Disclaimer: This is an example of a student written essay.
Click here for sample essays written by our professional writers.

Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of UKEssays.com.

Social and Legal Issues Concerning WikiLeaks

Paper Type: Free Essay Subject: Security
Wordcount: 2284 words Published: 11th Apr 2019

Reference this

INTRODUCTION

WikiLeaks is an international non-profit organization that publishes leaks and secrets from different sources. The history of the organization tells that over past eleven years it has leaked or published about 10 million secret government documents through its website. CIA is the Central Intelligence agency and is US based one. It is the only civilian intelligence on which the US government can rely and get work done on presidential orders.

Get Help With Your Essay

If you need assistance with writing your essay, our professional essay writing service is here to help!

Essay Writing Service

Recently, on March 7th 2017, the WikiLeaks website published the documents that contained the information about the methods and techniques used by the Central Intelligence Agency to break into TVs, phones and cars. It also contained details about how possibly the soft wares of the global giants of tech like Apple, Google and Samsung can be breached (Holland, 2017).

Whether WikiLeaks is legal or not has ever remained a hot questions and a controversial debate. To prove the WikiLeaks a legal organization, the fact that it operates to provide a platform to employees especially the government servants where they can share the sensitive documents without bothering their jobs. This organization plays a pivotally important role for the journalists. On contrary to this, the WikiLeaks is illegal as it breaches the copyright of the sources form where it decipher data and publish it anonymously on its website.

The tug and pull war has remained between the CIA and WikiLeaks but the consequences of the recent published documents can be graver than ever before. As CIA is the only civilian intelligence agency upon which the US government has trust and that too it is a US based organization so it is obvious for the organizations to ask the US government for its verdict.

Legal Issues  

Some easily comprehendible legal issues associated with the CIA WikiLeaks are as follows:

  1. These leaks are thought to be passed to the WikiLeaks by the contactors of the CIA: This assumption will lead to massive chaos in the CIA itself. For the time being the Central Intelligence Agency is not only facing the severe repercussions of the leaks published by the WikiLeaks and one of such repercussion to answer the companies like Apple and Google for violating their fundamental rights. This can impact the repute and credibility of the CIA. Not only this but also the US government can be alleged for being the driving force behind these bold steps taken by the CIA.
  2. CIA breach is legally an alarming issue as it has direct political impact: Most certainly leakage of highly sensitive information is by no means legitimate and lawful. This unlawful element further gets elevated by its adverse and direct political impacts.
  3. The Espionage Act-1971 is likely to be levied on the founder of the WikiLeaks as it was deemed once before as well: Once before in the history the founder of the WikiLeaks has been sued on the charge of violation and breaching of the basic and the most fundamental human rights. This time, the organization has taken a highly devastating step by all means and measures and it is expected and some people are hoping to sue the administration of the WikiLeaks as soon as possible.

Social Issues

The social issues of the WikiLeaks are as much explicit as are the legal issues. Some important social issues of the WikiLeaks are here under:

  1. Manipulation of information is a big social issues as far as the CIA WikiLeaks are concerned: It is in human nature to inflict other humans. Organizations are also treated as human in international law and the present case says that not only the WikiLeaks has breached the fundamental rights but has also manipulated the information as the statement.
  2. The website itself says that the administration has omitted some information from the documents which will be published later. It clearly shows that the manipulation of the information has been done by the WikiLeaks.
  3. The general society claims to bother the common wellbeing of its citizens and the US government being the world super power claims to bring in peace and assure fundamental human rights of every human being across the globe. This claim is masked by stains as soon as the CIA WikiLeaks are published on the website.
  4. Through these leaks the WikiLeaks have undoubtedly breached the social and legal rights of the CIA which has encouraged the society in general to breach fundamental rights which is a bad and dangerous precedent. Public has a different perception than the government or organizations. The ultimate deciphering of the message given by the WikiLeaks through this act is the encouragement of violation of fundamental human rights and by taking the responsibility openly as if no law-in-order can sue.

Social Issues

  1. Freedom of Information: WikiLeaks have repeatedly been under attack of some vibrant criticism. It has always been levied on the organization that it violates basic human rights by publishing secrets which can have severe repercussions. The same matter is to be seen be with utter different perspective. The WikiLeaks believes that it has done nothing unlawful in past and nor will it do. As the organization calls its working principled leaking. It is very much obvious to believe that through this leak the WikiLeaks has actually emphasized on its stand for the freedom of information (Karhula, n.d).
  2. Exposure of Wide Scale Government Corruption: Another important social factor of the WikiLeaks is that it has exposed the ruthless and the corrupt face of the governments over the time. It serves to raise the curtain and allows the public to have the real image. In this way society do not consider it to be unlawful and illegitimate because the purpose of the WikiLeaks suits the aspirations of the public. In societal terms the WikiLeaks enjoys a credible position in the public and it certainly means that the organization has the ability to influence the society at a larger scale. This factor counts to be an important consideration of government as well.

Legal Issues

An important issue that the WikiLeaks had in the past and is evident in the present CIA leaks as well is that does the WikiLeaks really know the difference between information dump and journalism. This is the most debatable and hot questions. People have spoken in favor of the WikiLeaks but in this regard the organization receive more criticism. Whatsoever be the reason, it is quite certain that the WikiLeaks have often dumped in the information in guise of journalism.

Perhaps the CIA leakage and its aftermath is the perfect time for the international segregation of journalists to stand against the organization. Here the emphasis is not on the consequences of the leakage rather the important ethical issue is that why is journalism being made confused with the information dump.

CONCLUSION

Government hacking natives is a method for reconnaissance yet with the protection demonstration my question is would we be able to truly know whether the records and archives discharge by WikiLeaks are genuine and in the event that they are genuine what the legislature is doing with all the observation and capacity. Security Breach, Hacking and other type of system interruption will in any case be here on the grounds that product, developers are advancing and the need to secure programming and program we have to know their imperfections and the best way to do that is to hack them. With this Leaks bunches of individuals will be exceptionally cautious on what they put on the web and a few people will cover their webcam on their portable PC or Smart TV.

Find Out How UKEssays.com Can Help You!

Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.

View our services

Notwithstanding news scope for the most part concentrating on spying capacities for shopper level gadgets, there is a noiseless executioner prowling in the shadows of the landfill: a few of the apparatuses discharged were non-malware assaults (regularly called file less assaults or “living-off-the-arrive” assaults). Non-malware assaults pick up control of PCs without downloading noxious programming. Rather, they utilize trusted, local working framework instruments, for example, PowerShell, and endeavor running applications, for example, programs, to “live off the land.” These assaults represent a greater hazard than malware assaults since they are harder to recognize and cause more harm.

The security business has seen the ascent of these assaults as lawbreakers and spies utilize them more. The CIA was additionally abusing these assault techniques — given that they’re an about imperceptible approach to rupture a framework — yet the Vault 7 discharge gives these instruments to countless noxious performers.  Non-malware assaults will turn out to be more ordinary, more progressed and more incessant, and security experts wherever should be on high ready. In light of past history, I anticipate that WikiLeaks will make these vulnerabilities open quickly after tech organizations make a fix. In the event that they take after this course, will enable aggressors to utilize the devices to direct surgical strikes and weaponized each benefit accessible.

I couldn’t think about a superior contemporary occasion to identify with the above cases then what was as of late discharged by the most advanced programmer on the planet, WikiLeaks. Prior this month a large number of reports containing modern programming apparatuses and procedures that were being utilized by the C.I.A were discharged to the general population. This product was being utilized by the organization to break into PCs, cell phones, and even SMART TVs. Like the investigation of Flame Malware, these instruments the organization has under lock and key could take advantage of Skype calls and keep record of the discussion that occurred. I additionally think the WikiLeaks discharge is firmly identified with Industrial Espionage through social building in light of the fact that the burglary of touchy data occurred and mystery data was traded off just without the utilization of an insider.

The WikiLeaks hack is likewise identified with the North Korea hack on Sony on the grounds that both utilized the internet for pressure. In any case, I don’t think everybody would concur that the current WikiLeaks discharge was pressure. With all due respect WikiLeaks states it was “pointing out the C.I.A’s worldwide incognito hacking system, it’s malware munitions stockpile and many weaponized misuses against an extensive variety of U.S. also, European organization items, including Apple’s iPhone, Google’s Android and Microsoft Windows and even Samsung TV’s, which are transformed into secret receivers.” (Krebs, 2017) So was this WikiLeaks discharge done to constrain or was it to advise general society of works on being utilized by our Federal authorities.

I trust consequential list principles ought to be connected while tending to the issues raised by the WikiLeaks discharge. This moral standard expresses that deciding if a demonstration is correct or wrong will rely on upon the outcomes of the demonstration itself. I see it as the all the more great that can be delivered by the outcomes, the better the demonstration was/is. As to WikiLeaks arrival of data educating the general population that the CIA has the way to hack into our own effects will make you feel somewhat uneasy. I question the CIA has any enthusiasm for hacking into my SMART TV in my parlor since I am not giving them motivation to. Be that as it may, in what capacity will this affect our military abilities to spy and hack into fear based oppressor association databases now that they know how the U.S. is doing it and what apparatuses we are utilizing? I don’t think WikiLeaks had any expectations on disturbing National Security rather they practiced their free press appropriate to distribute data they think society ought to know. I simply wish WikiLeaks was this forceful with psychological militant associations and would distribute some of their insider facts.

REFERENCES

  1. Khandelwal, S. (2017). 10 Things You Need To Know About ‘Wikileaks CIA Leak’. [online] The Hacker News. Available at: http://thehackernews.com/2017/03/wikileaks-cia-vault7-leak.html [Accessed 30 Apr. 2017].
  2. Miller, G. and Nakashima, E. (2017). WikiLeaks says it has obtained trove of CIA hacking tools.[online] Washington    Post. Available at:https://www.washingtonpost.com/world/national-security/wikileaks-says-it-has-obtained-trove-of-cia-hacking-tools/2017/03/07/c8c50c5c-0345-11e7-b1e9-a05d3c21f7cf_story.html?utm_term=.a35ea025732e [Accessed 30 Apr. 2017].
  3. Technewsworld.com. (2017). WikiLeaks Dumps CIA Hacking Docs Online | Cybersecurity | TechNewsWorld. [online] Available at: http://www.technewsworld.com/story/84353.html [Accessed 30 Apr. 2017].
  4. Karhula, P. (n.d.). What is the effect of WikiLeaks for Freedom of Information?. [online] Available at: https://www.ifla.org/publications/what-is-the-effect-of-wikileaks-for-freedom-of-information [Accessed 26 Apr. 2017].
  5. CNET. (2017). What is WikiLeaks?. [online] Available at: https://www.cnet.com/how-to/what-is-wikileaks/ [Accessed 30 Apr. 2017].

 

Cite This Work

To export a reference to this article please select a referencing stye below:

Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.

Related Services

View all

DMCA / Removal Request

If you are the original writer of this essay and no longer wish to have your work published on UKEssays.com then please: