebook, which already copied this feature for its Instagram and WhatsApp apps, is now bringing it to Messenger, the popular messaging app. However, there's nothing that much different about it.

(Speaking of Snap, inc. the parent company of Snapchat, had its first full week as a public company on Wall Street, where investors weren't as giddy about its future. While the stock jumped to $27 in the first two days of trading, this week it fell and hovered around the $23 mark, before closing Friday at $22.07.)

Google this week updated its Hangouts app, changing the focus from a group video messaging app to oneaimed at businesses for group chat among employees. In other words, Google is taking on the popular Slack service with similar features. To get there, as Edward C. Baig points out, Google split the app into two: a video chat service called Hangouts Meet, and a team-oriented messaging service known as Hangouts Chat. The update will become available later this year.

The Airbnb service announced this week that it had raised $1 billion in additional funding, which will help it push off an IPO. The company, which competes with hotels and motels by offering alternative lodging, is now valued at $31 billion. And guess what: It's making an operating profit.

Bugs Bunny poses with smartphone to plug the new Boomerang cartoon service(Photo: Warner Bros.)

Finally, two new streaming entertainment services were announced this week. If on-demand movies and TV shows from the likes of Netflix and Hulu arent your thing, how about an endless supply of classic cartoons or British dramas? The Warner Bros. Boomerang service, debuting in the spring, will offer5,000 toons from the Looney Tunes, Hanna-Barbera and MGM libraries and at $5 a month, sounds like a steal to me.

BritBox, from the BBC, touts British dramas like Upstairs, Downstairs and Brideshead Revisited. The endless supply of new announced streaming services got me wondering this week. If we order a bunch of them, we could end up paying just as much as we do now on cable. Cord cutters say no, but I wonder?

And thats all folks, for this week's edition of the top tech headlines of the week. I invite you to join me on Twitter, where I'm @jeffersongraham.

Read or Share this story: http://usat.ly/2mxcsd7

Read the rest here:
How to keep safe digitally in WikiLeaks age - USA TODAY

WikiLeaks CIA docs show it’s not 2017, it’s 1984. Now what? – CNET

"Big Brother is watching you." --George Orwell, "1984"

This past week, we learned what's in the new health care law being crafted by Congress, we found out IBM can cram a lot of data onto a single atom, and... what else?

Oh yeah, your TV could be spying on you.

And so could your phone, your tablet and your friggin' car.

It all came from more than 8,000 top secret documents reportedly from the Central Intelligence Agency and released by WikiLeaks on Tuesday. Aside from scaring the bejesus out of us, it also brought new life into our collective gallows humor and tendency to quote from George Orwell's dystopian classic, "1984."

That's the novel where people are constantly spied on by Big Brother, the omnipresent all-seeing government. One of the most potent tools in its arsenal was a "telescreen," or a television that can spy on you.

So, yeah, welcome to the future.

It turns out the fantastical tech we've brought into our lives, from phones that sit on our nightstands to tablets that entertain our kids, also have cameras and microphones that can be used to spy on us.

What's even more sigh-inducing than all these new revelations -- which are being compared to 2013's shocking Edward Snowden leaks involving the National Security Agency's mass surveillance programs -- is how shoulder-shrug-emoji everyone is about it.

The truth is that even though CNET and CBS haven't so far confirmed the authenticity of the WikiLeaks documents, and the CIA isn't supposed to spy on us domestically, these disclosures are a kind of confirmation of things hackers have been telling us for years.

"We know we have a spy agency," said Dan Petro, an associate at security research firm Biship Fox.

Even the CIA basically said, "Yeah, so what?"

"It is the CIA's job to be innovative, cutting edge, and the first line of defense in protecting this country from enemies abroad," Jonathan Liu, a CIA spokesman, said in an emailed statement. "America deserves nothing less."

A decade ago, talk of this type of spying was relegated to conspiracy theorists and the "tinfoil hat" crowd. (Here's a handy video showing how to make one, if you'd like.) Now it's just part of everyday life.

And just like the people in "1984," it turns out there isn't much we can do about all this, aside from convincing government to change.

Though Microsoft, Google and Apple say making sure your software is up to date should keep you safe, it's hard not to feel like maybe the only true answer would be to just ditch our tech once and for all.

OK, I know: A tech news and reviews site telling you to ditch tech is pretty ironic. But these are the times we live in. Big Brother is watching. No amount of how-to-ing is going to solve this one.

The one answer we know will work is to go low tech, and get your devices off the internet.

The LG TV I bought in 2010 that doesn't have any apps or a connection to the internet? I'm holding onto it for longer than I expected now.

If you're worried about your exotic Netflix, HBO Go and Hulu movie watching habits getting into the wrong hands, there's always VHS. And thanks to the Video Privacy Protection Act, if you can find a video store still renting tapes, you'll be (mostly) safe.

But move quick, because the last VCR maker stopped production last year.

Oh, and you can always ditch that Amazon Kindle and Apple iPad, too. It turns out "1984" is still in print, on dead-tree paper and everything. You can even buy it with cash from your local bookstore so there won't be a record in your credit card statement.

In Orwell's novel, the protagonists, Winston and Julia, rent a room without a telescreen to conduct their affair. But they get caught by the Thought Police anyway because their landlord, in a twist, turns out to be an agent in a sting operation to catch thought criminals.

Sadly, there's not much lower-tech you can go with people. Maybe move to a desert island?

CNET's Laura Hautala and Alfred Ng contributed to this report.

Life, disrupted: In Europe, millions of refugees are still searching for a safe place to settle. Tech should be part of the solution. But is it? CNET investigates.

Tech Enabled: CNET chronicles tech's role in providing new kinds of accessibility.

See more here:
WikiLeaks CIA docs show it's not 2017, it's 1984. Now what? - CNET

GOP senator reports hacking attempts after WikiLeaks criticism – The Hill

Sen. Ben Sasse (R-Neb.) reported Saturday that he was facing hacking attempts on "basically every device, every platform, personal and govt" following his recent criticism of WikiLeaks.

Sasse tweeted from his personal account:

Heads-up... I've been critical of Assange & WikLeaks this week.

So...big surprise: Am having multiple "password reset" attempts right now.

So...if you see crazy-tweets from me tonight, don't assume #HeavyBooze... https://t.co/J53RJWT9Hj

(basically every device, every platform, personal and govt) https://t.co/J53RJWT9Hj

Sasse slammed WikiLeaks this week after the anti-secrecy organization published nearly a gigabyte of classified documents describing CIA cyber operations. Federal officials have reportedly opened a criminal probeinto the alleged leak.

"[Wikileaks head] Julian Assange should spend the rest of his life wearing an orange jumpsuit," Sasse said in astatementon Thursday. "Hes an enemy of the American people and an ally to Vladimir Putin.

Sasse also sent a letter to Attorney General Jeff SessionsJeff Sessions134 foreign policy experts condemn Trump travel ban GOP senator reports hacking attempts after WikiLeaks criticism Diplomats warn of Russia hysteria MORE questioning whether the Trump administration was"aggressively"pursuing Assange's detention and prosecution.

The GOP senator noted in his letter that White House press secretary Sean Spicer had deferred questions over whether Assange belonged in jail to the Department of Justice at an earlier press conference.

"Frankly, it is amazing that I even have to ask this question of the Administration in light of the Intelligence Communitys formal assessment that Mr. Assanges website is a known outlet for foreign propaganda and in light of Mr. Assanges history of recklessly endangering the lives of Americans through his illegal disclosures," Sasse wrote.

Vice President Pence on Thursday told Fox News that the U.S. would pursue those involved in the incident, should the materials published by WikiLeaks prove to be valid CIA documents.

"If proven to be true and confirmed publicly, I can assure you that no resource will be spared in holding those [to] account that have leaked information that could well constitute a compromise of methods and a compromise of national security," Pence said.

Original post:
GOP senator reports hacking attempts after WikiLeaks criticism - The Hill

Media ought to discover motives of WikiLeaks’ Vault 7 whistleblower – The Guardian

The CIA headquarters in Langley, Virginia, US. Photograph: Dennis Brack/EPA

In any big data leak story, the why? and the who? tend to matter as well as the what? We need to remember the horrors of the Afghan war that sent Chelsea Manning to WikiLeaks and the disgust over unmonitored mass surveillance that made up Edward Snowdens mind for him. In sum, the ideals of the whistleblower matter too, and so does the social purpose fulfilled (as when America, for example, cleaned up its act after Snowden).

What, then, about Vault 7, the 10,000 or so CIA documents revealed via WikiLeaks last week (many of them, in the nature of things, as yet unread)? What was the leaker so exercised about? TV sets secretly monitoring the front parlour, a kind of Gogglebox in reverse?

This may be a moment when anger at privacy lost finally ignites (Ewen MacAskill in the Guardian), or when public opinion shrugs benignly and thinks the security agencies are just doing their job. But inevitably we also need to know more about who leaked it, and why.

WikiLeaks vaults tossed into a political campaign by a foreign power clearly dont pass muster (whoever the leaks are directed against). Simple document dumps in Assange mark 2 mode arent defensible either.

Perhaps the Vault 7 whistleblower had a particular outrage in mind? Perhaps he or she was just playing wrecker or serving some covert master? And those, increasingly, are questions for the media to ask as well. What the blanks going on here?

Read this article:
Media ought to discover motives of WikiLeaks' Vault 7 whistleblower - The Guardian

Pamela Anderson defends ‘sexy’ WikiLeaks founder Julian Assange in essay – USA TODAY

Pamela Anderson has penned a passionate defense of Julian Assange.(Photo: Kirsty Wigglesworth/AP, Foc Kan/WireImage)

Here's a twosome you may not have been expecting.

Pamela Anderson, 49,has penned a passionate defense of WikiLeaks founder Julian Assange, 45, calling him both"the most intelligent, interesting, and informed man in existence" and "quite sexy" to boot.

The actress, who has saidshe met Assange through designer Vivienne Westwood,has been spotted visiting the WikiLeaks founderat the Ecuadorian Embassy in London, where he has been holed upfor four years, even bringing him a vegan lunch in October.

"Yes- I think he's quite sexy," Anderson wrote in a March 9blog post on her website. "He has tremendous strength and stamina though vulnerable. Hard to imagine him that way as capable as he is. But, he is up against the biggest super powers in the world. I've spent enough time with him, to be absolutely sure of his intentions. They are good ones."

And on Feb 27, she wrote: "I have had more stimulating conversation with this man than all my ex-husbands and lovers combined."

Assange sought political asylum inJune 2012 after a European arrest warrantwas issued against him by Swedish authorities. Two women accused him of intentionally taking off or tampering with condoms, without consent, during sex.

Assange denies the rape allegation. He faces arrest by British police if he leaves the embassy before the statute of limitation runs out on the remaining charges in 2020.

Anderson calls the rape allegations levied against Assange "defamation," arguing,"There is no rape. It is a case of condom or not. It is ridiculous." She continues: "It is complex and there are powerful people trying to control the outcome."

Anderson closes her essay by saying: "I will always stand by My Julian ..."

In a February radio interview, Assange called Anderson "an attractive person with an attractive personality and whip smart" but declined to confirm a romantic relationship.

On Tuesday, WikiLeaks publishedthousands of documents it says detailCIA tools for hacking into web servers, computers, smartphones and even TVs that can be turned into covert microphones.

The Trump administrationrefused to confirm or deny the authenticity of the leaks.

Read or Share this story: http://usat.ly/2mdR6Pu

Read the original:
Pamela Anderson defends 'sexy' WikiLeaks founder Julian Assange in essay - USA TODAY

The good and bad of Wikileaks’ Vault 7 dump – Android Central


Android Central
The good and bad of Wikileaks' Vault 7 dump
Android Central
On Tuesday (March 7, 2017 if you're reading from the future) Wikileaks released the Vault 7 CIA files. These dumped a ton of information along with some Tweets about how journalists were supposed to be afraid that the CIA has tapped into everyone's ...

and more »

See original here:
The good and bad of Wikileaks' Vault 7 dump - Android Central

WikiLeaks’ CIA dump makes the Russian hacking story even murkier if that’s possible – Salon

Russia hacked the election. Russia didnt hack the election. Russia sort of, maybe, possibly hacked the election.

Is your head spinning from this story yet?

The latest WikiLeaks disclosures concerning the CIAs hacking abilities has further complicated the hall of mirrors that is the Russian hacking story. The Vault 7 leaks are believed to be authentic and reveal a few uncomfortable truths about the overreach of U.S. intelligence agencies.

Reactions to the leaks have varied from those who think they could be more significant than the Edward Snowden revelations to those who think its all a bit of a non-story. Basically, its a pretty clear split between those who regard WikiLeaks editor Julian Assange as a trustworthy whistleblower and those who regard him as a tool of the Kremlin.

Among other things, the leaks revealed that the U.S. government is essentially paying out to exploit the vulnerabilities in software without telling companies and, disturbingly, that they could be using your iPhone or Samsung TV as a microphone even when its supposedly switched off.

One of the most interesting disclosures concerns how the CIA can cover its tracks by leaving electronic trails suggesting the hacking is being done in different places notably, in Russia. In fact, according to WikiLeaks, theres an entire department dedicated to this. Its job is to misdirect attribution by leaving false fingerprints. If youve been at all skeptical about the recent levels of Russia-related hysteria, promoted heavily by U.S. intelligence agencies, alarm bells are probably going off in your head.

Keeping these tactics in mind, the evidence presented to prove that Russia hacked the Democratic National Committee in an effort to throw the presidential election to Donald Trump becomes flimsier than it was before. And it was pretty flimsy to begin with.

