Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Will WikiLeaks unravel the American 'secret government'?
#80
Keith Millea Wrote:11.30.10 - 11:37 AM
Taking Wikileaks Down

[Image: computerhacker-1117.jpg]
Another denial-of-service attack has brought down the Wikileaks site, at least temporarily. Responsibility for an attack Sunday has been claimed by a hacker known as the Jester, who charged Wikileaks with "attempting to endanger the lives of our troops."

30 November 2010 Attack hits Wikileaks cable site

[Image: _50216820_uptimegraphforcablegate,netcraft.gif] The attack on the site managed to make it inaccessible on the afternoon of 30 November
Continue reading the main story A web attack has been launched against the Wikileaks site set up to host leaked US diplomatic cables.


The deluge of data launched against the site managed to briefly make it unreachable around 1200 GMT on 30 November.
So far no-one has come forward to claim responsibility for the so-called denial-of-service (DoS) attack.
A similar attack was launched against the main Wikileaks site prior to the public release of the first cables.
Wikileaks revealed that the separate cablegate website was suffering a distributed denial of service (DDoS) attack via a message posted to its Twitter stream.
The cablegate site went live on Sunday night and soon after started to suffer occasional downtime.
A DDoS attack involves swamping a site with so many requests for access that it becomes overwhelmed.
Data gathered by net monitoring firm Netcraft showed that the cablegate site was intermittently available around Tuesday lunchtime and early afternoon because of the attack.
Prior to the launch of the site, Wikileaks had taken the precaution of hosting it on three separate IP addresses to cope with any attack.
"This does not appear to have prevented the current attack from succeeding," wrote Paul Mutton, a security analyst at Netcraft, in a blog post
He told the BBC that it was hard to work out what type of attack was under way. At the weekend before the cablegate site went live, a hacktivist known only as The Jester threatened to attack Wikileaks claiming its leak of cables would endanger US troops.
Mr Mutton said the latest attack was unlikely to be the work of The Jester as he has typically used Twitter to announce his targets. Something that was not done before the latest attack began.
"The cablegate site has only released 281 of the 251,287 leaked cables, so these attacks are likely to be symbolic action more than anything else," said Mr Mutton.
As cablegate came under attack, a separate ongoing assault against the main Wikileaks site made it unreachable on Tuesday afternoon.

From the Jesters website:

WikiLeaks – Insurance Policy Expired?

Posted: September 17, 2010 by th3j35t3r in General, Wikileaks, WikiSneaks

[Image: images.jpeg?w=150&h=90]UPDATE: I have re-uploaded ‘gap-insurance.aes256‘ and it appears to be staying put for now, however please download and upload to your favorite filer host and tell us where you put it in comments section below [Image: icon_wink.gif?m=1285254906g] @1000am EST 18th Sept.

So we all know it’s been pretty quiet round these parts. Why? WikiLeaks recently published a mysterious encrypted 1.4GB file titled “insurance.aes256′′ on their Afghan War Logs page, with no explanation. While much speculation has been going on as to the origins and purpose of the file, much of it saying that it is ‘insurance’ against WikiLeaks being taken down by the United States government, and contains ‘terrible secrets.’ WikiLeaks neither confirms nor denies the purpose of the file. But it remains there.

This annoyed me… so I got busy.
Anyone can download the actual ‘insurance.aes256′ file direct from WikiLeaks’ own servers here: http://leakmirror.wikileaks.org/file/straw-glass-and-bottle/insurance.aes256 and various other P2P and file-sharing hosts all over the internet.

So, in effect, Wikileaks is attempting to hold the U.S. Government ransom by holding this file ‘hostage’ – allowing anyone to download it, but rendering it useless without the key. Whether or not it’s a bluff, and the file is just (encrypted) random noise, or if it actually has sensitive information contained within it, is irrelevant.

An Analogy
There are two guys sitting at a table, one is Mr. X – a wealthy business owner – having tried to do good, and incurred cost to himself personally and his company in his efforts to look after his employees over his lifetime. His actions were always in the best interests of his staff and ‘mostly’ honorable.

