Feeds

Wikileaks are for-hire mercenaries - Cryptome

Private enterprise not public interest

The Power of One eBook: Top reasons to choose HP BladeSystem

Wikileaks has always been a commercial enterprise hiding behind a narcissistic "public interest" PR, says Cryptome operator John Young in a scathing critique of the site.

Whistleblower site Cryptome began publishing documents in 1996, incurring the wrath of UK and US governments. The archive endures. Young was invited to be the "public face" of Wikileaks at the formation of the venture, but declined. Now Young believes Wikileaks is selling its secrets for commercial gain. Speaking to US talk radio, Young compared Julian Assange to Henry Kissinger, and other "spook insiders" who have turned their insider knowledge into a lucrative sideline.

"What has been released has been much less voluminous than the attention about them," said Young. "The goal is to exaggerate the importance of Wikileaks".

From the earliest discussions, Young alleges, Wikileaks intended to pimp out the information for funds.

"Well, it only came up in the topic of raising $5 million the first year. That was the first red flag that I heard about. I thought that they were actually a public interest group up until then, but as soon as I heard that, I know that they were a criminal organisation.

"Assange is a narcissistic individual," claims Young. "Wikileaks is willing to sacrifice Bradley Manning and anyone else to advance their own interests."

In a posting to the nettime mailing list, Young added:

"The free stuff is meant [to] lure volunteers and promote high-profile public service, lipsticked with risk, with the enterprise funded by selling costly material sold on the black market of worldwide spying in the tradition of public benefit ops, ID, spies and ever more spies. No better customers for illicit information that [sic] those with depthless pockets.

"Soros and the Kochs have their lesser-known Internet promoters backing Wikileaks generously. And they expect good return on their investment, not just the freebies used to attract attention."

Writing last month, Young shared his disgust at Wikileaks' similar tactics to advertising-supported or state-supported media - which Young claims cannot be trusted by definition.

"Wikileaks lies as much as the media, indeed, exactly in the advertising format of the media. Its consumers like it for that very reason. It rides the wave of imaginary disgust with MSM and governments, but it has not modified the formula of braggardy and drama essential to capture eyeballs and through eyeballs, minds and hearts."

But Young includes all advertiser-supported media in the camp of the discredited ... and himself.

"Think Archive.org, think Wikipedia, think Google, think this list and your crafty mangy boil-ridden carcass. Mea culpa," he adds. ®

Related Links

JY on WND (audio)
JY at Nettime

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.