September 2007 Archives

There is an interesting example of Computer Assisted Reporting in the SQL database analysis (with source code) of:

US Military Equipment in Afghanistan (2007)/Appendix

published by

This looks to be an interesting and well researched analysis of the source data, which looks to be plausible.

However, there are at least some minor points which could be clarified or corrected, e.g. the comparison of the costs of the anti-Improvised Explosive Device equipment programme with that of the World War 2 atomic bombs - the figure from the Brookings Institute source cited is nearer to $23 billion (adjusted for inflation), which is not quite the same as the $13 billion cited by the article. The comparison between the two projects in terms of the proportion of the total economy or the number of top scientists employed , is also a bit misleading.

However, since is still pretending not to have launched in public yet, the authentication and analysis which is supposed to magically happen through "the wisdom of crowds" is being prevented, because the wiki front end is still deliberately locked, except to the favoured few.

This is not an open Wiki project.

The other aspects of this "leak" seems to be the Press Release which the people embargoed until 5am GMT on Monday 10th September 2007, but which the New York Sun, for one, seems to have ignored

It is entirely arguable that a website which claims to publish "leaks" , is in no moral or legal position to complain about the mainstream media jumping the gun on their artificial press release embargoes.

Suspiciously, if this was really an attempt at a media embargo, then the relevant pages should have been password protected for the favoured few journalists, rather than leaving them open to the public and to the Google search engine etc.

Either the political activists are being incredibly naive, or, more sinisterly, they are trying to generate short term publicity and hype, at the expense of long term trust, just like so many other political spin and public relations media manipulators, who insult the intelligence of the general public.

We still await any details about what or when the next public stages of this project are.

We still await even a high level security architecture to be published.- this is not an Open Source software project.

Until then, we cannot trust yet, which is a shame.

We are getting increasingly disenchanted with the project - not necessarily with the technical people behind it, but with the political activists , who seem to have already infiltrated the project with their own partisan political agenda.

Despite the claims of democracy and transparency and respect which can be found on the documentation, there is little evidence of this in last week's Kenyan corruption document hype affair.

When we raised a few points of concern via email, this is what we got back from the arrogant spin doctor

From: Wikileaks spokesperson
To: [email address]
Date: Sat, 01 Sep 2007

> On Fri, 31 Aug 2007
>Wikileaks spokesperson wrote:
>> Because Kenyan (and african more generally) internet speeds are so
>> incredibly slow, we need some people to
>> type up / wikify / OCR the KTM report to enable it's distribution
>> in Kenya.
> Why did you not do this *before* hyping up the publicity ?

Political timing.

Who exactly decided on this political timing ? The list of volunteers was not consulted.

It could be argued that even an absolutely genuine document which is leaked, can have vastly different impact, depending on the timing of the revelation.

This is why Freedom of Information Act request are often fought so hard by Western Government bureaucracies, and their political masters, even though the requested documents are revealed eventually after the legal appeals process, paid for by the taxpayers, who can neuter much of the political impact by causing lengthy delays.

Since the forthcoming Kenyan elections are not until November or December this year, it could be argued that the political timing of this document leak about the Moi clan corruption, actually plays in to the hands of the current Government, as it gives them time to rubbish the claims and to distract the electorate with other propaganda.

Would the political impact of the media hype about this particular document have been greater some time closer to the polling day ?

We could not ask such questions on the discussion pages of the wiki, because the Kenyan corruption document pages were locked until well after the document had been published.

> It took me half a dozen attempts to download the file, even >via a fast connection through a major ISP.


Presumably because the servers were overloaded by all the media requests generated by the press release hype - there were no problems with the ISP connection to other websites in Germany.

> > Would it really have been so difficult to have simply split the > document into 4 separate .pdf files, say the Table of >Contents and the Executive summary, in part 1, then pages 9 >to 40 and pages 41 to 75 and pages 75 to 110 each as >separate .pdf files ?

It is being wikified as we speak and we have it down to 1mb. Are you volunteering to assist?

No !

Remember this was not a "WikiLeak" by an anonymous third world whistleblower, this document was published by the core team of political activists.

They could easily have called on their list of volunteers for help before the publication date.

