Wikileaks Revelations Summary by CBS News- Good Read

Post your thoughts and comments on terrorism, war, and political shit like that.

Moderator: Metal Sludge

Post Reply
User avatar
SeminiferousButtNoid
Certified Asshole
Posts: 17738
Joined: Mon Apr 25, 2005 6:58 pm
Location: Balls Deep In The Hoopla

Wikileaks Revelations Summary by CBS News- Good Read

Post by SeminiferousButtNoid »

How WikiLeaks Enlightened Us in 2010
Posted by Joshua Norman

WikiLeaks has brought to light a series of disturbing insinuations and startling truths in the last year, some earth-shattering, others simply confirmations of our darkest suspicions about the way the world works. Thanks to founder Julian Assange's legal situation in Sweden (and potentially the United States) as well as his media grandstanding, it is easy to forget how important and interesting some of WikiLeaks' revelations have been.

WikiLeaks revelations from 2010 have included simple gossip about world leaders: Russia's PM Vladimir Putin is playing Batman to President Dmitri Medvedev's Robin; Iranian President Mahmoud Ahmadinejad is crazy and was once slapped by a Revolutionary Guard chief for being so; Libya's Col. Muammar el-Qaddafi has a hankering for his voluptuous blond Ukrainian nurse; and France's President Nicholas Sarkozy simply can't take criticism.

CBS News Special Report: WikiLeaks

However, WikiLeaks' revelations also have many major implications for world relations. The following is a list of the more impactful WikiLeaks revelations from 2010, grouped by region.

The United States

- The U.S. Army considered WikiLeaks a national security threat as early as 2008, according to documents obtained and posted by WikiLeaks in March, 2010.

- Then-Secretary of Defense Donald Rumsfeld and his top commanders repeatedly, knowingly lied to the American public about rising sectarian violence in Iraq beginning in 2006, according to the cross-referencing of WikiLeaks' leaked Iraq war documents and former Washington Post Baghdad Bureau Chief Ellen Knickmeyer's recollections.

- The Secretary of State's office encouraged U.S. diplomats at the United Nations to spy on their counterparts, including collecting data about the U.N. secretary general, his team and foreign diplomats, including credit card account numbers, according to documents from WikiLeaks U.S. diplomatic cable release. Later cables reveal the CIA draws up an annual "wish-list" for the State Department, which one year included the instructions to spy on the U.N.

- The Obama administration worked with Republicans during his first few months in office to protect Bush administration officials facing a criminal investigation overseas for their involvement in establishing policies that some considered torture. A "confidential" April 17, 2009, cable sent from the US embassy in Madrid obtained by WikiLeaks details how the Obama administration, working with Republicans, leaned on Spain to derail this potential prosecution.

- WikiLeaks released a secret State Department cable that provided a list of sites around the world vital to U.S. national security, from mines in Africa to labs in Europe.

Iraq

- A U.S. Army helicopter allegedly gunned down two journalists in Baghdad in 2007. WikiLeaks posted a 40-minute video on its website in April, showing the attack in gruesome detail, along with an audio recording of the pilots during the attack.

- Iran's military intervened aggressively in support of Shiite combatants in Iraq, offering weapons, training and sanctuary, according to an October, 2010, WikiLeaks release of thousands of secret documents related to the Iraq war.

- According to one tabulation, there have been 100,000 causalities, mostly civilian, in Iraq - greater than the numbers previously made public, many of them killed by American troops but most of them were killed by other Iraqis, according to the WikiLeaks Iraq documents dump.
- U.S. authorities failed to investigate hundreds of reports of abuse, torture, rape and even murder by Iraqi police and soldiers whose conduct appears to be systematic and normally unpunished, according to the WikiLeaks Iraq documents dump.

Afghanistan

- U.S. special-operations forces have targeted militants without trial in secret assassination missions, and many more Afghan civilians have been killed by accident than previously reported, according to the WikiLeaks Afghanistan war document dump.

