Power of Story Send a Tweet        
- Advertisement -

Share on Google Plus Share on Twitter Share on Facebook 3 Share on LinkedIn Share on PInterest Share on Fark! Share on Reddit Share on StumbleUpon Tell A Friend 10 (13 Shares)  

Printer Friendly Page Save As Favorite View Favorites (# of views)   4 comments
General News

What Might Be Lurking in WikiLeaks' "Thermonuclear Device"?

By       Message Roger Shuler       (Page 1 of 2 pages)     Permalink

Related Topic(s): ; ; ; , Add Tags  Add to My Group(s)

News 2   Must Read 1   Well Said 1  
View Ratings | Rate It

opednews.com

Author 13717
- Advertisement -


Cross Posted at Legal Schnauzer

- Advertisement -

It appears increasingly likely that WikiLeaks founder Julian Assange will be extradited to Sweden and turned over to the United States for criminal charges of a dubious nature.

That brings heightened urgency to this question: What is contained in the "thermonuclear device" of government files that WikiLeaks has vowed to release if harm comes to the organization or its leader?

- Advertisement -

Little is known about the files that WikiLeaks possesses but has not released, so we can only make an educated guess. But a source tells Legal Schnauzer that the files could include information about Bush-era crimes, including political prosecutions, stolen elections, U.S. attorney firings, and more.

One hint came when Assange said in a recent interview that he has "insurance files" on Rupert Murdoch and his global media company, News Corporation. But we've seen signs that WikiLeaks' "big bomb" goes way beyond anything involving Rupert Murdoch.

The strongest insight we've seen came in a recent Time  magazine profile of Assange in its Person of the Year issue. WikiLeaks, it turns out, obtained sensitive information by piggybacking on the work of Chinese hackers. Time explains:

- Advertisement -

The worst--or best, in the view of advocates for radical transparency--could be yet to come. John Young, a New York City architect who left the WikiLeaks steering committee after clashing with Assange, says the group members are storing "a lot more information underground than they are publishing on the surface." Some of it comes from a hacker-on-hacker sting in 2006, when data jockeys at WikiLeaks detected what they believed to be a large-scale intelligence operation to steal data from computers around the world. The intruders were using TOR, an anonymous browsing technology invented by the U.S. Navy, to tunnel into their targets and extract information. The WikiLeaks team piggybacked on the operation, recording the data stream in real time as the intruders stole it.

Next Page  1  |  2

 

- Advertisement -

News 2   Must Read 1   Well Said 1  
View Ratings | Rate It

opednews.com

I live in Birmingham, Alabama, and work in higher education. I became interested in justice-related issues after experiencing gross judicial corruption in Alabama state courts. This corruption has a strong political component. The corrupt judges are (more...)
 

Share on Google Plus Submit to Twitter Add this Page to Facebook! Share on LinkedIn Pin It! Add this Page to Fark! Submit to Reddit Submit to Stumble Upon Share Author on Social Media   Go To Commenting

The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.

Writers Guidelines

Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
Related Topic(s): ; ; ; , Add Tags
- Advertisement -

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

Boy Scouts and the Horrors of Their "Perversion Files"

Bush vs. Obama on Spending: It's No Contest

Why Is Karl Rove Planning to Visit the Backwoods of Alabama?

What's the Real Story Behind Karl Rove's Divorce?

Is "Morning Joe" Scarborough a Murderer?

Rove Might Be Trying To "Pull A Siegelman" With Julian Assange