WikiLeaks pioneered the use of encryption and air-gapped computers to protect sources and confidential documents later used in mainstream news rooms, according to evidence by an Italian investigative journalist.
Stefania Maurizi said that the organisation had taken extensive measures to protect thousands of state department documents leaked by Chelsea Manning in 2010.
She gave written evidence during the four-week extradition trial of Julian Assange at the Old Bailey, which ended 1 October 2020.
According to her evidence, US cables published by WikiLeaks showed that the US had successfully placed pressure on Italian politicians not to extradite and prosecute the CIA officers responsible for the kidnap and torture of an Egyptian cleric seized from the streets of Milan.
Assange is accused of offences under the Computer Fraud and Abuse Act and 17 counts under the Espionage Act after receiving and publishing thousands of classified documents from former US army intelligence analyst Chelsea Manning.
US prosecutors have alleged that Assange knowingly published thousands of unredacted state department documents which put US informants at risk.
Maurizi, a journalist with newspapers lEspresso and La Repubblica,worked as a media partner with WikiLeaks for more than 9 months to analyse US State Department cables related to Italy, and used local knowledge to redact the names of individuals who might be at risk if their names were disclosed.
Maurizi, who has a degree in maths and wrote a dissertation on cryptography, said that WikiLeaks had pioneered the use of encryption to protect journalistic sources.
Julian Assange and WikiLeaks were pioneering the use of encryption to protect journalistic sources, and this was of great interest to me both as an investigative journalist and a mathematician, she said.
At the time, no major newsroom was using cryptography to systematically protect sources, and it would be years before other newsrooms such as the Guardian and the Washington Post introduced cryptography.
WikiLeaks made original documents available on its websites so that people could access the original documentation and check the accuracy of published media reports. Assange called it scientific journalism, said Maurizi.
The journalist worked with Assange on the Iraq War logs in 2010 and was given access to more than 4,000 State Department cables in 2011.
I was given an encrypted USB stick and once I returned to Italy I was given a password that would then allow opening the file. Everything was done with the utmost responsibility and attention, she said.
Maurizi used an air-gapped computer, which she never left unattended, to analyse the cables, and adopted other security measures.
Even the work done by close colleagues on stories regarding the Italian Mafia requiring extreme caution and security never reached these levels, she said.
Maurizi said that she redacted any sensitive names using 12 Xs, so that the length of the name did not provide any clue to the identity before they were published by WikiLeaks.
The diplomatic cables shed light on extremely serious human rights violations including torture and kidnapping, said Maurizi.
They revealed that the US had put pressure on Italian politicians not to extradite US citizens and CIA agents held responsible for the kidnapping and extraordinary rendition of Abu Omar from the streets of Milan.
Omar was taken to Egypt in 2003 where he was held in cell, blindfolded, handcuffed and repeatedly tortured for 14 months, according to an investigation by Mother Jones.
Omar was sentenced in his absence to six years onterrorism charges ina decision confirmed by the Italian Supreme Court in 2015.
Thanks to a series of blunders by the US agents, Italian prosecutors identified 26 US citizens, mostly CIA officers, responsible for the kidnapping.
They were tried in absentia and convicted by the Italian supreme court between 2012 and 2014 to sentences of between six and nine years.
Under US pressure, successive Italian justice ministers refused to issue extradition requests to the US to put the suspects on trial in Italy, and several of the suspects received presidential pardons.
Without WikiLeaks publication of US diplomatic cables, it would have been impossible to acquire factual and solid evidence about the US pressures on the Italian politicians, said Maurizi.
Maurizi said that she learned that one of WikiLeaks media partners passwords had been compromised during a trip to visit Assange, who was then a guest at Ellingham Hall, a country house in Norfolk, in August 2011.
The password had been disclosed in a book on WikiLeaks, Inside Julian Assanges war on secrecy, written by Guardian journalists David Leigh and Luke Harding.
Later, the German newspaper Der Freitag published a story that did not reveal the password, but made it possible for people to connect the dots.
There was an ever-widening awareness that the files, until then considered to be safely encrypted, might nonetheless be public very soon, said Maurizi.
Copies of an encrypted file containing the unredacted State Department documents had been circulating on the internet.
Christian Grothoff, an expert in network security from the University of Applied Sciences in Bern, told the court on 21 September that the file was likely to have been distributed after people mirrored the contents of WikiLeaks following a denial-of-service (DDoS) attack.
Maurizi said: WikiLeaks was in the position of its own data having been irreversibly and repeatedly embedded in the internet and it could not undo what had happened.
She said that Assange was acutely troubled by the situation and made urgent attempts to inform the State Department that information was circulating out of control.
When WikiLeaks published the unredacted documents, following their publication on the US web site Cryptome, Maurizi contacted security expert Bruce Schneier.
According to extracts quoted in Maurizis evidence, Schneier said in an email that both parties made dumb mistakes. He said that if I were to assess the blame, the Guardian made the worse mistake. Without the key, no one would have been able to brute force the file. No one, probably not even aliens with a planet-sized computer, he added.
A judge will rule whether the UK should grant the US request to extradite Assange on 4 January 2021.
