Welcome!

Release Management Authors: Liz McMillan, Jnan Dash, Lori MacVittie, Gilad Parann-Nissany, Carmen Gonzalez

Related Topics: Cloud Security, Release Management , @CloudExpo

Cloud Security: Article

Wiki War Breaks Out

Vigilantes acting in support of Assange's rogue site started unleashing a torrent of punishing denial of service attacks

Even before WikiLeaks mastermind Julian Assange got hauled off to Wandsworth Prison in southwest London Tuesday, vigilantes acting in support of his rogue site started unleashing a torrent of punishing denial of service attacks on the financial institutions that turned the spigot off on the donations WikiLeaks needs to survive and pay Assange's legal bills.

That includes PayPal, MasterCard, Visa and the Swiss Post bank.

Amazon.com, which booted WikiLeaks off its cloud last week, was threatened again Thursday but reportedly the new avenging angel lacked the "forces" given Amazon's EC2-style elasticity. The ruffians pushed on to PayPal. Twitter is also a possible target for not allowing WikiLeaks discussions to "trend" to the top of the heap.

The attacks, which WikiLeaks refused neither to "condemn nor applaud" and which the US government is now investigating, brought down the web sites of Visa, MasterCard and the Swiss Post bank PostFinance.

Authorities apparently don't believe WikiLeaks and its leader aren't responsible for the attack and moved Assange to a segregated part of the prison where there is limited computer access, according to the Guardian Thursday.

PostFinance, which has so far suffered the most, was first hit on Monday and was down most of Tuesday preventing depositors from doing online banking; mastercard.com was still impossible to reach Wednesday but its core business was reportedly unaffected. Ditto Visa whose web site crashed Wednesday.

The attacks, however, have continued with reports of interference with MasterCard payment operations and from our own in-house experience with Visa Thursday that appeared to be true.

PayPal, which pulled WikiLeaks' account last Friday, has reportedly been hit too but seemed to bear up aside from some difficulties with its blog and Thursday with its web site.

The web site of the Swedish prosecutor's office, which is pressing the sex crimes case against Assange, was down Tuesday into Wednesday and then the web site and e-mail system of the law firm for the two Swedish women who brought the complaint were attacked.

So too Sarah Palin's web site and US Senator Joe Lieberman's, both outspoken WikiLeaks critics. At press time, the US Senate web site was a target.

Oddly enough the web site of the hysterically liberal Democratic senator from California Dianne Feinstein, who chairs the Senate Intelligence Committee and suddenly finds herself in Lieberman's company, is so far untouched. Guess the mob doesn't have a subscription to the Wall Street Journal where she wrote an op-ed saying Assange should be hauled into court for violating the Espionage Act of 1917.

Dubbed Operation Payback, the revenge attacks are the work of an army of maybe 1,500-but-swelling self-styled "hacktivists" associated with the so-called Anonymous hacker coalition that has previously attacked the Church of Scientology and RIAA for its anti-piracy moves.

When Operation Payback first started, these modern-day Vikings said, "While we don't have much of an affiliation with WikiLeaks, we fight for the same reasons. We want transparency and counter censorship."

After the marauders downed the Visa and MasterCard web sites Wednesday, Facebook killed an Operation Payback page where it appeared the vandals have been congregating, congratulating each other and getting their marching orders.

Facebook said the page was removed "for violating our Terms of Use," which outlaw hate speech, threats of violence and bullying.

It appears it was an idle gesture since they just regrouped elsewhere on Facebook.

Twitter, where the timing of some of the attacks has been posted, tried to do the same thing after a file appeared that seemed to contain credit card information. MasterCard said it was bogus.

In retaliation Anonymous has been hit and WikiLeaks itself has been under sporadic DDoS attacks since it started releasing stolen US embassy cables.

After WikiLeaks got kicked off Amazon's cloud last week and lost its wikileaks.org domain to DDoS attacks on EveryDNS.net, WikiLeaks borrowed a Swiss web address belonging to the Swiss Pirate Party and reportedly now has DNS servers in 14 countries and a thousand mirror sites.

It also took out an "insurance" policy.

Before turning himself in, Assange claimed he sent a practically biblical army of 100,000 fellow travelers a stockpile of secret national and commercial information that he threatened would be decrypted and released if something happened to him. His lawyers called it a "thermonuclear device."

On Tuesday WikiLeaks said it wouldn't send out the decryption code just yet. A spokesman told the AP it will only be used if "grave matters" take place involving WikiLeaks staff. What that means is unclear.

Indicative of what the file might contain WikiLeaks, in a shot across the establishment's bow Monday, released a list of critical foreign infrastructure assets such as pipelines, mines, trans-Atlantic cables, food sources and pharmaceutical supplies that are important to the security of the United States not to mention its allies. The list is a terrorist's dream.

The AP said British Foreign Secretary William Hague condemned the disclosure, telling the BBC it was a "reprehensible" act committed "without regard to wider concerns of security, the security of millions of people."

The wire service said it decided against publishing the list "due to the sensitive nature of the information." The BBC linked to the list on WikiLeaks and the AP wants to know why. It said the BBC didn't respond.

The list was part of the huge cache of 252,000 stolen diplomatic cables and State Department documents that WikiLeaks started releasing last week to the detriment of international relations. Nothing so far comes close to the dictionary definition of whistle-blowing, just voyeurism and general mayhem.

