Skip to main content

Home/ CNDLS Design Seminar/ Group items tagged Anonymous

Rss Feed Group items tagged

Tyler Sax

WikiLeaks - About - 2 views

shared by Tyler Sax on 16 Mar 11 - No Cached
  • Our goal is to bring important news and information to the public. We provide an innovative, secure and anonymous way for sources to leak information to our journalists (our electronic drop box).
    • Jaclyn Udell
       
      Do WikiLeaks have a bias/ulterior motive in leaking this information? How can we be certain that the electronic drop box is anonymous and ensures the safety of those submitting the information?
    • Jaclyn Udell
       
      I heard an interview on NPR one time and the people were talking about how authors should reveal their bias in their publications. Since WikiLeaks keeps submitters anonymous how do they expose the bias in their publications?
    • Tom Zorc
       
      While there is a bias in promoting certain data or info over others... a tool commonly used across many media sources, it seems to me that Wikileaks has been determined to release everything credible that comes across their desks, no matter what. (Correct me if I'm wrong.) Not much bias there. Bias on the side of the submitters though, I don't think that's Wikileak's responsibility to uncover... nor a possibility?
  • One of our most important activities is to publish original source material alongside our news stories so readers and historians alike can see evidence of the truth.
    • Jaclyn Udell
       
      Who in the company WikiLeaks is responsible for the repercussions of the information that is exposed? In America we have the right to express ourselves through words, but how does this impose upon other social norms in places where freedom of speech is limited?
    • Tyler Sax
       
      The question about responsibility is a great one. Obviously Julian Assange is taking a lot of heat right now, but he can't be the only one... wikileaks is an organization of paople all around the globe, most of whom work anonymously. 
    • Tom Zorc
       
      Does the responsibility of the repercussions of the content not lie with its creator? The issue of secrecy is interesting here - their communications obviously would have been very different if they *knew* it would be public information. So is secrecy a necessary part of the institution of government? Would the US political engine be designed differently if Wikileaks were a factor from day one? How might it be affected from here on out?
Randall Bass

Anonymous and attacks on 'anti-wikileaks' sites - 4 views

Ian--I like these questions. That is, even if you understand what denial of service attack is, it still raises the question of how does one launch one, how easy is it to do so, etc.?

Anonymous

Shida Zhang

BBC News - Anonymous leaks Bank of America e-mails - 2 views

  • In late 2010, Wikileaks founder Julian Assange said he planned to release documents in early 2011, which could bring down a well known bank.
  • Previously, he had claimed to be in possession of a hard drive containing internal documents from a senior Bank of America official. The Wikileaks release has yet to appear, and it is unclear if those files are the same ones obtained by Anonymous. One of the documents appears to show an employee of Bilboa Insurance asking a colleague to delete certain loan identifying numbers from their computer system.
  • the e-mails form the first part of a series of planned leaks that will prove Bank of America engaged in improper mortgage foreclosure practices.
  • ...2 more annotations...
  • Subsequently, sites mirroring the content have sprung up and the documents have also been released through peer-to-peer networks.
  • Anonymous members have engaged in a campaign of action against websites and companies that assisted the United States government in its attempt to isolate Wikileaks.
Ihsaan Patel

WikiLeaks Scandal Spurs Hackers vs. Lobbyist Fight - US News and World Report - 0 views

  • . The companies did so, which prompted a group of hackers to hit back. The group, which goes by the moniker "Anonymous," launched a series of cyber attacks against those three companies and others, in what the hackers dubbed "Operation Payback."
    • Ihsaan Patel
       
      What exactly is the relationship between Anonymous and Wikileaks? Will the relationship between them benefit or hurt wikileaks because Anonymous's activities seem to be explicitly illegal and so Wikileaks could be forced to face even more punishment.
  • Barr's braggadocio didn't sit well with the hacker collective, who then apparently broke into HBGary Federal's computer system and stole tens of thousands of E-mails and posted them on the Internet, hijacked Barr's Twitter account, posted his supposed home address and social security number, and defaced HBGary Federal's website.
    • Ihsaan Patel
       
      The fact that the group broke into the security system of a firm that specializes in cyber security makes me wonder if any information on the internet can truly be kept "safe"
Shida Zhang

BBC News - Anonymous hacktivists say Wikileaks war to continue - 1 views

    • Shida Zhang
       
      Note: they are trying to create hundreds of mirror sites for Wikileaks.
  • Paul Mutton at the security firm Netcraft, who is monitoring the attacks, said Visa is considered a more difficult target and the attack on it required a much larger number of "hacktivists" - politically motivated hackers - 2,000 compared with 400 for Mastercard.
  • Anonymous, which claimed to have carried out the attack, is a loose-knit group of hacktivists, with links to the notorious message board 4chan.
  • ...6 more annotations...
  • PayPal, which has stopped processing donations to Wikileaks, has also been targeted.
  • Security experts said the sites had been targeted by a so-called distributed denial-of-service attack (DDoS), which swamp a site with so many page requests that it becomes overwhelmed and drops offline.
  • "We feel that Wikileaks has become more than just about leaking of documents, it has become a war ground, the people vs. the government," he said.
  • "The idea is not to wipe them off but to give the companies a wake-up call," he said. "Companies will notice the increase in traffic and an increase in traffic means increase in costs associated with running a website."
  • DDoS attacks are illegal in many countries, including the UK.
  • Anonymous is also helping to create hundreds of mirror sites for Wikileaks, after its US domain name provider withdrew its services.
Tyler Sax

