The founding of Wikileaks in 2006 is followed by coverage of several key events: its 2009–2010 leaks about the Icelandic financial collapse, Swiss banking tax evasion, Kenyan government corruption,toxic-waste dumping,Chelsea(formerly Bradley)Manning's
communications with Adrian Lamo, uploads to Wikileaks of the Iraq and Afghanistan war documents, diplomatic cables, and video, exposure to the FBI by Lamo, and the accusations of sexual assault made against Assange.
Chelsea Manning is a United States Army soldier who was convicted in July 2013 of violations of the Espionage Act and other offenses, after releasing the largest set of classified documents ever leaked to the public.
If Manning had not leaked it then world would not have known the truth behind the USA combats in Iraq.
This video is the real face off of USA - Iraq Invasion .
Two reporters carrying cameras were mistaken as weapons. A van with kids was showered with piercing bullets from the sky.The flesh being torn by bullets flying at innocent residents of Iraq. It's illegal engagement and people were required to take note of all this. Govt was misusing it's power.
In what is called the "researcher's introduction", Assange begins with a cryptic quote from Oscar Wilde: "Man is least himself when he talks in his own person. Give him a mask, and he will tell you the truth."
Nothing about Assange has ever been straightforward. One of the main characters in Underground is the Melbourne hacker Mendax. Although there is no way readers at that time could have known it, Mendax is Julian Assange.
IN the late 1980s, Assange joined the underground subculture of hacking that was forming in Melbourne. By October 1989 an attack was mounted from Australia on America's NASA computer system via the introduction of what was called the WANK worm, in an attempt to sabotage the Jupiter launch of the Galileo rocket as part of an action of anti-nuclear activists.
In an article he later published in the left-wing magazine CounterPunch, Assange would claim the WANK worm attack was "the origin of hacktivism".
Mendax formed a closed group with two other hackers - Trax and Prime Suspect. They called themselves the International Subversives. Mendax wrote a program called Sycophant. It allowed the International Subversives to conduct "massive attacks on the US military". The list of the computers they could recall finding their way into "read like a who's who of the American military-industrial complex".
Eventually Mendax penetrated the computer system of the Canadian telecommunications corporation Nortel. It was here that his hacking was first discovered. The Australian Federal Police conducted a long investigation into the International Subversives, Operation Weather.
Eventually Trax lost his nerve and began to talk. He told the police that the International Subversives had been hacking on a scale never achieved before.
In October 1991 the AFP raided Prime Suspect's and Mendax's homes. They found Assange in a state of near mental collapse. His young wife had recently left him, taking their son Daniel. Assange told Dreyfus that he had been dreaming incessantly of "police raids . . . of shadows in the pre-dawn darkness, of a gun-toting police squad bursting through his back door at 5am". When the police arrived, the incriminating disks, which he usually hid inside a beehive, were scattered beside his computer.
Assange descended into a personal hell. He entered a psychiatric ward briefly. He told Dreyfus that 1992 was "the worst year in his life". His case was not finally settled until December 1996.
Although Assange had been speaking in secretive tones about the technical possibility of a massive prison sentence, in the end he received a $5000 good behaviour bond and a $2100 reparations fine.
The experience of arrest and trial nonetheless scarred his soul and helped shape his politics.
The WANK Worm was a computer worm that attacked DEC VMS computers in 1989 over the DECnet. It was written in DIGITAL Command Language.
The worm is believed to have been created by Melbourne-based hackers, the first to be created by an Australian or Australians. The federal police of Melbourne thought the worm was created by two hackers who used the names Electron and Phoenix.
The worm coincidentally appeared on a DECnet computer network shared between NASA and the US Department of Energy days before the launch of a NASA space shuttle carrying the Galileo spacecraft. At the time, there were protests outside the Kennedy Space Center in Florida by anti-nuclear groups regarding the use of the plutonium-based power modules in Galileo. The protesters contended that if this shuttle blew up "like Challenger did", the plutonium spilled would cause widespread death to residents of Florida.
The worm propagated through the network pseudo-randomly from one system to the other by using an algorithm which converted the victim machine's system time into a candidate target node address (composed of a DECnet Area and Node number) and subsequently attempted to exploit weakly secured accounts such as SYSTEM and DECNET that had password identical to the usernames. The worm did not attack computers within DECnet area 48, which was New Zealand. A comment inside the worm source code at the point of this branch logic indicated that New Zealand was a nuclear free zone. New Zealand had recently forbidden U.S. nuclear-powered vessels from docking at its harbours, thus further fuelling the speculation inside NASA that the worm attack was related to the anti-nuclear protest.
The line "You talk of times of peace for all, and then prepare for war" is drawn from the lyrics of the Midnight Oil song Blossom and Blood; Midnight Oil are an Australian rock band known for their political activism and opposition to both nuclear power and nuclear weapons. The process name of the second version of the worm to be detected was "oilz", an Australian shorthand term for the band.
