WikiLeaks pioneered the use of encryption and air-gapped computers to protect sources and confidential documents later used in mainstream news rooms, according to evidence by an Italian investigative journalist.
Stefania Maurizi said that the organisation had taken extensive measures to protect thousands of state department documents leaked by Chelsea Manning in 2010.
She gave written evidence during the four-week extradition trial of Julian Assange at the Old Bailey, which ended 1 October 2020.
According to her evidence, US cables published by WikiLeaks showed that the US had successfully placed pressure on Italian politicians not to extradite and prosecute the CIA officers responsible for the kidnap and torture of an Egyptian cleric seized from the streets of Milan.
Assange is accused of offences under the Computer Fraud and Abuse Act and 17 counts under the Espionage Act after receiving and publishing thousands of classified documents from former US army intelligence analyst Chelsea Manning.
US prosecutors have alleged that Assange knowingly published thousands of unredacted state department documents which put US informants at risk.
Maurizi, a journalist with newspapers lEspresso and La Repubblica,worked as a media partner with WikiLeaks for more than 9 months to analyse US State Department cables related to Italy, and used local knowledge to redact the names of individuals who might be at risk if their names were disclosed.
Maurizi, who has a degree in maths and wrote a dissertation on cryptography, said that WikiLeaks had pioneered the use of encryption to protect journalistic sources.
Julian Assange and WikiLeaks were pioneering the use of encryption to protect journalistic sources, and this was of great interest to me both as an investigative journalist and a mathematician, she said.
At the time, no major newsroom was using cryptography to systematically protect sources, and it would be years before other newsrooms such as the Guardian and the Washington Post introduced cryptography.
WikiLeaks made original documents available on its websites so that people could access the original documentation and check the accuracy of published media reports. Assange called it scientific journalism, said Maurizi.
The journalist worked with Assange on the Iraq War logs in 2010 and was given access to more than 4,000 State Department cables in 2011.
I was given an encrypted USB stick and once I returned to Italy I was given a password that would then allow opening the file. Everything was done with the utmost responsibility and attention, she said.
Maurizi used an air-gapped computer, which she never left unattended, to analyse the cables, and adopted other security measures.
Even the work done by close colleagues on stories regarding the Italian Mafia requiring extreme caution and security never reached these levels, she said.
Maurizi said that she redacted any sensitive names using 12 Xs, so that the length of the name did not provide any clue to the identity before they were published by WikiLeaks.
The diplomatic cables shed light on extremely serious human rights violations including torture and kidnapping, said Maurizi.
They revealed that the US had put pressure on Italian politicians not to extradite US citizens and CIA agents held responsible for the kidnapping and extraordinary rendition of Abu Omar from the streets of Milan.
Omar was taken to Egypt in 2003 where he was held in cell, blindfolded, handcuffed and repeatedly tortured for 14 months, according to an investigation by Mother Jones.
Omar was sentenced in his absence to six years onterrorism charges ina decision confirmed by the Italian Supreme Court in 2015.
Thanks to a series of blunders by the US agents, Italian prosecutors identified 26 US citizens, mostly CIA officers, responsible for the kidnapping.
They were tried in absentia and convicted by the Italian supreme court between 2012 and 2014 to sentences of between six and nine years.
Under US pressure, successive Italian justice ministers refused to issue extradition requests to the US to put the suspects on trial in Italy, and several of the suspects received presidential pardons.
Without WikiLeaks publication of US diplomatic cables, it would have been impossible to acquire factual and solid evidence about the US pressures on the Italian politicians, said Maurizi.
Maurizi said that she learned that one of WikiLeaks media partners passwords had been compromised during a trip to visit Assange, who was then a guest at Ellingham Hall, a country house in Norfolk, in August 2011.
The password had been disclosed in a book on WikiLeaks, Inside Julian Assanges war on secrecy, written by Guardian journalists David Leigh and Luke Harding.
