{"id":32173,"date":"2017-06-16T01:45:08","date_gmt":"2017-06-16T05:45:08","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/julian-assange-wired.php"},"modified":"2017-06-16T01:45:08","modified_gmt":"2017-06-16T05:45:08","slug":"julian-assange-wired","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/julian-assange-2\/julian-assange-wired.php","title":{"rendered":"Julian Assange &#8211; WIRED"},"content":{"rendered":"<p><p>    Mark    Chew\/Fairfax Media\/Fairfax Media\/Getty Images  <\/p>\n<p>        Amid a seemingly     incessant    deluge of leaks and hacks, Washington, DC staffers have learned    to imagine how even the most benign email would look a week    later on the homepage of a secret-spilling outfit like    WikiLeaks or DCLeaks. In many cases, they've     stopped emailing    altogether, deleted accounts, and reconsidered dumbphones     . Julian    Assangeor at least, a ten-years-younger and     more innocent      Assangewould    say he's already won.  <\/p>\n<p>    After another week of         Clinton-related emails      roiling this    election, the political world has been left to scrub their    inboxes, watch their private correspondences be picked over in    public, and psychoanalyze WikiLeaks' inscrutable founder. Once    they're done sterilizing their online lives, they might want to    turn to an essay Assange wrote ten years ago, laying out the    endgame of his leaking strategy long before he became one of    the most controversial figures on the Internet.      <\/p>\n<p>    In \" Conspiracy as Governance     ,\" which    Assange posted to his blog in December 2006, the leader of    then-new WikiLeaks describes what he considered to be the most    effective way to attack a conspiracyincluding, as he puts it,    that particular form of conspiracy known as a political party.       <\/p>\n<p>      \"Consider what would happen if one of      these parties gave up their mobile phones, fax and email      correspondencelet alone the computer systems which manage      their [subscribers], donors, budgets, polling, call centres      and direct mail campaigns. They would immediately fall into      an organisational stupor and lose to the other.\"           <\/p>\n<p>    And how to induce that \"organisational    stupor?\" Foment the fear that any correspondence could leak at    any time.  <\/p>\n<p>      \"The more secretive or unjust an      organization is, the more leaks induce fear and paranoia in      its leadership and planning coterie. This must result in      minimization of efficient internal communications mechanisms      (an increase in cognitive 'secrecy tax') and consequent      system-wide cognitive decline resulting in decreased ability      to hold onto power as the environment demands adaptation.\"          <\/p>\n<p>    WikiLeaks would publish its first leak    the same month as that blog post, a communication from a    Somalian Islamic cleric calling for political assassinations.    Three years later it'd put out the Pentagon and State    Department leaks provided by Chelsea Manning, and six years    after that, leaked emails from the Democratic National    Committee and Clinton advisor John Podesta would lead to the    ousting of DNC Chairman Debbie Wasserman Schultz and shake    Hillary Clinton's campaign.  <\/p>\n<p>        It was a crappy, annoying        manifesto. And it was ahead of its time by many years.               <\/p>\n<p>      Dave Aitel, former NSA analyst          <\/p>\n<p>    The last decade has shown just how    prescient Assange was. Take, for example, the Russian hackers    who published private files from the World Anti-Doping Agency    after Russia's athletes got banned from the Olympics for    doping. \"Now a group like WADA has to take everything they say    to every person into account. They have to think, this could    leak,\" says Dave Aitel, a former NSA staffer and founder of the    security firm Immunity who focuses on cyberwar and information    warfare. \"The idea is, 'If we can prevent them from having    secrets, they have to operate very differently.'\"      <\/p>\n<p>    That move comes straight from Assange.    \"It was a crappy, annoying manifesto,\" Aitel says. \"And it was    ahead of its time by many years.\"   <\/p>\n<p>    A spokesperson for WikiLeaks says    Assange's essay was a \"thought experiment\" that the    organization still believes to be true. \"Organizations have two    choices (1) reduce their levels of abuse or dishonesty or (2)    pay a heavy 'secrecy tax' in order to engage in inefficient but    secretive processes,\" the spokesperson writes. \"As    organizations are usually in some form of competitive    equilibrium this means that, in the face of WikiLeaks,    organizations that are honest will, on average, grow, while    those that are dishonest and unjust will decline.\"       <\/p>\n<p>        The more secretive or unjust an        organization is, the more leaks induce fear and paranoia in        its leadership and planning coterie.      <\/p>\n<p>      Julian Assange, writing in 2006          <\/p>\n<p>    Of course, Assange's claim that a    political party leaks in direct proportion to its dishonesty    looks almost laughable after the last several months. WikiLeaks    has published leaks exclusively damaging to Clinton and the    Democratic Party, while publishing nothing from Donald Trump or    his campaign. (Trump has, of course, faced the leaks of his     1995 tax returns      and a     damning video where    he brags about sexual assault     . But mainstream newspapers published    both, and neither came from the sort of internal communications    Assange wrote about. Trump himself also famously     doesn't use email     , as good a    security measure as anyone could hope for.)  <\/p>\n<p>    In fact, the Department of Homeland    Security and the Office of the Director of National    Intelligence have both said that recent WikiLeaks releases    originated with Russian    state-sponsored hackers     seeking to influence US electoral    politics. Assange's essay doesn't account for the possibility    that a government might exploit or collude with a leak platform    like WikiLeaks. (WikiLeaks' spokesperson denied that there has    been any \"official claim that any documents published by    WikiLeaks have come from a state actor,\" somehow ignoring last    week's DHS and ODNI    announcement.)       <\/p>\n<p>    The notion in Assange's essay that only    corrupt conspiracies keep secrets is one that Clinton herself    has argued againstironically, something we know because she    said it in a speech whose partial transcript    WikiLeaks leaked last Friday    . Speaking to the National    Multi-Housing Council in 2013, Clinton cited how President    Lincoln secretly promised jobs to lame duck Congressmen of the    opposing political party if they agreed to vote for the 13th    Amendment, which ended slavery. \"If everybody's watching all of    the backroom discussions and the deals, you know, then people    get a little nervous, to say the least,\" she said. \"So, you    need both a public and a private position.\"       <\/p>\n<p>    But the other point Assange makesthe    \"secrecy tax\" that organizations pay when they try to avoid    leaksrings true. Any organization that has tried to encrypt    all its communications, delete them, or throttle, quarantine,    and compartmentalize them in the name of secrecy knows the toll    that paranoia takes.  <\/p>\n<p>      \"An authoritarian conspiracy that      cannot think efficiently cannot act to preserve itself      against the opponents it induces.... When we look at a      conspiracy as an organic whole, we can see a system of      interacting organs, a body with arteries and veins whose      blood may be thickened and slowed till it falls, unable to      sufficiently comprehend and control the forces in its      environment.\"    <\/p>\n<p>    Let that be a warning to the Democratic    Party and any other organization with secrets to keep. If the    leaks don't kill you, the fear of them just might.       <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.wired.com\/2016\/10\/want-know-julian-assanges-endgame-told-decade-ago\/\" title=\"Julian Assange - WIRED\">Julian Assange - WIRED<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Mark Chew\/Fairfax Media\/Fairfax Media\/Getty Images Amid a seemingly incessant deluge of leaks and hacks, Washington, DC staffers have learned to imagine how even the most benign email would look a week later on the homepage of a secret-spilling outfit like WikiLeaks or DCLeaks. In many cases, they've stopped emailing altogether, deleted accounts, and reconsidered dumbphones . <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1599],"tags":[],"class_list":["post-32173","post","type-post","status-publish","format-standard","hentry","category-julian-assange-2"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32173"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32173"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32173\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}