Julian Assange: Why the world needs WikiLeaks
Summary
TLDRIn this TED Talk, Julian Assange discusses the mission of WikiLeaks to release classified documents and promote transparency. He explains the methods used to protect whistleblowers and ensure document legitimacy, highlighting the impact of their releases on political events, such as the Kenyan election and the Baghdad airstrike video. Assange also addresses the ethical considerations and potential risks of leaking sensitive information, emphasizing the importance of free speech and the role of WikiLeaks in holding powerful entities accountable.
Takeaways
- đ° Julian Assange founded WikiLeaks, which has released more classified documents than the rest of the world's media combined, raising concerns about the state of investigative journalism.
- đ WikiLeaks uses advanced encryption and legal jurisdictions to protect the identity of whistleblowers and the security of the documents they release.
- đ The organization vets documents like a regular news organization, ensuring their legitimacy before releasing them to the public.
- đ€ Assange emphasizes that WikiLeaks rarely knows the identity of its sources and actively destroys such information to maintain anonymity.
- đłïž The release of the Kroll Report had a significant impact on Kenya's political landscape, potentially influencing an election outcome.
- đ„ The Baghdad airstrike video released by WikiLeaks caused widespread outrage, highlighting the disparity in force used by military personnel.
- đ The alleged source of the video and cables, U.S. intelligence analyst Bradley Manning, was arrested, but WikiLeaks denies receiving the alleged 280,000 cables from him.
- đ Assange's philosophy is that information concealed by organizations is a signal that its release could lead to positive change and reform.
- đš WikiLeaks has a harm immunization policy to handle documents containing personal information, aiming to protect individuals while exposing truths.
- đ The impact of leaked materials is felt globally, influencing public opinion and potentially policy, as seen in the case of the Baghdad airstrike video.
- đŽââ ïž Assange's background includes a nomadic childhood and early involvement in journalism and activism, shaping his approach to information freedom.
Q & A
What is the claim made about WikiLeaks in the opening of the conversation?
-The claim is that WikiLeaks has released more classified documents in the last few years than the rest of the world's media combined.
How does Julian Assange describe the typical source of information for WikiLeaks?
-Julian describes the sources as classical whistleblowers who use various methods to get information to WikiLeaks, including state-of-the-art encryption and regular postal mail.
What is the purpose of using encryption and passing information through certain legal jurisdictions according to Assange?
-The purpose is to hide trails, pass information securely, and enact legal protections in jurisdictions like Sweden and Belgium.
How does WikiLeaks ensure the legitimacy of the documents they release?
-WikiLeaks vets the documents like a regular news organization, formats them, and releases them to the public while being prepared to defend against legal and political attacks.
What is WikiLeaks' policy regarding the identity of their sources?
-WikiLeaks rarely knows the identity of their sources, and if they ever find out, they destroy that information as soon as possible to maintain anonymity.
Outlines
đ The Scale of WikiLeaks' Impact
In this segment, Chris Anderson interviews Julian Assange, the founder of WikiLeaks, discussing the organization's unprecedented release of classified documents compared to the rest of the world's media. Assange expresses concern over the media's failure and highlights the role of whistleblowers in providing information. He details the secure methods WikiLeaks uses to protect the sources and the privacy of the information, including encryption and legal protections. The conversation also touches on the verification process of documents and the anonymity of sources, with Assange confirming that WikiLeaks destroys any information that might reveal a source's identity.
đ The Kenyan Leak and Its Political Consequences
This paragraph delves into a specific instance where WikiLeaks released the Kroll Report, a secret intelligence document commissioned by the Kenyan government. Assange explains the political context and the impact of the report's release, which led to a significant shift in public opinion and potentially influenced the outcome of an election. The report exposed corruption within the Kenyan government and put pressure on the newly elected president, Kibaki, who was seen aligning with the former dictator, Moi. The leak's indirect dissemination through international media eventually emboldened the Kenyan press to cover the story, leading to a substantial public response.
đ The Baghdad Airstrike Video Controversy
The conversation shifts to the release of a video depicting a Baghdad airstrike, which resulted in civilian casualties, including two Reuters employees. Assange discusses the aftermath of the video's release, the public outrage it sparked, and the disparity in force used. He also addresses the allegations surrounding U.S. intelligence analyst Bradley Manning's involvement in leaking the video and other classified materials to WikiLeaks. Assange maintains that WikiLeaks has a harm immunization policy to handle sensitive information and argues that the leaks serve to reveal the truth about government actions and policies.
