- Homepage: http://www.wikileaks.org/
June 2013: 'The New York Times recently published an opinion piece that startled me, especially when I checked the byline. WikiLeaks founder Julian Assange, the fugitive in the Ecuadorean Embassy in London, focused on The New Digital Age, a book by top Google executives Eric Schmidt and Jared Cohen that to him exemplifies the melding of the technology corporation and the state. It is, he claimed, a startlingly clear and provocative blueprint for technocratic imperialism, from two of our leading “witch doctors who construct a new idiom for United States global power in the twenty-first century.” He added, “This idiom reflects the ever closer union between the State Department and Silicon Valley.”'http://www.salon.com/2013/06/25/who_will_stop_google_partner/
March 2013: "You don’t have to think that WikiLeaks is the future of media, or Private Manning a paragon of heroic whistle-blowing, to understand the threat. Indeed, the two of us deeply disagree with each other about how to assess Private Manning’s conduct and WikiLeaks’s behavior."http://www.nytimes.com/2013/03/14/opinion/the-impact-of-the-bradley-manning-case.html
July 2012: "When WikiLeaks made its first big media appearance by publishing tens of thousands of top-secret diplomatic cables in 2010, we argued the group headed by controversial front man Julian Assange was a media entity, albeit an unusual one. The broader implications of this status extend far beyond the question of whether we support the organization or its motives: As a blog post at the Electronic Frontier Foundation points out, threats aimed at WikiLeaks are by implication also threats to any other media outlet that dares to publish government information. And some members of Congress say they want to make this connection explicit by changing laws so that journalists can also be sanctioned."http://gigaom.com/2012/07/24/first-they-came-for-wikileaks-then-the-new-york-times/
October 2011: "Many major media organizations have distanced themselves from WikiLeaks, which, they tell us, is reckless, and does not engage in real journalism. The announcement this week by WikiLeaks’s founder, Julian Assange, that it might close because companies like MasterCard and Visa will no longer process donations to the group, highlights the threat the group faces."http://www.nytimes.com/2011/10/27/opinion/without-computer-security-sources-secrets-arent-safe-with-journalists.html
October 2011: "The U.S. government has obtained a controversial type of secret court order to force Google Inc. and small Internet provider Sonic.net Inc. to turn over information from the email accounts of WikiLeaks volunteer Jacob Appelbaum, according to documents reviewed by The Wall Street Journal."http://online.wsj.com/article/SB10001424052970203476804576613284007315072.html
June 2011: "The Justice Department shows no sign of rethinking its campaign to punish unauthorized disclosures to the news media, with five criminal cases so far under President Obama, compared with three under all previous presidents combined. This week, a grand jury in Virginia heard testimony in a continuing investigation of WikiLeaks, the antisecrecy group, a rare effort to prosecute those who publish secrets, rather than those who leak them."http://www.nytimes.com/2011/06/18/us/politics/18leak.html
January 2011: "THE news that federal prosecutors have demanded that the microblogging site Twitter provide the account details of people connected to the WikiLeaks case, including its founder, Julian Assange, isn’t noteworthy because the government’s request was unusual or intrusive. It is noteworthy because it became public."http://www.nytimes.com/2011/01/10/business/media/10link.html
January 2011: 'Chicago — THE so-called Shield bill, which was recently introduced in both houses of Congress in response to the WikiLeaks disclosures, would amend the Espionage Act of 1917 to make it a crime for any person knowingly and willfully to disseminate, “in any manner prejudicial to the safety or interest of the United States,” any classified information “concerning the human intelligence activities of the United States.”'http://www.nytimes.com/2011/01/04/opinion/04stone.html
December 2010: "A group of Internet activists took credit for crashing the Visa.com Web site on Wednesday afternoon, hours after they launched a similar attack on MasterCard. The cyber attacks, by activists who call themselves Anonymous, are aimed at punishing companies that have acted to stop the flow of donations to WikiLeaks in recent days."http://thelede.blogs.nytimes.com/2010/12/08/operation-payback-attacks-visa
