Feeds

Wikileaks are for-hire mercenaries - Cryptome

Private enterprise not public interest

Protecting against web application threats using SSL

Wikileaks has always been a commercial enterprise hiding behind a narcissistic "public interest" PR, says Cryptome operator John Young in a scathing critique of the site.

Whistleblower site Cryptome began publishing documents in 1996, incurring the wrath of UK and US governments. The archive endures. Young was invited to be the "public face" of Wikileaks at the formation of the venture, but declined. Now Young believes Wikileaks is selling its secrets for commercial gain. Speaking to US talk radio, Young compared Julian Assange to Henry Kissinger, and other "spook insiders" who have turned their insider knowledge into a lucrative sideline.

"What has been released has been much less voluminous than the attention about them," said Young. "The goal is to exaggerate the importance of Wikileaks".

From the earliest discussions, Young alleges, Wikileaks intended to pimp out the information for funds.

"Well, it only came up in the topic of raising $5 million the first year. That was the first red flag that I heard about. I thought that they were actually a public interest group up until then, but as soon as I heard that, I know that they were a criminal organisation.

"Assange is a narcissistic individual," claims Young. "Wikileaks is willing to sacrifice Bradley Manning and anyone else to advance their own interests."

In a posting to the nettime mailing list, Young added:

"The free stuff is meant [to] lure volunteers and promote high-profile public service, lipsticked with risk, with the enterprise funded by selling costly material sold on the black market of worldwide spying in the tradition of public benefit ops, ID, spies and ever more spies. No better customers for illicit information that [sic] those with depthless pockets.

"Soros and the Kochs have their lesser-known Internet promoters backing Wikileaks generously. And they expect good return on their investment, not just the freebies used to attract attention."

Writing last month, Young shared his disgust at Wikileaks' similar tactics to advertising-supported or state-supported media - which Young claims cannot be trusted by definition.

"Wikileaks lies as much as the media, indeed, exactly in the advertising format of the media. Its consumers like it for that very reason. It rides the wave of imaginary disgust with MSM and governments, but it has not modified the formula of braggardy and drama essential to capture eyeballs and through eyeballs, minds and hearts."

But Young includes all advertiser-supported media in the camp of the discredited ... and himself.

"Think Archive.org, think Wikipedia, think Google, think this list and your crafty mangy boil-ridden carcass. Mea culpa," he adds. ®

Related Links

JY on WND (audio)
JY at Nettime

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.