April 18, 2011

Wikileaks

1.   What is Wikileaks & How Does It Operate?

WikiLeaks is an international non-profit organization that publishes submissions of private, secret, and classified media from anonymous news sources, news leaks, and whistleblowers. Its website, launched in 2006 under The Sunshine Press organization claimed a database of more than 1.2 million documents within a year of its launch. WikiLeaks describes its founders as a mix of Chinese dissidents, journalists, mathematicians, and start-up company technologists from the United States, Taiwan, Europe, Australia, and South Africa. Julian Assange, an Australian Internet activist, is generally described as its director. The site was originally launched as a user-editable wiki, but has progressively moved towards a more traditional publication model and no longer accepts either user comments or edits. [1]
Wikileaks is an un-censorable version of Wikipedia for untraceable mass document leaking and analysis. It combines the protection and anonymity of cutting-edge cryptographic technologies with the transparency and simplicity of a wiki interface.
Wikileaks looks like Wikipedia. Anybody can post comments to it. No technical knowledge is required. Whistleblowers can post documents anonymously and untraceably. Users can publicly discuss documents and analyze their credibility and veracity. Users can discuss the latest material, read and write explanatory articles on leaks along with background material and context. The political relevance of documents and their veracity can be revealed by a cast of thousands.
Wikileaks incorporates advanced cryptographic technologies to ensure anonymity and un-traceability. Those who provide leaked information may face severe risks, whether of political repercussions, legal sanctions or physical violence. Accordingly, sophisticated cryptographic and postal techniques are used to minimize the risks that anonymous sources face.
For the technically minded, Wikileaks integrates technologies including modified versions of MediaWiki, OpenSSL, FreeNet, Tor, PGP and software of our own design.
Wikileaks information is distributed across many jurisdictions, organizations and individuals. Once a document is leaked it is essentially impossible to censor.

2.    Purpose of WikiLeaks

WikiLeaks states that its "primary interest is in exposing oppressive regimes in Asia, the former Soviet bloc, Sub-Saharan Africa and the Middle East, but we also expect to be of assistance to people of all regions who wish to reveal unethical behavior in their governments and corporations."
In January 2007, the website stated that it had over 1.2 million leaked documents that it was preparing to publish. An article in The New Yorker said:
One of the WikiLeaks activists owned a server that was being used as a node for the Tor network. Millions of secret transmissions passed through it. The activist noticed that hackers from China were using the network to gather foreign governments’ information, and began to record this traffic. Only a small fraction has ever been posted on WikiLeaks, but the initial tranche served as the site’s foundation, and Assange was able to say, "we have received over one million documents from thirteen countries."
Assange responded to the suggestion that eavesdropping on Chinese hackers played a crucial part in the early days of WikiLeaks by saying "the imputation is incorrect. The facts concern a 2006 investigation into Chinese espionage one of our contacts was involved in. Somewhere between none and handful of those documents were ever released on WikiLeaks. Non-government targets of the Chinese espionage, such as Tibetan associations were informed (by us)". The group has subsequently released a number of other significant documents which have become front-page news items, ranging from documentation of equipment expenditures and holdings in the Afghanistan war to corruption in Kenya.
The organisation's stated goal is to ensure that whistleblowers and journalists are not jailed for emailing sensitive or classified documents, as happened to Chinese journalist Shi Tao, who was sentenced to 10 years in 2005 after publicising an email from Chinese officials about the anniversary of the Tiananmen Square massacre.
In an interview on The Colbert Report, Assange explained about the limit to the freedom of speech, saying, "[it is] not an ultimate freedom, however free speech is what regulates government and regulates law. That is why in the US constitution the bill of rights says that congress is to make no such law abridging the freedom of the press. It is to take the rights of the press outside the rights of the law because those rights are superior to the law because in fact they create the law. Every constitution, every bit of legislation is derived from the flow of information. Similarly every government is elected as a result of people understanding things".
The project has drawn comparisons to Daniel Ellsberg's leaking of the Pentagon Papers in 1971. In the United States, the leaking of some documents may be legally protected. The U.S. Supreme Court has ruled that the Constitution guarantees anonymity, at least in the area of political discourse. Author and journalist Whitley Strieber has spoken about the benefits of the WikiLeaks project, noting that "Leaking a government document can mean jail, but jail sentences for this can be fairly short. However, there are many places where it means long incarceration or even death, such as China and parts of Africa and the Middle East."

3.   Couldn't Mass Leaking Of Documents Be Irresponsible?

  • Aren't some leaks deliberately false and misleading?
  • Couldn't leaking involve invasions of privacy?