- Afghan President Hamid Karzai freed suspected drug dealers because of their political connections, according to a secret diplomatic cable. The cable, which supports the multiple allegations of corruption within the Karzai government, said that despite repeated rebukes from U.S. officials in Kabul, the president and his attorney general authorized the release of detainees. Previous cables accused Karzai's half-brother, Ahmed Wali Karzai, of being a corrupt narcotics trafficker.

Asia

- Pakistan's government has allowed members of its spy network to hold strategy sessions on combating American troops with members of the Taliban, while Pakistan has received more than $1 billion a year in aid from Washington to help combat militants, according to a July, 2010, WikiLeaks release of thousands of files on the Afghanistan war.

- A stash of highly enriched uranium capable of providing enough material for multiple "dirty bombs" has been waiting in Pakistan for removal by an American team for more than three years but has been held up by the country's government, according to leaked classified State Department documents.

- Despite sustained denials by US officials spanning more than a year, U.S.military Special Operations Forces have been conducting offensive operations inside Pakistan, helping direct U.S. drone strikes and conducting joint operations with Pakistani forces against Al Qaeda and Taliban forces in north and south Waziristan and elsewhere in the Federally Administered Tribal Areas, according to secret cables released as part of the Wikileaks document dump.

- China was behind the online attack of Google, according to leaked diplomatic cables. The electronic intrusion was "part of a coordinated campaign of computer sabotage carried out by government operatives, private security experts and internet outlaws recruited by the Chinese government."

- Secret State Department cables show a South Korean official quoted as saying that North Korea's collapse is likely to happen "two to three years" after the death of the current dictator, Kim Jong Il. The U.S. is already planning for the day North Korea implodes from its own economic woes. China has "no will" to use its economic leverage to force North Korea to change its policies and the Chinese official who is the lead negotiator with North Korea is "the most incompetent official in China."

- North Korea is secretly helping the military dictatorship in Myanmar build nuclear and missile sites in its jungles, according to a leaked diplomatic cable. Although witnesses told the embassy that construction is at an early stage, officials worry Myanmar could one day possess a nuclear bomb.

- Five years ago, the International Committee of the Red Cross told U.S. diplomats in New Delhi that the Indian government "condones torture" and systematically abused detainees in the disputed region of Kashmir. The Red Cross told the officials that hundreds of detainees were subjected to beatings, electrocutions and acts of sexual humiliation, the Guardian newspaper of London reported Thursday evening.

- The British government has been training a Bangladeshi paramilitary force condemned by human rights organisations as a "government death squad", leaked US embassy cables have revealed. Members of the Rapid Action Battalion (RAB), which has been held responsible for hundreds of extra-judicial killings in recent years and is said to routinely use torture, have received British training in "investigative interviewing techniques" and "rules of engagement".

- Secret U.S. diplomatic cables reveal that BP suffered a blowout after a gas leak in the Caucasus country of Azerbaijan in September 2008, a year and a half before another BP blowout killed 11 workers and started a leak that gushed millions of gallons of oil into the Gulf of Mexico.

Middle East

- Saudi Arabia's rulers have deep distrust for some fellow Muslim countries, especially Pakistan and Iran, despite public appearances, according to documents from the late November, 2010, WikiLeaks U.S. diplomatic cable dump. King Abdullah called Pakistan's president Asif Ali Zardari "the greatest obstacle" to the country's progress and he also repeatedly urged the United States to attack Iran to destroy its nuclear program to stop Tehran from developing a nuclear weapon.

- Iranian Red Crescent ambulances were used to smuggle weapons to Lebanon's militant Hezbollah group during its 2006 war with Israel, according to the leaked U.S. diplomatic memos.

- In a leaked diplomatic memo, dated two weeks after elections that landed Israeli Prime Minister Benjamin Netanyahu in office, a senior American diplomat said that during a meeting a few days before "Netanyahu expressed support for the concept of land swaps, and emphasized that he did not want to govern the West Bank and Gaza but rather to stop attacks from being launched from there."

- The United States was secretly given permission from Yemen's president to attack the al Qaeda group in his country that later attempted to blow up planes in American air space. President Ali Abdullah Saleh told John Brennan, President Obama's counterterrorism adviser, in a leaked diplomatic cable from September 2009 that the U.S. had an "open door" on terrorism in Yemen.

- Contrary to public statements, the Obama administration actually helped fuel conflict in Yemen. The U.S. was shipping arms to Saudi Arabia for use in northern Yemen even as it denied any role in the conflict.

- Saudi Arabia is one of the largest origin points for funds supporting international terrorism, according to a leaked diplomatic cable. Secretary of State Hillary Clinton urged U.S. diplomats to do more to stop the flow of money to Islamist militant groups from donors in Saudi Arabia. The Saudi government, Clinton wrote, was reluctant to cut off money being sent to the Taliban in Afghanistan and Lashkar-e-Taiba (LeT) in Pakistan.

- The U.S. is failing to stop the flow of arms to Middle Eastern militant groups. Hamas and Hezbollah are still receiving weapons from Iran, North Korea, and Syria, secret diplomatic cables allege.

- A storage facility housing Yemen's radioactive material was unsecured for up to a week after its lone guard was removed and its surveillance camera was broken, a secret U.S. State Department cable released by WikiLeaks revealed Monday. "Very little now stands between the bad guys and Yemen's nuclear material," a Yemeni official said on January 9 in the cable.

- Israel destroyed a Syrian nuclear reactor in 2007, constructed with apparent help from North Korea, fearing it was built to make a bomb. In a leaked diplomatic cable obtained by the Israeli daily Yedioth Ahronoth, then-US secretary of state Condoleezza Rice wrote the Israelis targeted and destroyed the Syrian nuclear reactor just weeks before it was to be operational.

- Diplomatic cables recently released by WikiLeaks indicate authorities in the United Arab Emirates debated whether to keep quiet about the high-profile killing of a Hamas operative in Dubai in January. The documents also show the UAE sought U.S. help in tracking down details of credit cards Dubai police believe were used by a foreign hit squad involved in the killing. The spy novel-like slaying, complete with faked passports and assassins in disguise, is widely believed to be the work of Israeli secret agents.

- WikiLeaks founder Julian Assange told Al Jazeera network that some of the unpublished cables show "Top officials in several Arab countries have close links with the CIA, and many officials keep visiting US embassies in their respective countries voluntarily to establish links with this key US intelligence agency. These officials are spies for the U.S. in their countries."

Europe

- Of the 500 or so tactical nuclear weapons in the U.S. arsenal, it is known that about 200 are deployed throughout Europe. Leaked diplomatic cables reveal that dozens of U.S. tactical nuclear weapons are in Germany, the Netherlands and Belgium.

- NATO had secret plans to defend the Baltic states and Poland from an attack by Russia, according to a leaked diplomatic cable. NATO officials had feared "an unnecessary increase in NATO-Russia tensions," and wanted no public discussions of their contingency plans to defend Baltic states from Russian attack.

- The Libyan government promised "enormous repercussions" for the U.K. if the release of Abdel Baset al-Megrahi, the Lockerbie bomber, was not handled properly, according to a leaked diplomatic cable. The Libyan government threatened "harsh, immediate" consequences if the man jailed for the bombing of Pan Am Flight 103 died in prison in Scotland.

- Pope Benedict impeded an investigation into alleged child sex abuse within the Catholic Church, according to a leaked diplomatic cable. Not only did Pope Benedict refuse to allow Vatican officials to testify in an investigation by an Irish commission into alleged child sex abuse by priests, he was also reportedly furious when Vatican officials were called upon in Rome.

- Sinn Fein leaders Gerry Adams and Martin McGuinness carried out negotiations for the Good Friday agreement with Irish then-prime minister Bertie Ahern while the two had explicit knowledge of a bank robbery that the Irish Republican Army was planning to carry out, according to a WikiLeaks cable. Ahern figured Adams and McGuinness knew about the 26.5 million pound Northern Bank robbery of 2004 because they were members of the "IRA military command."

Africa

- Anglo-Dutch oil giant Royal Dutch Shell PLC has infiltrated the highest levels of government in Nigeria. A high-ranking executive for the international Shell oil company once bragged to U.S. diplomats, as reported in a leaked diplomatic cable, that the company's employees had so well infiltrated the Nigerian government that officials had "forgotten" the level of the company's access.

- Mozambique is fast on its way to becoming a narco-state because of close ties between drug smugglers and the southeastern African nation's government, according to U.S. Embassy cables released by WikiLeaks. The cables say cocaine, heroin and other drugs come in from South America and Asia, and are then flown to Europe or sent overland to neighboring South Africa for sale.

- Zimbabwe's Robert Mugabe-appointed attorney general announced he was investigating Mugabe's chief opposition leader on treason charges based exclusively on the contents of a WikiLeaks' leaked cable. The cable claimed Zimbabwe opposition leader Morgan Tsvangirai encouraged Western sanctions against his own country to induce Mugabe into giving up some political power.

Americas/Caribbean

- Mexican President Felipe Calderon told a U.S. official last year that Latin America "needs a visible U.S. presence" to counter Venezuelan President Hugo Chavez's growing influence in the region, according to a U.S. State Department cable leaked to WikiLeaks.

- A newly released confidential U.S. diplomatic cable predicts Cuba's economic situation could become "fatal" within two to three years, and details concerns voiced by diplomats from other countries, including China, that the communist-run country has been slow to adopt reforms.

- The Honduran military, Supreme Court and National Congress conspired in 2009 in what constituted an illegal and unconstitutional coup against the Executive Branch, according to a leaked diplomatic cable. However, the constitution itself may be deficient in terms of providing clear procedures for dealing with alleged illegal acts by the President and resolving conflicts between the branches of government.

- Venezuela's deteriorating oil industry and its growing economic problems are taking a toll on President Hugo Chavez's popularity. In one confidential leaked diplomatic cable dated Oct. 15, 2009, the U.S. Embassy said "equipment conditions have deteriorated drastically" since the government expropriated some 80 oil service companies earlier that year. It said safety and maintenance at the now state-owned oil facilities were in a "terrible state."

- China has been reselling Venezuela's cheap oil at a profit, according to a classified U.S. document released by WikiLeaks. President Hugo Chavez was upset that China apparently profited by selling fuel to other countries, fuel that it had sold China at a discount in order to gain favor. The cable also describes falling crude output in Venezuela caused by a host of problems within the national oil company Petroleos de Venezuela SA, or PDVSA.

- Jamaica's counter-drug efforts have been so sluggish that exasperated Cuban officials privately griped about their frustrations to a U.S. drug enforcement official, according to a U.S. diplomatic cable. The communique released by WikiLeaks said Cuban officials painted their Caribbean neighbor to the south as chronically uncooperative in stopping drug smugglers who use Cuban waters and airspace to transport narcotics destined for the U.S.

- A leaked U.S. diplomatic cable published Saturday depicts the leader of Mexico's army "lamenting" its lengthy role in the anti-drug offensive, but expecting it to last between seven and 10 more years. The cable says Mexican Defense Secretary Gen. Guillermo Galvan Galvan mistrusts other Mexican law enforcement agencies and prefers to work separately, because corrupt officials had leaked information in the past.

- McDonald's tried to delay the US government's implementation of a free-trade agreement in order to put pressure on El Salvador to appoint neutral judges in a $24m lawsuit it was fighting in the country. The revelation of the McDonald's strategy to ensure a fair hearing for a long-running legal battle against a former franchisee comes from a leaked US embassy cable dated 15 February 2006.

In 2010, WikiLeaks released only about 2,000 of the approximate 250,000 cables it claims to possess, and the pace of those releases dropped dramatically as the holidays approached. If Assange's promises are to be believed, 2011 will be another important year for learning about the hidden forces that drive our world.
GreatWhiteSnake wrote:I'm 46 and my dad's 67 and we kiss each other on the mouth and my 9 yo old son and I do too. It's because we love each other. A lot. And could give a shit what anyone else thinks about us kissing on the mouth.
User avatar
PowerSlaveToTheGrind
Made the Devil Cry
Posts: 1036
Joined: Wed Jul 26, 2006 12:06 pm
Location: Warwickshire, UK

Re: Wikileaks Revelations Summary by CBS News- Good Read

Post by PowerSlaveToTheGrind »

It's an interesting read, but the leaks haven't really released anything that wasn't previously known or at least suspected.
vanitybinge
Playing a Package Tour in Arenas
Posts: 12289
Joined: Fri Dec 01, 2006 9:31 am
Location: Gotham

Re: Wikileaks Revelations Summary by CBS News- Good Read

Post by vanitybinge »

I beg to differ. The past year alone of Wikileaks will help shape and define the next decade.
In the paper, seems a florist
Found in Lincoln Park, died of some anemia
No one raped her, poor Doloris,
Just detained her and drained her on the spot
User avatar
TheMightyMaiden
Buying Cool Stage Clothes
Posts: 682
Joined: Sat Feb 19, 2005 6:19 pm

Re: Wikileaks Revelations Summary by CBS News- Good Read

Post by TheMightyMaiden »

How does Wikileaks obtain all of this information? So much of it?
Image

P.S. I'm male
User avatar
MasterOfMeatPuppets
MSX Tour Support Act
Posts: 4249
Joined: Wed Feb 07, 2007 4:29 pm

Re: Wikileaks Revelations Summary by CBS News- Good Read

Post by MasterOfMeatPuppets »

Officially, people like Bradley Manning. Unofficially, they may have other sources...
http://www.bloomberg.com/news/2011-01-2 ... -data.html
WikiLeaks, condemned by the U.S. government for posting secret data leaked by insiders, may have used music- and photo-sharing networks to obtain and publish classified documents, according to a computer security firm.

Tiversa Inc., a company based in Cranberry Township, Pennsylvania, has evidence that WikiLeaks, which has said it doesn’t know who provides it with information, may seek out secret data itself, using so-called “peer-to-peer” networks, Chief Executive Officer Robert Boback claimed. He said the government is examining evidence that Tiversa has turned over.

The company, which has done investigative searches on behalf of U.S. agencies including the FBI, said it discovered that computers in Sweden were trolling through hard drives accessed from popular peer-to-peer networks such as LimeWire and Kazaa. The same information obtained in those searches later appeared on WikiLeaks, Boback said. WikiLeaks bases its most important servers in Sweden.

“WikiLeaks is doing searches themselves on file-sharing networks,” Boback said in an interview, summing up his firm’s deductions from the search evidence it gathered. “It would be highly unlikely that someone else from Sweden is issuing those same types of searches resulting in that same type of information.”

‘Completely False’

Tiversa’s claim is “completely false in every regard,” said Mark Stephens, WikiLeaks’ London attorney, in an e-mail. Stephens regularly represents media organizations, including Bloomberg News.

Tiversa declined to say who its client was when it noticed the Swedish downloads. Howard Schmidt, a former Tiversa adviser, is cybersecurity coordinator and special assistant to U.S. President Barack Obama.

Tiversa researchers said the data-mining operation in Sweden is both systematic and highly successful.

In a 60-minute period on Feb. 7, 2009, using so-called Internet protocol addresses that every computer, server or similar equipment has, Tiversa’s monitors detected four Swedish computers engaged in searching and downloading information on peer-to-peer networks. The four computers issued 413 searches, crafted to find Microsoft Excel spreadsheets and other information-rich documents among some of the 18 million users the company estimates are on such file-sharing networks at any given moment.

Those searches led to a computer in Hawaii that held a survey of the Pentagon’s Pacific Missile Range Facility in that state. Tiversa captured the download of the PDF file by one of the Swedish computers. The document was renamed and posted on the WikiLeaks website two months later, on April 29, 2009, according to a mirror image of the site.

Navy Systems

A product of the U.S. Navy’s Space and Naval Warfare Systems Center, the document exposed sensitive details of infrastructure changes for outfitting the base with a new sensor system. The mirror site said only that the file “was first publicly revealed by WikiLeaks working with our source.”

Boback said the retrieval and posting follows a pattern his researchers have tracked over and over. They estimate that as much as half of the postings by the group could originate from information siphoned from peer-to-peer users, he said.

“There are not that many whistleblowers in the world to get you millions of documents,” Boback said. “However, if you are getting them yourselves, that information is out there and available.”

Tiversa provided its findings to U.S. agencies to aid what Boback called the early stages of an investigation into the matter. A separate criminal probe is being conducted by a U.S. grand jury in Virginia regarding tens of thousands of diplomatic cables and other secret material allegedly provided by U.S. Army private Bradley Manning, Stephens said in December.

Swedish Allegations

WikiLeaks founder Julian Assange is in the U.K. fighting extradition to Sweden, where he faces allegations of sexual molestation and rape. Lawyers for Assange have said the accusations in Sweden are politically motivated and tied to the actions of WikiLeaks.

The U.S. Justice Department declined to comment on whether there was an official investigation regarding the downloads Tiversa concluded were done by WikiLeaks, said Dean Boyd, a spokesman.

Lime Group, which owns the rights to LimeWire software, shut its operations in December and an e-mail to Tiffany Guarnaccia, a spokeswoman, couldn’t be delivered. The network can be used by anyone who previously downloaded the software, peer-to-peer experts said. Sharman Networks, which owns Kazaa, referred inquiries to ICON Communications in Sydney, Australia, which didn’t return e-mails seeking comment.

U.S. Probes

The U.S. investigations could provide authorities an alternate path for prosecuting WikiLeaks and Assange, said Paul Ohm, an expert in cyber crime at the University of Colorado in Boulder.

Boback, whose firm has made such searches for the Federal Bureau of Investigation and the Internal Revenue Service to trace unauthorized downloads, argued that such conduct is just information scavenging, not illegal hacking.

Assistant U.S. Attorney Kathryn Warma in Seattle, who successfully prosecuted similar cases of unintended searching, said the systematic pillaging of computer contents through peer- to-peer networks could be pursued under federal anti-hacking statutes.

Even if not criminal, such conduct, if traced to WikiLeaks, would contradict its stated mission as a facilitator of leaked material by insiders, whose identities, Assange has said, the group takes measures not to know. The group provides an encrypted drop box on its website that it said prevents any tracing back to the source of documents.

Receptacle for Leaks

“If their information gathering doesn’t consist simply of being a receptacle for leaks but of this more aggressive effort to go out and cull this information, then you’re moving a clear step further from anything that resembles traditional journalistic practice,” said Mark Jurkowitz, the associate director for the Washington-based Project for Excellence in Journalism.

The evidence could also be used by congressional committees, which Boback said are pursuing a separate inquiry to undermine WikiLeaks’ claim that it’s a legitimate media organization with protections under the First Amendment.

“There is a difference between being given information that may have been obtained in violation of some agreement or law versus the media itself violating the law or an agreement in order to obtain information,” said Sandra Baron, the executive director of the Media Law Resource Center in New York. “The media is not allowed to steal.”

Thousands of Documents

The WikiLeaks site has posted hundreds of thousands of documents in the past four years. With the exception of classified material allegedly provided by Manning, the source of its leaked documents has never been publicly identified.

On Jan. 17, a former Swiss banker, Rudolf Elmer, turned over information to Assange on almost 2,000 account holders Elmer claims are guilty of tax evasion and other crimes. The data has yet to be published by WikiLeaks.

Assange based the group’s primary servers in Sweden because of the strength of that country’s media laws, which prohibit authorities from inquiring about journalistic sources, he has said. The group said in 2010 that the Swedish Pirate Party, which aims to reform copyright law and ensure citizens’ right to privacy, would host some of the group’s servers as well.

Assange has told interviewers he aims to make leaks untraceable to avoid retaliation against providers by governments or others harmed by the information.

Sourcing Information

“We cannot comply with requests for information on sources because we simply do not have the information to begin with,” WikiLeaks has said on its website.

The vulnerability of vast amounts of confidential and secret information on peer-to-peer networks is a risk well-known to researchers and security experts, as well as to information scavengers and foreign intelligence agencies, according to Eric Johnson, an expert on peer-to-peer technology at Dartmouth College’s Tuck School of Business in Hanover, New Hampshire.

The networks are popular with U.S. soldiers in Iraq and Afghanistan, who use them to download music and videos, as do teenagers who sometimes download material on their parents’ computers, Johnson said. A Congressional subcommittee held hearings in 2007 and 2009 on inadvertent sharing on such sites.

In 2009, Tiversa found the entire blueprints and avionics package for Marine One, the presidential helicopter, on a computer linked to Iran, according to Boback’s 2009 testimony at the hearings. His firm also found a leak of a file of a LimeWire user that showed the safe-house location of the president’s family.

Terrorism Targets

In late 2009, WikiLeaks published a spreadsheet detailing vulnerable, potential terrorist targets in Fresno County compiled by State of California security officials and the U.S. Department of Homeland Security. It noted locations for caches of bomb-grade fertilizers; the location of large gasoline and propane reserves; and the coordinates of key military and law enforcement sites and their functions.

Asked to aid in the investigation of the leak by U.S. authorities that the company declined to identify, Tiversa found the spreadsheet was inadvertently exposed by a California state employee using a peer-to-peer network in August 2008, more than a year before WikiLeaks posted it.

A WikiLeaks post of Army intelligence documents in 2009 included reports on Taliban leaders and their movements, as well as confidential notes of meetings where complaints were voiced about the performance of Iraqi police. Those documents were exposed to unauthorized searching on peer-to-peer networks more than eight months earlier in September 2008, Tiversa investigators found after they were asked to investigate the matter by a client the company declined to identify.

Order of Battle

The Pentagon’s 58-page Afghanistan Order of Battle was exposed in a file-sharing network in January 2009 and posted on WikiLeaks four months later. For a downloaded list of every Chevron Corp. property in the U.S. and Canada, the posting gap was two months -- from March to May 2009, the firm found.

Confidential documents can be mined from peer-to-peer networks using malicious software that sucks out information unrelated to the song, photo or other material users want to share. In most cases, Johnson said all that is needed is weak security settings or user mistakes that allow searchers to dig into the computers of users who don’t realize that confidential files on their hard drives can be tapped.

Congressional Legislation

The U.S. House of Representatives last year approved a bill that would prohibit peer-to-peer file sharing software on any U.S. government computer.

If federal prosecutors can definitely link the theft of confidential information directly to WikiLeaks and its core of paid staffers and volunteers, they would still face significant challenges. The legal tools available to them for a criminal prosecution aren’t firmly tested, according to lawyers and peer- to-peer experts.

“It’s not a slam dunk either way” said Ohm, a former Justice Department prosecutor.

In 2008, a federal court in Oklahoma found that removing pornographic pictures from a computer by an FBI agent using LimeWire didn’t constitute an illegal search. In contrast, Warma successfully prosecuted two Seattle cases recently involving individuals who retrieved financial information through LimeWire “in excess of authorization.” Warma said retrieving confidential information through peer-to-peer networks could be prosecuted under the federal Computer Fraud and Abuse Act.

“I can almost guarantee you there is a task force at the Department of Justice that’s been tasked with creatively coming up with theories to use against WikiLeaks,” Ohm said. “I’m sure that in those conversations the Computer Fraud and Abuse Act has come across the board, especially with this new twist of peer-to-peer networks.”
ImageImage
User avatar
TheMightyMaiden
Buying Cool Stage Clothes
Posts: 682
Joined: Sat Feb 19, 2005 6:19 pm

Re: Wikileaks Revelations Summary by CBS News- Good Read

Post by TheMightyMaiden »

Thanks
Image

P.S. I'm male
Post Reply