Feeds

WikiLeaks ousted from Amazon US

Homeland Security Senator badmouths Assange

  • alert
  • submit to reddit

SANS - Survey on application security programs

Update: This story has been updated to show that contrary to some reports, Senator Lieberman's statement did not say that Amazon removed Wikileaks' mirrors in response to his inquiry.

WikiLeaks is no longer mirroring its trove of confidential US diplomatic cables on US-based servers run by Amazon.com, and according to US Senator Joe Lieberman, chairman of the Senate's Homeland Security and Governmental Affairs Committee, when his office phoned Amazon to inquire about the WikiLeaks mirrors, Amazon said it had removed them.

Amazon did not immediately respond to multiple requests for comment. But Wikileaks confirms that it did not remove the servers on its own. "WikiLeaks servers at Amazon ousted," reads a post to the Wikileaks Twitter account. "Free speech the land of the free--fine our $ are now spent to employ people in Europe."

As of Monday, according to Netcraft records, WikiLeaks was hosting its "cablegate" US department documents on the US-based portion of Amazon EC2 service. The whistle-blowing website did much the same thing with the classified Iraq War documents it revealed last month.

But on Wednesday, WikiLeaks mirrors disappeared from Amazon's service, according to Netcraft records. A DNS check now shows that WikiLeaks has reverted to servers run by the Swedish ISP Bahnhof, which has long hosted the site.

The cablegate site has been unavailable to many users, and this may have been related to its removal from Amazon.

According to a statement from Senator Joe Lieberman, his staff phoned Amazon to ask about the Wikileaks mirrors on AWS, and Amazon said it had taken them down. "This morning Amazon informed my staff that it has ceased to host the WikiLeaks website," Liberman said. "The company’s decision to cut off WikiLeaks now is the right decision and should set the standard for other companies WikiLeaks is using to distribute its illegally seized material."

WikiLeaks still uses a US-based domain name registrar (Dynadot) and a US-based DNS service (EveryDNS). ®

Bootnote

Another tip of the hat to Alex Norcliffe.

3 Big data security analytics techniques

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T dangles gigabit broadband plans over 100 US cities
So soon after a mulled Google Fiber expansion, fancy that
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
Turnbull gave NBN Co NO RULES to plan blackspot upgrades
NBN Co faces huge future Telstra bills and reduces fibre footprint
NBN Co plans fibre-to-the-basement blitz to beat cherry-pickers
Heading off at the pass operation given same priority as blackspot fixing
NBN Co in 'broadband kit we tested worked' STUNNER
Announcement of VDSL trial is not proof of concept for fibre-to-the-node
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.