Later, the German newspaper Der Freitag published a story that did not reveal the password, but made it possible for people to connect the dots.
There was an ever-widening awareness that the files, until then considered to be safely encrypted, might nonetheless be public very soon, said Maurizi.
Copies of an encrypted file containing the unredacted State Department documents had been circulating on the internet.
Christian Grothoff, an expert in network security from the University of Applied Sciences in Bern, told the court on 21 September that the file was likely to have been distributed after people mirrored the contents of WikiLeaks following a denial-of-service (DDoS) attack.
Maurizi said: WikiLeaks was in the position of its own data having been irreversibly and repeatedly embedded in the internet and it could not undo what had happened.
She said that Assange was acutely troubled by the situation and made urgent attempts to inform the State Department that information was circulating out of control.
When WikiLeaks published the unredacted documents, following their publication on the US web site Cryptome, Maurizi contacted security expert Bruce Schneier.
According to extracts quoted in Maurizis evidence, Schneier said in an email that both parties made dumb mistakes. He said that if I were to assess the blame, the Guardian made the worse mistake. Without the key, no one would have been able to brute force the file. No one, probably not even aliens with a planet-sized computer, he added.
A judge will rule whether the UK should grant the US request to extradite Assange on 4 January 2021.
- What Is the Signal Encryption Protocol? - WIRED - November 30th, 2020
- Data Protection | The Pros and Cons of End-to-End Encryption - DIGIT.FYI - November 30th, 2020
- Encryption Software Market Overview, Growth, Types, Applications, Dynamics, Companies, Regions, & Forecast to 2026 - The Haitian-Caribbean News... - November 30th, 2020
- Encryption Software Market to Witness Astonishing Growth by 2027 | Dell , Eset , Gemalto and more - Cheshire Media - November 30th, 2020
- EU targets end-to-end encryption tools after rise in terror attacks - DIGIT.FYI - November 30th, 2020
- European Legislators Move to Eliminate End-to-End Encryption in Messaging Services Following Terror Attacks - Digital Information World - November 30th, 2020
- Facebook urged to end encryption to help cops stop paedophiles using app - The Sun - November 30th, 2020
- Inside the French governments mission to develop an encrypted messaging platform - NS Tech - November 30th, 2020
- Hardware-based Full Disk Encryption Market Size, Key Manufacturers, Demand, Application And Opportunities By 2027 - The Haitian-Caribbean News Network - November 30th, 2020
- The tech and security backends that keep your data safe - Business MattersBusiness Matters - November 30th, 2020
- Encryption Software Market Expected to Boost the Global Industry Growth in the Near Future - Cheshire Media - November 30th, 2020
- Commercial Encryption Software Market Will Generate Record Revenue by 2025 - The Haitian-Caribbean News Network - November 30th, 2020
- Symmetric Encryption Algorithms: Live Long & Encrypt - Hashed Out by The SSL Store - Hashed Out by The SSL Store - November 24th, 2020
- Google plans to test end-to-end encryption in Android messages - TechCrunch - November 24th, 2020
- Google Messages Set to Roll Out End-to-End Encryption - Infosecurity Magazine - November 24th, 2020
- Did they crack the code? The importance of encryption for protest movements - OpenGlobalRights - November 24th, 2020
- The EU's muddled approach to encryption - The Spectator US - November 24th, 2020
- AES Encryption Software Market 2020 Global Industry Size, Demand, Growth Analysis, Share, Revenue and Forecast 2022 - The Think Curiouser - November 24th, 2020
- How to recover data from a Mac with T2 or FileVault encryption and without a password - Macworld - November 24th, 2020
- Security flaws in smart doorbells may open the door to hackers - We Live Security - November 24th, 2020
- Document Encryption Software Market 2020 - Impact of COVID-19 Pandemic, Future Development, Top Manufacturers Analysis, Trends and Demand discussed in... - November 24th, 2020
- U.S. Hardware Encryption Market is expected to reach $259.12 billion by 2026 | CAGR 32.4% - WhaTech - November 24th, 2020
- Data Encryption Market: Global Industry Analysis, Size, Share, Trends, Growth and Forecast 2020 2026 - The Think Curiouser - November 24th, 2020
- Arrests and raids in Essex as police crackdown on encrypted criminal networks - Gazette - November 24th, 2020
- 2020 and Beyond: Homomorphic Encryption Market Trends and Outlook Study to 2027 - The Haitian-Caribbean News Network - November 24th, 2020
- US Department of Justice reignites the Battle to Break Encryption - Naked Security - October 17th, 2020
- Five Eyes Call for Tech World to Weaken Encryption - ClearanceJobs - ClearanceJobs - October 17th, 2020
- Zoom Begins Rollout of End-To-End Encryption - My TechDecisions - TechDecisions - October 17th, 2020
- Could homomorphic encryption be the solution to big data's problem? - Siliconrepublic.com - October 17th, 2020
- U.S., UK and other countries warn tech firms that encryption creates 'severe risks' to public safety - CNBC - October 17th, 2020
- Is Signal secure? How the messaging app protects privacy - Business Insider - Business Insider - October 17th, 2020
- AeroVironment and Viasat to aim to improve radio encryption for Puma AE - Flightglobal - October 17th, 2020
- Encryption Backdoor? The Trump Administration Wants It. - The National Interest - October 17th, 2020
- How to use private conversations on Skype to send encrypted calls and messages - Business Insider India - October 17th, 2020
- AES Encryption Software Industry Market 2020: Potential growth, attractive valuation make it is a long-term investment | Know the COVID19 Impact | Top... - October 17th, 2020
- Trustifi Named Overall Encryption Solution Provider of the Year in 2020 CyberSecurity Breakthrough Awards Program - GlobeNewswire - October 17th, 2020
- ACLU and EFF Call DOJ's Encryption Dream a Nightmare - L.A. Weekly - October 17th, 2020
- Global Database Encryption Market Expected to reach highest CAGR in forecast period : International Business Machines Corporation, Symantec... - October 17th, 2020
- Feds, 'Five Eyes' Allies Take Another Swing at Encryption Policy Changes - MeriTalk - October 13th, 2020
- Homomorphic encryption tools find their niche - CSO Online - October 13th, 2020
- Mission Impossible: 7 Countries Tell Facebook To Break Encryption - Forbes - October 13th, 2020
- Dutton pushes against encryption yet again but oversight at home is slow - ZDNet - October 13th, 2020
- Western governments double down efforts to curtail end-to-end encryption - The Daily Swig - October 13th, 2020
- Fuse Analytics integration with StrongSalt offers Enterprise Information Archiving with GDPR protections - PR Web - October 13th, 2020
- Is Signal Safe? What to Know About the New Encrypted Messaging App - Parentology - October 13th, 2020
- Five Eyes alliance warning: 'Encryption creates severe risks to public safety' - New Zealand Herald - October 13th, 2020
- Privateness or youngster safety? 7 governments, together with US & UK, argue Fb's new encryption plan would profit PEDOPHILES - Editorials 360 - October 13th, 2020
- Optical Encryption Market Analysis And Demand With Forecast Overview To 2025 - Express Journal - October 13th, 2020
- Encrypted messages don't always stay private. Here's what that means for you - CNET - October 11th, 2020
- EARN IT Act a Dire Threat to Encryption, Speech Online, Critics Say - Decrypt - October 11th, 2020
- Analyzing Impacts of Covid-19 on Cloud Encryption Software Market Effects, Aftermath, Global Industry Challenges, Business Overview and Forecast To... - October 11th, 2020
- Parts of the Election System Are Ripe for Hacking: 'Encryption? We Don't Do That' - Josh Kurtz - October 6th, 2020
- Global Encryption Software Market 2020 Industry Size, Shares and Upcoming Trends 2025 - Reported Times - October 6th, 2020
- Encryption Software Market 2020 2027: Recent Trends, Growth Opportunities and Business Development Strategies By IBM, Trend Micro, Symantec, McaFee,... - October 6th, 2020
- Encryption Key Management Market Research By Growth, Competitive Methods And Forecast To 2026 - The Daily Chronicle - October 6th, 2020
- Global Hardware-based Full Disk Encryption Market Size, Share, Trends, CAGR by Technology, Key Players, Regions, Cost, Revenue and Forecast 2020 to... - October 6th, 2020
- Global Encryption Software Market 2020 | Know the Companies List Could Potentially Benefit or Loose out From the Impact of COVID-19 | Top Companies:... - October 6th, 2020
- Stay Tuned with the Epic Battle in the Encryption Key Management Market - The Daily Chronicle - October 6th, 2020
- Hardware-based Full Disk Encryption Market To Drive Highest Growth By 2027 With Leading Key Players: Seagate Technology PLC, Western Digital Corp,... - October 6th, 2020
- Encrypted USB flash drive you can unlock with your smartphone (or Apple Watch) - ZDNet - October 6th, 2020
- Global Mobile Encryption Market is slated to grow rapidly in the coming years: McAfee(Intel Corporation), Blackberry, T-Systems International, ESET,... - October 6th, 2020
- Cloud Encryption Software Market Potential Growth, Size, Share, Demand and Analysis of Key Players Research Forecasts to 2026 - The Daily Chronicle - October 6th, 2020
- Best Encryption Software in 2020 - Latest Quadrant Ranking Released by 360Quadrants - PRNewswire - September 30th, 2020
- 4 Reasons Why Encryption Is a Must for Data Protection - CIOReview - September 30th, 2020
- Prospective Node Operators Stake $125M in ETH to Participate in NuCypher Encryption Network - CoinDesk - Coindesk - September 30th, 2020
- Fortanix Partners with VMware to Enable Cloud Service Providers to Deliver Data Security as a Service - GlobeNewswire - September 30th, 2020
- SanDisks latest portable SSDs have boosted speed and security - The Verge - September 30th, 2020
- What Facebook users need to know about end-to-end encryption - Fast Company - September 30th, 2020
- Whats really up with your secure WhatsApp chats - Mint - September 30th, 2020
- Hardware Encryption Technology Market Trends Together With Growth Forecast To 2026 - The Daily Chronicle - September 30th, 2020
- Global Cloud Encryption Market- Industry Analysis and forecast 2020 2027: By Industrial verticals, Services, and Region. - Unica News - September 30th, 2020
- Global Hardware-based Full Disk Encryption (FDE) Market to Witness a Pronounce Growth During 2020-2026 - The Daily Chronicle - September 30th, 2020
- Global Cloud Encryption Technology Market with (Covid-19) Impact Analysis: Growth, Latest Trend Analysis and Forecast 2026 - The Daily Chronicle - September 30th, 2020
- Global Email Encryption Software Market Report 2020-2027: Production Capacity and Consumption Analysis by Regions and Country Wise - Crypto Daily - September 30th, 2020
- Cloud Encryption Service Market 2020 | Detailed Analysis, Growth, Research and Forecast - The Daily Chronicle - September 30th, 2020
- Database Encryption Market Potential Growth, Size, Share, Demand and Analysis of Key Players Research Forecasts to 2027 - The Daily Chronicle - September 30th, 2020
- Optical Encryption Industry 2020 Includes The Major Application Segments And Size In The Global Market To 2026 - The Daily Chronicle - September 30th, 2020
- Hardware Based Encryption Market Projected to Be Resilient During 2020-2025 - The Market Records - September 30th, 2020
- Hardware Encryption Market (2020-2026) | Where Should Participant Focus To Gain Maximum ROI | Exclusive Report By DataIntelo - Crypto Daily - September 30th, 2020
- Ring plans to offer end-to-end encryption by the end of the year - The Verge - September 29th, 2020