> Has nobody at heard of ZIP compression ? >Even though, in this case the saving in file size is only about 3 >per cent, surely it should be a semi-automatic part of the > publication process to provide compressed >versions of documents ?

Possibly. Are you volunteering to write the code?

Why should anyone have to re-invent the wheel ? There are lots of existing file splitting and file compression programs, several of them are probably already installed by default on the servers.

Integrating them securely into the system, without introducing remotely exploitable vulnerabilities, may take some work, but nobody is in a position to help to do that, since have not bothered to even publish a high level systems architecture design, or a security architecture, let alone any Open Source source code or APIs.

They seem to be acting exactly like a big Government IT project and relying on security through obscurity, without any of a Government's trustworthiness, even if that is quite low in the opinion of many people.

This is a serious credibility problem for the project.

>> On Aug 31, 2007, at 6:34 PM, Julian A. wrote: >> >>> Wikileaks news release >>> Embargoed until 5:00 AM GMT, Friday, August 31, 2007 >>> >>> The missing Kenyan billions > > [...] > >>> NOTE: Wikileaks has not yet publicly "launched". > > How can you have an *embargoed Press release* and claim > NOT to have launched publicly ???

Done all the time for many developing projects. Known != launched

No ! That is not the way to establish a reputation for trustworthiness,

That is the tactic of fraudsters and confidence tricksters and failed Government and Corporate IT project disaster spin doctors.

> Worryingly, there is also no warning in the Press Release, >that journalists or activists should ensure that they double >check the names and addresses and contact details which the >alleged Kroll report, which was not intended for publication, >contains, Probably most of them are accurate, or at least they >were back in 2004.
> However like all external consultancy reports, it pitches that >further research work is required, partly for commercial >reasons, and partly, because there is obviously much more >investigative work and checking which could be done.

Sure, but we're not the nanny state.

This spin doctor seems to have contempt for the users of the system, and for any collateral damage which may be done to innocent third parties.

Just the sort of attitude taken by fascists, communists and other fanatics who worship "the end justifies the means" politics

That particular kind of moralizing is not our role.

Giving some basic warnings and caveats about an as yet unverified and unanalysed document, should definitely be part of the documentation.

Solidarité, WL

If the attitudes displayed in this email persist, then we will have to move from trying to keep an open mind about, to active opposition to the scheme. should publish a project roadmap of the stages which they intend to go through before they launch fully. On past performance, it seems unlikely that they will stick to their promised project milestones, but at least it would make it clear to their volunteers and the interested media and public, just at what stage the project is currently at. It could also highlight any "new ideas" and modifications which get added to the specification e.g. there now seems to be vague mention of some sort of undefined "reputation system", which is being given as an excuse for not yet allowing the full editing functionality of the wiki.

If this comment here on this blog earlier on Friday , apparently posted via an IP address in France, is genuinely from someone who is a spokesman for the project ,

please put a prominent link to as there is a lot of press using the non-plural mistakenly

Posted by: Wikileaks | | August 31, 2007 06:44 PM

then we are must remind them that they have not yet earned our trust, and that blog does not yet fully endorse the project

We must point out that there were at least 10 URL links to visible on the front page when this comment was posted.

This website does not attempt to pass itself off as the genuine website, as should be clear from our capitalisation to distinguish between the two.

If anybody is confused, then that is not our fault.

We would like to know who the idiots amateurs were who chose the name "wikileaks", for a global internet project, and did not bother to register all of the shorter, easier to spell versions of the name and all of the appropriate common top level domain name extensions.

We could simply be Man-in-the-Middle snooping on people erroneously connecting via this website to, and collecting their details in our webserver logfiles and possibly also snarfing people's log in editing credentials, however, we do not intend to do that.

We are hopefully providing a little feedback and constructive criticism of the project and some discussion on the wider issues about whistleblowing which remain, whether achieves its stated aims or not.

What exactly are the people in control of up to ?

Their "anonymous uncensorable whistleblower" allegedly "easy to use" website project has been quiet recently, after showing a Wiki front end, and hinting at some still secret secure backend infrastructure, which is, ironically, meant to be based on Open Source software.

We were expecting that the next stage of development might be, for example, the copying of a section of the public Wikpedia content, to demonstrate some secure, anonymous Editing and Discussion tools. should allow and encourage users to anonymously register as page editors and to use tools like Tor The Onion Router, which is specifically and controversially blocked by Wikipedia.

We look forward to seeing what the solution is to Wiki edit wars and spam.

We cannot yet trust a system for which, rather like the UK Government's control freak national centralised biometric database and ID Card system, there is still no published detailed security architecture, let alone any Open Source computer source code. have successfully generated a lot of hype and interest from the world's media regarding their leak of an alleged Kroll Associates report circa 2004 into the corruption of the then Kenyan government ruling clan and its hangers on: article:
The looting of Kenya under President Moi

which links to

KTM report.pdf - intermediate download page with information about file size etc. N.B. this naming convention is confusing - there is no "dot" between "KTM" and "report.pdf"

This then links to the actual 3.7 Megabyte Adobe .pdf format file (110 pages)

All well and good, and the document itself, looks plausible.

Even if you are not that specifically interested in Kenyan politics, it seems to provides a list of banks, lawyers and financial front men etc. who may be involved with other corrupt governments e.g. Zimbabwe

However, this document was not presented as another stage in the testing of the prototype anonymous, uncensorable back end infrastructure. Instead it was hyped out to the world's media via an embargoed Press Release, the classic technique of the old symbiotic and parasitic relationship between the Mainstream Media and Anonymous Government Sources i.e. it looks just like some successful Public Relations Media Spin.

About this blog

This blog here at (no "S") discusses the ethical and technical issues raised by the project, which is trying to be a resource for whistleblower leaks, by providing "untraceable mass document leaking and analysis".

These are bold and controversial aims and claims, with both pros and cons, especially for something which crosses international boundaries and legal jurisdictions.

This blog is not part of the project, and there really are no copies of leaked documents or files being mirrored here.

Email Contact

Please feel free to email us your views about this website or news about the issues it tries to comment on:

email: blog@WikiLeak[dot]org

Before you send an email to this address, remember that this blog is independent of the project.

If you have confidential information that you want to share with us, please make use of our PGP public encryption key or an email account based overseas e.g. Hushmail

Now that the project is defunct, so far as new whistleblower are concerned, what are the alternatives ?

The wiki page lists links and anonymity analyses of some of the many post-wikileaks projects.

There are also links to better funded "official" whistlblowing crime or national security reporting tip off websites or mainstream media websites. These should, in theory, be even better at protecting the anonymity and security of their informants, than wikileaks, but that is not always so.

New whistleblower website operators or new potential whistleblowers should carefully evaluate the best techniques (or common mistakes) from around the world and make their personal risk assessments accordingly.

Hints and Tips for Whistleblowers and Political Dissidents

The Submissions web page provides some methods for sending them leaked documents, with varying degrees of anonymity and security. Anybody planning to do this for real, should also read some of the other guides and advice to political activists and dissidents:

Please take the appropriate precautions if you are planning to blow the whistle on shadowy and powerful people in Government or commerce, and their dubious policies. The mainstream media and bloggers also need to take simple precautions to help preserve the anonymity of their sources e.g. see Spy Blog's Hints and Tips for Whistleblowers - or use this easier to remember link:

BlogSafer - wiki with multilingual guides to anonymous blogging

Digital Security & Privacy for Human Rights Defenders manual, by Irish NGO Frontline Defenders.

Everyone’s Guide to By-Passing Internet Censorship for Citizens Worldwide (.pdf - 31 pages), by the Citizenlab at the University of Toronto.

Handbook for Bloggers and Cyber-Dissidents - March 2008 version - (2.2 Mb - 80 pages .pdf) by Reporters Without Borders

Reporters Guide to Covering the Beijing Olympics by Human Rights Watch.

A Practical Security Handbook for Activists and Campaigns (v 2.6) (.doc - 62 pages), by experienced UK direct action political activists

Anonymous Blogging with Wordpress & Tor - useful step by step guide with software configuration screenshots by Ethan Zuckerman at Global Voices Advocacy. (updated March 10th 2009 with the latest Tor / Vidalia bundle details)

WikiLeakS Links

The Frequently Asked Questions (FAQ) page.

WikiLeakS Twitter feeds

The website does not stay online all of the time, especially when there is a surge of traffic caused by mainstream media coverage of a particularly newsworthy leak.