The other guy, Mr. Y – was less wealthy and had a smaller business, with a following of loyal clients who always trusted his (alleged) integrity and high moral standpoint, his whole ethos and approaches. This is important to the clients because by the nature of the business they are all in – lives are at stake – and Mr. Y relies above all on this perceived client/trust relationship in order to continue to operate. Without it he’s in trouble.
Before them is a box, and in the box is a 3×5 index card with a list of the worst things they’ve ever done. I’ll let them be alone with their boxes for one hour, and after that hour I’ll open each of the boxes and make public the contents of each box. Who’s going to sweat more? We will see what we will see.

There’s a problem with this analogy: they both have their box in front of them, whereas in the current real-world situation, only ‘Mr. X‘ has a box. And worse still, it’s ‘Mr. Y’ who put it there.

Not cool.
I’d like to take a moment to describe what a “self-working card trick” is. A self-working card trick is a specific type of card trick (or magic) which does not require any skill to pull off. These tricks do not require sleight of hand, deception or any of the other things we normally associate with magic. They don’t even require a magician. Despite this, self-working card tricks can be some of the best because they are so baffling and can be pulled off with the audience watching as intently as they may- they will never see what’s going on until they realize the trick is based around a formula…not deception.

Now Here is the formula for the trick Assange is pulling on the U.S. Government:
The U.S. Government will dedicate resources to decrypting the file Assange has uploaded, proportional to the amount of damage they “believe” the information will do, if released. The best defense against damage from the information being decrypted is to determine what the information is so that denials, defenses, etc., can be prepared in advance. Without knowing exactly what information is encrypted in the file, the U.S. Government will presumably allocate resources proportional to the “most damaging thing” they believe the encrypted information is likely to conceal.

That’s assuming they give a shit.


Which they don’t. You see the only reason they would care about your file, Assange, is if you had already given the U.S. Government the key to the file (which you haven’t). Or maybe you are hoping that they use the much speculated upon ‘skeleton key’ or backdoor to AES256 encryption, that you believe the NSA has at their disposal? But even if they do have it (which they don’t), exactly how do you plan on ever finding out? By judging the NSA’s reaction to the contents of your file? LOL

Simple probability analysis to see if there were any statistical anomalies in the file has been performed, giving clues about the file. According to the results, the file is almost completely random. There is a very tiny bias towards 0 bits showing up more than 1 bits, but this is insignificant. Again, it could just be 1.4GB of random garbage. Or not.

Levelling the Field:
Now, hypothetically you understand, if errrrr ‘someone’ had been independently looking into WikiLeaks operations, (obviously this is not why you have heard so little from me lately) and had damning information regarding hmmm let’s say…
  • so-called ‘source handling/protection’ – (leak submission failings, log files, TOR?? Secure?? – really? Are WL themselves not accused of sniffing TOR traffic?)
  • the embedding of what can only be described as spyware within PDF files downloadable from WikiLeaks site –(now, even if WikiLeaks didn’t put it there, how did it pass the WikLeaks stringent ‘cleansing’ process and end up on multiple documents available to an ‘interested public’? (Who’s spying on who?)
  • who’s financing and donating – (few surprises here, wonder why ‘those guys’ are donating large amounts of $$$ to WikiLeaks, and if I know about it – who else does?)
  • advisory board – (J, B, W, N, D, T, Y, X, P, C, C – you know who you are [Image: icon_wink.gif?m=1285254906g]
  • more information pertaining to recent ‘allegations’ against WikiLeaks staffers.
  • Plus 3 additional subjects (hypothetically speaking you understand)
.
.. then made a nice portable 384Mb encrypted ISO 9660 image (for example) of a volume containing said findings, he sure as heck wouldn’t just put it, say…
RIGHT HERE (whooopsy daisy.)
(MD5SUM: 5488d43eb8e56166a8a08f3772c9c312)
Note for the interested party:

There are ways to conceal information in a file where the same file can be accessed, with different passwords where each password yields different information.

Why do I point this out?
Well obviously, hypothetically, the ISO could contain a series of nested sub-volumes – well eight (hypothetically). Each volume would have it’s own key, in this way, individual sections of said research could be dispensed at leisure – without divulging all contents immediately. A single file could be used to provide information on WikiLeaks and/or it’s cohorts and financiers for months or years to come, merely by meting out the various passwords which apply to various nested sub-volumes, over time.
Surely, this is all speculation and conjecture… right?
Surely WikiLeaks really does take their ‘duty of care’ to their sources seriously… right?

Surely WikiLeaks knows how to protect their ‘infrastructure’ don’t they, and furthermore if they were not covering their arcs, would make sure that nobody ever found out… right?

Now here’s a thing – if I trusted WikiLeaks, I might have uploaded this file to their site, but for some reason, I just don’t trust them. I can’t see them publishing it. Maybe I am paranoid, but what if I am not? We all know that WikiLeaks has been hiding behind the whole ‘freedom of the press’ card for way to long. They are now starting to cost lives, which is fine, as long as they are not innocent lives of Afghan Informants, and U.S./European troops.

Oh, and while I am on the subject, quit randomly downing your site because ‘you can’t afford’ to keep it running. LOL But somehow people are still strangely able to ‘donate’ on the exact same URL resolving to the exact same IP?? Come on guys – Periquito AB is not that expensive, which is a good thing because their approach to providing secure infrastructure is questionable.
Damn… I promised myself I wasn’t going to get into that… my sincere apologies… I digressed.

….So what do I, personally think is contained within the WikiLeaks ‘insurance.aes256′ file?
I would like to think, it contains mainly this:
http://tinyurl.com/y8ufsnp
…but who knows? Ya hear me Assange? – ‘Who knows? Who cares?’
Furthermore who even knows who knows? One thing however, that IS KNOWN and has been demonstrated time and again, neither WikiLeaks, Assange, or myself are particularly well known for pulling a bluff. We say what we mean, and mean what we say.
Is my research just food-for-thought-for-the-masses or a direct engagementagainst WikiLeaks? Or neither, or both? Who cares?
Poker anyone?

gap-insurance.aes256is released under a Creative Commons license. Please feel free to disseminate over your favorite file-sharing and p2p networks, and if you do, please put a link in the comments below so others can grab it. [Image: icon_wink.gif?m=1285254906g]

<<< peace out.
Jester

It seems to be 'full-out' cyberwarfare at this point. Whatever side you my USG on on [or your phony surrogates] I'm on the other side...please not this in my 'files'...thank you!
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply


Messages In This Thread
Will WikiLeaks unravel the American 'secret government'? - by Peter Lemkin - 01-12-2010, 04:57 PM
Will WikiLeaks unravel the American 'secret government'? - by Myra Bronstein - 06-12-2010, 05:45 AM
Will WikiLeaks unravel the American 'secret government'? - by Myra Bronstein - 08-12-2010, 03:13 AM
Will WikiLeaks unravel the American 'secret government'? - by Myra Bronstein - 08-12-2010, 03:40 AM
Will WikiLeaks unravel the American 'secret government'? - by Myra Bronstein - 11-12-2010, 06:34 AM

Possibly Related Threads…
Thread Author Replies Views Last Post
  Complete Wikileaks Data Dump Lauren Johnson 1 4,122 14-12-2021, 06:08 PM
Last Post: Lauren Johnson
  Wikileaks Next Series: Vault 7 Lauren Johnson 23 60,702 09-11-2017, 05:06 PM
Last Post: Lauren Johnson
  A Very Partial List of CIA Secret & Illegal Operations Peter Lemkin 0 8,436 07-11-2017, 05:50 AM
Last Post: Peter Lemkin
  American Libertarians [Neocons?] Are Remaking Latin American Politics Peter Lemkin 1 7,267 13-08-2017, 04:29 AM
Last Post: Peter Lemkin
  Once invisible government now visible Harry Dean 0 3,143 12-03-2017, 04:21 AM
Last Post: Harry Dean
  Canada's secret Nazis Magda Hassan 0 3,447 28-02-2017, 11:06 AM
Last Post: Magda Hassan
  The hidden forces guiding the US Government Ivan De Mey 1 3,895 06-12-2016, 08:59 AM
Last Post: David Guyatt
  Wikileaks promises new release of information on Hilary. Drew Phipps 21 27,170 19-10-2016, 06:06 AM
Last Post: Peter Lemkin
  Noam Chomsky and the Manufacturing of American Dissent: 2 videos Paul Rigby 83 52,210 10-06-2015, 02:24 PM
Last Post: Matthew Hewitt
  HSBC Bank : Secret Origins to 26/11 Mumbai Attacks Paul Rigby 2 4,487 21-02-2015, 10:56 AM
Last Post: David Guyatt

Forum Jump:


Users browsing this thread: 1 Guest(s)