Skip to main contentSkip to navigationSkip to navigation
US embassy in London
Wikileaks released more than 250,000 US embassy cables revealing highly sensitive information. Photograph: Martin Argles for the Guardian
Wikileaks released more than 250,000 US embassy cables revealing highly sensitive information. Photograph: Martin Argles for the Guardian

Wikileaks evades hackers with shift to Amazon

This article is more than 13 years old
Website moves front page to Amazon server hire service but keeps US embassy cables out of reach (updated)

Wikileaks, the site that has infuriated the US government by releasing thousands of US diplomatic cables, is being hosted by one of the symbols of that country's internet success - Amazon.

The site came under a "Distributed Denial of Service" (DDOS) attack on Sunday night from an unidentified hacker, forcing it to seek a new location for its computer files. And it found it through Amazon's "Elastic Cloud Computing" (EC2) service, which enables businesses to hire its servers and store their data there.

DDOS attacks typically force sites off the net unless they have enormous bandwidth at their disposal or highly effective countermeasures. Wikileaks, being small and struggling for funds, is neither.

But EC2 allows companies to pay for their usage as it mounts up, rather than upfront.

While Amazon is American, not all of its servers are hosted there - and it could cause a major incident if the US government were to take action against a company on the basis that it might be hosting material the government finds embarrassing.

But the US government would not be able to remove the diplomatic cables from the internet by ordering Amazon to take down the Wikileaks pages - partly because the cables are not hosted there: further digging shows that http://cablegate.wikileaks.org, where the documents are being held, is actually hosted by Octopuce, a French company.

The use of Amazon's EC2 is therefore more likely to be a convenient way of evading the DDOS attack. The pages that are hosted there do not appear to contain any of the sensitive information that the US government has been complaining about - meaning that it would have little legal cause to complain to Amazon.

Update: Alex Norcliffe points out that in fact the cables are being hosted - in part - on Amazon's US servers: "the cablegate.wikileaks.org site is most definitely using Amazon's west-coast datacentre in addition to Octopuce... The way this is done is by "DNS round-robin", and means that when asking for cablegate.wikileaks.org you might sometimes be directed to Octopuce and sometimes to Amazon. To verify this, you can see all the results of their DNS entry at http://www.whatsmydns.net/#A/cablegate.wikileaks.org - the 9x IP address is Octopuce, and the 2x IP address is Amazon's west-coast data centre."

Norcliffe says that the Wikileaks war logs were also hosted on Amazon EC2.

Comments (…)

Sign in or create your Guardian account to join the discussion

Most viewed

Most viewed