- WhatsApp boosts end-to-end encryption - BusinessTech - September 17th, 2021
- WhatsApp to offer encryption on cloud backups: Heres all you need to know - India Today - September 17th, 2021
- London's Top Cop Says 'Big Tech,' Encryption Are Letting The Terrorists Win - Techdirt - September 17th, 2021
- Zoom unveils new security features including end-to-end encryption for Zoom Phone, verified identities and... - ZDNet - September 15th, 2021
- Insights on the Hardware Encryption Global Market to 2026 - by Algorithm & Standard, Architecture, Product, Application and Region - PRNewswire - September 15th, 2021
- Light Start: WhatsApp rolls out backup encryption, LG is more attractive, Google goes dark and iPhones only laak gud vaabs Stuff - Stuff Magazines - September 15th, 2021
- Revenant REvil. WhatsApp offers encryption. Hortum spyware in Turkey. Update on the UN data breach. Healthcare breaches disclosed. - The CyberWire - September 15th, 2021
- How a glitch in the Matrix led to apps potentially exposing encrypted chats - The Register - September 15th, 2021
- Secure cloud storage: which are the most secure providers? - ITProPortal - September 15th, 2021
- WhatsApp is finally allowing users to encrypt chat backups uploaded to iCloud and Google Drive - Buzz.ie - September 15th, 2021
- WhatsApp is adding encrypted backups - The Verge - September 11th, 2021
- What Is Fully Homomorphic Encryption (FHE)? - CIO Insight - September 11th, 2021
- WhatsApp end-to-end encrypted messages arent that private after all - Ars Technica - September 11th, 2021
- UK government backs Apple, and wants to scan encrypted messages for CSAM - 9to5Mac - September 11th, 2021
- VPN and Email Encryption Provider, WiTopia, Inc., Is Now Raising Capital Via StartEngine - PRNewswire - September 11th, 2021
- Future in the cloud for encryption - Capacity Media - September 8th, 2021
- WhatsApps Claims Of End-To-End Encryption Might Be Entirely True - Ubergizmo - September 8th, 2021
- Debunking Wi-Fi Security Myths: Wi-Fi Encryption Is Weak - TechSpective - September 8th, 2021
- WhatsApp Flaw Casts Doubt on End-to-End Encryption - Security Boulevard - September 8th, 2021
- Bluefin Receives U.S. Patent on Systems for Vaultless Tokenization and Encryption - WFMZ Allentown - September 8th, 2021
- Priti Patel backs ad campaign that criticises Facebook's stance on end-to-end encryption - Graham Cluley Security News - September 8th, 2021
- EXCLUSIVE: What's in the new zero-trust strategy - Politico - September 8th, 2021
- 3 ways to protect yourself from cyberattacks in the midst of an IT security skill shortage - Help Net Security - September 8th, 2021
- Apple Has Betrayed Its Privacy Legacy and Will Undermine End-to-end Encryption Everywhere - Privacy News Online - September 8th, 2021
- IBM's first 7nm Power10 chip arrives in E1080 server system with a wealth of shiny features - The Register - September 8th, 2021
- The adoption of multi-cloud drives the need for better data protection and management of encryption keys an... - Security Boulevard - August 26th, 2021
- Cryptomator Vs. BoxCryptor: Which One Is The Best Encryption Software? - Analytics Insight - August 26th, 2021
- Why you should encrypt your data on your computer and how to do it - The Star Online - August 26th, 2021
- Video end-to-end encryption on Ring to be available worldwide - ITP.net - August 26th, 2021
- What is a Vocoder? How an audio encryption device used in WW2 became the sound of electro and modern pop - Mixdown - August 26th, 2021
- Privacera partners with StreamSets to strengthen data security for ETL processing in the cloud - Help Net Security - August 26th, 2021
- R400m cocaine-in-a-boat accused used encryption app to communicate - TimesLIVE - August 26th, 2021
- Evervaults encryption as a service is now open access - TechCrunch - August 24th, 2021
- How to Encrypt Your Own Windows and Mac Devices (and Why You Need To) - Lifehacker - August 24th, 2021
- Why encryption is the key to digital fitness, according to Thales - iTnews - August 24th, 2021
- How to check each of your WhatsApp chats are ACTUALLY private right now and not being intercepted by h... - The Sun - August 24th, 2021
- WebCam: How Australia paved the way for Apple's encryption backflip - Crikey - August 24th, 2021
- Staggering 400% rise in child sexual abuse images detected by Facebook as fears over encryption plans g... - The Sun - August 24th, 2021
- Hardware-based Full Disk Encryption Market 2021 and Analysis to 2027 Micron Technology Inc, Seagate Technology PLC, Toshiba, Intel - The Market... - August 24th, 2021
- WhatsApp could soon have an iPad app for the first time - Engadget - August 24th, 2021
- Facebook is bringing end-to-end encryption to Messenger calls and Instagram DMs - TechCrunch - August 14th, 2021
- Apple opens the encryption Pandora's box - Axios - August 14th, 2021
- How to encrypt your computer (and why you should) - Mashable - August 14th, 2021
- Protects User Privacy With Encryption and Authentication - Security Magazine - August 14th, 2021
- An Overview of Blockchain in Supply Chain: Whats the Link? - JD Supra - August 14th, 2021
- Facebook introduces end-to-end encryption for its voice & video call features - Techstory - August 14th, 2021
- Hardware Encryption Devices Market Research Report 2021 Elaborate Analysis With Growth Forecast To 2027 Intel, Toshiba, Micron Technology Inc,... - August 14th, 2021
- If You Build It, They Will Come: Apple Has Opened the Backdoor to Increased Surveillance and Censorship Around the World - EFF - August 14th, 2021
- Encryption Software Market Report 2021-26: Size, Growth, Size, Share and Forecast IMARC Group - The Market Writeuo - The Market Writeuo - August 14th, 2021
- AES Encryption Software Market Growth in the Forecast Period of 2021 to 2026 With Top Companies: , Dell, Eset, Gemalto, IBM, Mcafee - The Market... - August 14th, 2021
- Regulated encryption isnt possible heres what is - POLITICO Europe - August 3rd, 2021
- Work from home and cloud are prompting hard looks at security - GCN.com - August 3rd, 2021
- Atakama and Spirion to announce their strategic partnership at Black Hat 2021 - PRNewswire - August 3rd, 2021
- Spirion and Atakama Join Forces at Black Hat 2021 Conference - MarTech Series - August 3rd, 2021
- Looking for ways to password protect a file or folder on Windows 11? Here's how you can do it - India Today - August 3rd, 2021
- XSOC CORP's SOCKET Receives UL- 2900 Certification for Securing Encrypted Workflows of Today's Enterprise and Industrial Connected Devices - Business... - August 3rd, 2021
- Apple @ Work: FileVault 2 is so good, theres no reason for IT departments not to use it - 9to5Mac - August 3rd, 2021
- The Future of Industrial Security - Security Today - August 3rd, 2021
- Global Encryption Software System Market Size And Forecast to 2021 2027 analysis with key players : IBM, Microsoft, Sophos ltd, Gemalto, Net App Inc,... - August 3rd, 2021
- Cloud Encryption Software Market Size 2021 Industry Demand, Share, Global Trend, Industry News, Business Growth, Top Key Players Update, Business... - August 3rd, 2021
- Global E-mail Encryption Market Dynamics Analysis, Production, Supply and Demand, Covered in the Latest Research 2021-2026 - Digital Journal - August 3rd, 2021
- Insights on the Optical Encryption Global Market to 2027 - Featuring Arista Networks, Broadcom and CenturyLink Among Others - ResearchAndMarkets.com -... - July 8th, 2021
- Jupiter Project Presents 'Metis Messenger', the Decentralized Chat Application That Syncs Across All Platforms - GlobeNewswire - July 8th, 2021
- If full encryption of police radios necessary? Berkeley may allow public to hear one of their channels - The Daily Post - July 2nd, 2021
- Leveraging Encryption Keys to Better Secure the Federal Cloud - Nextgov - July 2nd, 2021
- Benefits of Adopting Data Encryption in Businesses - CIOReview - July 2nd, 2021
- Encryption can be lucrative, but with environmental costs - Floridanewstimes.com - July 2nd, 2021
- UK Government has suggested messaging apps to avoid using end-to-end encryption on the accounts of children because that can be harmful to them -... - July 2nd, 2021
- Diavol ransomware linked to Trickbot botnet - IT PRO - July 2nd, 2021
- Got data? The biggest-ever portable encrypted SSD just came out - Cult of Mac - July 2nd, 2021
- Application-Level Encryption Market is expected to expand at a CAGR of 25% from 2020 to 2030 KSU | The Sentinel Newspaper - KSU | The Sentinel... - July 2nd, 2021
- Encryption Key Management Market to Eyewitness Massive Growth by 2028: Ciphercloud, Gemalto, Google The Manomet Current - The Manomet Current - July 2nd, 2021
- Data storage: the importance of protecting the device and not just the network - IT-Online - July 2nd, 2021
- Global E-mail Encryption Market 2021 Demands To Sustain in Future Industry Size, Growth, Revenue, Global Statistics and Forecast to 2030 The Manomet... - July 2nd, 2021
- Hardware Encryption Market 2021 Industry Analysis by Manufacturers, End-User, Type, Application, Regions and Forecast to 2027 The Manomet Current -... - July 2nd, 2021
- Former Anonymous and Lulzsec hacker discusses his criminal past and gives his top tips for avoiding ransomware - Texasnewstoday.com - July 2nd, 2021
- Why Inspecting Encrypted Traffic Is A Must - Security Boulevard - June 25th, 2021
- Researchers: 2G Connection Encryption Deliberately Weakened To Comply With Cryptowar Export Restrictions - Techdirt - June 25th, 2021
- The Ultimate Guide to Key Management Systems - Hashed Out by The SSL Store - Hashed Out by The SSL Store - June 25th, 2021
- Will regulation adapt to encryption, or will encryption adapt to regulation?Expert answers - QNT - June 25th, 2021