- Drug-filled drone crash outside S.C. prison sends police on alert
- GOP to Obama: Take your ‘golf cap off’ and get down to coal country
- Hamas cleric tells Jews: ‘We will exterminate you’
- San Diego Costco, Target shoppers shocked by plane crash in parking lot
- George W. Bush penning biography of father
- Israel vows to destroy Hamas tunnels
- Spain evacuates staff from embassy in Libya
- Peace Corps evacuates over Ebola fears; 2 volunteers isolated
- House overwhelmingly approves $16 billion cash infusion for VA overhaul
- Obama admin to blame for HealthCare.gov woes, $840M cost: GAO
Stratfor’s hacked files not the first WikiLeaks has published
Question of the Day
WikiLeaks became famous for publishing secrets passed to it by outraged whistleblowers.
But the anti-secrecy website, which began publishing stolen emails from a private intelligence firm this week, got its start posting purloined documents from computer hackers, not leakers, according to its founder, Julian Assange, and security researchers.
In 2007, in a contribution to a restricted internal WikiLeaks email discussion list, Mr. Assange said the group began with a terabyte of information - the equivalent of all the books in a large university library - gleaned by hijacking and duplicating stolen data that Chinese and other hackers were moving around the Internet.
“Hackers monitor Chinese and other intel [agencies] as they burrow into their targets; when they pull [data], so do we,” he wrote to John Young, the publisher of Cryptome.org, a site that began publishing leaked intelligence documents more than 15 years ago.
Mr. Young later posted the email exchange online.
“Inexhaustible supply of material. Near 100,000 documents/emails a day … . We’re drowning,” wrote Mr. Assange.
He said the documents included material from “half a dozen foreign ministries, dozens of political parties and consulates.” He said some documents had been hacked from the World Bank, the United Nations and private trade groups.
“We don’t even know a tenth of what we have or who it belongs to,” Mr. Assange said.
Mr. Young told The Washington Times that he thinks the 2007 email referred to WikiLeaks’ surreptitious monitoring of the Tor network, an Internet system that allows users to move encrypted data anonymously.
“Material can be extracted from Tor,” said Mr. Young, “Anyone with the technical ability can do that.”
In several comments to the news media last year, Mr. Assange minimized the role that the Tor breach played in the origins of WikiLeaks
“Somewhere between none and [a] handful of those documents were ever released on WikiLeaks,” he told a British news site, the Register.
But Mr. Assange has never answered questions about another technique WikiLeaks allegedly used; namely, exploiting file-sharing programs. By downloading those programs, users get access to the collections of thousands of others.
But file-sharing programs, unbeknown to most users, also allow access to all the data on their hard drive.
In early 2009, the security firm Tiversa Inc. watched as computers in Sweden - where WikiLeaks servers are based - remotely searched hundreds of computers using file-sharing and downloaded selected documents.
© Copyright 2014 The Washington Times, LLC. Click here for reprint permission.
About the Author
TWT Video Picks
By Ted Cruz
Israel saves its enemies; Hamas endangers its friends
- Geraldo Rivera: Matt Drudge 'doing his best to stir up a civil war'
- Al Gore's climate-changers at EPA hearings foiled by cool temperatures
- Chicken pox outbreak puts illegal immigrant facility on lockdown
- EDITORIAL: The real Lois Lerner exposed in newly released emails
- NAPOLITANO: Is the president incompetent or lawless?
- House votes to sue President Obama over claims of presidential power
- 'Big Bang' star Mayim Bialik helps send bulletproof vests to IDF
- Lois Lerner hated conservatives, new emails show
- Star witness in Bob McDonnell corruption trial refutes 'crush' defense
- CRUZ: A tale of two hospitals: One in Israel, one in Gaza
Obama's biggest White House 'fails'
Celebrities turned politicians
Athletes turned actors
20 gadgets that changed the world