United States v. Manning,  known now as Chelsea Manning. After serving in Iraq since October , Manning was arrested in May after Adrian Lamo , a computer hacker in the United States, indirectly informed the Army's Criminal Investigation Command that Manning had acknowledged passing classified material to the whistleblower website, WikiLeaks. Manning entered guilty pleas to 10 of 22 specified offenses in February The trial on the 12 remaining charges began on June 3,
Breaking Down the Hacking Case Against Julian Assange
Case Studies Continued | Cyberwarfare
CNN -- Media outlets and a Twitter feed this week lobbed a controversial term into the public debate about cyber attacks over WikiLeaks:. Despite these bold proclamations, internet security experts said the WikiLeaks-related attacks are anything but cyber war -- not that these same experts are exactly sure what a cyber war would look like, or if one has ever occurred. The WikiLeaks saga reads like a high-tech spy novel -- one packed with government secrets, icy Cold War bunkers , shady networks of anonymous hackers and, most recently, the disruption of American financial institutions. The battle over the site -- which has come under fire from the United States for publishing private diplomatic communications -- escalated this week as apparent WikiLeaks' supporters crashed the websites of PayPal, Visa and MasterCard, which had stopped processing donations to WikiLeaks. For everything else, there's Operation Payback," wrote a Twitter user claiming responsibility for the attacks -- and giving them a snappy name.
Cyber Security Case Study: Chelsea (formerly Bradley) Manning
In early , Private Bradley Manning leaked several thousand classified military documents and files to WikiLeaks. Most workstations have NetTop2 installed, which essentially prevents any data transfer from occurring, and they are virtual desktop sessions. This, however, was not the case.
The group has released a number of prominent document caches. Early releases included documentation of equipment expenditures and holdings in the Afghanistan war ,  a report about a corruption investigation in Kenya,   and an operating procedures manual for the U. The latter release allowed the mapping of , deaths in "significant" attacks by insurgents in Iraq that had been reported to Multi-National Force — Iraq , including about 15, that had not been previously published. In April , WikiLeaks began publishing secret files relating to prisoners detained in the Guantanamo Bay detention camp.