Zlio.com

Wednesday, January 12, 2011

Getting in Who Wikileaks?

Internet networking scene last week when WikiLeaks launch video shooting of civilians by U.S. soldiers. The video was then known to occur in Baghdad, Iraq in 2007.
At that time, the Apache helicopter owned by the American troops were on their way to help colleagues who are involved in the firefight. It identifies civilian helicopter later identified as one Reuters reporter militants.

Suddenly the helicopter crew immediately launched indiscriminate attacks against civilians are. This attack resulted in seven civilians were killed.
Twenty-four hours after the 17:47 minute video duration was entered on YouTube, as many as 1.3 million people have seen it.
Before releasing the video shooting of civilians by U.S. soldiers, not many know about WikiLeaks. There are many msiteri about this site, including the person who manage it. Who is behind WikiLeaks is a big question?
WikiLeaks is a special site that posted the documents secret. This site does not accept contributions from any government funds, in order to manjaga integrity.
"Wikileaks is a nonprofit organization funded by human rights campaigners, investigative journalist, technology and the general public," said Wikileaks.

But who could manage it?

    The face of the most commonly seen is a man known as Julian Assange. This white-haired man is an Australian now living in East Africa.

"His parents ran a touring theater company. Assange claimed to have attended in 37 schools and 6 universities in Australia, "reported the Sydney Morning Herald newspaper, quoting an e-mail interview with Assange.

Assange Further details remain secret himself to the public, including his age. but from the search, Assange been found guilty of hacker attacks against U.S. intelligence and publishing a magazine that menginpirasikan person against the Commonwealth.

Anyone Assange or others behind WikiLeaks One thing is for sure, this site has provided confidential information that had been covered. Regardless of right or wrong way WikiLeaks obtain this information, but proved to information disseminated quickly become a conversation and be able to make a superpower the U.S. are like fire jengot. (Aolnews)

Technology Behind WikiLeaks

Recently the world digemparkan by leaked documents about the war the United States (U.S.) in Afghanistan. Secret dossiers published by the site that aims to accommodate the leaked document, Wikileaks.Sejak was founded in 2006, this is probably one of the largest spills ever handled by Wikileaks. Not only because it is very sensitive, but also the documents about to be published large amounts, consisting of 92 000 reports from January 2004 to December 2009.

Before the opening to the crowd two leading newspapers, the New York Times and The Guardian, and the German magazine Der Spiegel have access to first. The three media were then write a report based on documents leaked it. Wikileaks also has published a video about the war in Iraq before opening a document about the Afghan War.

Although much attention diberikanterhadap leaked documents relating to U.S. troops, Wikileaks is actually not only pay attention to Uncle Sam's country only. Documents about other countries can also be found on its Web site, including about Indonesia. Wikileaks documents on Indonesia ranges from U.S. Marines intelligence analysis, analysis of the problem Lumpur Sidoarjo / Lumpur Lapindo, Congressional Research Services analysis on various topics of Indonesia, among others, about the separatist movements and terrorism in Indonesia.

What is used?

Although the name and looks similar to the Wikipedia site, Wikileaks is actually very different from the free encyclopaedia website. For example in publication policy issues, Wikileaks is much more strict than Wikipedia that frees everyone to send and write articles.

Wikileaks acted as a journalist, and GoMBANc Nan Cengka Business Contributors Indonesiakontributor document is treated as a source. Swedish law, the state where the Wikileaks site is located, prohibits investigation of the sources of journalists. Also in Sweden when the reporter divulge the identity of the source, he can be prosecuted for having committed crimes.

In addition to legal protection Wikileaks also utilize technology to protect resources and personnel. It is interesting also to look at. In essence, Wikileaks utilize processes and information technology to ensure confidentiality and anonymity. At the time of delivery of documents, Wikileaks can utilize the resources there https / / sunshinepress.org.

Encrypted connection to the site, utilizing SSL technology (secure socket layer). SSL technology found in many Internet banking sites to secure the connection. SSL also allows users to check the identity of the site. This site provides a fingerprint (fingerprint) to confirm that the site is really Sunshinepress.org, not the other sites that greet.

In addition to the secure site with an encrypted connection WikiLeaks also provides networking sites using TOR (The Onion Router). TOR network allows users to hide your IP address (Internet Protocol) origin.

Although not always able to show the identity of users with certainty, LP address allows other people to perform further tracking. TOR network makes access to a site as if it originated from another computer's IP address, which acts as a node exit (exit node), while the access of its own origin can not be tracked. Use of the TOR network is to strengthen the document contributor anonymity.

Despite using a secure connection and anonymous, the identities of contributors to the document can still be traced through the information contained in the document itself. Katena was Wikileaks in the process to clean up the metadata. Metadata of a document to provide information about pengiri mnya.

Perhaps the best known metadata in the images, which provide information when the photos were taken and the camera model used. But there is also the metadata in other documents, such as Microsoft Word file. WikiLeaks shows how to how to clean a Microsoft Word file of metadata, by the standards of the NSA (National Security Agency), before it converted to PDF. Metadata cleaning instructions can be downloaded at http / / www.wikileaks.Org/w/images/7/75/NSA-redact.pdf

When the metadata cleanup process is deemed too complicated, Wikileaks will do its own personnel.

To communicate directly with personnel Wikileaks, the site also provides chat channels are also encrypted to prevent eavesdropping. Because they can not bugged, communication can be done safely. This chat channel can be opened via a browser at https / / chat. wikileaks.org /

Besides via the Internet, WikiLeaks also received packages in the mail. But because far more risky, this method is not recommended. Wikileaks for example, recommends that sent from places that are not monitored by video cameras.

Predictably, not everyone is happy about Wikileaks. According to the Wikileaks site, for example, since 2007 China has blocked this site so it can not be accessed from within the country. But the block to access Wikileaks files can be easily tricked by mirroring, or mirror sites that copy the contents of Wikileaks.

These mirror sites, too, who still provide access when Wikileaks was forced off due to run out of funds. Because modern technology allows the copying of digital files is easier for people to avoid blocking and censorship (bataviase)

No comments:

Post a Comment

Friends

Please donate your sincerity, for help because I was in school ^^

Search This Blog

Just Sharing...

Want to exchange Links? Copy / paste the following HTML code into your blog

Photobucket