. Military Space News .
CYBER WARS
WikiLeaks list did not lead to attacks
by Staff Writers
Dallas TX (SPX) Mar 01, 2016


File image.

The WikiLeaks organization was criticized for providing a target list for terrorists when it published a secret memo in 2010 with 200 international sites that the U.S. Department of State considered critical to national security.

Was there any truth to that claim?

Dr. Daniel G. Arce, Ashbel Smith Professor and program head of economics in the UT Dallas School of Economic, Political and Policy Sciences, wanted to find out. In a new study published in the International Journal of Critical Infrastructure Protection, he found no evidence that the leak led to any attacks.

"When the list came out, there was a lot of concern that this was a to-do list for terrorists," Arce said. "I wanted to answer the question. If you're going to make claims, at some point you have got to look back and see if the claims were true."

WikiLeaks published a secret memo listing critical infrastructure facilities around the world. The classified Department of Homeland Security information listed weapons manufacturers, mines, pharmaceutical facilities and other sites that, if attacked, would critically impact the United States. U.S. officials denounced WikiLeaks for releasing the list, saying it could jeopardize national security.

As part of his analysis, Arce compared the facilities with more than 40,000 terrorism incidents entered in the Global Terrorism Database, which includes information on terrorism events. Arce focused on events occurring from December 2010 through 2014.

Of more than 200 sites on the State Department's list, two were attacked after the locations were leaked.

An attack on an oil refinery in Basra, Iraq, resulted in no casualties. Arce said it would be difficult to attribute the attack to WikiLeaks given the insurgent activity in that nation. The other attack was on the Baku-Tbilisi-Ceyhan pipeline in Turkey, which had been attacked multiple times before the release of the WikiLeaks list.

"It's really unlikely that it was a to-do list for terrorists," Arce said. "It doesn't appear that it created as much of a security risk as claimed." He noted that failed attacks might not be chronicled in the database.

Although Arce said the leak did not turn out to be a target list for terrorists, the document revealed which sites the U.S. government deemed most critical. Arce's analysis found that those locations differed significantly from targets previously attacked by terrorists. He said the sites may have been included based on anticipated attacks rather than on previous attack patterns.

"It's possible that sites on the list were not attacked because the list prompted better security at those locations," Arce said. "Based on these findings, more research is needed to evaluate the risks to facilities on the list."


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
University of Texas at Dallas
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

Previous Report
CYBER WARS
Apple-FBI case has wide implications
Washington (AFP) Feb 28, 2016
Apple and the US government are squaring off in an epic legal battle with wide-ranging implications for how technology firms must work with law enforcement. The iPhone maker is being asked to provide "reasonable assistance" to the investigation of the last year's deadly San Bernardino attacks by disabling security preventing the FBI from accessing the encrypted handset of one of the shooters ... read more


CYBER WARS
China Interfering in THAAD Deployment Decision Process Preposterous

S. Korea dismisses China warning on US missile system

Russian expert says THAAD deployment in S. Korea to raise regional tension

US missile system in S. Korea would hurt Seoul-Beijing ties: envoy

CYBER WARS
Russia negotiating S-300 missile systems' supplies to Iran

Saudi says it intercepted Scud missile from Yemen

Saab, Indian firm in joint venture for missile programs

Saudi Patriot 'intercepts' Scud fired from Yemen capital

CYBER WARS
New sensor payload capability available for Global Hawk

US failing to explain deadly drone policy: report

NASA Global Hawk Flies Pacific Storm Mission

Drone serves as both aircraft and submarine

CYBER WARS
US Army Pacific exercise highlights joint communications for Pacific Theater

ViaSat tapped to provide tactical terminals for Apache helicopters

Harris wins place on military communications contract

General Dynamics MUOS-Manpack radio supports government testing of MUOS network

CYBER WARS
Rheinmetall upgrading Polish Army's Leopard 2 tanks

Milrem unveils unmanned ground vehicle at Singapore Airshow

BAE Systems announces upgrades to engineering vehicle

Court denies Lockheed Martin JLTV injunction request

CYBER WARS
Australia unveils 'massive' increase in defence spending

BAE Systems profit jumps; eyes defence spend recovery

US firearms industry marketing to children: report

US dominates arms trade as Asia, Mid-East boost imports

CYBER WARS
China to secure 'de facto' control of S. China Sea: US admiral

Ex-military chiefs say Britain is 'stronger' in EU

China's Pacific actions galvanize neighbors against it: Pentagon chief

China deploys fighter jets to contested island in S. China Sea

CYBER WARS
Physicists promise a copper revolution in nanophotonics

Stretchable nano-devices towards smart contact lenses

New ways to construct contactless magnetic gears

Scientists take nanoparticle snapshots









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.