WikiLeaks releases Stratfor emails possibly from December hack
- 27 February, 2012 19:04
WikiLeaks said it planned to release from Monday over 5 million emails from Stratfor Global Intelligence, a provider of geopolitical analysis, whose website was hacked and emails and customer data stolen in December.
The whistle blower site said the emails date from between July, 2004 and late December, 2011, and allegedly contain privileged information about the US government's attacks against WikiLeaks and its founder Julian Assange and Stratfor's own attempts to subvert WikiLeaks. They also allegedly reveal controversial practices by Stratfor in cultivating sources, and targeting of individuals for corporate and government clients, WikiLeaks said.
Stratfor in Austin, Texas said in a statement Monday that mails stolen during the December hack apparently will be published by WikiLeaks. "This is a deplorable, unfortunate -- and illegal -- breach of privacy," it said. "Some of the emails may be forged or altered to include inaccuracies; some may be authentic. We will not validate either".
WikiLeaks did not disclose its source for the emails it is leaking to over 25 media outlets and activists. Hacker group, Anonymous however said in a Twitter message that it gave the Stratfor emails to WikiLeaks. Transparency, whether forced or voluntary, is a necessity to understand our world, it said.
Stratfor said in January that it got an alert in December that its website had been hacked and customer credit card and other information had been stolen by Anonymous. Its website was hacked again on Dec. 24.
Stratfor denied the hackers' claim that the data was a list of "private clients" but rather a list of members who may have purchased a publication.
"As one person said, the credit cards were extra, something they took when they realized they could. It was our email they were after," George Friedman, CEO of Stratfor said in the statement in January.
Within Anonymous there were some hackers in December who were opposed to the hacking of Stratfor.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- FAQs: How to break the old trade-off between effectiveness against malware and speed
- The Five Key Benefits of Application Control and How to Achieve Them
- How to Protect Your Business from the Coming Malware Storm
- Buy Vs. Build - Embedding Business Analytics Into SaaS or Cloud Applications
- Big Data for the Enterprise
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Best Practices for Migrating to SharePoint 2013
This white paper details a number of best practices for migrating to SharePoint 2013. These best practices also apply to migrations to most earlier versions of SharePoint. Download now.
Best Practice in BYOD
The key trend affecting enterprise mobility today can be summarized in four letters: BYOD – Bring Your Own Device. As the number of end-users bringing devices into your organization grows, so does the need for an effective Enterprise Mobility Management (EMM) solution. Learn how to manage devices across multiple platforms all from a single, centralised and unified management console. Download for more!
The Big Data Security Analytics Era is Here
Large organisations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up‐to-the‐minute situational awareness and rapid data-driven security decisions. This means that large organisations have entered the era of big data security analytics. Learn more.