This is the latest U.S. attack on Wikileaks reported in The Age on 22 January 2011:
WASHINGTON: WikiLeaks, condemned by the US government for posting secret data leaked by insiders, may have used music- and photo-sharing networks to obtain and publish classified documents, according to a computer security firm.
Tiversa Inc, based in Pennsylvania, has evidence that WikiLeaks, which has said it does not know who provides it with information, may seek out secret data itself, using ''peer-to-peer'' networks, its chief executive, Robert Boback, said.
The company, which has done investigative searches on behalf of US agencies including the FBI, said it discovered computers in Sweden were trolling through hard drives accessed from popular peer-to-peer networks such as LimeWire and Kazaa. The information obtained in those searches had later appeared on WikiLeaks, Mr Boback said. WikiLeaks bases its most important servers in Sweden.
''It would be highly unlikely that someone else from Sweden is issuing those same types of searches resulting in that same type of information,'' he said.
Tiversa's claim was ''completely false in every regard'', said Mark Stephens, WikiLeaks's London lawyer.
So this should put a smile on a few faces this morning courtesy of a mention on @BernardKeane:
Joint Request for Statements of Interest: Internet Freedom Programs
January 3, 2011
Department of State
Public Notice
Bureau of Democracy, Human Rights and Labor and Bureau of Near Eastern Affairs Joint Request for Statements of Interest: Internet Freedom Programs
SUMMARY
The Bureau of Democracy, Human Rights, and Labor (DRL) and the Bureau of Near Eastern Affairs (NEA) announce a Joint Request for Statements of Interest (SOI) from organizations interested in submitting proposals for projects that support Internet freedom under the “Governing Justly and Democratically” Foreign Assistance program objective. This solicitation does not constitute a formal Request for Proposals: DRL and/or NEA will invite select organizations that submit SOIs to expand on their ideas via full proposal at a later date.
PLEASE NOTE: DRL and NEA strongly urge applicants to access immediately http://www.grants.gov/ in order to obtain a username and password. It may take up to a week to register with grants.gov. Please see the section entitled, “DEADLINE AND SUBMISSION INSTRUCTIONS” below for specific instructions.
REQUESTED STATEMENT OF INTEREST PROGRAM OBJECTIVES
DRL and NEA invite organizations to submit statements of interest outlining program concepts and capacity to manage projects that will foster freedom of expression and the free flow of information on the Internet and other connection technologies in East Asia, including China and Burma; the Near East, including Iran; Southeast Asia; the South Caucasus; Eurasia, including Russia; Central Asia; Latin America, including Cuba and Venezuela; and Africa. Programming may support activities in Farsi, Chinese, Russian, Burmese, Spanish, Vietnamese, Arabic, French, and other languages spoken in acutely hostile Internet environments. Concepts may be global in nature, regional or country-specific.
Statements should clearly address a) support for digital activists and civil society organizations in exercising their right to freedom of expression and the free flow of information in acutely hostile Internet environments, or b) support for ongoing evaluation and research to enhance global Internet freedom policy and diplomacy. (my emphasis)
Supporting digital activists:
1. Statements of interest should address one or more of the following potential program activities:
Counter-censorship Technology: Development and support of web-based circumvention technology to enable users in closed societies to get around firewalls and filters in acutely hostile Internet environments. DRL and NEA will consider projects that support the deployment of individual technologies in specific environments, as well as projects that identify a lead organization to provide sub-grant and contractual support to non-profit organizations and for-profit companies that develop and maintain circumvention technologies. Statements of interest proposing a consortium of technologies under a lead organization should clearly identify potential technology partners and include an indication of those organizations’ interest in participating in the proposed project. In all cases, preference will be given to peer-reviewed technologies……..