The Telegraph speculates that the financial giants are acting in lockstep because Assange made the "fatal mistake" of threatening to bring down a major US bank with New Year's revelations supposedly akin to Enron. Fingers pointed at Bank of America.

The paper figures such a thing cuts a little too close to home for all of them especially in the middle of a recession.

WikiLeaks still has a post office box in Australia and bank accounts in Germany and Iceland to accept donations.

Wading into the fray Tuesday, possibly to heighten its non-existent profile, a Philadelphia start-up financial processing service called Xipwire (say Zipwire) has offered to handle WikiLeaks donations via debit and credit cards over cell phones.

It said on its site, "While people may or may not agree with WikiLeaks, we at Xipwire believe that anyone who wishes to support the organization through a donation should be able to do so." It said it is "waiving all fees so that 100 percent of the donations collected will be directly passed on to WikiLeaks." The AP says it holding the money in an escrow account since it hasn't been able to make contact with WikiLeaks.

Of course, if WikiLeaks is declared a terrorist organization, as the incoming chairman of the House Homeland Security Committee wants, US banks would be prohibited from processing payments and it would be a felony to provide the group with "material support or resources."

More Stories By Maureen O'Gara

Maureen O'Gara the most read technology reporter for the past 20 years, is the Cloud Computing and Virtualization News Desk editor of SYS-CON Media. She is the publisher of famous "Billygrams" and the editor-in-chief of "Client/Server News" for more than a decade. One of the most respected technology reporters in the business, Maureen can be reached by email at maureen(at)sys-con.com or paperboy(at)g2news.com, and by phone at 516 759-7025. Twitter: @MaureenOGara

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
Large scale deployments present unique planning challenges, system commissioning hurdles between IT and OT and demand careful system hand-off orchestration. In his session at @ThingsExpo, Jeff Smith, Senior Director and a founding member of Incenergy, will discuss some of the key tactics to ensure delivery success based on his experience of the last two years deploying Industrial IoT systems across four continents.
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and shared the must-have mindsets for removing complexity from the develo...
SYS-CON Events announced today that MangoApps will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MangoApps provides modern company intranets and team collaboration software, allowing workers to stay connected and productive from anywhere in the world and from any device.
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, explained how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportuni...
In today's uber-connected, consumer-centric, cloud-enabled, insights-driven, multi-device, global world, the focus of solutions has shifted from the product that is sold to the person who is buying the product or service. Enterprises have rebranded their business around the consumers of their products. The buyer is the person and the focus is not on the offering. The person is connected through multiple devices, wearables, at home, on the road, and in multiple locations, sometimes simultaneously...
“delaPlex Software provides software outsourcing services. We have a hybrid model where we have onshore developers and project managers that we can place anywhere in the U.S. or in Europe,” explained Manish Sachdeva, CEO at delaPlex Software, in this SYS-CON.tv interview at @ThingsExpo, held June 7-9, 2016, at the Javits Center in New York City, NY.
From wearable activity trackers to fantasy e-sports, data and technology are transforming the way athletes train for the game and fans engage with their teams. In his session at @ThingsExpo, will present key data findings from leading sports organizations San Francisco 49ers, Orlando Magic NBA team. By utilizing data analytics these sports orgs have recognized new revenue streams, doubled its fan base and streamlined costs at its stadiums. John Paul is the CEO and Founder of VenueNext. Prior ...
"We've discovered that after shows 80% if leads that people get, 80% of the conversations end up on the show floor, meaning people forget about it, people forget who they talk to, people forget that there are actual business opportunities to be had here so we try to help out and keep the conversations going," explained Jeff Mesnik, Founder and President of ContentMX, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
With 15% of enterprises adopting a hybrid IT strategy, you need to set a plan to integrate hybrid cloud throughout your infrastructure. In his session at 18th Cloud Expo, Steven Dreher, Director of Solutions Architecture at Green House Data, discussed how to plan for shifting resource requirements, overcome challenges, and implement hybrid IT alongside your existing data center assets. Highlights included anticipating workload, cost and resource calculations, integrating services on both sides...
Big Data engines are powering a lot of service businesses right now. Data is collected from users from wearable technologies, web behaviors, purchase behavior as well as several arbitrary data points we’d never think of. The demand for faster and bigger engines to crunch and serve up the data to services is growing exponentially. You see a LOT of correlation between “Cloud” and “Big Data” but on Big Data and “Hybrid,” where hybrid hosting is the sanest approach to the Big Data Infrastructure pro...
"We are a well-established player in the application life cycle management market and we also have a very strong version control product," stated Flint Brenton, CEO of CollabNet,, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
We all know the latest numbers: Gartner, Inc. forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from last year, and will reach 20.8 billion by 2020. We're rapidly approaching a data production of 40 zettabytes a day – more than we can every physically store, and exabytes and yottabytes are just around the corner. For many that’s a good sign, as data has been proven to equal money – IF it’s ingested, integrated, and analyzed fast enough. Without real-ti...
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull these blogs together, I realized that my IOT discussion lacked a vision; it lacked an end point towards which an organization could drive their IOT envisioning, proof of value, app dev, data engineering and data science efforts. And I think that the IOT end point is really quite simple…
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.