You are here: Fairness.com > Resources > Wikileaks.org

Wikileaks.org


Self Description

Third-Party Descriptions

June 2013: 'The New York Times recently published an opinion piece that startled me, especially when I checked the byline. WikiLeaks founder Julian Assange, the fugitive in the Ecuadorean Embassy in London, focused on The New Digital Age, a book by top Google executives Eric Schmidt and Jared Cohen that to him exemplifies the melding of the technology corporation and the state.  It is, he claimed, a startlingly clear and provocative blueprint for technocratic imperialism, from two of our leading “witch doctors who construct a new idiom for United States global power in the twenty-first century.”  He added, “This idiom reflects the ever closer union between the State Department and Silicon Valley.”'

http://www.salon.com/2013/06/25/who_will_stop_google_partner/

March 2013: "You don’t have to think that WikiLeaks is the future of media, or Private Manning a paragon of heroic whistle-blowing, to understand the threat. Indeed, the two of us deeply disagree with each other about how to assess Private Manning’s conduct and WikiLeaks’s behavior."

http://www.nytimes.com/2013/03/14/opinion/the-impact-of-the-bradley-manning-case.html

July 2012: "When WikiLeaks made its first big media appearance by publishing tens of thousands of top-secret diplomatic cables in 2010, we argued the group headed by controversial front man Julian Assange was a media entity, albeit an unusual one. The broader implications of this status extend far beyond the question of whether we support the organization or its motives: As a blog post at the Electronic Frontier Foundation points out, threats aimed at WikiLeaks are by implication also threats to any other media outlet that dares to publish government information. And some members of Congress say they want to make this connection explicit by changing laws so that journalists can also be sanctioned."

http://gigaom.com/2012/07/24/first-they-came-for-wikileaks-then-the-new-york-times/

October 2011: "Many major media organizations have distanced themselves from WikiLeaks, which, they tell us, is reckless, and does not engage in real journalism. The announcement this week by WikiLeaks’s founder, Julian Assange, that it might close because companies like MasterCard and Visa will no longer process donations to the group, highlights the threat the group faces."

http://www.nytimes.com/2011/10/27/opinion/without-computer-security-sources-secrets-arent-safe-with-journalists.html

October 2011: "The U.S. government has obtained a controversial type of secret court order to force Google Inc. and small Internet provider Sonic.net Inc. to turn over information from the email accounts of WikiLeaks volunteer Jacob Appelbaum, according to documents reviewed by The Wall Street Journal."

http://online.wsj.com/article/SB10001424052970203476804576613284007315072.html

June 2011: "The Justice Department shows no sign of rethinking its campaign to punish unauthorized disclosures to the news media, with five criminal cases so far under President Obama, compared with three under all previous presidents combined. This week, a grand jury in Virginia heard testimony in a continuing investigation of WikiLeaks, the antisecrecy group, a rare effort to prosecute those who publish secrets, rather than those who leak them."

http://www.nytimes.com/2011/06/18/us/politics/18leak.html

January 2011: "THE news that federal prosecutors have demanded that the microblogging site Twitter provide the account details of people connected to the WikiLeaks case, including its founder, Julian Assange, isn’t noteworthy because the government’s request was unusual or intrusive. It is noteworthy because it became public."

http://www.nytimes.com/2011/01/10/business/media/10link.html

January 2011: 'Chicago — THE so-called Shield bill, which was recently introduced in both houses of Congress in response to the WikiLeaks disclosures, would amend the Espionage Act of 1917 to make it a crime for any person knowingly and willfully to disseminate, “in any manner prejudicial to the safety or interest of the United States,” any classified information “concerning the human intelligence activities of the United States.”'

http://www.nytimes.com/2011/01/04/opinion/04stone.html

December 2010: "A group of Internet activists took credit for crashing the Visa.com Web site on Wednesday afternoon, hours after they launched a similar attack on MasterCard. The cyber attacks, by activists who call themselves Anonymous, are aimed at punishing companies that have acted to stop the flow of donations to WikiLeaks in recent days."

http://thelede.blogs.nytimes.com/2010/12/08/operation-payback-attacks-visa

December 2010: "The developments came as several newspapers, including The New York Times, published confidential documents obtained by WikiLeaks and made available from a mass of some 250,000 diplomatic cables from the State Department, including communications concerning American policy toward Iran, Pakistan, North Korea, Russia and many other countries."

http://www.nytimes.com/2010/12/03/world/europe/03assange.html

December 2010: "Early this week, after hacker attacks on its site, Wikileaks moved its operation, including all those diplomatic cables, to the greener pastures of Amazon.com's cloud servers. But today, it was down again and mid-afternoon we found out the reason: Amazon had axed Wikileaks from its servers."

http://tpmmuckraker.talkingpointsmemo.com/2010/12/how_lieberman_got_amazon_to_drop_wikileaks.php