Recently, they have been using their new Twitter feeds, to selectively publicise leaked documents to the media, and also to report on the status of routing or traffic congestion problems affecting the main website in Stockholm, Sweden.

N.B.the words "security" or "anonymity" and "Twitter" are mutually exclusive: Twitter feed via SSL encrypted session: unencrypted Twitter feed

Internet Censorship

OpenNet Initiative - researches and measures the extent of actual state level censorship of the internet. Features a blocked web URL checker and censorship map.

Temporary Autonomous Zone

Temporary Autonomous Zones (TAZ) by Hakim Bey (Peter Lambourn Wilson)

Cyberpunk author William Gibson

Campaign Button Links

Watching Them, Watching Us, UK Public CCTV Surveillance Regulation Campaign
UK Public CCTV Surveillance Regulation Campaign

NO2ID Campaign - cross party opposition to the NuLabour Compulsory Biometric ID Card
NO2ID Campaign - cross party opposition to the NuLabour Compulsory Biometric ID Card and National Identity Register centralised database.

Gary McKinnon is facing extradition to the USA under the controversial Extradition Act 2003, without any prima facie evidence or charges brought against him in a UK court. Try him here in the UK, under UK law.
Gary McKinnon is facing extradition to the USA under the controversial Extradition Act 2003, without any prima facie evidence or charges brought against him in a UK court. Try him here in the UK, under UK law.

FreeFarid_150.jpg - Kafkaesque extradition of Farid Hilali under the European Arrest Warrant to Spain

Peaceful resistance to the curtailment of our rights to Free Assembly and Free Speech in the SOCPA Designated Area around Parliament Square and beyond

Parliament Protest blog - resistance to the Designated Area restricting peaceful demonstrations or lobbying in the vicinity of Parliament.

Petition to the European Commission and European Parliament against their vague Data Retention plans
Data Retention is No Solution Petition to the European Commission and European Parliament against their vague Data Retention plans.

Save Parliament: Legislative and Regulatory Reform Bill (and other issues)
Save Parliament - Legislative and Regulatory Reform Bill (and other issues)

Open Rights Group

The Big Opt Out Campaign - opt out of having your NHS Care Record medical records and personal details stored insecurely on a massive national centralised database.

Tor - the onion routing network
Tor - the onion routing network - "Tor aims to defend against traffic analysis, a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security. Communications are bounced around a distributed network of servers called onion routers, protecting you from websites that build profiles of your interests, local eavesdroppers that read your data or learn what sites you visit, and even the onion routers themselves."

Tor - the onion routing network
Anonymous Blogging with Wordpress and Tor - useful Guide published by Global Voices Advocacy with step by step software configuration screenshots (updated March 10th 2009).

Amnesty International's campaign

BlogSafer - wiki with multilingual guides to anonymous blogging

NGO in a box - Security Edition privacy and security software tools

Home Office Watch blog, "a single repository of all the shambolic errors and mistakes made by the British Home Office compiled from Parliamentary Questions, news reports, and tip-offs by the Liberal Democrat Home Affairs team."

Reporters Without Borders - Reporters Sans Frontières - campaign for journalists 'and bloggers' freedom in repressive countries and war zones.

Committee to Protect Bloggers - "devoted to the protection of bloggers worldwide with a focus on highlighting the plight of bloggers threatened and imprisoned by their government."

wikileaks_logo_low.jpg - the controversial "uncensorable, anonymous whistleblowing" website based currently in Sweden.

Syndicate this site (XML):

Recent Comments

  • James Hyams: I'm writing a thesis on Public Trust in WikiLeaks, the read more
  • rich kaplan: Hello Wikeleaks vrew. In Turkey , the islamist goverment just read more
  • wikileak: Cryptome have a few more extracts from this book read more
  • wikileak: have now launched their website with some details of read more
  • wikileak: Bahnhof Internet seem to be hosting two Wikileaks servers in read more
  • wikileak: Clay Shirky has posted a rough transcript of Daniel Domscheit-Berg's read more
  • wikileak: @ N - you can still see the "1.2 million read more
  • N: @wikileak - Exactly, these cables are _from_ the United States, read more
  • wikileak: is now displaying this meassage: Coming soon! While we read more

November 2018

Sun Mon Tue Wed Thu Fri Sat
        1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30