December 2010: "The developments came as several newspapers, including The New York Times, published confidential documents obtained by WikiLeaks and made available from a mass of some 250,000 diplomatic cables from the State Department, including communications concerning American policy toward Iran, Pakistan, North Korea, Russia and many other countries."http://www.nytimes.com/2010/12/03/world/europe/03assange.html
December 2010: "Early this week, after hacker attacks on its site, Wikileaks moved its operation, including all those diplomatic cables, to the greener pastures of Amazon.com's cloud servers. But today, it was down again and mid-afternoon we found out the reason: Amazon had axed Wikileaks from its servers."http://tpmmuckraker.talkingpointsmemo.com/2010/12/how_lieberman_got_amazon_to_drop_wikileaks.php
March 2008: "On Feb. 15, the judge, Jeffrey S. White of Federal District Court in San Francisco, ordered the American address of the site, Wikileaks.org, to be disabled at the request of Bank Julius Baer & Company, a Swiss banking company, and its Cayman Islands subsidiary. They charged that Wikileaks had posted confidential, personally identifiable account information on some of the bank’s customers."http://www.nytimes.com/2008/03/01/us/01wiki.html
February 2008: 'The site, Wikileaks.org, invites people to post leaked materials with the goal of discouraging “unethical behavior” by corporations and governments. It has posted documents concerning the rules of engagement for American troops in Iraq, a military manual concerning the operation of prison at Guantánamo Bay, Cuba, and other evidence of what it has called corporate waste and wrongdoing.'http://www.nytimes.com/2008/02/19/us/19cnd-wiki.html
January 2007: "Wikileaks.org is a Web-based way for people with damning, potentially helpful or just plain embarrassing government documents to make them public without leaving fingerprints. Modeled on the participatory, online encyclopedia Wikipedia, the site is expected to go live within the next two months."http://www.washingtonpost.com/wp-dyn/content/article/2007/01/14/AR2007011400760.html
Role Name Type Last Updated Cooperation (past or present) Dynadot Organization Feb 20, 2008 Founded/Co-Founded by Julian Assange Person Dec 3, 2010 Founded/Co-Founded by James Chen Person Jan 15, 2007 Supported by (past or present) David House Person Sep 10, 2013 Cooperation (past or present) Bradley Manning Person Jun 2, 2011
Articles and Resources
21 Articles and Resources. Go to: [Next 1]
Date Fairness.com Resource Read it at: Sep 10, 2013 New details in how the feds take laptops at border
QUOTE: President Barack Obama and his predecessors have maintained that people crossing into U.S. territory aren't protected by the Fourth Amendment. That policy is intended to allow for intrusive searches that keep drugs, child pornography and other illegal imports out of the country. But it also means the government can target travelers for no reason other than political advocacy if it wants, and obtain electronic documents identifying fellow supporters.
Yahoo News Jun 25, 2013 Who will stop Google? Snowden revealed what many of us already suspected: Google completely controls the web
QUOTE: What do the U.S. government and Silicon Valley already have in common? Above all, they want to remain opaque while making the rest of us entirely transparent through the capture of our data. What is arising is simply a new form of government, involving vast entities with the reach and power of government and little accountability to anyone. Google, the company with the motto “Don’t be evil,” is rapidly becoming an empire. Not an empire of territory, as was Rome or the Soviet Union, but an empire controlling our access to data and our data itself. Antitrust lawsuits proliferating around the company demonstrate its quest for monopoly control over information in the information age.
Salon Mar 13, 2013 Death to Whistle-Blowers? (Op-Ed)
QUOTE: ...Private Manning still faces trial on the most serious charges, including the potential capital offense of “aiding the enemy” — though the prosecution is not seeking the death penalty in this case, “only” a life sentence. If successful, the prosecution will establish a chilling precedent: national security leaks may subject the leakers to a capital prosecution or at least life imprisonment. Anyone who holds freedom of the press dear should shudder at the threat that the prosecution’s theory presents to journalists, their sources and the public that relies on them.
