WikiLeaks site comes under attack

SHARE:

The WikiLeaks website crashed Tuesday in an apparent cyberattack after the accelerated publication of tens of thousands of once-secret State Department cables by the anti-secrecy organization raised new concerns about the exposure of confidential U.S. embassy sources.
"WikiLeaks.org is presently under attack," the group said on Twitter late Tuesday. One hour later, the site and the cables posted there were inaccessible.
WikiLeaks updated its Twitter account to say that it was "still under a cyberattack" and directed followers to search for cables on a mirror site or a separate search system, cablegatesearch.net.
The apparent cyberattack comes after current and former American officials said the recently released cables — and concerns over the protection of sources — are creating a fresh source of diplomatic setbacks and embarrassment for the Obama administration. It was not immediately clear who was behind the attack.
The Associated Press reviewed more than 2,000 of the cables recently released by WikiLeaks. They contained the identities of more than 90 sources who had sought protection and whose names the cable authors had asked to protect.
Officials said the disclosure in the past week of more than 125,000 sensitive documents by WikiLeaks, far more than it had earlier published, further endangered informants and jeopardized U.S. foreign policy goals. The officials would not comment on the authenticity of the leaked documents but said the rate and method of the new releases, including about 50,000 in one day alone, presented new complications.
"The United States strongly condemns any illegal disclosure of classified information," State Department spokeswoman Victoria Nuland said. "In addition to damaging our diplomatic efforts, it puts individuals' security at risk, threatens our national security and undermines our effort to work with countries to solve shared problems. We remain concerned about these illegal disclosures and about concerns and risks to individuals.
"We continue to carefully monitor what becomes public and to take steps to mitigate the damage to national security and to assist those who may be harmed by these illegal disclosures to the extent that we can," she told reporters.
Neither Nuland nor other current officials would comment on specific information contained in the compromised documents or speculate as to whether any harm caused by the new releases would exceed that caused by the first series of leaks, which began in November and sent the administration into a damage-control frenzy.
WikiLeaks fired back at the criticism even as its website came under cyberattack.
"Dear governments, if you don't want your filth exposed, then stop acting like pigs. Simple," the group posted on Twitter.
Some officials noted that the first releases had been vetted by media organizations who scrubbed them to remove the names of contacts that could be endangered. The latest documents have not been vetted in the same way.
"It's picking at an existing wound. There is the potential for further injury," said P.J. Crowley, the former assistant secretary of state for public affairs who resigned this year after criticizing the military's treatment of the man suspected of leaking the cables to WikiLeaks. "It does have the potential to create further risk for those individuals who have talked to U.S. diplomats. It has the potential to hurt our diplomatic efforts and it once again puts careers at risk."
Crowley set up a crisis management team at the State Department to deal with the matter and said officials at the time went through the entire collection of documents they believed had been leaked and warned as many named sources as possible, particularly in authoritarian countries, that their identities could be revealed. A handful of them were relocated, but Crowley said others may have been missed and some could not be contacted because the effort would have increased the potential for exposure.
The new releases "could be used to intimidate activists in some of these autocratic countries," he said. He said he believed that "any autocratic security service worth its salt" probably already would have the complete unredacted archive of cables but added that the new WikiLeaks releases meant that any intelligence agency that did not "will have it in short order."
WikiLeaks insisted it was "totally false" that any WikiLeaks sources have been exposed and appeared to suggest the group itself was not even responsible for releasing unredacted cables.
The group seemed to taunt U.S. officials and detractors in yet another Twitter message late Tuesday, asking what they will do "when it is revealed which mainstream news organization disclosed all 251k unredacted cables."
The AP review included all cables classified as "confidential" or "secret," among the more than 50,000 recently released by WikiLeaks. In them, the AP found the names of at least 94 sources whose identities the cable authors asked higher-ups to "protect" or "strictly protect." Several thousand other of the recently published cables were not classified and did not appear to put sources in jeopardy.
The accelerated flood of publishing partly reflects the collapse of the unusual relationships between WikiLeaks and news organizations that previously were cooperating with it in exchange for being given copies of all the uncensored State Department messages.
Initially, WikiLeaks released only a trickle of documents at a time from a trove of a quarter-million, and only after considering advice from five news organizations with which it chose to share all of the material. The news organizations advised WikiLeaks on which documents to release publicly and what redactions to make to those documents. The Associated Press was not among those news organizations.
In recent months, those relationships have soured noticeably. WikiLeaks complained Tuesday that a reporter who wrote about the group's efforts for The New York Times, one of the news organizations it was working with closely, was a "sleazy hack job." It also said a reporter for Guardian in Britain, another of its former partners in the release of documents, had exhibited a "tawdry vendetta" against WikiLeaks.