đ€ Balancing Transparency and Source Protection
Assange reflects on the paradox of WikiLeaks' mission to bring transparency while maintaining secrecy to protect its sources. He asserts that there are no dissidents within WikiLeaks and that the organization acts in a way that compels people to continue its mission without compromising it. The discussion also explores the audience's perception of Assange and WikiLeaks, ranging from heroes who shed light on important issues to dangerous troublemakers. Assange shares an example of an unverified report on an oil well blowout in Albania, illustrating the challenges of verifying documents without clear authorship or context.
đ Overwhelmed by Growth: WikiLeaks' Current Challenges
Assange admits that WikiLeaks is currently facing challenges due to its rapid growth, which has led to an influx of high-quality whistleblower disclosures that the organization is struggling to process. He identifies the need for journalistic volunteers and funding as the main bottlenecks hindering the publication rate. The conversation also touches on Assange's personal background, including his nomadic childhood and early involvement in journalism and activism.
đïž Iceland's Embrace of Free Press Principles
The final paragraph discusses Assange's involvement in Iceland's response to a financial crisis and the subsequent efforts to strengthen freedom of speech and press protections. After WikiLeaks faced legal challenges in Iceland, the organization worked with local politicians to draft legislation aimed at making Iceland a haven for free press with robust legal protections. This initiative resulted in a unanimous parliamentary decision to enact these protections, including a new Nobel Prize for freedom of speech.
đź The Future of Privacy and Transparency
In the concluding part of the interview, Assange contemplates the future balance between government surveillance and public oversight. He acknowledges the pressures to harmonize legislation on freedom of speech and transparency globally but remains uncertain about the direction it will take. He emphasizes the importance of the current moment, suggesting that with concerted effort, the balance can be tipped towards greater openness and accountability.
Mindmap
Keywords
đĄWikiLeaks
đĄWhistleblowers
đĄEncryption
đĄLegal Jurisdictions
đĄKroll Report
đĄDiplomatic Cables
đĄCollateral Murder
đĄHarm Immunization Policy
đĄTransparency
đĄFundraising
đĄIcelandic Modern Media Initiative
Highlights
Chris Anderson welcomes Julian Assange and discusses WikiLeaks' impact on releasing classified documents.
Julian Assange highlights the failures of global media compared to WikiLeaks in releasing classified information.
Assange explains the secure methods WikiLeaks uses to receive and vet documents from whistleblowers.
The discussion on how WikiLeaks ensures the anonymity of their sources.
Chris Anderson and Julian Assange discuss a specific leak, the Kroll Report, and its impact on Kenyan politics.
The release of the Kroll Report shifted the Kenyan election results by 10%.
Introduction to the Baghdad airstrike video, showing the disparity in force and its impact.
The Baghdad airstrike video caused widespread outrage due to the disparity in force and civilian casualties.
Discussion on the arrest of Bradley Manning and the allegations of leaking U.S. embassy cables to WikiLeaks.
Julian Assange talks about the philosophy behind WikiLeaks and the importance of exposing concealed information.
Assange discusses the risks and harm immunization policy WikiLeaks follows to protect individuals.
Assange addresses concerns from military families and the broader impact of exposing U.S. military actions.
The discussion on the irony of WikiLeaks creating secrecy around its sources to expose secrets.
Julian Assange's background, including his nomadic childhood and early activism in journalism.
Assange shares his core values and the influence of capable, generous men in his life.
The story of WikiLeaks' impact in Iceland and the creation of new legislation for press freedom.
Julian Assange reflects on the future of freedom of speech and transparency legislation globally.
Transcripts
Chris Anderson: Julian, welcome.
It's been reported that WikiLeaks, your baby,
has, in the last few years
has released more classified documents
than the rest of the world's media combined.
Can that possibly be true?
Julian Assange: Yeah, can it possibly be true?
It's a worry -- isn't it? -- that the rest of the world's media
is doing such a bad job
that a little group of activists
is able to release more
of that type of information
than the rest of the world press combined.
CA: How does it work?
How do people release the documents?
And how do you secure their privacy?
JA: So these are -- as far as we can tell --
classical whistleblowers,
and we have a number of ways for them
to get information to us.
So we use this state-of-the-art encryption
to bounce stuff around the Internet, to hide trails,
pass it through legal jurisdictions
like Sweden and Belgium
to enact those legal protections.
We get information in the mail,
the regular postal mail,
encrypted or not,
vet it like a regular news organization, format it --
which is sometimes something that's quite hard to do,
when you're talking about
giant databases of information --
release it to the public
and then defend ourselves
against the inevitable legal and political attacks.
CA: So you make an effort to ensure
the documents are legitimate,
but you actually
almost never know who the identity of the source is?
JA: That's right, yeah. Very rarely do we ever know,
and if we find out at some stage
then we destroy that information as soon as possible.
(Phone ring) God damn it.
(Laughter)
CA: I think that's the CIA asking what the code is
for a TED membership.
(Laughter)
So let's take [an] example, actually.
This is something
you leaked a few years ago.
If we can have this document up ...
So this was a story in Kenya a few years ago.
Can you tell us what you leaked and what happened?
JA: So this is the Kroll Report.
This was a secret intelligence report
commissioned by the Kenyan government
after its election in 2004.
Prior to 2004, Kenya was ruled
by Daniel arap Moi
for about 18 years.
He was a soft dictator of Kenya.
And when Kibaki got into power --
through a coalition of forces that were trying
to clean up corruption in Kenya --
they commissioned this report,
spent about two million pounds
on this and an associated report.
And then the government sat on it
and used it for political leverage on Moi,
who was the richest man --
still is the richest man -- in Kenya.
It's the Holy Grail of Kenyan journalism.
So I went there in 2007,
and we managed to get hold of this
just prior to the election --
the national election, December 28.
When we released that report,
we did so three days after the new president, Kibaki,
had decided to pal up with
the man that he was going to clean out,
Daniel arap Moi,
so this report then
became a dead albatross
around President Kibaki's neck.
CA: And -- I mean, to cut a long story short --
word of the report leaked into Kenya,
not from the official media, but indirectly,
and in your opinion, it actually shifted the election.
JA: Yeah. So this became front page of the Guardian
and was then printed in all the surrounding countries of Kenya,
in Tanzanian and South African press.
And so it came in from the outside.
And that, after a couple of days,
made the Kenyan press feel safe to talk about it.
And it ran for 20 nights straight on Kenyan TV,
shifted the vote by 10 percent,
according to a Kenyan intelligence report,
which changed the result of the election.
CA: Wow, so your leak
really substantially changed the world?
JA: Yep.
(Applause)
CA: Here's -- We're going to just show
a short clip from this
Baghdad airstrike video.
The video itself is longer,
but here's a short clip.
This is -- this is intense material, I should warn you.
Radio: ... just fuckin', once you get on 'em just open 'em up.
I see your element, uh, got about four Humvees, uh, out along ...
You're clear. All right. Firing.
Let me know when you've got them. Let's shoot.
Light 'em all up.
C'mon, fire!
(Machine gun fire)
Keep shoot 'n. Keep shoot 'n.
(Machine gun fire)
Keep shoot 'n.
Hotel ... Bushmaster Two-Six, Bushmaster Two-Six,
we need to move, time now!
All right, we just engaged all eight individuals.
Yeah, we see two birds [helicopters], and we're still firing.
Roger. I got 'em.
Two-Six, this is Two-Six, we're mobile.
Oops, I'm sorry. What was going on?
God damn it, Kyle. All right, hahaha. I hit 'em.
CA: So, what was the impact of that?
JA: The impact on the people who worked on it
was severe.
We ended up sending two people to Baghdad
to further research that story.
So this is just the first of three attacks
that occurred in that scene.
CA: So, I mean, 11 people died in that attack, right,
including two Reuters employees?
JA: Yeah. Two Reuters employees,
two young children were wounded.
There were between 18 and 26 people killed all together.
CA: And releasing this caused
widespread outrage.
What was the key element of this
that actually caused the outrage, do you think?
JA: I don't know. I guess people can see
the gross disparity in force.
You have guys walking in a relaxed way down the street,
and then an Apache helicopter sitting up at one kilometer
firing 30-millimeter cannon shells
on everyone --
looking for any excuse to do so --
and killing people rescuing the wounded.
And there was two journalists involved that clearly weren't insurgents
because that's their full-time job.
CA: I mean, there's been this U.S. intelligence analyst,
Bradley Manning, arrested,
and it's alleged that he confessed in a chat room
to have leaked this video to you,
along with 280,000
classified U.S. embassy cables.
I mean, did he?
JA: We have denied receiving those cables.
He has been charged,
about five days ago,
with obtaining 150,000 cables
and releasing 50.
Now, we had released,
early in the year,
a cable from the Reykjavik U.S. embassy,
but this is not necessarily connected.
I mean, I was a known visitor of that embassy.
CA: I mean, if you did receive thousands
of U.S. embassy diplomatic cables ...
JA: We would have released them. (CA: You would?)
JA: Yeah. (CA: Because?)
