Julian Assange: Why I Founded WikiLeaks

Assange embassy
WikiLeaks founder Julian Assange waves from a window with Ecuador’s Foreign Affairs Minister Ricardo Patino at Ecuador’s embassy in central London June 16, 2013.
Julian Assange explains the radical thinking that led him to create WikiLeaks in When Google Met WikiLeaks, published by OR Books.

Assange’s account of his encounter with the head of Google, Eric Schmidt, can be found here.  

I looked at something that I had seen going on with the world, which is that I thought there were too many unjust acts. And I wanted there to be more just acts, and fewer unjust acts.

And one can ask, “What are your philosophical axioms for this?” And I say, “I do not need to consider them. This is simply my temperament. And it is an axiom because it is that way.” That avoids getting into further unhelpful philosophical discussion about why I want to do something. It is enough that I do.

In considering how unjust acts are caused, and what tends to promote them, and what promotes just acts, I saw that human beings are basically invariant. That is, their inclinations and biological temperament haven’t changed much over thousands of years. Therefore the only playing field left is: what do they have and what do they know?

What they have—that is, what resources they have at their disposal, how much energy they can harness, what food supplies they have and so on—is something that is fairly hard to influence. But what they know can be affected in a nonlinear way because when one person conveys information to another they can convey it on to another, and another, in a way that is nonlinear[i].

So you can affect a lot of people with a small amount of information. Therefore, you can change the behavior of many people with a small amount of information. The question then arises as to what kinds of information will produce behavior which is just and disincentivize behavior which is unjust?

All around the world there are people observing different parts of what is happening to them locally. And there are other people that are receiving information that they haven’t observed firsthand. In the middle there are people who are involved in moving information from the observers to the people who will act on information. These are three separate problems that are all tied together.

I felt that there was a difficulty in taking observations and, in an efficient way, putting them into a distribution system which could then get this information to people who would act upon it. You can argue that companies like Google, for example, are involved in this “middle” business of moving information from people who have it to people who want it.

The problem I saw was that this first step was crippled, and often the last step was as well, when it came to information that governments were inclined to censor.

“People don’t want to be coerced, they don’t want to be killed.”

We can look at this whole process as justice produced by the Fourth Estate[ii]. This description, which is partly derived from my experiences in quantum mechanics, looks at the flow of particular types of information which will effect some change in the end. The bottleneck appeared to me to be primarily in the acquisition of information that would go on to produce changes that were just.

In a Fourth Estate context, the people who acquire information are sources; the people who work on information and distribute it are journalists and publishers; and the people who may act on it includes everyone.

That’s a high-level construct. But it then comes down to how you practically engineer a system that solves that problem, and not just a technical system but a total system. WikiLeaks was, and is, an attempt—although still very young—at a total system.

On the technical front, our first prototype was engineered for a very adverse situation where publishing would be extremely difficult and our only effective defense would be anonymity, where sourcing would be difficult (as it still currently is for the national security sector), and where internally we had a very small and completely trusted team.

I would say that probably the most significant form of censorship, historically, has been economic censorship, where it is simply not profitable to publish something because there is no market for it.

I describe censorship as a pyramid. On the top of the pyramid there are the murders of journalists and publishers. On the next level there are legal attacks on journalists and publishers. A legal attack is simply a delayed use of coercive force, which doesn’t necessarily result in murder but may result in incarceration or asset seizure.

Remember, the volume of the pyramid increases significantly as you go down from the peak, and in this example that means that the number of acts of censorship also increases as one goes down.

12_23_Assange“When Google Met Wikileaks” by Julian Assange OR BOOKS

“We would need a publishing system where the only defense was anonymity.”

There are very few people who are murdered, there are a few public legal attacks on individuals and corporations and then at the next level down there is a tremendous amount of self-censorship. This self-censorship occurs in part because people don’t want to move up into the upper parts of the pyramid—they don’t want to come under legal attack and coercive force, they don’t want to be killed. That discourages people from behaving in a certain way.

Then there are other forms of self-censorship motivated by concerns over missing out on business deals, missing out on promotions. Those are even more significant because they are lower down the pyramid. At the very bottom—which is the largest volume—is all those people who cannot read, do not have access to print, do not have access to fast communications, or where there is no profitable industry in providing such[iii].

We decided to deal with the top two sections of this censorship pyramid: threats of violence, and the delayed threats of violence that are represented by the legal system. In some ways that is the hardest case; in some ways it is the easiest case.

It is the easiest case because it is clear-cut when things are being censored or not. It is also the easiest case because the volume of censorship is relatively small, even if the per-event significance can be very high.

Initially, WikiLeaks didn’t have that many friends. Although of course I had some previous political connections of my own from other activities, we didn’t have significant political allies and we didn’t have a worldwide audience that was looking to see how we were doing. So we took the position that we would need to have a publishing system where the only defense was anonymity. It had no financial defense; it had no legal defense; and it had no political defense. Its defenses were purely technical.

That meant a system that was distributed at its front[iv] with many domain names, and a fast ability to change those domain names[v], a caching system[vi], and, at the back, tunneling through the Tor network to hidden servers[vii].

Extracted from When Google Met WikiLeaks by Julian Assange published byOR Books. Newsweek readers can obtain a 20 percent discount on the cover price when ordering from the OR Books website and including the offer code word NEWSWEEK.

Assange’s account of a long conversation with the head of Google, Eric Schmidt, can be found here.


[i] What is meant by “nonlinear” here is that the rate at which information spreads is not a constant, but instead increases as it spreads throughout a population. For example, if on one day a person spreads an idea to two people, and on the next day the three of them each spread it to two new people, and so on, then after the first day three people know, after the second day nine people know, after the first week 2,187 people know, and after twenty-one days every person on earth knows (given the present human population of 7.1 billion). In literal terms, “nonlinear” means “cannot be graphed as a straight line.”

[ii] The “Fourth Estate” is an informal term referring to any group outside governmental or political organizations that have an influence on politics. It is usually used to denote the press.

[iii] For a visual representation of the censorship pyramid, see Marienna Pope-Weidemann, “Cypherpunks: Freedom and the Future of the Internet” (review), Counterfire, 13 September 2013, archive.today/Oyczc

For further discussion of this idea, see Julian Assange with Jacob Appelbaum, Andy Müller-Maguhn, and Jérémie Zimmermann, Cypherpunks: Freedom and the Future of the Internet (OR Books, 2012), pp. 123–124.

[iv] “Distributed at its front” is a technical description. The “front” of a website is the part that is visible when you visit it with your browser. On most news websites, the front and the back of the website are at the same physical location. This means that it is easier to censor, because there is just one point of weakness. WikiLeaks was built to deal with censorship, so it used a different model, where the back ends of the site are hidden and secret, and where the front end of the website is copied across lots of different computers. This means that even if one of the computers that hosts the “front” of the website is attacked, there will be other copies, and the site will still be available to the public. Furthermore, the “back” of the website remains secret, and new “front” nodes can be created at will.

[v] A “domain name” is a human-readable name for an internet site, like “wikileaks.org” or “whitehouse.gov” All devices connected to the internet are assigned numerical addresses, known as IP addresses. All internet sites on the web are hosted on computers, and can be accessed with an IP address. For example, “” is an IP address for the WikiLeaks website (just one of many front nodes). IP addresses are difficult to remember. To solve this problem, the “domain name system” (DNS) was invented: the system for linking “domain names” to IP addresses.

Unlike IP addresses, which are automatically assigned whenever you connect a device to the network, you can own a domain name of your choice by registering it with a “domain name registrar” for a small fee. All domain names are entered into a global directory—like a telephone directory—that links each domain name to the real IP address of an actual website. When “wikileaks.org” is typed into a browser, the browser first does a “lookup”—it contacts a DNS server, which contains a copy of the global directory, and looks up the domain name “wikileaks.org” to find the corresponding IP. It then loads the website from that IP. When a domain name is successfully translated into an IP address, it is said to have “resolved.”

A “DNS attack” is an attempt to cut off an internet site by interfering with the directory that links the domain name to the IP address, so that it will no longer resolve. But just as there are many different telephone directories, there are many different DNS servers. By being able to switch DNS servers quickly, it is possible to defend against the effects of a DNS attack, and ensure that the website is accessible.

[vi] “A caching system,” in the abstract, is a fast system that holds no information to begin with but is connected to a slow system that does. When the cache is asked for information, it initially relays the request to the slow system, forwards the reply, and keeps a copy. When the cache is asked again, it quickly sends the copy it has previously made.

WikiLeaks uses many location-shielding and encryption technologies that can slow down the path to the “back end,” where the content is generated. In this context, a caching system is designed to help speed up the overall system, to make it more usable, by speeding up any repeated requests, which the majority of requests are.

[vii] A “hidden server,” in this context, is a server that is not accessible using the conventional internet. WikiLeaks was using custom software to hide some of its websites in a way that was inaccessible to most of the internet.

The “back end” of WikiLeaks—that is, the software that produces the WikiLeaks website—was hidden. From the hidden “back end” the content was pushed to the front nodes by “tunneling through the Tor network,” that is, using the location-hiding and encrypted Tor network to push content to the servers where people could read it.

The concept is similar to that of the “Tor hidden service.” See the Tor Project website: archive.today/tmQ5y

Wikileaks Cables Confirm Existence of Extraterrestrial Life.

We’re already halfway through 2013 and the world continues to wake up to the fact that we are not alone in the universe. This year alone we’ve seen a tremendous step forward regarding UFO disclosure. In early May, researchers, activists, political leaders and high ranking military/agency personnel from around the world testified to the reality of the UFO/extraterrestrial phenomenon in front of several former United States members of congress. To watch an interview with the former 2008 presidential candidate and ex-congressman Mike Gravel (who participated in the hearings) click here. You can watch interviews with all of the senators that participated in the event here.


Prior to the recent hearing on UFOs and extraterrestrial life, we’ve had explosive statements made by NASA astronauts and professors, you can watch some of those statements here and here. Not only has the world heard from all of these credible people, its also been privy to official documentation released by dozens of governments worldwide that outline the reality of the UFO phenomenon. Documents indicate that UFOs are of concern to governments, and they put a significant amount of time, effort and resources into studying them. Apart from governments, agencies like the National Security Agency also released official files regarding UFOs, you can view some of these previously classified documents here.

It’s now a fact that UFOs are tracked on radar, performing maneuvers that defy our idea of physics. Jets are constantly scrambled to take a closer look at them. This is no longer a conspiracy theory, it’s a fact. Release of files began early in 2007 with the UK, among others. Since then they’ve released thousands of pages every year, with the latest ones published in June 2013 made available at the UK’s National Archives. You can view them here.

Behind the scenes, high-ranking Air Force officers are soberly concerned about UFOs. But through official secrecy and ridicule, many citizens are led to believe the unknown flying objects are nonsense.
—Former CIA Director, Roscoe Hillenkoetter, 1960.
The UFO/extraterrestrial phenomenon is extremely top secret, access to this type of documentation and the deeper truth behind it is almost impossible. CIA directors, presidents and other high ranking officials barely have any access to these programs. That being said, all of the information that’s already out in the public domain is overwhelming. It makes you wonder how far down the rabbit hole this topic goes.

As most of the world today already knows, Wikileaks is an international, online, non-profit organization that publishes secret information, news leaks, and classified material from anonymous sources. They’ve been a tremendous threat to the controlling elite for a number of years, and have gained the attention of major mainstream media outlets worldwide. For the most part, these mainstream media outlets have bashed Assange, pointing to the idea that the release of classified documents is a threat to national security. That’s not true, it’s more like a threat to the truth that the elite try to cover up on a daily basis that would threaten their ability to control the human race.

Since a large amount of official documentation has already been released, documents from the Wikileaks cables shouldn’t come as a big surprise. Assange has already mentioned that there are yet to be published cables that make reference to UFOs. This is no joke, below are quotations taken from official transcripts via the official Wikileak cables.


You can view it here: http://wikileaks.org/cable/2010/01/10DUSHANBE82.html

On January 13 Ambassador called on Dushanbe Mayor and Chairman of the upper house of Parliament Mahmadsaid Ubaidulloev at his parliamentary office. The Mayor began the meeting with a lengthy discourse on Afghanistan, thanking the United States for its contributions and sacrifices there, and saying that U.S. activities there were very important “as we enter the third millennium and the 21st century.” Ubaidulloev thought the main task there was to build a sense of national identity among ethnically disparate groups, and said the United States was an example for this. He noted that “war is very dangerous”, and said “we know there is life on other planets, but we must make peace here first.
In a platitude-ridden meeting, Dushanbe Mayor Mahmadsaid Ubaidulloev said upcoming elections would be free and fair, that contributions to the Roghun Dam were voluntary, and that the losses suffered by the United States in Afghanistan were felt by Tajiks as their own. Ubaidulloev asked for help in getting Tajik students admitted to Harvard University, but effectively declined to help find a new location for an American Corner in Dushanbe. He asserted the existence of life on other planets, caveating this by noting that we should focus on solving our problems on Earth. End Summary.
Not only do these cables raise an eyebrow, but a statement given by Julian Assange himself raises the need for further inquiry. The audio on the video is delayed. What points to this interview being real? For one, if you can read lips it’s not hard to follow. Secondly, it sounds exactly like Julian. Thirdly, multiple mainstream media outlets (Telegraph, CBS news and more) published the original version of the video which was taken down immediately. One of the mainstream media outlets was Forbes, you can view that poorly written article here in which you will see access to the video has been cut off. Articles written by major media outlets are usually very poor, and do their best to ridicule the subject of UFOs. The original version had perfect audio, the same sound and was in the same setting.

I have said in passing there is information about UFOs in Cablegate. And that is true, but these are only small passing references. Most of the material concerns UFO cults, and their behaviour in recruiting people. For instance, there is quite a large cable, which we’ll try and release in the next few days, concerning the Raelians, a UFO cult which has a strong presence in Canada and was of concern to the U.S. ambassador in Canada – Julian Assange

It’s not surprising that that the U.S. ambassador in Canada was concerned with this group. High level agencies are also concerned with abductees and ET contactees. Their mail is stamped in a special way, they are constantly surveyed by army intelligence, phone tapping and are also confronted by ‘men in black’ (intelligence officers). Agencies that are active in the UFO phenomenon keep close tabs on UFO/extraterrestrial activity outside of their sphere of influence. That being said, again, it’s no surprise that the U.S. ambassador had an interest in this ‘UFO cult.’ Anything extraterrestrial would be a concern to the elite, as they are the ones active in the cover up.

We are living in an extremely unique time, our world has become much more transparent than ever before. One aspect of multiple realizations is the UFO/extraterrestrial phenomenon, but it seems to branch into every aspect of our reality depending on how far down the rabbit hole you want to go. Our perception of life on other planets largely comes from external sources like television programming. As a result, many are filled with fear when giving thought to this subject. Hopefully as we move through the shift in consciousness the planet is currently experiencing, fear will dissipate as it will no longer serve the human race. This is undoubtedly one of the largest realizations in human history. The only thing that goes beyond it, in my opinion, is the realization of humanities infinite potential to create a new experience from a place of peace, love, co-operation and understanding.

“There is abundant evidence that we are being contacted, that civilizations have been visiting us for a very long time. That their appearance is bizarre from any type of traditional materialistic western point of view. That these visitors use the technologies of consciousness, they use toroids, they use co-rotating magnetic disks for their propulsion systems, that seems to be a common denominator of the UFO phenomenon.” – Dr Brian O’leary, Former NASA Astronaut and Princeton Physics Professor (source)

“Yes there have been crashed craft, and bodies recovered. We are not alone in the universe, they have been coming here for a long time” Apollo 14 Astronaut (source # 1) (source # 2)

“Decades ago, visitors from other planets warned us about the direction we were heading and offered to help. Instead, some of us interpreted their visits as a threat, and decided to shoot first and ask questions after. It is ironic that the US should be fighting monstrously expensive wars, allegedly to bring democracy to those countries, when it itself can no longer claim to be called a democracy when trillions, and I mean thousands of billions of dollars have been spent on black projects which both congress and the commander in chief have been kept deliberately in the dark.” –
Paul Hellyer, Former Canadian Defence Minister (source)

There is nothing to be afraid of.

Much Love





%d bloggers like this: