WikiLeaks sets sights on major U.S. bank, founder says
Julian Assange won't identify bank, though he said last year that WikiLeaks has obtained over 5GB of Bank of America data
Computerworld - The next target of WikiLeaks could be a major U.S. bank.
In a story published yesterday on Forbes.com, WikiLeaks founder Julian Assange is quoted as saying that whistleblower Web site is sitting on tens of thousands -- possibly even hundreds of thousands -- of sensitive internal documents from a large U.S. bank.
Assange did not identify the bank to Forbes, but he said that WikiLeaks will start posting the documents early next year. The leaked documents, he added, will offer a "true and representative insight into how banks behave at the executive level in a way that will stimulate investigations and reforms."
The documents are not isolated to a specific incident, but instead highlight a systematic pattern of what he called Enron-like violations and unethical practices.
"When Enron collapsed, through court processes, thousands and thousands of e-mails came out that were internal, and it provided a window into how the whole company was managed. It was all the little decisions that supported the flagrant violations," he said. "This will be like that."
In an interview with the IDG News Service last year, Assange contended that WikiLeaks had obtained a hard drive of an executive officer at the Bank of America that held close to 5GB of data.
During the interview at the 2009 Hack In The Box security conference in Kuala Lumpur, Malaysia, Assange said WikiLeaks was working to find a way to present the leaked Bank of America material in an easy-to-browse fashion.
"It's a difficult problem," Assange had said at that time. "We could just dump it all into one giant Zip file, but we know for a fact that has limited impact. To have impact, it needs to be easy for people to dive in and search it and get something out of it."
Assange did not identify the targeted bank in the Forbes interview. Bank of America officials did not immediately respond to a request for comment.
News of the latest WikiLeaks plan comes amid growing questions about the legality of the whistleblower Web site's actions.
On Sunday, WikiLeaks released thousands of classified U.S. State Department cables that were apparently obtained from a relatively low-level U.S. Army intelligence officer. Earlier this year, the site released a similar set of documents pertaining to the ongoing wars in Iraq and Afghanistan that were also obtained from the officer.
The release of the documents has stirred considerable outrage both domestically and on the international stage.
According to yesterday's Washington Post, the U.S. Departments of Justice and Defense are in the midst of an investigation to determine whether Assange has violated criminal laws in releasing the documents. According to the paper, the government is considering whether Assange can be charged with violating the Espionage Act.
Meanwhile, Rep. Peter King (R-N.Y.) has asked U.S. Attorney General Eric Holder to label WikiLeaks a terrorist organization and prosecute Assange under the Espionage Act.
Also following the latest release of classified documents, White House and Pentagon officials ordered sweeping reviews of processes for protecting classified data, and of policies on the use of USB drives and other removable storage media on government and military networks.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
- Hackers steal user data from the European Central Bank website, demand money
- Arrests made after international cyber-ring targets StubHub
- SQL injection flaw opens door for Wall Street Journal database hack
- Goodwill Industries probes possible payment card breach
- Aloha point-of-sale terminal, sold on eBay, yields security surprises
- The biggest data breaches of 2014 (so far)
- Blue Shield discloses 18,000 doctors' Social Security numbers
- PF Chang's says breach was 'highly sophisticated criminal operation'
- Breaches exposed 1 in 7 US debit cards in 2013
- New malware program targets banking data
Read more about Security in Computerworld's Security Topic Center.
- Securing Mobility, From Device to Network At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Data Protection eGuide In this eGuide, CSO and sister publications IDG News Service, Computerworld, and CIO pull together news, trend, and how-to articles about the increasingly...
- Warning: Cloud Data at Risk Experts agree that relying on SaaS vendors to backup and restore your data is dangerous. Yet that's exactly what huge portions of the...
- The Opportunities and Challenges of the Cloud In this report F5 poses questions to IDC analysts, Sally Hudson and Phil Hochmuth, on behalf of F5's customers to better understand the...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!