Recall, for example, that cybersecurity firm CrowdStrike conveniently concluded within one day that the Russian government was behind the attack on the DNC servers. I say conveniently, because the DNC paid for CrowdStrikes services and its fair to say the DNC had an unhealthy fixation on all things Russia for the duration of the election cycle.

The evidence provided by CrowdStrike included the fact that malware found on DNC servers was the same as malware believed to be used by Russian intelligence units, that metadata files included information in Cyrillic text, and that emails had been sent using the Russian email service Yandex. In other words, it was nothing the CIA couldnt have done itself in order to misdirect attribution. Whats more, CrowdStrike actually admitted that it deliberately left outevidence that didnt support its claims that Russia was responsible.

FireEye, a competitor of CrowdStrike, made similar claims on thin evidence. The hackers, they explained, appeared to cease operations on Russian holidays, and their work hours seem to align with the UTC +3 time zone, which contains cities such as Moscow and St. Petersburg.

In a thorough and thought-provoking piece on Russian hacking, investigative journalist Yasha Levine picks this evidence apart:

So, FireEye knows that these two APTs [Advanced Persistent Threats] are run by the Russian government because a few language settings are in Russian and because of the telltale timestamps on the hackers activity? First off, what kind of hacker especially a sophisticated Russian spy hacker keeps to standard 9-to-5 working hours and observes official state holidays? Second, just what other locations are in Moscows time zone and full of Russians? Lets see: Israel, Belarus, Estonia, Latvia, Moldova, Romania, Lithuania, Ukraine. If non-Russian-speaking countries are included (after all, language settings could easily be switched as a decoy tactic), that list grows longer still: Greece, Finland, Turkey, Jordan, Lebanon, Syria, Iraq, Saudi Arabia, Somalia, Yemen, Ethiopia, Kenya the countries go on and on.

This is forensic science in reverse, Levine writes. First you decide on the guilty party, then you find the evidence that confirms your belief.

Does any of this mean that Russia is not actually hacking or attempting to hack American institutions and agencies? Of course not. All major powers dedicate huge amounts of time and resources to hacking each other, pretty much on a constant basis. Its highly doubtful that hacking ceases on national holidays. The question is whether Russia is actually responsible in the instances described by firms like CrowdStrike and FireEye.

The Vault 7 leaks are not exactly a smoking gun for those who maintain Russias innocence where the DNC hacks and leaks are concerned but theyre not insignificant either. If anything, the new leaks should make people think a little harder before putting their complete trust in the CIAs public conclusions about the acts (or alleged acts) of enemy states.

On the other hand, for those who still believe Russia is responsible for the DNC hack, the latest WikiLeaks dump could also easily have confirmed their beliefs. Russia is the only country specifically named by WikiLeaks as a potential victim of these misdirected attribution tactics. This will heighten suspicions that U.S. intelligence agencies have in some way been infiltrated by Russia to facilitate the leaks of damaging (but true) information. It will confirm, for some observers, that WikiLeaks is in Vladimir Putins pocket.

Personally, given that WikiLeaks has an impeccable record in terms of the authenticity of the material it releases, Im inclined to disagree with the analysis that paints Assange as a Kremlin stooge. What we really need to be skeptical about is the way these stories are framed and promoted by both government agencies and media. The fact that the CIA an organization of professionals trained in the most sophisticated methods of deception is front and center promoting the idea that Assange is a Russian agent, should be enough for anyone to take that idea with a pinch of salt.

The Russia story has turned into a game of pick your favorite conspiracy theory but what we label as conspiracy theory is most often whatever we find unpalatable to our built-in biases. We go around looking to confirm our own theories by seizing on the evidence that matches our ideas of how things are. No one is immune to this.

What we should work toward is a better awareness of these tendencies. If journalists can do that and they should perhaps they can begin to employ more exacting standards to their investigations and reporting. Maybe then we can come a little closer to determining the real truth, rather than the truth as we would like it to be.

Original post:
WikiLeaks' CIA dump makes the Russian hacking story even murkier if that's possible - Salon

List of material published by WikiLeaks – Wikipedia

Since 2006, the document archive website WikiLeaks has published anonymous submissions of documents that are generally unavailable to the general public.

WikiLeaks posted its first document in December 2006, a decision to assassinate government officials, signed by Sheikh Hassan Dahir Aweys.[1]The New Yorker has reported that

[Julian] Assange and the others were uncertain of its authenticity, but they thought that readers, using Wikipedia-like features of the site, would help analyze it. They published the decision with a lengthy commentary, which asked, "Is it a bold manifesto by a flamboyant Islamic militant with links to Bin Laden? Or is it a clever smear by US intelligence, designed to discredit the Union, fracture Somali alliances and manipulate China?" ... The document's authenticity was never determined, and news about WikiLeaks quickly superseded the leak itself.[1]

On 31 August 2007, The Guardian featured on its front page a story about corruption by the family of the former Kenyan leader Daniel arap Moi. The newspaper stated that the source of the information was WikiLeaks.[2]

In February 2008, the wikileaks.org domain name was taken offline after the Swiss Bank Julius Baer sued WikiLeaks and the wikileaks.org domain registrar, Dynadot, in a court in California, United States, and obtained a permanent injunction ordering the shutdown.[3][4] WikiLeaks had hosted allegations of illegal activities at the bank's Cayman Islands branch.[3] WikiLeaks' U.S. Registrar, Dynadot, complied with the order by removing its DNS entries. However, the website remained accessible via its numeric IP address, and online activists immediately mirrored WikiLeaks at dozens of alternative websites worldwide.[5]

The American Civil Liberties Union and the Electronic Frontier Foundation filed a motion protesting the censorship of WikiLeaks. The Reporters Committee for Freedom of the Press assembled a coalition of media and press that filed an amicus curiae brief on WikiLeaks' behalf. The coalition included major U.S. newspaper publishers and press organisations, such as the American Society of News Editors, the Associated Press, the Citizen Media Law Project, the E. W. Scripps Company, the Gannett Company, the Hearst Corporation, the Los Angeles Times, the National Newspaper Publishers Association, the Newspaper Association of America and the Society of Professional Journalists. The coalition requested to be heard as a friend of the court to call attention to relevant points of law that it believed the court had overlooked (on the grounds that WikiLeaks had not appeared in court to defend itself, and that no First Amendment issues had yet been raised before the court). Amongst other things, the coalition argued that:[5]

"WikiLeaks provides a forum for dissidents and whistleblowers across the globe to post documents, but the Dynadot injunction imposes a prior restraint that drastically curtails access to Wikileaks from the Internet based on a limited number of postings challenged by Plaintiffs. The Dynadot injunction therefore violates the bedrock principle that an injunction cannot enjoin all communication by a publisher or other speaker."[5]

The same judge, Jeffrey White, who issued the injunction vacated it on 29 February 2008, citing First Amendment concerns and questions about legal jurisdiction.[6] WikiLeaks was thus able to bring its site online again. The bank dropped the case on 5 March 2008.[7] The judge also denied the bank's request for an order prohibiting the website's publication.[5]

The executive director of the Reporters Committee for Freedom of the Press, Lucy Dalglish, commented:

"It's not very often a federal judge does a 180 degree turn in a case and dissolves an order. But we're very pleased the judge recognized the constitutional implications in this prior restraint."[5]

A copy of Standard Operating Procedures for Camp Deltathe protocol of the U.S. Army at the Guantanamo Bay detention campdated March 2003 was released on the WikiLeaks website on 7 November 2007.[8] The document, named "gitmo-sop.pdf", is also mirrored at The Guardian.[9] Its release revealed some of the restrictions placed over detainees at the camp, including the designation of some prisoners as off-limits to the International Committee of the Red Cross, something that the U.S. military had in the past repeatedly denied.[10]

On 3 December 2007, WikiLeaks released a copy of the 2004 edition of the manual,[11] together with a detailed analysis of the changes.[12]

On 24 March 2008, WikiLeaks made 35 uncensored videos of civil unrest in Tibet available for viewing, to get around official Chinese censorship during the worst of the unrest.[13]

On 24 March 2008, WikiLeaks published what they referred to as "the collected secret 'bibles' of Scientology",.[14] On 7 April 2008, they reported receiving a letter (dated 27 March) from the Religious Technology Center claiming ownership of the several documents pertaining to OT Levels within the Church of Scientology. These same documents were at the center of a 1994 scandal. The email stated:

Moxon & Kobrin[15]

The letter continued on to request the release of the logs of the uploader, which would remove their anonymity. WikiLeaks responded with a statement released on Wikinews stating: "in response to the attempted suppression, WikiLeaks will release several thousand additional pages of Scientology material next week",[16] and did so.

In September 2008, during the 2008 United States presidential election campaigns, the contents of a Yahoo! account belonging to Sarah Palin (the running mate of Republican presidential nominee John McCain) were posted on WikiLeaks after being hacked into by members of Anonymous.[17] It has been alleged by Wired that contents of the mailbox indicate that she used the private Yahoo! account to send work-related messages, in violation of public record laws.[18] The hacking of the account was widely reported in mainstream news outlets.[19][20][21] Although WikiLeaks was able to conceal the hacker's identity, the source of the Palin emails was eventually publicly identified as David Kernell, a 20-year-old economics student at the University of Tennessee and the son of Democratic Tennessee State Representative Mike Kernell from Memphis,[22] whose email address (as listed on various social networking sites) was linked to the hacker's identity on Anonymous.[23] Kernell attempted to conceal his identity by using the anonymous proxy service ctunnel.com, but, because of the illegal nature of the access, ctunnel website administrator Gabriel Ramuglia assisted the FBI in tracking down the source of the hack.[24]

WikiLeaks publicised reports on extrajudicial executions by Kenyan police for one week starting 1 November 2008 on its home page. Two of the human rights investigators involved, Oscar Kamau Kingara and John Paul Oulu, who made major contributions to a Kenya National Commission on Human Rights (KNCHR) report that was redistributed by WikiLeaks, The Cry of Blood Report on Extra-Judicial Killings and Disappearances,[25] were assassinated several months later, on 5 March 2009.[26][27] WikiLeaks called for information on the assassination.[26] In 2009, Amnesty International UK gave WikiLeaks and Julian Assange an award for the distribution of the KNCHR's The Cry of Blood report.[28]

After briefly appearing on a blog, the membership list of the far-right British National Party was posted to WikiLeaks on 18 November 2008. The name, address, age and occupation of many of the 13,500 members were given, including several police officers, two solicitors, four ministers of religion, at least one doctor, and a number of primary and secondary school teachers. In Britain, police officers are banned from joining or promoting the BNP, and at least one officer was dismissed for being a member.[29] The BNP was known for going to considerable lengths to conceal the identities of members. On 19 November, BNP leader Nick Griffin stated that he knew the identity of the person who initially leaked the list on 17 November, describing him as a "hardliner" senior employee who left the party in 2007.[30][31][32] On 20 October 2009, a list of BNP members from April 2009 was leaked. This list contained 11,811 members.[33]

On 7 February 2009, WikiLeaks released 6,780 Congressional Research Service reports.[34][35]

In March 2009, WikiLeaks published a list of contributors to the Norm Coleman senatorial campaign.[36][37]

In November 2009, controversial documents, including e-mail correspondence between climate scientists, were released (allegedly after being illegally obtained) from the University of East Anglia's (UEA) Climatic Research Unit (CRU).[38] According to the university, the emails and documents were obtained through a server hacking; one prominent host of the full 120MB archive was WikiLeaks,[39][40] although the information was not originally leaked to them.[41]

In March 2009 documents concerning complex arrangements made by Barclays Bank to avoid tax appeared on Wikileaks.[42][43] The documents had been ordered to be removed from the website of The Guardian.[44][45] In an editorial on the issue, The Guardian pointed out that, due to the mismatch of resources, tax collectors (HMRC) now have to rely on websites such as Wikileaks to obtain such documents.[46]

WikiLeaks has published the lists of forbidden or illegal web addresses for several countries.

On 19 March 2009, WikiLeaks published what was alleged to be the Australian Communications and Media Authority's blacklist of sites to be banned under Australia's proposed laws on Internet censorship.[47] Reactions to the publication of the list by the Australian media and politicians were varied. Particular note was made by journalistic outlets of the type of websites on the list; while the Internet censorship scheme submitted by the Australian Labor Party in 2008 was proposed with the stated intention of preventing access to child pornography and sites related to terrorism,[48] the list leaked on WikiLeaks contains a number of sites unrelated to sex crimes involving minors.[49][50] When questioned about the leak, Stephen Conroy, the Minister for Broadband, Communications and the Digital Economy in Australia's Rudd Labor Government, responded by claiming that the list was not the actual list, yet threatening to prosecute anyone involved in distributing it.[51] On 20 March 2009, WikiLeaks published an updated list, dated 18 March 2009; it more closely matches the claimed size of the ACMA blacklist, and contains two pages that have been independently confirmed as blacklisted by ACMA.

WikiLeaks also contains details of Internet censorship in Thailand, including lists of censored sites dating back to May 2006.[52]

Wikileaks published a list of web sites blacklisted by Denmark.[53]

Since May 2009, WikiLeaks has made available reports of several meetings of the Bilderberg Group.[54] It includes the group's history[55] and meeting reports from the years 1955, 1956, 1957, 1958, 1960, 1962, 1963 and 1980.

On 28 January 2009, WikiLeaks released 86 telephone intercept recordings of Peruvian politicians and businessmen involved in the "Petrogate" oil scandal.[56] The release of the tapes featured on the front pages of five Peruvian newspapers.[57]

On 16 July 2009, Iranian news agencies reported that the head of Iran's atomic energy organization Gholam Reza Aghazadeh had abruptly resigned for unknown reasons after twelve years in office.[58] Shortly afterwards WikiLeaks released a report disclosing a "serious nuclear accident" at the Iranian Natanz nuclear facility in 2009.[59] The Federation of American Scientists (FAS) released statistics that say the number of enriched centrifuges operational in Iran mysteriously declined from about 4,700 to about 3,900 beginning around the time the nuclear incident WikiLeaks mentioned would have occurred.[60]

According to media reports the accident may have been the direct result of a cyberattack at Iran's nuclear program, carried out with the Stuxnet computer worm.[61][62]

In September 2006, commodities giant Trafigura commissioned an internal report about a toxic dumping incident in the Ivory Coast,[63] which (according to the United Nations) affected 108,000 people. The document, called the Minton Report, names various harmful chemicals "likely to be present" in the waste and notes that some of them "may cause harm at some distance". The report states that potential health effects include "burns to the skin, eyes and lungs, vomiting, diarrhea, loss of consciousness and death", and suggests that the high number of reported casualties is "consistent with there having been a significant release of hydrogen sulphide gas".

On 11 September 2009, Trafigura's lawyers, Carter-Ruck, obtained a secret "super-injunction"[64] against The Guardian, banning that newspaper from publishing the contents of the document. Trafigura also threatened a number of other media organizations with legal action if they published the report's contents, including the Norwegian Broadcasting Corporation[63] and The Chemical Engineer magazine.[65] On 14 September 2009, WikiLeaks posted the report.[66]

On 12 October, Carter-Ruck warned The Guardian against mentioning the content of a parliamentary question that was due to be asked about the report. Instead, the paper published an article stating that they were unable to report on an unspecified question and claiming that the situation appeared to "call into question privileges guaranteeing free speech established under the 1689 Bill of Rights".[67] The suppressed details rapidly circulated via the internet and Twitter[68][69] and, amid uproar, Carter-Ruck agreed the next day to the modification of the injunction before it was challenged in court, permitting The Guardian to reveal the existence of the question and the injunction.[70] The injunction was lifted on 16 October.[71]

WikiLeaks made available an internal document[72] from Kaupthing Bank from just prior to the collapse of Iceland's banking sector, which led to the 20082012 Icelandic financial crisis. The document shows that suspiciously large sums of money were loaned to various owners of the bank, and large debts written off. Kaupthing's lawyers have threatened WikiLeaks with legal action, citing banking privacy laws. The leak has caused an uproar in Iceland.[73] Criminal charges relating to the multibillion-euro loans to Exista and other major shareholders are being investigated. The bank is seeking to recover loans taken out by former bank employees before its collapse.[74]

In October 2009, Joint Services Protocol 440, a 2,400-page restricted document written in 2001 by the British Ministry of Defence was leaked. It contained instructions for the security services on how to avoid leaks of information by hackers, journalists, and foreign spies.[75][76]

On 25 November 2009, WikiLeaks released 570,000 intercepts of pager messages sent on the day of the September 11 attacks.[77][78][79] Chelsea Manning (see below) commented that those were from an NSA database.[80][81] Among the released messages are communications between Pentagon officials and New York City Police Department.[82]

On 15 March 2010, WikiLeaks released a secret 32-page U.S. Department of Defense Counterintelligence Analysis Report from March 2008. The document described some prominent reports leaked on the website. These related to U.S. security interests, and described potential methods of marginalizing the organization. WikiLeaks editor Julian Assange said that some details in the Army report were inaccurate and its recommendations flawed,[83] and also that the concerns of the U.S. Army raised by the report were hypothetical.[84] The report discussed deterring potential whistleblowers via termination of employment and criminal prosecution of any existing or former insiders, leakers or whistleblowers. Reasons for the report include notable leaks such as U.S. equipment expenditure, human rights violations in Guantanamo Bay, and the battle over the Iraqi town of Fallujah.[85]

On 5 April 2010, WikiLeaks released classified U.S. military footage from a series of attacks on 12 July 2007 in Baghdad by a U.S. helicopter that killed 1218 people,[86][87][88] including two Reuters news staff, Saeed Chmagh and Namir Noor-Eldeen, on a website called "Collateral Murder". The footage consisted of a 39-minute unedited version and an 18-minute version that had been edited and annotated. According to some media reports, the Reuters news staff were in the company of armed men[89][90][91] and the pilots may have thought Chmagh and Noor-Eldeen were carrying weapons (which was actually camera equipment).[92] The military conducted an investigation into the incident and found there were two rocket propelled grenade launchers and one AK-47 among the dead.[93][94]

In the week following the release, "Wikileaks" was the search term with the most significant growth worldwide in the last seven days as measured by Google Insights.[95]

A 22-year-old US Army intelligence analyst, PFC (formerly SPC) Bradley Manning (now Chelsea Manning), was arrested after alleged chat logs were turned in to the authorities by former hacker Adrian Lamo, in whom she had confided. Manning reportedly told Lamo she had leaked the Baghdad airstrike video, in addition to a video of the Granai airstrike and around 260,000 diplomatic cables, to WikiLeaks.[96][97] WikiLeaks said "allegations in Wired that we have been sent 260,000 classified US embassy cables are, as far as we can tell, incorrect."[98] WikiLeaks have said that they are unable as yet to confirm whether or not Manning was actually the source of the video, stating "we never collect personal information on our sources", but that they have nonetheless "taken steps to arrange for (Manning's) protection and legal defence."[97][99] On 21 June Julian Assange told The Guardian that WikiLeaks had hired three US criminal lawyers to defend Manning but that they had not been given access to her.[100]

On 28 February 2013, Manning confessed in open court to providing vast archives of military and diplomatic files to WikiLeaks.[101] She pleaded guilty to 10 criminal counts in connection with the huge amount of material she leaked, which included videos of airstrikes in Iraq and Afghanistan in which civilians were killed, logs of military incident reports, assessment files of detainees held at Guantnamo Bay, Cuba, and a quarter-million cables from American diplomats stationed around the world.[101] She read a statement recounting how she joined the military, became an intelligence analyst in Iraq, decided that certain files should become known to the American public to prompt a wider debate about foreign policy, downloaded them from a secure computer network and then ultimately uploaded them to WikiLeaks.[101]

Manning reportedly wrote, "Everywhere there's a U.S. post, there's a diplomatic scandal that will be revealed."[102] According to The Washington Post, she also described the cables as "explaining how the first world exploits the third, in detail, from an internal perspective."[103]

On 25 July 2010,[104] WikiLeaks released to The Guardian, The New York Times, and Der Spiegel over 92,000 documents related to the war in Afghanistan between 2004 and the end of 2009. The documents detail individual incidents including friendly fire and civilian casualties.[105] The scale of the leak was described by Julian Assange as comparable to that of the Pentagon Papers in the 1970s. The documents were released to the public on 25 July 2010. On 29 July 2010 WikiLeaks added a 1.4 GB "insurance file" to the Afghan War Diary page, whose decryption details would be released if WikiLeaks or Assange were harmed.[106][107]

About 15,000 of the 92,000 documents have not yet been released on WikiLeaks, as the group is currently reviewing the documents to remove some of the sources of the information. Speaking to a group in London in August 2010, Assange said that the group will "absolutely" release the remaining documents. He stated that WikiLeaks has requested help from the Pentagon and human-rights groups to help redact the names, but has not received any assistance. He also stated that WikiLeaks is "not obligated to protect other people's sources...unless it is from unjust retribution."[108]

According to a report on the Daily Beast website, the Obama administration has asked Britain, Germany and Australia among others to consider bringing criminal charges against Assange for the Afghan war leaks and to help limit Assange's travels across international borders.[109] In the United States, a joint investigation by the Army and the Federal Bureau of Investigation may try to prosecute "Mr. Assange and others involved on grounds they encouraged the theft of government property".[110]

The Australia Defence Association (ADA) stated that WikiLeaks' Julian Assange "could have committed a serious criminal offence in helping an enemy of the Australian Defence Force (ADF)."[111] Neil James, the executive director of ADA, states: "Put bluntly, Wikileaks is not authorised in international or Australian law, nor equipped morally or operationally, to judge whether open publication of such material risks the safety, security, morale and legitimate objectives of Australian and allied troops fighting in a UN-endorsed military operation."[111]

WikiLeaks' recent leaking of classified U.S. intelligence has been described by commentator of The Wall Street Journal as having "endangered the lives of Afghan informants" and "the dozens of Afghan civilians named in the document dump as U.S. military informants. Their lives, as well as those of their entire families, are now at terrible risk of Taliban reprisal."[112] When interviewed, Assange stated that WikiLeaks has withheld some 15,000 documents that identify informants to avoid putting their lives at risk. Specifically, Voice of America reported in August 2010 that Assange, responding to such criticisms, stated that the 15,000 still held documents are being reviewed "line by line," and that the names of "innocent parties who are under reasonable threat" will be removed.[113]Greg Gutfeld of Fox News described the leaking as "WikiLeaks' Crusade Against the U.S. Military."[114]John Pilger has reported that prior to the release of the Afghan War Diaries in July, WikiLeaks contacted the White House in writing, asking that it identify names that might draw reprisals, but received no response.[115][116]

According to the New York Times, Amnesty International and Reporters Without Borders criticized WikiLeaks for what they saw as risking people's lives by identifying Afghans acting as informers.[117] A Taliban spokesman said that the Taliban had formed a nine-member "commission" to review the documents "to find about people who are spying."[117] He said the Taliban had a "wanted" list of 1,800 Afghans and was comparing that with names WikiLeaks provided, stating "after the process is completed, our Taliban court will decide about such people."[117]

Following the Love Parade stampede in Duisburg, Germany on 24 July 2010, the local news blog Xtranews published internal documents of the city administration regarding Love Parade planning and actions by the authorities. The city government reacted by acquiring a court order on 16 August forcing Xtranews to remove the documents from its blog.[118] Two days later, however, after the documents had surfaced on other websites as well, the government stated that it would not conduct any further legal actions against the publication of the documents.[119] On 20 August WikiLeaks released a publication titled Loveparade 2010 Duisburg planning documents, 20072010, which comprised 43 internal documents regarding the Love Parade 2010.[120][121]

In October 2010, it was reported that WikiLeaks was planning to release up to 400,000 documents relating to the Iraq War.[122] Julian Assange initially denied the reports, stating: "WikiLeaks does not speak about upcoming releases dates, indeed, with very rare exceptions we do not communicate any specific information about upcoming releases, since that simply provides fodder for abusive organizations to get their spin machines ready."[123]The Guardian reported on 21 October 2010 that it had received almost 400,000 Iraq war documents from WikiLeaks.[124] On 22 October 2010, Al Jazeera was the first to release analyses of the leak, dubbed The War Logs. WikiLeaks posted a tweet that "Al Jazeera have broken our embargo by 30 minutes. We release everyone from their Iraq War Logs embargoes." This prompted other news organizations to release their articles based on the source material. The release of the documents coincided with a return of the main wikileaks.org website, which had been offering no content since 30 September 2010.

The BBC quoted The Pentagon referring to the Iraq War Logs as "the largest leak of classified documents in its history." Media coverage of the leaked documents focused on claims that the U.S. government had ignored reports of torture by the Iraqi authorities during the period after the 2003 war.[125]

On 22 November 2010 an announcement was made by the WikiLeaks Twitter feed that the next release would be "7x the size of the Iraq War Logs."[126][127] U.S. authorities and the media speculated that they contained diplomatic cables.[128] Prior to the expected leak, the government of the United Kingdom (UK) sent a DA-Notice to UK newspapers, which requests advance notice from the newspapers regarding the expected publication.[129] According to Index on Censorship, "there is no obligation on media to comply". "Newspaper editors would speak to [the] Defence, Press and Broadcasting Advisory Committee prior to publication."[129] The Pakistani newspaper Dawn stated that the U.S. newspapers The New York Times and The Washington Post were expected to publish parts of the diplomatic cables on Sunday 28 November, including 94 Pakistan-related documents.[130]

On 26 November, via his lawyer Jennifer Robinson, Assange sent a letter to the US Department of State, asking for information regarding people who could be placed at "significant risk of harm" by the diplomatic cables release.[131][132]Harold Koh, Legal Adviser of the Department of State, refused the proposal, stating, "We will not engage in a negotiation regarding the further release or dissemination of illegally obtained U.S. Government classified materials."[132]

On 28 November, WikiLeaks announced it was undergoing a massive Distributed Denial-of-service attack,[133] but vowed to still leak the cables and documents via prominent media outlets including El Pas, Le Monde, Der Spiegel, The Guardian, and The New York Times.[134] The announcement was shortly thereafter followed by the online publication, by The Guardian, of some of the purported diplomatic cables, including one in which United States Secretary of State Hillary Clinton apparently orders diplomats to obtain credit card and frequent flier numbers of the French, British, Russian and Chinese delegations to the United Nations Security Council.[135] Other revelations reportedly include that several Arab nations urged the U.S. to launch a first strike on Iran, that the Chinese government was directly involved in computer hacking, and that the U.S. is pressuring Pakistan to turn over nuclear material to prevent it from falling into the wrong hands. The cables also include unflattering appraisals of world leaders.[136] Despite the steps taken by United States Government forbidding all unauthorized federal government employees and contractors from accessing classified documents publicly available on WikiLeaks, in the week following the release (28 November 5 December 2010), "Wikileaks" remained the top search term in United States as measured by Google Insights.[137]

U.S. Secretary of State Hillary Clinton responded to the leaks saying, "This disclosure is not just an attack on America's foreign policy; it is an attack on the international community, the alliances and partnerships, the conventions and negotiations that safeguard global security and advance economic prosperity." Julian Assange is quoted as saying, "Of course, abusive, Titanic organizations, when exposed, grasp at all sorts of ridiculous straws to try and distract the public from the true nature of the abuse."[138]John Perry Barlow, co-founder of the Electronic Frontier Foundation, wrote a tweet saying: "The first serious infowar is now engaged. The field of battle is WikiLeaks. You are the troops."[139]

On 24 April 2011 WikiLeaks began a month-long release of 779 US Department of Defense documents about detainees at the Guantanamo Bay detention camp.[140]

On 1 December 2011 WikiLeaks started to release the Spy Files.[141][142][143]

On 27 February 2012, WikiLeaks began to publish what it called "The Global Intelligence Files", more than 5,000,000 e-mails from Stratfor dating from July 2004 to late December 2011. It was said to show how a private intelligence agency operates and how it targets individuals for their corporate and government clients.[144] A few days before, on 22 February, WikiLeaks had released its second insurance file via BitTorrent. The file is named "wikileaks-insurance-20120222.tar.bz2.aes" and about 65 GB in size.[145][146]

On 5 July 2012, WikiLeaks began publishing the Syria Files, more than two million emails from Syrian political figures, ministries and associated companies, dating from August 2006 to March 2012.[147]

In April 2013, WikiLeaks releases 1.7million U.S. diplomatic and intelligence reports including Kissinger cables.[148]

Released on 19 May 2013.[149]

Wednesday 4 September 2013 at 1600 UTC, WikiLeaks released 'Spy Files #3' 249 documents from 92 global intelligence contractors.[150]

Draft text for the Trans-Pacific Partnership Agreement Intellectual Property charter.[151]

WikiLeaks published a secret draft of the Financial Services Annex of the Trade in Services Agreement in June 2014. On its website, the organization provided an analysis of the leaked document. TISA, an international trade deal aimed at market liberalization, covers 50 countries and 68% of the global services industry. The agreement's negotiations have been criticized for a lack of transparency.[152]

On 29 July 2014, WikiLeaks released a secret gagging order issued by the Supreme Court of Victoria that forbid the Australian press from coverage of a multimillion-dollar bribery investigation involving the nation's central bank and several international leaders.[153] Indonesian, Vietnamese, Malaysian and Australian government officials were named in the order, which was suppressed to "prevent damage to Australia's international relations that may be caused by the publication of material that may damage the reputations of specified individuals who are not the subject of charges in these proceedings."[154]

Public criticism of the suppression order followed the leak. Human Rights Watch General Counsel Dinah PoKempner, said "Secret law is often unaccountable and inadequately justified. The government has some explaining to do as to why it sought such an extraordinary order, and the court should reconsider the need for it now that its action has come to light."[155] At a media conference, Indonesian president Susilo Bambang Yudhoyono condemned the gagging order, calling for an open and transparent investigation.[156]

On 25 March 2015 WikiLeaks released the "Investment Chapter" from the secret negotiations of the TPP (Trans-Pacific Partnership) agreement.

"The TPP has developed in secret an unaccountable supranational court for multinationals to sue states. This system is a challenge to parliamentary and judicial sovereignty. Similar tribunals have already been shown to chill the adoption of sane environmental protection, public health and public transport policies." --Julian Assange

Whistle blower, Royal Navy Able Seaman William McNeilly exposed serious security issues relate to the UK's nuclear weapons system.[157]

On 22 July 2016, WikiLeaks released nearly 20,000 e-mails and over 8,000 attachments from the Democratic National Committee (DNC), the governing body of the U.S. Democratic Party. The leak includes emails from seven key DNC staff members, and date from January 2015 to May 2016. The collection of emails allegedly disclose the bias of key DNC staffers against the presidential campaign of Senator Bernie Sanders in favor of Hillary Clinton's campaign. WikiLeaks did not reveal their source.[158]

On 7 October 2016, WikiLeaks started releasing emails from John Podesta, the chairman of Hillary Clinton's 2016 presidential campaign.[159] The emails provide some insight to the inner workings of Clinton's campaign.[160][161] One of the emails contained 25 excerpts from Clinton's paid Wall Street speeches.[162][163] Another leaked document included eighty pages of Clinton's Wall Street speeches.[164][165] Also among these emails was an email from Donna Brazile to Podesta that suggested that Brazile had received a town hall debate question in advance and was sharing it with Clinton.[166] One of the emails released on 12 October 2016 included Podesta's iCloud account password. His iCloud account was reportedly hacked, and his Twitter account was briefly compromised.[167][168] Some emails from revealed emails that Barack Obama and Podesta exchanged in 2008.[169]

The Clinton campaign has declined to authenticate these leaks. Glen Caplin, a spokesman for the Clinton campaign, said, "By dribbling these out every day WikiLeaks is proving they are nothing but a propaganda arm of the Kremlin with a political agenda doing [Vladimir] Putin's dirty work to help elect Donald Trump."[165] The New York Times reported that when asked, president Vladimir Putin replied that Russia was being falsely accused.[170][171] Julian Assange has also denied that Russia is the source.[172]

On 25 November 2016, WikiLeaks released 200 emails and 300 internal documents allegedly from the United States Embassy in Sana'a, Yemen. These files appear to provide details on the United States military operations in Yemen from 2009 to March 2015.[173]

On 28 November 2016, WikiLeaks released more than 500,000 diplomatic cables sent by the United States Department of State in 1979 during the presidency of Jimmy Carter.[174]

On 1 December 2016, WikiLeaks released 2,420 documents which it claims are from the German Parliamentary Committee investigating the NSA spying scandal.[175] German security officials at first suspected the documents were obtained from a 2015 cyberattack on the Bundestag, but now suspect it was an internal leak.[176]

On 16 February 2017, WikiLeaks released a purported report on CIA espionage orders (marked as NOFORN) for the 2012 French presidential election.[177][178] The order called for details of party funding, internal rivalries and future attitudes toward the United States. The Associated Press noted that "the orders seemed to represent standard intelligence-gathering."[179]

This article only covers a small subset of the leaked documentsthose that have attracted significant attention in the mainstream press. Wikileaks has the complete list, organised by country or by year through 2010.

Read more here:
List of material published by WikiLeaks - Wikipedia

WikiLeaks CIA cache: Fool me once – Engadget

What sort of misleading claims? How about the suggestion that the safest encryption apps, Signal and WhatsApp (neither of which actually appear in the document dump), are broken. Or that the CIA bugs everyone's phones. That our government is spying on us through our TVs with the flick of a switch. And that the CIA, which is providing evidence to Congress in the Trump-Russia probe, is part of a conspiracy to damage ... Russia.

When the news hit Tuesday morning, the bigger outlets ran wild, uncritically repeating the WikiLeaks press statement, and reporting on the documents without having them verified. If only being first was better than being correct.

WikiLeaks framed the whole media-attention sideshow as a giant embarrassment for an out-of-control CIA. Breitbart loved it. Especially the bit about how the CIA is trying to frame those completely innocent Russian government hackers. Hey, at least it was a break from WikiLeaks lending support to Trump's ravings that Obama wiretapped him.

By Tuesday afternoon, people were starting to get over the shock of learning that the CIA is a spy agency. A few news outlets started to correct their shit. They might've even felt a bit swindled by having regurgitated that crucial first round of PR from WikiLeaks, casting the dump as some sort of Snowden 2.0. (Snowden, for his part, has done his very best to make it a Snowden 2.0.)

Many in hacking and security weren't taking the bait to begin with. Many hackers were less interested this time by what was in the drop than by who it was from, and why it was being released now.

By now the press has started to sort things out -- but only after the misinformation had spread. But as Zeynep Tufekci writes, this is just a page from the WikiLeaks playbook. This time, she said, "there are widespread claims on social media that these leaked documents show that it was the C.I.A. that hacked the Democratic National Committee, and that it framed Russia for the hack. (The documents in the cache reveal nothing of the sort.)"

In an unusual turn, the CIA made a statement. Intelligence officials told press the agency was aware of a breach leading to this very dump, and is looking at contractors as the likeliest source. A formal criminal probe has been opened.

Thanks to the disinformation, lots of people are concerned about what was in the dump and how it affects their privacy and security. The contents haven't been confirmed by the CIA but it looks like it's shaping up to be the real deal. It mostly contains a lot of attack tools, and lots of clues that CIA operatives love Dr. Who, Nyan Cat, and hoard cheesy memes.

The files consist mostly of notes and documentation on the CIA's hack attack tools -- very specific tools used when the agency focuses on a very specific target. These aren't just hoovering up everyone's data like the lazy old NSA -- this is what a modern Bond's "Q" would use to go after a special someone, or someones.

As in, probably not you.

The attacks focus on operating systems, not on apps themselves. That bit you read about the CIA cracking Signal and WhatsApp was false. What this all shows, interestingly, is that encryption on those apps is tight enough that even the CIA hasn't been able to break them and needs to pop old versions of iOS just to read some ambassador's uncreative sexts.

There is literally no surprise here. The ubiquity of large systems having exploitable bugs, and the implications of this, have been reported on for decades.

Perhaps the nonstop cycle of social-media outrage has given us collective amnesia. What's old is new, and suddenly everyone is shocked to hear that there are 0-days in Windows and Android, and people are taking advantage of exploits. We all jump on a chair and lift our skirts and cry "rat!" because someone, somewhere, hasn't taken our advice about what to do with vulnerabilities.

So what's vulnerable, according to the CIA's hack attack tools circa 2013-2016? That would be Windows (Exchange 7 and 10 especially), OS X El Capitan, some Apple iPhone operating systems, and as we'd expect, a range of Android system exploits. The documents indicate that antivirus products like F-Secure, Bitdefender and Comodo are a pain in the ass to deal with, which makes them look pretty good.

The irony is that the best way to avoid these kinds of attacks is to update your system software when you're supposed to, don't get phished and try not to become a CIA target by, say, committing treason. Oh, and don't stop using reputable encrypted apps. Especially not because some guy with a hard-on for the CIA told the press the apps were compromised.

The docs do reveal that the CIA is well into hacking Internet of Things devices to use for surveillance with its Embedded Development Branch. According to journalists who are actually reading the documents, meeting notes from 2014 show that the CIA's analysts "are looking at self-driving cars, customized consumer hardware, Linux-based embedded systems and whatever else they can get their hands on."

This is to be expected, because spies gotta spy. Of course, because we live in a time when companies are using connected teddy bears to surveil kids and then getting owned by malicious hackers, we should expect spy agencies to roll IoT into their bespoke little government-funded "Q" laboratories.

It should make you uncomfortable -- and angry -- as hell that the CIA can use your smart toaster to spy on you. But, what's really troubling is that it's just piggybacking on data that companies are already collecting. Truth is, the US government isn't the early adopter here; Amazon, Google and Facebook are really the front-line developers of the surveillance state.

Image: REUTERS/Rick Wilking (Samsung TV)

Follow this link:
WikiLeaks CIA cache: Fool me once - Engadget

Purdy: Things from sports that I wish were in the WikiLeaks document dump – The Mercury News

(Sports columnist Mark Purdy has challenge himself to write 10 columns in 10 hours on March 10. This is one of those columns.)

All right, so after writing about lots of serious stuff in the preceding columns of 10 x 10 x 10, theres room for a little fun. Isnt there?

Because I know that my readers are sophisticated people with varied interests they have certainly been following the news about WikiLeaks and this weeks document dump.It seems the WikiLeakers (or whatever theyre called) have released thousands more words about how the CIA operates and obtains important information, such as how Charles Barkleys mouth has a high-tech ability to never shut up.

Just kidding. That information was not in the latest document dump. But I wish it were, among other things. Such as? Well, Ive got a long list. If WikiLeaks can find any of this stuff, I promise to send them a donation equal to one-million millionth of Brock Osweilers contract.

Heres the partial list. Please, WikiLeaks. We are relying you to find all this

Sonny Grays previously indestructible latissimi dorsi.

Steph Currys stamina. Hes going to need it over the next three months. And right now, he seems to be dragging.

Matt Cains arm from 2012. If its found, imagine how strong the Giants rotation will be.

College basketball fever in the Bay Area. Sure, it might rise up if St. Marys goes on a NCAA tournament run. But the most consistently ignored best sports action in Northern California can be found in the gyms and arenas in Moraga as well as at Cal, Stanford, USF, Santa Clara and San Jose State. For a change, not one of them has been terrible this season. And there are always good seats available.

Sanity on Twitter.

Joe Thorntons razor.

Brent Burns teeth.

Patrick Marleaus birth certificate. He cant be 37 years old and still skate so fast, can he?

The Raiders secret strategy to make it seem as if they are courting Las Vegas only to turn around and tell Oakland fans: We were just kidding! Were not really leaving! (We can only wish.)

Aldon Smiths common sense.

The report from Bud Seligs Blue Ribbon Panel that was supposed to examine all the elements of the As ballpark situation in Oakland and San Jose but after four years vanished into thin air along with the panel, apparently. Anyone seen those guys lately?

Kyle Shanahans backpack. No wait. He found that. Now he just needs to stuff some talented players onto the roster inside of it. The current free agent signings are a decent start. But the college draft must provide assistance, too.

The end of the bar at Avaya Stadium. (Inside joke: Its an oval bar stretching practically the width of the goal line, which means a tipsy Earthquakes fan could walk an entire circle around it and not fall down if the tipsy fan holds on well enough.)

Draymond Greens chill pills. The temper flashes are okay during the regular season. They cant happen in the playoffs. The Warriors need him for seven games in the finals, not six. As we saw last year.

And, thats right, a Charles Barkley muzzle.

Your suggestion here. Comment section below.

See more here:
Purdy: Things from sports that I wish were in the WikiLeaks document dump - The Mercury News