JA: Well, because these sort of things
reveal what the true state
of, say,
Arab governments are like,
the true human-rights abuses in those governments.
If you look at declassified cables,
that's the sort of material that's there.
CA: So let's talk a little more broadly about this.
I mean, in general, what's your philosophy?
Why is it right
to encourage leaking of secret information?
JA: Well, there's a question as to what sort of information is important in the world,
what sort of information
can achieve reform.
And there's a lot of information.
So information that organizations
are spending economic effort into concealing,
that's a really good signal
that when the information gets out,
there's a hope of it doing some good --
because the organizations that know it best,
that know it from the inside out,
are spending work to conceal it.
And that's what we've found in practice,
and that's what the history of journalism is.
CA: But are there risks with that,
either to the individuals concerned
or indeed to society at large,
where leaking can actually have
an unintended consequence?
JA: Not that we have seen with anything we have released.
I mean, we have a harm immunization policy.
We have a way of dealing with information
that has sort of personal --
personally identifying information in it.
But there are legitimate secrets --
you know, your records with your doctor;
that's a legitimate secret --
but we deal with whistleblowers that are coming forward
that are really sort of well-motivated.
CA: So they are well-motivated.
And what would you say to, for example,
the, you know, the parent of someone
whose son is out serving the U.S. military,
and he says, "You know what,
you've put up something that someone had an incentive to put out.
It shows a U.S. soldier laughing
at people dying.
That gives the impression, has given the impression,
to millions of people around the world
that U.S. soldiers are inhuman people.
Actually, they're not. My son isn't. How dare you?"
What would you say to that?
JA: Yeah, we do get a lot of that.
But remember, the people in Baghdad,
the people in Iraq, the people in Afghanistan --
they don't need to see the video;
they see it every day.
So it's not going to change their opinion. It's not going to change their perception.
That's what they see every day.
It will change the perception and opinion
of the people who are paying for it all,
and that's our hope.
CA: So you found a way to shine light
into what you see
as these sort of dark secrets in companies and in government.
Light is good.
But do you see any irony in the fact that,
in order for you to shine that light,
you have to, yourself,
create secrecy around your sources?
JA: Not really. I mean, we don't have
any WikiLeaks dissidents yet.
We don't have sources who are dissidents on other sources.
Should they come forward, that would be a tricky situation for us,
but we're presumably acting in such a way
that people feel
morally compelled
to continue our mission, not to screw it up.
CA: I'd actually be interested, just based on what we've heard so far --
I'm curious as to the opinion in the TED audience.
You know, there might be a couple of views
of WikiLeaks and of Julian.
You know, hero -- people's hero --
bringing this important light.
Dangerous troublemaker.
Who's got the hero view?
Who's got the dangerous troublemaker view?
JA: Oh, come on. There must be some.
CA: It's a soft crowd, Julian, a soft crowd.
We have to try better. Let's show them another example.
Now here's something that you haven't yet leaked,
but I think for TED you are.
I mean it's an intriguing story that's just happened, right?
What is this?
JA: So this is a sample of what we do
sort of every day.
So late last year -- in November last year --
there was a series of well blowouts
in Albania,
like the well blowout in the Gulf of Mexico,
but not quite as big.
And we got a report --
a sort of engineering analysis into what happened --
saying that, in fact, security guards
from some rival, various competing oil firms
had, in fact, parked trucks there and blown them up.
And part of the Albanian government was in this, etc., etc.
And the engineering report
had nothing on the top of it,
so it was an extremely difficult document for us.
We couldn't verify it because we didn't know
who wrote it and knew what it was about.
So we were kind of skeptical that maybe it was
a competing oil firm just sort of playing the issue up.
So under that basis, we put it out and said,
"Look, we're skeptical about this thing.
We don't know, but what can we do?
The material looks good, it feels right,
but we just can't verify it."
And we then got a letter
just this week
from the company who wrote it,
wanting to track down the source --
(Laughter)
saying, "Hey, we want to track down the source."
And we were like, "Oh, tell us more.
What document is it, precisely, you're talking about?
Can you show that you had legal authority over that document?
Is it really yours?"
So they sent us this screen shot
with the author
in the Microsoft Word ID.
Yeah.
(Applause)
That's happened quite a lot though.
This is like one of our methods
of identifying, of verifying, what a material is,
is to try and get these guys to write letters.
CA: Yeah. Have you had information
from inside BP?
JA: Yeah, we have a lot, but I mean, at the moment,
we are undergoing a sort of serious fundraising and engineering effort.
So our publication rate
over the past few months
has been sort of minimized
while we're re-engineering our back systems
for the phenomenal public interest that we have.