March 2008: "On Feb. 15, the judge, Jeffrey S. White of Federal District Court in San Francisco, ordered the American address of the site, Wikileaks.org, to be disabled at the request of Bank Julius Baer & Company, a Swiss banking company, and its Cayman Islands subsidiary. They charged that Wikileaks had posted confidential, personally identifiable account information on some of the bank’s customers."

http://www.nytimes.com/2008/03/01/us/01wiki.html

February 2008: 'The site, Wikileaks.org, invites people to post leaked materials with the goal of discouraging “unethical behavior” by corporations and governments. It has posted documents concerning the rules of engagement for American troops in Iraq, a military manual concerning the operation of prison at Guantánamo Bay, Cuba, and other evidence of what it has called corporate waste and wrongdoing.'

http://www.nytimes.com/2008/02/19/us/19cnd-wiki.html

January 2007: "Wikileaks.org is a Web-based way for people with damning, potentially helpful or just plain embarrassing government documents to make them public without leaving fingerprints. Modeled on the participatory, online encyclopedia Wikipedia, the site is expected to go live within the next two months."

http://www.washingtonpost.com/wp-dyn/content/article/2007/01/14/AR2007011400760.html

Relationships

RoleNameTypeLast Updated
Cooperation (past or present) Dynadot Organization Feb 20, 2008
Founded/Co-Founded by Julian Assange Person Dec 3, 2010
Founded/Co-Founded by James Chen Person Jan 15, 2007
Supported by (past or present) David House Person Sep 10, 2013
Cooperation (past or present) Bradley Manning Person Jun 2, 2011

Articles and Resources

21 Articles and Resources. Go to:  [Next 1]

Date Fairness.com Resource Read it at:
Sep 10, 2013 New details in how the feds take laptops at border

QUOTE: President Barack Obama and his predecessors have maintained that people crossing into U.S. territory aren't protected by the Fourth Amendment. That policy is intended to allow for intrusive searches that keep drugs, child pornography and other illegal imports out of the country. But it also means the government can target travelers for no reason other than political advocacy if it wants, and obtain electronic documents identifying fellow supporters.

Yahoo News
Jun 25, 2013 Who will stop Google? Snowden revealed what many of us already suspected: Google completely controls the web

QUOTE: What do the U.S. government and Silicon Valley already have in common? Above all, they want to remain opaque while making the rest of us entirely transparent through the capture of our data. What is arising is simply a new form of government, involving vast entities with the reach and power of government and little accountability to anyone. Google, the company with the motto “Don’t be evil,” is rapidly becoming an empire. Not an empire of territory, as was Rome or the Soviet Union, but an empire controlling our access to data and our data itself. Antitrust lawsuits proliferating around the company demonstrate its quest for monopoly control over information in the information age.

Salon
Mar 13, 2013 Death to Whistle-Blowers? (Op-Ed)

QUOTE: ...Private Manning still faces trial on the most serious charges, including the potential capital offense of “aiding the enemy” — though the prosecution is not seeking the death penalty in this case, “only” a life sentence. If successful, the prosecution will establish a chilling precedent: national security leaks may subject the leakers to a capital prosecution or at least life imprisonment. Anyone who holds freedom of the press dear should shudder at the threat that the prosecution’s theory presents to journalists, their sources and the public that relies on them.

New York Times
Jul 24, 2012 First they came for Wikileaks, then the New York Times

QUOTE: There are signs that the U.S. government wants to target mainstream journalists and media outlets for the same kind of investigation that WikiLeaks has been subjected to for publishing classified information, which makes it even more important to defend WikiLeaks’ status as a media entity.

GigaOM
Oct 26, 2011 When Secrets Aren’t Safe With Journalists (Op-Ed)

QUOTE: operational computer security is still not taught in most journalism schools, and poor data security practices remain widespread in news organizations....Until journalists take their security obligations seriously, it will be safer to leak something to WikiLeaks — or groups like it — than to the mainstream press.

New York Times
Oct 10, 2011 Secret Orders Target Email: WikiLeaks Backer's Information Sought

QUOTE: The court clashes in the WikiLeaks case provide a rare public window into the growing debate over a federal law that lets the government secretly obtain information from people's email and cellphones without a search warrant. Several court decisions have questioned whether the law, the Electronic Communications Privacy Act, violates the U.S. Constitution's Fourth Amendment protections against unreasonable searches and seizures.

Wall Street Journal, The (WSJ)
Jun 17, 2011 U.S. Pressing Its Crackdown Against Leaks

QUOTE: The Justice Department shows no sign of rethinking its campaign to punish unauthorized disclosures to the news media, with five criminal cases so far under President Obama, compared with three under all previous presidents combined....The string of cases reflects a broad belief across two administrations and in both parties in Congress that leaks have gotten out of hand, endangering intelligence agents and exposing American spying methods.

New York Times
May 02, 2011 Tugging at Threads to Unspool Stories of Torture

QUOTE: The Center for Victims of Torture… has treated 20,000 torture victims from around the world… Iraqis at the center have described being kidnapped, beaten, given electric shocks, raped and burned… The torturers… have included the Iraqi Army, American forces, Saddam Hussein’s henchmen, Al Qaeda in Iraq, and the sectarian groups.

New York Times
Apr 24, 2011 Judging Detainees’ Risk, Often With Flawed Evidence

QUOTE: The documents reveal that the analysts sometimes ignored serious flaws in the evidence… They include detainees’ admissions without acknowledging other government documents that show the statements were later withdrawn, often attributed to abusive treatment or torture.

New York Times
Apr 17, 2011 In Sometimes Deadly Clashes, Defiant Syrians Protest

QUOTE: Security officers responded with deadly force, witnesses reported, including live ammunition fired at a funeral and the seizure of critically wounded demonstrators from a hospital… Clashes between security forces and protesters left at least five dead and dozens injured on the holiday, meant to celebrate the removal of the last French troops from Syria in 1946.

New York Times
Mar 04, 2011 Hacked e-mails show Web is increasingly useful tool in dirty-tricks campaigns

QUOTE: But many experts say the shadowy political intelligence business has become larger and more sophisticated as corporations, trade groups and political parties increasingly turn to computer sleuths to monitor and, in some cases, harass their detractors. The work almost always goes undetected and has been made easier with the rise of computer networks and social media sites with relatively lax safeguards.

Washington Post
Jan 09, 2011 Twitter Shines a Spotlight on Secret F.B.I. Subpoenas

QUOTE: THE news that federal prosecutors have demanded that the microblogging site Twitter provide the account details of people connected to the WikiLeaks case, including its founder, Julian Assange, isn’t noteworthy because the government’s request was unusual or intrusive. It is noteworthy because it became public.... the government — in the course of conducting inquiries — has been able to look through much of the information without the knowledge of the people being investigated.

New York Times
Jan 09, 2011 1986 Privacy Law Is Outrun by the Web

QUOTE: Many Internet companies and consumer advocates say the main law governing communication privacy — enacted in 1986, before cellphone and e-mail use was widespread, and before social networking was even conceived — is outdated, affording more protection to letters in a file cabinet than e-mail on a server...a patchwork of confusing standards that have been interpreted inconsistently by the courts, creating uncertainty.

New York Times
Jan 03, 2011 A Clear Danger to Free Speech

QUOTE: THE so-called Shield bill, which was recently introduced in both houses of Congress in response to the WikiLeaks disclosures, would amend the Espionage Act of 1917 to make it a crime for any person knowingly and willfully to disseminate, “in any manner prejudicial to the safety or interest of the United States,” any classified information “concerning the human intelligence activities of the United States.” Although this proposed law may be constitutional as applied to government employees who unlawfully leak such material to people who are unauthorized to receive it, it would plainly violate the First Amendment to punish anyone who might publish or otherwise circulate the information after it has been leaked.

New York Times
Dec 08, 2010 ‘Operation Payback’ Attacks Fell Visa.com (The Lede)

QUOTE: A group of Internet activists took credit for crashing the Visa.com Web site on Wednesday afternoon, hours after they launched a similar attack on MasterCard. The cyber attacks, by activists who call themselves Anonymous, are aimed at punishing companies that have acted to stop the flow of donations to WikiLeaks in recent days. The group explained that its distributed denial of service attacks — in which they essentially flood Web sites site with traffic to slow them down or knock them offline — were part of a broader effort called Operation Payback, which began as a way of punishing companies that attempted to stop Internet file-sharing and movie downloads.

New York Times
Dec 02, 2010 Swedish Court Confirms Arrest Warrant for WikiLeaks Founder

QUOTE: Sweden’s highest court refused on Thursday to allow Julian Assange, the founder of the WikiLeaks whistle-blowing organization, to appeal a court order seeking his arrest to face questioning over alleged sex crimes...

New York Times
Dec 01, 2010 How Lieberman Got Amazon To Drop Wikileaks

QUOTE: [Amazon's] terms of acceptable use include a ban on illegal activities (it's not yet clear whether Wikileaks has broken any laws) and content "that may be harmful to our users, operations, or reputation." It also prohibits using Amazon's servers "to violate the security or integrity of any network, computer or communications system," although Wikileaks obviously obtained the cables long before hopping on Amazon's servers.

Talking Points Memo (TPM)
Aug 21, 2009 Worldwide battle rages for control of the internet

QUOTE: By reinforcing their efforts to monitor activity online, they [governments] hope to deprive dissenters of information and the ability to communicate.

New Scientist
Mar 01, 2008 Judge Reverses His Order Disabling Web Site

QUOTE: ...Judge White acknowledged that the bank’s request posed serious First Amendment questions and might constitute unjustified prior restraint...Critics of [the] previous order had said one problem was its breadth: It obstructed access to documents beyond those that the bank said contained confidential information.

New York Times
Feb 19, 2008 Web Site That Posts Leaked Material Ordered Shut

QUOTE: In a move that legal experts said could present a major test of First Amendment rights in the Internet era, a federal judge in San Francisco on Friday ordered the disabling of a Web site devoted to disclosing confidential information.

New York Times

21 Articles and Resources. Go to:  [Next 1]