COMMENTS

Name

4G,1,A/B Testing,2,Aerospace Engineering,2,AFP Consortium,1,Agile,2,AI,5,amazon,4,Amazon india coupons,3,AMD,1,Analytics,2,android,28,android phones,2,Anonymous,3,Antivirus,1,app,24,App Development,6,apple,32,apps,5,Artificial Intelligence,8,Assurance,1,asus,1,Audi,2,auto,7,automation,2,automation software,11,automotive technology,11,banking,1,Big data,2,bitcoin,3,BlackBerry,5,blockchain,4,blogging,1,BMW,1,branding,1,brands,2,browser,2,Business,18,Business Analytics,2,Business Intelligence,1,Business lesson,18,Business models,6,business strategy,24,Business Strategy Model,16,Business Success Story,7,business techniques,24,cameraphone,5,car,15,car technology,11,CES,1,chromebook,3,Cloud computing,6,cloud Technology,5,CMS,1,coding,1,companies,3,Consortium,1,consulting,1,content marketing,9,corporate,1,coupons,3,CRM,2,CRM Software,3,cryptocurrency,2,Customer experience,8,Customer Service,7,customer support,4,cyber crime,5,cyber security,27,data,3,data recovery,1,deals,1,Dell Streak,1,development,9,devices,2,DevOps,1,digital currency,1,digital marketing,23,Digital Transformation,2,disk,1,e commerce,1,eBay,1,ebook,1,ecommerce,8,Electric Cars,11,electronics sale,2,elon musk,2,email,1,energy,1,enterprise,11,Enterprise Security,2,enterprise technology,9,entrepreneur,3,entrepreneurship,7,ERP,2,facebook,24,file conversion,1,financial tech,1,fintech,1,firefox,2,firefox os,2,Flipkart,2,Front-end Development,3,future business,10,future technology,34,gadget,33,gamail,1,games,6,Games.,1,google,20,google cars,1,google glass,3,Google I/O,1,Google+,8,goole ranking,1,Graphics Card,1,Green energy,1,hackers,18,hacking,14,hardware,5,Healthcare,1,HealthTech,1,Home Automation,1,Hosting,3,How To Guides,22,How Tos,17,icloud,3,IDE,1,Infographic,2,Information Technology,19,infosec,14,innovation,52,internet,8,Internet Explorer,1,Internet of Things,8,Inventory Management,1,ios,18,IoT,10,ipad,8,iPhone,14,iPhone 8,1,IT certification,1,IT Operation,1,IT Service,2,IT services management,3,ITSM,2,iWatch,1,Jabong,1,JavaScript,4,JS,1,Kubernetes,1,laptop,3,LinkedIn,2,local business,1,Lotus Notes,3,MacBook,3,mackbook air,2,Magento,1,Managed IT Services,3,Mark Zuckerberg,4,Mercedes,1,messenger,1,microsoft,6,mobile app development,28,mobile apps,30,mobile broadband,1,mobile enterprise,15,mobile recharge,2,mobility,18,mobility management,11,Motorola Xoom,1,Myntra,1,network,4,nokia,1,NSA,2,Nvidia,1,Objective-C,1,Omnichannel,1,OnePlus Smartphones,1,online course,1,online education,2,online recharge,1,online shopping,4,open source,1,opreating system,5,Outlook,2,P2P,1,page ranking,1,patent,1,Payment,1,PayTM,1,pc software,1,photoshop,1,playstation,1,Porsche,1,process management,4,Procure,1,programming,4,programming language,5,Python,1,Quality,2,Redbus,1,remote control,1,renewable energy,3,review,10,SAAS,4,sales,2,Sales Funnel,2,samsung,7,scrum,1,search engine,4,Search Engine Optimization,2,security,15,Self Driving Cars,11,SEO,9,smartphone,14,SmartTech,1,SME,1,sms,1,Snapdeal,2,social media,12,social network,11,software,14,Software as a service (SaaS),5,software development,17,software methodology,8,Software Outsourcing,2,software review,4,Solar,1,Solar energy,1,Solar power,1,startup,10,steve jobs,3,storage,1,strategy,1,Supercars,1,sustainability,1,Swift,1,tablet,9,team management,3,tech,4,tech conference,1,Tech event,2,Ted talk,1,Tesla,2,Tesla Motors,3,The Internet Of Things,2,timeline,1,toolbar,1,tools,2,torrent,1,touchscreen,2,trdx,1,tutorial,2,twitter,3,udacity,1,udemy,1,ultrabook,1,USB,1,video,2,video editor,2,virtual phone,1,Virtual Reality,4,Volvo,2,VPN,3,VR,2,Wearable gadget,2,Wearable Tech,2,Web 4.0,3,Web Development,9,web technology,12,Wi-Fi,1,wikileaks,2,windows,7,windows 10,1,Windows 8,8,Windows 8 Preview,1,Wordpress,3,workplace,2,X Mountain Lion,2,xcode,1,xp,1,
ltr
item
TechFond - Latest Technology | Analysis | Enterprise | Startups | Product Reviews | How Tos: WikiLeaks site comes under attack
WikiLeaks site comes under attack
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKtKAhRPkjsKZc3F2G7SufL34R-2vdEySZERffSfuYL3Lfe-JtlhdptknLRkqG92cto1EQ5N35mI_Gj3UpjTcWdIOazo5JU8ZC9JfInzM3tMsT_5VwDEloOzMr4eN4rLzwjGUwhZoreZ4/s400/wikileaks.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKtKAhRPkjsKZc3F2G7SufL34R-2vdEySZERffSfuYL3Lfe-JtlhdptknLRkqG92cto1EQ5N35mI_Gj3UpjTcWdIOazo5JU8ZC9JfInzM3tMsT_5VwDEloOzMr4eN4rLzwjGUwhZoreZ4/s72-c/wikileaks.jpg
TechFond - Latest Technology | Analysis | Enterprise | Startups | Product Reviews | How Tos
https://www.techfond.in/2011/08/wikileaks-site-comes-under-attack.html
https://www.techfond.in/
https://www.techfond.in/
https://www.techfond.in/2011/08/wikileaks-site-comes-under-attack.html
true
6925568668654321940
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy