The Blog

Is Wikileaks Secure?

And beyond the law?

8:25 AM, Jun 15, 2010 • By GABRIEL SCHOENFELD
Widget tooltip
Single Page Print Larger Text Smaller Text Alerts

Is there nothing we can do about Wikileaks? Is it really a website where anyone can post any U.S. government secret no matter how injurious it is to American security?

Is Wikileaks Secure?

Wikileaks is much in the news because of the young Army intelligence officer accused of providing it with a massive trove of diplomatic cables and sensitive military videos. The website’s organizers boast that it “combines the protection and anonymity of cutting-edge cryptographic technologies with the comfortable presentation style of Wikipedia.”  They convey an assumption that its servers are beyond the reach of law enforcement, and that those who post to it cannot be tracked down.

But the history of warfare—including information warfare—teaches that every measure elicits a countermeasure.  An interesting and highly relevant detail emerges from the indictment of Thomas Drake, the senior National Security Agency employee recently charged under the Espionage Act for passing classified information to the Baltimore Sun

To communicate covertly with the Sun reporter, Drake opened up a Hushmail account and she apparently did the same. Hushmail is a web service that, as it advertises itself, “looks and feels just like any other web-mail site, but adds strong encryption to your emails to protect your secrets from prying eyes.”

Yet when the prying eyes are federal investigators, it turns out that Hushmail is not quite so secure. The indictment of Drake makes plain that the feds pierced Hushmail’s encryption either via technological or legal means, noting, among other things, that “defendant DRAKE scanned and emailed Reporter A electronic copies of certain classified and unclassified documents.”

Wikileaks makes claims about its inviolability that are strikingly like those made by Hushmail. Whether it can be pierced by technological means is unknown. But warfare is not a static thing. Even “cutting-edge cryptographic technologies” may not cut it when facing the huge decryption resources of powerful states.   

Gabriel Schoenfeld is the author of Necessary Secrets: National Security, the Media, and the Rule of Law.

Recent Blog Posts

The Weekly Standard Archives

Browse 15 Years of the Weekly Standard

Old covers