New York Times Jul 24, 2012 First they came for Wikileaks, then the New York Times
QUOTE: There are signs that the U.S. government wants to target mainstream journalists and media outlets for the same kind of investigation that WikiLeaks has been subjected to for publishing classified information, which makes it even more important to defend WikiLeaks’ status as a media entity.
GigaOM Oct 26, 2011 When Secrets Aren’t Safe With Journalists (Op-Ed)
QUOTE: operational computer security is still not taught in most journalism schools, and poor data security practices remain widespread in news organizations....Until journalists take their security obligations seriously, it will be safer to leak something to WikiLeaks — or groups like it — than to the mainstream press.
New York Times Oct 10, 2011 Secret Orders Target Email: WikiLeaks Backer's Information Sought
QUOTE: The court clashes in the WikiLeaks case provide a rare public window into the growing debate over a federal law that lets the government secretly obtain information from people's email and cellphones without a search warrant. Several court decisions have questioned whether the law, the Electronic Communications Privacy Act, violates the U.S. Constitution's Fourth Amendment protections against unreasonable searches and seizures.
Wall Street Journal, The (WSJ) Jun 17, 2011 U.S. Pressing Its Crackdown Against Leaks
QUOTE: The Justice Department shows no sign of rethinking its campaign to punish unauthorized disclosures to the news media, with five criminal cases so far under President Obama, compared with three under all previous presidents combined....The string of cases reflects a broad belief across two administrations and in both parties in Congress that leaks have gotten out of hand, endangering intelligence agents and exposing American spying methods.
New York Times May 02, 2011 Tugging at Threads to Unspool Stories of Torture
QUOTE: The Center for Victims of Torture… has treated 20,000 torture victims from around the world… Iraqis at the center have described being kidnapped, beaten, given electric shocks, raped and burned… The torturers… have included the Iraqi Army, American forces, Saddam Hussein’s henchmen, Al Qaeda in Iraq, and the sectarian groups.
New York Times Apr 24, 2011 Judging Detainees’ Risk, Often With Flawed Evidence
QUOTE: The documents reveal that the analysts sometimes ignored serious flaws in the evidence… They include detainees’ admissions without acknowledging other government documents that show the statements were later withdrawn, often attributed to abusive treatment or torture.
New York Times Apr 17, 2011 In Sometimes Deadly Clashes, Defiant Syrians Protest
QUOTE: Security officers responded with deadly force, witnesses reported, including live ammunition fired at a funeral and the seizure of critically wounded demonstrators from a hospital… Clashes between security forces and protesters left at least five dead and dozens injured on the holiday, meant to celebrate the removal of the last French troops from Syria in 1946.
New York Times Mar 04, 2011 Hacked e-mails show Web is increasingly useful tool in dirty-tricks campaigns
QUOTE: But many experts say the shadowy political intelligence business has become larger and more sophisticated as corporations, trade groups and political parties increasingly turn to computer sleuths to monitor and, in some cases, harass their detractors. The work almost always goes undetected and has been made easier with the rise of computer networks and social media sites with relatively lax safeguards.
Washington Post Jan 09, 2011 Twitter Shines a Spotlight on Secret F.B.I. Subpoenas
QUOTE: THE news that federal prosecutors have demanded that the microblogging site Twitter provide the account details of people connected to the WikiLeaks case, including its founder, Julian Assange, isn’t noteworthy because the government’s request was unusual or intrusive. It is noteworthy because it became public.... the government — in the course of conducting inquiries — has been able to look through much of the information without the knowledge of the people being investigated.
New York Times Jan 09, 2011 1986 Privacy Law Is Outrun by the Web
QUOTE: Many Internet companies and consumer advocates say the main law governing communication privacy — enacted in 1986, before cellphone and e-mail use was widespread, and before social networking was even conceived — is outdated, affording more protection to letters in a file cabinet than e-mail on a server...a patchwork of confusing standards that have been interpreted inconsistently by the courts, creating uncertainty.
New York Times Jan 03, 2011 A Clear Danger to Free Speech
QUOTE: THE so-called Shield bill, which was recently introduced in both houses of Congress in response to the WikiLeaks disclosures, would amend the Espionage Act of 1917 to make it a crime for any person knowingly and willfully to disseminate, “in any manner prejudicial to the safety or interest of the United States,” any classified information “concerning the human intelligence activities of the United States.” Although this proposed law may be constitutional as applied to government employees who unlawfully leak such material to people who are unauthorized to receive it, it would plainly violate the First Amendment to punish anyone who might publish or otherwise circulate the information after it has been leaked.
New York Times Dec 08, 2010 ‘Operation Payback’ Attacks Fell Visa.com (The Lede)
QUOTE: A group of Internet activists took credit for crashing the Visa.com Web site on Wednesday afternoon, hours after they launched a similar attack on MasterCard. The cyber attacks, by activists who call themselves Anonymous, are aimed at punishing companies that have acted to stop the flow of donations to WikiLeaks in recent days. The group explained that its distributed denial of service attacks — in which they essentially flood Web sites site with traffic to slow them down or knock them offline — were part of a broader effort called Operation Payback, which began as a way of punishing companies that attempted to stop Internet file-sharing and movie downloads.
New York Times Dec 02, 2010 Swedish Court Confirms Arrest Warrant for WikiLeaks Founder
QUOTE: Sweden’s highest court refused on Thursday to allow Julian Assange, the founder of the WikiLeaks whistle-blowing organization, to appeal a court order seeking his arrest to face questioning over alleged sex crimes...
New York Times Dec 01, 2010 How Lieberman Got Amazon To Drop Wikileaks
QUOTE: [Amazon's] terms of acceptable use include a ban on illegal activities (it's not yet clear whether Wikileaks has broken any laws) and content "that may be harmful to our users, operations, or reputation." It also prohibits using Amazon's servers "to violate the security or integrity of any network, computer or communications system," although Wikileaks obviously obtained the cables long before hopping on Amazon's servers.
Talking Points Memo (TPM) Aug 21, 2009 Worldwide battle rages for control of the internet
QUOTE: By reinforcing their efforts to monitor activity online, they [governments] hope to deprive dissenters of information and the ability to communicate.
New Scientist Mar 01, 2008 Judge Reverses His Order Disabling Web Site
QUOTE: ...Judge White acknowledged that the bank’s request posed serious First Amendment questions and might constitute unjustified prior restraint...Critics of [the] previous order had said one problem was its breadth: It obstructed access to documents beyond those that the bank said contained confidential information.
New York Times Feb 19, 2008 Web Site That Posts Leaked Material Ordered Shut
QUOTE: In a move that legal experts said could present a major test of First Amendment rights in the Internet era, a federal judge in San Francisco on Friday ordered the disabling of a Web site devoted to disclosing confidential information.
New York Times
21 Articles and Resources. Go to: [Next 1]
- Arts & Humanities
- Businesses & Organizations
- Computers & Information Technology
- Family & Friends & Interpersonal
- Government & Politics / History
- Health & Medicine
- Law & Justice
- Media & Journalism
- Personal Finance & Career
- Philosophy & Religion
- Recreation & Entertainment
- Science & Technology
- Social Sciences & Groups
- Arctic / Antarctic / Greenland
- Central America / Caribbean
- Eurasia / Central Asia
- Middle East
- North America
- Oceania / AustralAsia
- South America
- About Fairness.com
- Contact Us
- Conditions of Service
- Fair Use Notice
- Advisory Board
Not a current user? Sign up!