WikiLeaks sets sights on major U.S. bank, founder says
Julian Assange won't identify bank, though he said last year that WikiLeaks has obtained over 5GB of Bank of America data
Computerworld - The next target of WikiLeaks could be a major U.S. bank.
In a story published yesterday on Forbes.com, WikiLeaks founder Julian Assange is quoted as saying that whistleblower Web site is sitting on tens of thousands -- possibly even hundreds of thousands -- of sensitive internal documents from a large U.S. bank.
Assange did not identify the bank to Forbes, but he said that WikiLeaks will start posting the documents early next year. The leaked documents, he added, will offer a "true and representative insight into how banks behave at the executive level in a way that will stimulate investigations and reforms."
The documents are not isolated to a specific incident, but instead highlight a systematic pattern of what he called Enron-like violations and unethical practices.
"When Enron collapsed, through court processes, thousands and thousands of e-mails came out that were internal, and it provided a window into how the whole company was managed. It was all the little decisions that supported the flagrant violations," he said. "This will be like that."
In an interview with the IDG News Service last year, Assange contended that WikiLeaks had obtained a hard drive of an executive officer at the Bank of America that held close to 5GB of data.
During the interview at the 2009 Hack In The Box security conference in Kuala Lumpur, Malaysia, Assange said WikiLeaks was working to find a way to present the leaked Bank of America material in an easy-to-browse fashion.
"It's a difficult problem," Assange had said at that time. "We could just dump it all into one giant Zip file, but we know for a fact that has limited impact. To have impact, it needs to be easy for people to dive in and search it and get something out of it."
Assange did not identify the targeted bank in the Forbes interview. Bank of America officials did not immediately respond to a request for comment.
News of the latest WikiLeaks plan comes amid growing questions about the legality of the whistleblower Web site's actions.
On Sunday, WikiLeaks released thousands of classified U.S. State Department cables that were apparently obtained from a relatively low-level U.S. Army intelligence officer. Earlier this year, the site released a similar set of documents pertaining to the ongoing wars in Iraq and Afghanistan that were also obtained from the officer.
The release of the documents has stirred considerable outrage both domestically and on the international stage.
According to yesterday's Washington Post, the U.S. Departments of Justice and Defense are in the midst of an investigation to determine whether Assange has violated criminal laws in releasing the documents. According to the paper, the government is considering whether Assange can be charged with violating the Espionage Act.
Meanwhile, Rep. Peter King (R-N.Y.) has asked U.S. Attorney General Eric Holder to label WikiLeaks a terrorist organization and prosecute Assange under the Espionage Act.
Also following the latest release of classified documents, White House and Pentagon officials ordered sweeping reviews of processes for protecting classified data, and of policies on the use of USB drives and other removable storage media on government and military networks.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
- NSA used 'European bazaar' to spy on EU citizens
- Target CIO resigns following breach
- Evan Schuman: Mobile IT Roach Motel: Data checks in, but it won't check out
- Sears finds no evidence of data breach -- yet
- Gameover malware is tougher to kill with new rootkit component
- Mobile app for RSA Conference exposes personal data
- UK man charged with hacking Federal Reserve
- Bloomberg clamps down with data-access policies after scandal
- Amazon.com security slip allowed unlimited password guesses on mobile apps
- Huge turnout at RSA shows hackers are winning
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts