{"id":179,"date":"2008-03-02T21:39:46","date_gmt":"2008-03-03T05:39:46","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2008\/03\/02\/current-event-wikileaks-a-source-of-private-and-leaked-information\/"},"modified":"2008-03-02T21:39:46","modified_gmt":"2008-03-03T05:39:46","slug":"current-event-wikileaks-a-source-of-private-and-leaked-information","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2008\/03\/02\/current-event-wikileaks-a-source-of-private-and-leaked-information\/","title":{"rendered":"Current Event: Wikileaks &#8212; a source of private and leaked information"},"content":{"rendered":"<p>On Februrary 19, 2008, the Wikileaks domain name was shut down as a result of a lawsuit filed by a group of Swiss bankers.  Wikileaks is a website where people can confidentially and anonymously post sensitive, often leaked, information.  <!--more-->The Swiss bankers, representing Bank Julius Baer &amp; Co., claimed that Wikileaks &#8220;had displayed confidential, personally identifiable account information of its customers, as a result of possibly criminal actions by a former employee.&#8221;  Wikileaks is hosted by Dynadot in San Mateo, California, and California judges &#8220;pulled the plug&#8221; on the Wikileaks domain in response to the lawsuits.  On February 29th, Wikileaks was given its domain name back, due largely to several free speech groups (Public Citizen, the California First Amendment Coalition, the American Civil Liberties Union, the Project on Government Oversight, and the Electronic Frontier Foundation) who provided legal support for Wikileaks.  Wikileaks is currently up and running on its primary domain name &lt;http:\/\/wikileaks.org\/&gt;.<\/p>\n<p>Information on Wikileaks includes <a href=\"http:\/\/wikileaks.org\/wiki\/Camp_Delta_Standard_Operating_Procedure\">an operations manual from the Guantanamo detentions camp<\/a> and <a href=\"http:\/\/wikileaks.org\/wiki\/The_looting_of_Kenya_under_President_Moi\">President Moi&#8217;s looting of Kenya<\/a>.  As a means of circumventing several country&#8217;s firewalls (such as the great Firewall of China), several <a href=\"http:\/\/wikileaks.cx\/wiki\/Wikileaks:Cover_Names\">Wikileaks covernames<\/a> are provided, and Wikileaks also provides an encrypted <a href=\"https:\/\/secure.wikileaks.org\/\">https:\/\/secure.wikileaks.org\/<\/a> to ensure the confidentiality of its submitters.<\/p>\n<p>More links:<\/p>\n<p><a href=\"http:\/\/en.wikipedia.org\/wiki\/Wikileaks\">Wikipedia entry for Wikileaks<\/a><\/p>\n<p><a href=\"http:\/\/www.news.com\/8301-13578_3-9874167-38.html\">Wikileaks Loses Domain Name<\/a><\/p>\n<p><a href=\"http:\/\/www.news.com\/8301-13578_3-9883240-38.html?tag=newsmap\">Wikileaks Gets its Domain Name Back <\/a><\/p>\n<p><a href=\"http:\/\/bits.blogs.nytimes.com\/2008\/03\/01\/wikileaks-ruling-leaves-big-questions-unanswered\/?hp\">Wikileaks Rulings Leave Big Questions Unanswered<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On Februrary 19, 2008, the Wikileaks domain name was shut down as a result of a lawsuit filed by a group of Swiss bankers. Wikileaks is a website where people can confidentially and anonymously post sensitive, often leaked, information.<\/p>\n","protected":false},"author":48,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-179","post","type-post","status-publish","format-standard","hentry","category-current-events"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/48"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=179"}],"version-history":[{"count":0,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/179\/revisions"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}