Feeds

Wikileaks are for-hire mercenaries - Cryptome

Private enterprise not public interest

The Essential Guide to IT Transformation

Wikileaks has always been a commercial enterprise hiding behind a narcissistic "public interest" PR, says Cryptome operator John Young in a scathing critique of the site.

Whistleblower site Cryptome began publishing documents in 1996, incurring the wrath of UK and US governments. The archive endures. Young was invited to be the "public face" of Wikileaks at the formation of the venture, but declined. Now Young believes Wikileaks is selling its secrets for commercial gain. Speaking to US talk radio, Young compared Julian Assange to Henry Kissinger, and other "spook insiders" who have turned their insider knowledge into a lucrative sideline.

"What has been released has been much less voluminous than the attention about them," said Young. "The goal is to exaggerate the importance of Wikileaks".

From the earliest discussions, Young alleges, Wikileaks intended to pimp out the information for funds.

"Well, it only came up in the topic of raising $5 million the first year. That was the first red flag that I heard about. I thought that they were actually a public interest group up until then, but as soon as I heard that, I know that they were a criminal organisation.

"Assange is a narcissistic individual," claims Young. "Wikileaks is willing to sacrifice Bradley Manning and anyone else to advance their own interests."

In a posting to the nettime mailing list, Young added:

"The free stuff is meant [to] lure volunteers and promote high-profile public service, lipsticked with risk, with the enterprise funded by selling costly material sold on the black market of worldwide spying in the tradition of public benefit ops, ID, spies and ever more spies. No better customers for illicit information that [sic] those with depthless pockets.

"Soros and the Kochs have their lesser-known Internet promoters backing Wikileaks generously. And they expect good return on their investment, not just the freebies used to attract attention."

Writing last month, Young shared his disgust at Wikileaks' similar tactics to advertising-supported or state-supported media - which Young claims cannot be trusted by definition.

"Wikileaks lies as much as the media, indeed, exactly in the advertising format of the media. Its consumers like it for that very reason. It rides the wave of imaginary disgust with MSM and governments, but it has not modified the formula of braggardy and drama essential to capture eyeballs and through eyeballs, minds and hearts."

But Young includes all advertiser-supported media in the camp of the discredited ... and himself.

"Think Archive.org, think Wikipedia, think Google, think this list and your crafty mangy boil-ridden carcass. Mea culpa," he adds. ®

Related Links

JY on WND (audio)
JY at Nettime

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.