Send a Tweet
Most Popular Choices
Share on Facebook 3 Share on Twitter Printer Friendly Page More Sharing
General News    H2'ed 1/24/11

What Might Be Lurking in WikiLeaks' "Thermonuclear Device"?

By       (Page 1 of 2 pages)     (# of views)   4 comments
Author 13717
Message Roger Shuler
- Advertisement -


Cross Posted at Legal Schnauzer

It appears increasingly likely that WikiLeaks founder Julian Assange will be extradited to Sweden and turned over to the United States for criminal charges of a dubious nature.

- Advertisement -

That brings heightened urgency to this question: What is contained in the "thermonuclear device" of government files that WikiLeaks has vowed to release if harm comes to the organization or its leader?

Little is known about the files that WikiLeaks possesses but has not released, so we can only make an educated guess. But a source tells Legal Schnauzer that the files could include information about Bush-era crimes, including political prosecutions, stolen elections, U.S. attorney firings, and more.

One hint came when Assange said in a recent interview that he has "insurance files" on Rupert Murdoch and his global media company, News Corporation. But we've seen signs that WikiLeaks' "big bomb" goes way beyond anything involving Rupert Murdoch.

- Advertisement -

The strongest insight we've seen came in a recent Time  magazine profile of Assange in its Person of the Year issue. WikiLeaks, it turns out, obtained sensitive information by piggybacking on the work of Chinese hackers. Time explains:

The worst--or best, in the view of advocates for radical transparency--could be yet to come. John Young, a New York City architect who left the WikiLeaks steering committee after clashing with Assange, says the group members are storing "a lot more information underground than they are publishing on the surface." Some of it comes from a hacker-on-hacker sting in 2006, when data jockeys at WikiLeaks detected what they believed to be a large-scale intelligence operation to steal data from computers around the world. The intruders were using TOR, an anonymous browsing technology invented by the U.S. Navy, to tunnel into their targets and extract information. The WikiLeaks team piggybacked on the operation, recording the data stream in real time as the intruders stole it.

Next Page  1  |  2

 

- Advertisement -

News 2   Must Read 1   Well Said 1  
Rate It | View Ratings

Roger Shuler Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

I live in Birmingham, Alabama, and work in higher education. I became interested in justice-related issues after experiencing gross judicial corruption in Alabama state courts. This corruption has a strong political component. The corrupt judges are (more...)
 
Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Writers Guidelines
Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEdNews Newsletter
Name
Email
   (Opens new browser window)
 

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

Boy Scouts and the Horrors of Their "Perversion Files"

Bush vs. Obama on Spending: It's No Contest

Why Is Karl Rove Planning to Visit the Backwoods of Alabama?

What's the Real Story Behind Karl Rove's Divorce?

Is "Morning Joe" Scarborough a Murderer?

Rove Might Be Trying To "Pull A Siegelman" With Julian Assange