Checkout the link below.
Born on July 3, 1971, in Townsville, Australia, Julian Assange used his genius IQ to hack into the databases of many high profile organizations. In 2006, Assange began work on Wikileaks, a Web site intended to collect and share confidential information on an international scale. The information his organization released earned him strong supporters and powerful enemies. For his efforts, the internet activist earned the Time magazine "Person of the Year" title in 2010. After arriving at the Ecuadorean Embassy in London in June 2012, seeking to avoid extradition to Sweden, Assange was granted political asylum by the Ecuadorean government in August 2012.
Journalist, computer programmer and activist Juliam Assange was born on July 3, 1971, in Townsville, Queensland, Australia. Assange had an unusual childhood, as he spent some of his early years traveling around with his mother, Christine, and his stepfather, Brett Assange. The couple worked together to put on theatrical productions. Brett Assange later described Julian as a "sharp kid who always fought for the underdog."
The relationship between Brett and Christine later soured, but Assange and his mother continued to live a transient lifestyle. With all of the moving around, Assange ended up attending roughly 37 different schools growing up, and was frequently homeschooled.
Founding WikileaksAssange discovered his passion for computers as a teenager. At the age of 16, he got his first computer as a gift from his mother. Before long, he developed a talent for hacking into computer systems. His 1991 break-in to the master terminal for Nortel, a telecommunications company, got him in trouble. Assange was charged with more than 30 counts of hacking in Australia, but he got off the hook with only a fine for damages.
Assange continued to pursue a career as a computer programmer and software developer. An intelligent mind, he studied mathematics at the University of Melbourne. He dropped out without finishing his degree, later claiming that he left the university for moral reasons; Assange objected to other students working on computer projects for the military.
In 2006, Assange began work on Wikileaks, a Web site intended to collect and share confidential information on an international scale. The site officially launched in 2007 and it was run out of Sweden at the time because of the country's strong laws protecting a person's anonymity. Later that year, Wikileaks released a U.S. military manual that provided detailed information on the Guantanamo detention center. Wikileaks also shared emails from then-vice presidential candidate Sarah Palin that it received from an anonymous source in September 2008.
Sexual Assault Controversy
In early December 2010, Assange discovered that he had other legal problems to worry about. He had been under investigation by the Swedish police since early August, in connection with two sexual assault cases. After a European Arrest Warrant was issued by Swedish authorities on December 6, Assange turned himself in to the London police.
After a series of extradition hearings in early 2011 to appeal the warrant, Assange learned on November 2, 2011, that the High Court dismissed his appeal. Still on conditional bail, Assange made plans to appeal to the U.K. Supreme Court, in regard to the case.
According to a New York Times article, Assange came to the Ecuadorean Embassy in London in June 2012, seeking to avoid extradition to Sweden. Nearly two months later, in August 2012, Assange was granted political asylum by the Ecuadorean government, which, according to the Times, "protects Mr. Assange from British arrest, but only on Ecuadorean territory, leaving him vulnerable if he tries to leave the embassy to head to an airport or train station." The article went on to say that the decision "cited the possibility that Mr. Assange could face 'political persecution' or be sent to the United States to face the death penalty," putting further strain on the relationship between Ecuador and Britain, and instigating a rebuttal from the Swedish government.
It is very interesting thing to cypher texts or decipher them.Modern day world we call them - HACKERS !!
Famous names like :
1. Julian Assange - founder of wikileaks
It churned the whole world pacifying with catastrophic secrets revelations of US gov and more.
2. Edward Snowden - worked as system administrator for CIA
He revealed some classified documents under US gov surveillance program.
These two are among modern day HACKERS . This whole profession of cypheranalysis has been going on from ages in various civilisations. We practise it in our day to day lives.We decode things in our brain to process them , its very natural process.
This whole article is a mere glimpse on who these people are and their existence.
I remember that beautful movie "Beautiful Minds" based on life John Nash , an American mathematician was awarded nobel laureate in economics. He anticipated many concepts of modern cryptography.
Its a very beautiful movie readers do watch.
He was a British mathematician, logician, cryptanalyst, computer scientist and a philosopher.
Father of Artificial Intelligence.
He devised a number of techniques for breaking German ciphers, including improvements to the pre-war Polish bombe method, an electromechanical machine that could find settings for the Enigma machine.
In 1952, he was charged with gross indecency after admitting to a sexual relationship with another man, and as a result was told to choose either imprisonment or chemical castration as punishment. He chose the latter. Alan Turing was found dead on June 8th, 1954, a day after taking his own life. He was aged just 41.
Turing wrote the following letter in 1952 to his friend and fellow mathematician, Norman Routledge, shortly before pleading guilty.
(Source: Alan Turing: The Enigma - The Centenary Edition; Image: Alan Turing, via.)