The WikiLeaks releases


The release by WikiLeaks of the emails of leading figures within the Democratic party establishment and the Hillary Clinton campaign (pretty much the same thing) has provoked howls of outrage by Democratic supporters who see in the timing of these releases, just before the election, a sinister plot. They have darkly insinuated that the documents are fake or that WikiLeaks and its head Julian Assange are tools of Russian president Vladimir Putin who is using them to damage Clinton and thus help his good buddy Donald Trump. Some Democratic partisans have even challenged the authenticity o the emails, even though that was put to rest when Trump raised them in last Sunday’s debate and Clinton did not challenge the contents.

There is no evidence of any of these allegations against WikiLeaks. As far as I am aware, WIkiLeaks has a perfect record when it comes to the authenticity of the documents it releases. Furthermore, they have made no secret of the fact that they time their releases in order to get the maximum effect, a practice that is routinely adopted by news media, governments, and business. Conversely, the late Friday evening information dump of bad news so that it gets little coverage is a well-known phenomenon.

Glenn Greenwald provides a point-by-point rebuttal of the charges made against WikiLeaks. Greenwald quotes David Barstow who was one of the journalists who published the 1995 tax return of Donald Trump that came from an anonymous source.

Last week, the three-time Pulitzer Prize-winning reporter from the New York Times, David Barstow, was interviewed about his decision to publish Donald Trump’s 1995 tax return even though he has no idea who sent the tax return to the paper, what their motives were, or whether that person committed any crimes in obtaining it. It’s well-worth listening to this 2-minute audio as Barstow explains why, as a journalist, he does not care at all who his source is, what motives they have, or whether they acted criminally in obtaining the information:

As Bartsow points out, some of the most important sources in the history of American journalism had horrible motives. For that reason, “What really matters to me is: is this information real, and if so, is it newsworthy?” That is the only consideration for real journalists.

Greenwald says that there are five things to bear in mind whenever we hear of situations like this and think that we are witnessing something unique.

  1. A source’s motives are irrelevant in deciding whether to publish.
  2. Journalists constantly publish material that is stolen or illegally obtained.
  3. The more public power someone has, the less privacy they are entitled to claim.
  4. Whether something is “shocking” or “earth-shattering” is an irrelevant standard.
  5. All journalists are arbiters of privacy and gatekeepers of information.

The criticism that the WikiLeaks releases are harming Democrats in general and Clinton in particular is a curious complaint, as if that organization should factor in domestic US politics in its actions, and favor one party or even one individual within that party. Would these same people be complaining if the organization got hold of and released Donald Trump’s tax returns (or other damaging documents) before the election, thus harming his campaign? Indeed, even within the Democratic party, would Sanders supporters be complaining if the same damaging information, that shows the cynical behavior by Clinton and the party, had been released early in the primary season when it might have helped him? I seriously doubt it.

Clinton and Democratic party supporters have a right to be worried about the impact of the releases on their candidate’s chances and one cannot fault them for wishing that this had come out after the election. But those of us who believe in greater transparency should not allow short-term political expediency to cloud our judgment. It is wrong to try and discredit WikilLeaks by issuing baseless allegations against it just because the information that came out harms the Democrats, just as it is wrong for Trump to try and discredit the women who have stepped forward to substantiate the groping and assault charges made against him by issuing baseless allegations about them.

Comments

  1. says

    I don’t want to victim-blame. However, in 2016 any IT-competent organization that is managing private data ought to have heard of internet security and hacking, and followed minimal “best practices” regarding securing their server.

    While it is correct that, in principle, I should be able to securely store my money in a paper bag on a park bench, without fear of doing so: I have not been robbed by a criminal mastermind if someone walks by and takes it.

  2. Hj Hornbeck says

    The release by WikiLeaks of the emails of leading figures within the Democratic party establishment and the Hillary Clinton campaign (pretty much the same thing) has provoked howls of outrage by Democratic supporters who see in the timing of these releases, just before the election, a sinister plot. They have darkly insinuated that the documents are fake or that WikiLeaks and its head Julian Assange are tools of Russian president Vladimir Putin who is using them to damage Clinton and thus help his good buddy Donald Trump.

    It’s tough to verify that no one has tampered with any of 29,000+ emails, especially when many of them aren’t yours. According to Motherboard, some of the July 2016 documents were tampered with:

    The metadata in the leaked documents are perhaps most revealing: one dumped document was modified using Russian language settings, by a user named “Феликс Эдмундович,” a code name referring to the founder of the Soviet Secret Police, the Cheka, memorialised in a 15-ton iron statue in front of the old KGB headquarters during Soviet times. The original intruders made other errors: one leaked document included hyperlink error messages in Cyrillic, the result of editing the file on a computer with Russian language settings. After this mistake became public, the intruders removed the Cyrillic information from the metadata in the next dump and carefully used made-up user names from different world regions, thereby confirming they had made a mistake in the first round.

    With digital documents, it’s impossible to tell a great forgery from an original; if these hackers step up their game, this becomes a he-said-she-said scenario.

    As for Assange being explicitly allied with Russia, that’s a stretch. The smart money is on an alignment of interests: Russia wants to sow chaos and boost Trump’s chances, while Assange and Wikileaks have a grudge against Clinton, so both benefit from posting emails.

    But it’s not ruled out, either; Assange had a TV show on a Russian propaganda network, a friend of his used Wikileaks material to help a pro-Russia dictator, and he was the one who convinced Snowden to settle in Russia. The links are quite weak, but still there.

  3. Reginald Selkirk says

    It’s interesting that Trump, who refuses to approve the customary release of income tax records, feels no compunction about digging through the hacked emails of his opponents for material to use against them.

  4. says

    Would these same people be complaining if the organization got hold of and released Donald Trump’s tax returns (or other damaging documents)

    Like a tape from Access Hollywood of The Donald suggesting he sexually harasses women? I figured that would be the obvious one to point to since it has gotten so much attention. And, no, I have heard no complaints from Democrats. On the contrary, some have been giddy about the possibility of more such content from The Apprentice being purchased and released.

  5. John Morales says

    [OT]

    With digital documents, it’s impossible to tell a great forgery from an original; if these hackers step up their game, this becomes a he-said-she-said scenario.

    Bitcoin is essentially digital documents.

  6. Hj Hornbeck says

    John Morales @5:

    Bitcoin is essentially digital documents.

    And Bitcoin transactions can be forged. Even the original paper admits this:

    We consider the scenario of an attacker trying to generate an alternate chain faster than the honest chain. Even if this is accomplished, it does not throw the system open to arbitrary changes, such as creating value out of thin air or taking money that never belonged to the attacker. Nodes are not going to accept an invalid transaction as payment, and honest nodes will never accept a block containing them. An attacker can only try to change one of his own transactions to take back money he recently spent.

    It goes on to point out that tampering with your own transaction takes a lot of CPU horsepower, too much to be practical. But “practical” is not the same as “impossible,” and once it’s done there’s no way to tell the forged chain from the original.

    Another route is to find an alternate coin that has the same SHA256 hash value as an existing one, and swap it into the chain. This is brutally difficult; SHA256’s grandparent, the MD5 hash algorithm, has been considered “broken” for some time and unfit for cryptographic use, yet no-one’s found an effective way to pull off the same “pre-image” attack against it. Again, if you could do this, you’ve forged something with no way to tell the original from the duplicate.

Leave a Reply

Your email address will not be published. Required fields are marked *