Feeds

Has Wikileaks run out of secrets?

Julian - this lot's rubbish

3 Big data security analytics techniques

Comment According to a story that's popular in Washington, after Bill Clinton held his first meeting with his intelligence chiefs as President, he pulled them aside. "Look, guys," he said. "There's really two things I want to know: Who killed the Kennedys? And have aliens landed?"

The story is told with a kind of "Look who's just rolled in from Arkansas" relish - but admit it, they're not a bad start, and if you were in Bubba's shoes, you might have wanted to ask these yourself.

Clinton's apparent curiosity contrasts with this pitiful selection of "secrets" divulged by Wikileaks, trumpeted so loudly you'd think the End Times were upon us.

Previously, I've compared Wikileaks to Kabuki theatre, in which everyone has a part to play. This latest drop, hyped for weeks, merely seems to confirm it. You can boo or hiss accordingly. Assange is saving the world, or destroying international relations. Get a grip, people.

We were never going to learn very much of substance from diplomatic cables, as diplomats are merely ornaments, the eunuchs in the room. If you want secrets that show something about power, you want to hear from the people who arrange the hit squads - not the people who arrange the cocktail parties.

We only have second-hand reports to go on, but apparently the world of diplomacy has been shaken to its foundations by revelations that … Gadaffi has a hot blonde nurse; a Labour politician is apparently lecherous; security around the Pakistan nuclear program is not very good; a member of the Royal family was rude on a foreign visit.

(This is standard operating procedure for Royals, by the way. As is diplomatic spookery.)

No wait, there's more. Kim Jong-il is "a flabby old chap". Well - would you have guessed any of this?

Not only is this material utterly trivial and inconsequential, but it looks as if it's already been heavily filleted. There really isn't anything to embarrass US-Russian relations, and revelations about Israel and Syria are conspicuous by their absence.

Cryptome operator John Young has a much better list, including:

  • Files on North Korea, Cuba, Venezuela, Iran and perhaps most significantly, Israel - its weaponry, war plans, assassination squads, foreign sources of funds, Mossad and its collaborators
  • Files on weapons of mass destruction, nuclear, biological, chemical, radiological. Top secret files of the IAEA on nuclear non-proliferation contributed and deceptively withheld by a bevy of nations, ie, the CIA's Valerie Plame and related front companies
  • Files of global WMD research laboratories and the status of reserve stocks of offensive and defensive weapons
  • War plans of all nations, for and against one another
  • Files of billionaire political meddlers
  • Files of the major world banks and their attorneys
  • Files of national tax agencies.

Now isn't that much more like it?

The longer that Wikileaks continues to pump out trivia, and governments issue their theatrical, orchestrated cries that the sky is falling, the longer we're left in the dark. Wikileaks and the establishment do now seem to depend on each other to quite an unhealthy degree.

Perhaps you've got a list, too. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
EU: Let's cost financial traders $400m a day, because EVIL BANKERS. Right?
Wait 'til this one hits your pension fund where it hurts
Systems meltdown plunges US immigration courts into pen-and-paper stone age
Massive outage could last four weeks, sources claim
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.