WikiLeaks - Submissions - 0 views

    • Randall Bass
       
      The Wikileaks postings are meant to be the beginning of a chain of reference. 
  • That is why we have created our novel method of submission based on a suite of security technologies designed to provide anonymity. We have put a great deal of technical and design work into the drop box because we take the journalist-source relationship very seriously.
    • Randall Bass
       
      What is the security architecture of Wikileaks? What makes the drop box secure? (RBass)
  • ...4 more annotations...
  • Communication is secured with SSL encryption.
  • 3.3 High risk postal submissions
  • This is because our journalists write news stories based on the material, and then provide a link to the supporting documentation to prove our stories are true. It’s not news if it has been publicly available elsewhere first, and we are a news organisation.
  • we do not solicit it
    • Tyler Sax
       
      This assertion was certainly challenged when it came to the most recent US government document leaks. Some speculated that Assange (or someone on his "team") helped the US soldier gain access to the documents
Tyler Sax

Blogs | The Tor Blog - 1 views

    • Hadley Stein
       
      This is kind of confusing. Why is it that this more technological discussion on the internet is uncommon. If it is important that we understand these concepts to understand technology, privacy etc., why isn't it always accessible? Do those you understand these concepts purposely make it inaccessible to those who do not?
  • The question he didn't even know to ask is, "What are safe and secure computing and online practices?"
  • how to think about adversaries online, what is ssl, what it means, what are phishing, viruses, botnets, and state-sponsored malware. By the end of the 4th hour, he understood how tor is different than a simple vpn or proxy server, and when to use tor and when it isn't needed. 3.5h of that discussion was basic operational, computer, and online security and safe practices.
  • ...13 more annotations...
    • Hadley Stein
       
      Is it a problem when even people who you would except (or at least hope) understand how the internet works do not? This really highlights the lack of education surrounding th internet.
  • Look at the infrastructures of google, facebook, yahoo, and microsoft to see the challenges that lie ahead for these tools.
    • Hadley Stein
       
      I had never really thought about the infrastructure, specifically the money, required to develop the internet.
  • who uses and how they use it matters
  • What one should or should not do is policy and law, what one can actually do or not do is technology.
    • Tyler Sax
       
      Good quote
  • technology exists to circumvent internet censorship
  • what a proxy is
  • technology exists to circumvent internet censorship
  • Technology is agnostic, who uses and how they use it matters.
  • Circumvention, anonymity, and privacy tools used in a free world can be a minor annoyance,
  • i.e. wikileaks used wikis, ssl, email, and yes, tor, but in the end, it's an annoyance. We don't have people in the streets rioting trying to overthrow our govt. Wikipedia uses the same technology in wikis, ssl, and email. Everyone loves Wikipedia and considers it a net positive.
  • 1 billion people are online in some way
  • In the 1930s, the feds and police warned of mass chaos if the interstate highway system was built in the US. The ability for criminals to quickly transit between cities was of grave concern.
    • Tyler Sax
       
      I like this analogy about internet security
  •  
    What is the line between moral and immoral? Who determines what is moral or "net positive"?
Shida Zhang

Hacker group releases BofA employee correspondence | Reuters - 1 views

  • Consumer groups have accused major U.S. lenders of foreclosing on many homes without having proper documentation in place.
  • The group's email release also includes correspondence between Anonymous and the former employee, in which the former employee described the bank as a "cult" and said the company is now intent on destroying his career.
  • They saw to that when they showed everyone my picture and labelled me as a terrorist."
Tyler Sax

WikiLeaks Was Launched With Documents Intercepted From Tor | Threat Level | Wired.com - 0 views

  • WikiLeaks, the controversial whistleblowing site that exposes secrets of governments and corporations, bootstrapped itself with a cache of documents obtained through an internet eavesdropping operation by one of its activists, according to a new profile of the organization’s founder. The activist siphoned more than a million documents as they traveled across the internet through Tor, also known as “The Onion Router,” a sophisticated privacy tool that lets users navigate and send documents through the internet anonymously.
    • Tyler Sax
       
      This is an interesting note about something that isn't taled about very often -- where did Wikileaks come from in the first place?
  • The siphoned documents, supposedly stolen by Chinese hackers or spies who were using the Tor network to transmit the data, were the basis for WikiLeaks founder Julian Assange’s assertion in 2006 that his organization had already “received over one million documents from 13 countries” before his site was launched, according to the article in The New Yorker.
  •  
    (This article seems to have been debunked by another I bookmarked)
  •  
    (This article seems to have been debunked by another I bookmarked)
Tom Zorc

WikiLeaks and Tor: Moral use of an amoral system? | Invisible Inkling - 0 views

  • Reading the New Yorker’s piece on WikiLeaks, it’s hard to decide whether I’m reading about freedom fighters, skilled propagandists, or as is often the case, both.
  • The Tor Project blog responds, pointing out that Tor doesn't magically encrypt text, it simply allows for the anonymous transfer of files. So if you use unsecure connections and send data in plain text, it's just as safe as writing down the information on a piece of paper, folding it into an airplane, and throwing it across the street.
1 - 10 of 10
Showing 20 items per page