Feeds

Wikileaks are for-hire mercenaries - Cryptome

Private enterprise not public interest

Website security in corporate America

Wikileaks has always been a commercial enterprise hiding behind a narcissistic "public interest" PR, says Cryptome operator John Young in a scathing critique of the site.

Whistleblower site Cryptome began publishing documents in 1996, incurring the wrath of UK and US governments. The archive endures. Young was invited to be the "public face" of Wikileaks at the formation of the venture, but declined. Now Young believes Wikileaks is selling its secrets for commercial gain. Speaking to US talk radio, Young compared Julian Assange to Henry Kissinger, and other "spook insiders" who have turned their insider knowledge into a lucrative sideline.

"What has been released has been much less voluminous than the attention about them," said Young. "The goal is to exaggerate the importance of Wikileaks".

From the earliest discussions, Young alleges, Wikileaks intended to pimp out the information for funds.

"Well, it only came up in the topic of raising $5 million the first year. That was the first red flag that I heard about. I thought that they were actually a public interest group up until then, but as soon as I heard that, I know that they were a criminal organisation.

"Assange is a narcissistic individual," claims Young. "Wikileaks is willing to sacrifice Bradley Manning and anyone else to advance their own interests."

In a posting to the nettime mailing list, Young added:

"The free stuff is meant [to] lure volunteers and promote high-profile public service, lipsticked with risk, with the enterprise funded by selling costly material sold on the black market of worldwide spying in the tradition of public benefit ops, ID, spies and ever more spies. No better customers for illicit information that [sic] those with depthless pockets.

"Soros and the Kochs have their lesser-known Internet promoters backing Wikileaks generously. And they expect good return on their investment, not just the freebies used to attract attention."

Writing last month, Young shared his disgust at Wikileaks' similar tactics to advertising-supported or state-supported media - which Young claims cannot be trusted by definition.

"Wikileaks lies as much as the media, indeed, exactly in the advertising format of the media. Its consumers like it for that very reason. It rides the wave of imaginary disgust with MSM and governments, but it has not modified the formula of braggardy and drama essential to capture eyeballs and through eyeballs, minds and hearts."

But Young includes all advertiser-supported media in the camp of the discredited ... and himself.

"Think Archive.org, think Wikipedia, think Google, think this list and your crafty mangy boil-ridden carcass. Mea culpa," he adds. ®

Related Links

JY on WND (audio)
JY at Nettime

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
More alleged private, nude celeb pics appear online
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Freenode IRC users told to change passwords after securo-breach
Miscreants probably got in, you guys know the drill by now
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
BitTorrent's peer-to-peer chat app Bleep goes live as public alpha
A good day for privacy as invisble.im also reveals its approach to untraceable chats
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.