That's a problem.
I mean, like any sort of growing startup organization,
we are sort of overwhelmed
by our growth,
and that means we're getting enormous quantity
of whistleblower disclosures
of a very high caliber
but don't have enough people to actually
process and vet this information.
CA: So that's the key bottleneck,
basically journalistic volunteers
and/or the funding of journalistic salaries?
JA: Yep. Yeah, and trusted people.
I mean, we're an organization
that is hard to grow very quickly
because of the sort of material we deal with,
so we have to restructure
in order to have people
who will deal with the highest national security stuff,
and then lower security cases.
CA: So help us understand a bit about you personally
and how you came to do this.
And I think I read that as a kid
you went to 37 different schools.
Can that be right?
JA: Well, my parents were in the movie business
and then on the run from a cult,
so the combination between the two ...
(Laughter)
CA: I mean, a psychologist might say
that's a recipe for breeding paranoia.
JA: What, the movie business?
(Laughter)
(Applause)
CA: And you were also -- I mean,
you were also a hacker at an early age
and ran into the authorities early on.
JA: Well, I was a journalist.
You know, I was a very young journalist activist at an early age.
I wrote a magazine,
was prosecuted for it when I was a teenager.
So you have to be careful with hacker.
I mean there's like -- there's a method
that can be deployed for various things.
Unfortunately, at the moment,
it's mostly deployed by the Russian mafia
in order to steal your grandmother's bank accounts.
So this phrase is not,
not as nice as it used to be.
CA: Yeah, well, I certainly don't think
you're stealing anyone's grandmother's bank account,
but what about
your core values?
Can you give us a sense of what they are
and maybe some incident in your life
that helped determine them?
JA: I'm not sure about the incident.
But the core values:
well, capable, generous men
do not create victims;
they nurture victims.
And that's something from my father
and something from other capable, generous men
that have been in my life.
CA: Capable, generous men do not create victims;
they nurture victims?
JA: Yeah. And you know,
I'm a combative person,
so I'm not actually so big on the nurture,
but some way --
there is another way of nurturing victims,
which is to police perpetrators
of crime.
And so that is something
that has been in my character
for a long time.
CA: So just tell us, very quickly in the last minute, the story:
what happened in Iceland?
You basically published something there,
ran into trouble with a bank,
then the news service there
was injuncted from running the story.
Instead, they publicized your side.
That made you very high-profile in Iceland. What happened next?
JA: Yeah, this is a great case, you know.
Iceland went through this financial crisis.
It was the hardest hit of any country in the world.
Its banking sector was 10 times the GDP
of the rest of the economy.
Anyway, so we release this report
in July last year.
And the national TV station was injuncted
five minutes before it went on air,
like out of a movie: injunction landed on the news desk,
and the news reader was like,
"This has never happened before. What do we do?"
Well, we just show the website instead,
for all that time, as a filler,
and we became very famous in Iceland,
went to Iceland and spoke about this issue.
And there was a feeling in the community
that that should never happen again,
and as a result,
working with Icelandic politicians
and some other international legal experts,
we put together a new sort of
package of legislation for Iceland
to sort of become an offshore haven
for the free press,
with the strongest journalistic protections in the world,
with a new Nobel Prize
for freedom of speech.
Iceland's a Nordic country,
so, like Norway, it's able to tap into the system.
And just a month ago,
this was passed by the Icelandic parliament unanimously.
CA: Wow.
(Applause)
Last question, Julian.
When you think of the future then,
do you think it's more likely to be
Big Brother exerting more control,
more secrecy,
or us watching
Big Brother,
or it's just all to be played for either way?
JA: I'm not sure which way it's going to go.
I mean, there's enormous pressures
to harmonize freedom of speech legislation
and transparency legislation around the world --
within the E.U.,
between China and the United States.
Which way is it going to go? It's hard to see.
That's why it's a very interesting time to be in --
because with just a little bit of effort,
we can shift it one way or the other.
CA: Well, it looks like I'm reflecting the audience's opinion
to say, Julian, be careful,
and all power to you.
JA: Thank you, Chris. (CA: Thank you.)
(Applause)
Voir Plus de Vidéos Connexes
What did Julian Assange do? | ABC News In-Depth
Electoral Bonds Scam Exposed
Encryption Explained Simply | What Is Encryption? | Cryptography And Network Security | Simplilearn
Google HACKING (use google search to HACK!)
Pesquisa e OpiniĂŁo PĂșblica - Aula 05 - Grupos de PressĂŁo
The Importance of AI Governance
5.0 / 5 (0 votes)