Providing a forum for freely posting information involves the potential for abuse, but such exposure can be minimized. The simplest and most effective measure here is a worldwide community of informed users and editors who can scrutinize and discuss leaked documents.
On Wikipedia, posting of false material or other irresponsible posting or editing can be reversed by other users, and the results there have been extremely satisfying and reassuring. There is no reason to expect any different from Wikileaks. As discovered with Wikipedia, the collective wisdom of an informed community of users allows for rapid and accurate dissemination, verification and analysis.

Furthermore, as recent history shows, misleading leaks and misinformation already exist in the mainstream media, an obvious example being the lead-up to the Iraq war. Peddlers of misinformation will find themselves undone by Wikileaks, equipped as it is to scrutinize leaked documents in a way that no mainstream media outlet is capable of. A taste of what to expect is provided by this excellent unweaving of the British government's politically motivated additions to an intelligence dossier on Iraq. The dossier was cited by Colin Powell in his address to the United Nations the same month to justify the pending US invasion of Iraq.
Wikileaks' overarching goal is to provide a forum where embarrassing information can expose injustice. All our policies and practices will be formulated with this goal in mind.

4.   Does Wikileaks Support Corporate Whistleblowers?

It is increasingly obvious that corporate fraud must be effectively addressed. In the US, employees account for most revelations of fraud, followed by industry regulators, media, auditors and, finally, the SEC. Whistleblowers account for around half of all exposures of fraud.
Corporate corruption comes in many forms. The number of employees and turnover of some corporations exceeds the population and GDP of some nation states. When comparing countries, after observations of population size and GDP, it is usual to compare the system of government, the major power groupings and the civic freedoms available to their populations. Such comparisons can also be illuminating in the case of corporations.
Considering corporations as analogous to a nation state reveals the following properties:
  • The right to vote does not exist except for share holders (analogous to land owners) and even there voting power is in proportion to ownership.
  • All power issues from a central committee.
  • There is no balancing division of power. There is no fourth estate. There are no juries and innocence is not presumed.
  • Failure to submit to any order may result in instant exile.
  • There is no freedom of speech.
  • There is no right of association. Even love between men and women is forbidden without approval.
  • The economy is centrally planned.
  • There is pervasive surveillance of movement and electronic communication.
  • The society is heavily regulated, to the degree many employees are told when, where and how many times a day they can go to the toilet.
  • There is little transparency and freedom of information is unimaginable.
  • Internal opposition groups are blackbanned, surveilled and/or marginalized whenever and wherever possible.

While having a GDP and population comparable to Belgium, Denmark or New Zealand, most corporations have nothing like their quality of civic freedoms and protections. Internally, some mirror the most pernicious aspects of the 1960s Soviet system. This is even more striking when the regional civic laws the company operates under are weak (such as in West Papua or South Korea); there, the character of these corporate tyrannies is un-obscured by their surroundings.
Wikileaks endeavors to civilize corporations by exposing uncivil plans and behavior. Just like a country, a corrupt or unethical corporation is a menace to all inside and outside it.

5.   Leaks

2006–08
WikiLeaks posted its first document in December 2006, a decision to assassinate government officials signed by Sheikh Hassan Dahir Aweys." In August 2007, The Guardian published a story about corruption by the family of the former Kenyan leader Daniel arap Moi based on information provided via WikiLeaks. In November 2007, a March 2003 copy of Standard Operating Procedures for Camp Delta detailing the protocol of the U.S. Army at the Guantanamo Bay detention camp was released. The document revealed that some prisoners were off-limits to the International Committee of the Red Cross, something that the U.S. military had in the past repeatedly denied. In February 2008, WikiLeaks released allegations of illegal activities at the Cayman Islands branch of the Swiss Bank Julius Baer which led to the bank suing WikiLeaks and obtaining an injunction which temporarily shut down wikileaks.org. The site was instantly mirrored by supporters and later that month the judge overturned his previous decision citing First Amendment concerns and questions about legal jurisdiction. In March 2008, WikiLeaks published what they referred to as "the collected secret 'bibles' of Scientology," and three days later received letters threatening to sue them for breach of copyright. In September 2008, during the 2008 United States presidential election campaigns, the contents of a Yahoo account belonging to Sarah Palin (the running mate of Republican presidential nominee John McCain) were posted on WikiLeaks after being hacked into by members of Anonymous. In November 2008, the membership list of the far-right British National Party was posted to WikiLeaks, after briefly appearing on a blog. A year later, on October 2009, another list of BNP members was leaked.
2009
In January 2009, WikiLeaks released 86 telephone intercept recordings of Peruvian politicians and businessmen involved in the 2008 Peru oil scandal. In February, WikiLeaks released 6,780 Congressional Research Service reports followed in March, by a list of contributors to the Norm Coleman senatorial campaign and a set of documents belonging to Barclays Bank that had been ordered removed from the website of The Guardian. In July, they released a report relating to a serious nuclear accident that had occurred at the Iranian Natanz nuclear facility in 2009. Later media reports have suggested that the accident was related to the Stuxnet computer worm. In September, internal documents from Kaupthing Bank were leaked, from shortly before the collapse of Iceland's banking sector, which led to the 2008–2010 Icelandic financial crisis. The document shows that suspiciously large sums of money were loaned to various owners of the bank, and large debts written off. In October, Joint Services Protocol 440, a British document advising the security services on how to avoid documents being leaked was published by WikiLeaks. Later that month, they announced that a super-injunction was being used by the commodities company, Trafigura to gag The Guardian newspaper from reporting on a leaked internal document regarding a toxic dumping incident in the Ivory Coast. In November, they hosted copies of e-mail correspondence between climate scientists, although they were not originally leaked to WikiLeaks. They also released 570,000 intercepts of pager messages sent on the day of the 11 September attacks. During 2008 and 2009, WikiLeaks published the alleged lists of forbidden or illegal web addresses for Australia, Denmark and Thailand. These were originally created to prevent access to child pornography and terrorism, but the leaks revealed that other sites covering unrelated subjects were also listed.
2010
In March 2010, WikiLeaks released a secret 32-page U.S. Department of Defense Counterintelligence Analysis Report written in March 2008 discussing the leaking of material by WikiLeaks and how it could be deterred. In April, a classified video of the 12 July 2007 Baghdad airstrike was released, showing two Reuters employees being fired at, after the pilots mistakenly thought the men were carrying weapons, which were in fact cameras. In the week following the release, "wikileaks" was the search term with the most significant growth worldwide in the last seven days as measured by Google Insights. In January 2010, WikiLeaks received the first test cable A 22-year-old US Army intelligence analyst, PFC (formerly SPC) Bradley Manning, a US embassy cable relating about IceSave, thereafter referred as "Reykjavik 13"[citation needed]. In June 2010, he was arrested after alleged chat logs were turned in to the authorities by former hacker Adrian Lamo, in whom he had confided. Manning reportedly told Lamo he had leaked the "Collateral Murder" video, in addition to a video of the Granai airstrike and around 260,000 diplomatic cables, to WikiLeaks. In July, WikiLeaks released 92,000 documents related to the war in Afghanistan between 2004 and the end of 2009 to The Guardian, The New York Times and Der Spiegel. The documents detail individual incidents including friendly fire and civilian casualties. At the end of July, a 1.4 GB "insurance file" was added to the Afghan War Diary page, whose decryption details would be released if WikiLeaks or Assange were harmed. About 15,000 of the 92,000 documents have not yet been released on WikiLeaks, as the group is currently reviewing the documents to remove some of the sources of the information. WikiLeaks asked the Pentagon and human-rights groups to help remove names from the documents to reduce the potential harm caused by their release, but did not receive assistance. Following the Love Parade stampede in Duisburg, Germany on 24 July 2010, a local published internal documents of the city administration regarding the planning of Love Parade. The city government reacted by acquiring a court order on 16 August forcing the removal of the documents from the site on which it was hosted. On 20 August WikiLeaks released a publication titled Loveparade 2010 Duisburg planning documents, 2007–2010, which comprised 43 internal documents regarding the Love Parade 2010. Following on from the leak of information from the Afghan War, in October 2010, around 400,000 documents relating to the Iraq War were released in October. The BBC quoted The Pentagon referring to the Iraq War Logs as "the largest leak of classified documents in its history." Media coverage of the leaked documents focused on claims that the U.S. government had ignored reports of torture by the Iraqi authorities during the period after the 2003 war.


6.   Conclusion

Finally, one might argue that the Wikileaks controversy covers new ground or ground in which ALA might need new research and policy formulation:  that of an information environment in which the electronic public forum can become a battleground where the usual rules of public discourse don’t apply.  Hackers have extremely sophisticated means of enabling people to release information anonymously and also punishing companies or governments that try to suppress that information through such means as “denial of service” attacks.  In an era when government and private information from individuals and companies will be made public increasingly through unauthorized means, what should the role of libraries be toward making this information accessible to its users or denying users?  What should the policy be?

7.   References

[1] http://en.wikipedia.org/wiki/WikiLeaks
[2] http://mirror.wikileaks.info/
[3] http://mirror.wikileaks.info/
[4] http://www.fas.org/blog/secrecy/2007/01/wikileaks_and_untraceable_docu.html
[5] http://web.archive.org/web/20080504122032/http://wikileaks.org/wiki/Wikileaks:About#What_is_Wikileaks.3F_How_does_Wikileaks_operate.3F

No comments:

Post a Comment