Posts: 9,353
Threads: 1,466
Likes Received: 0 in 0 posts
Likes Given: 0
Joined: Sep 2008
Peter Lemkin Wrote:David Guyatt Wrote:Ed Jewett Wrote:[B]... it could very well be internal U.S. elements unhappy with the direction the President is taking things. Wikileaks may have both domestic and foreign sources.
Interesting.
Wikileaks website is down. Suggestions are that China is responsible. But who really knows.
This link is still open and they are getting many attacks, but they also have many servers all over the world and mirrors and supposedly some very clever hacker-types working for them. This is really turning into a 'drama'! :bebored: :evil: :hmmmm:
It's still not accessible here in the UK Pete....
The shadow is a moral problem that challenges the whole ego-personality, for no one can become conscious of the shadow without considerable moral effort. To become conscious of it involves recognizing the dark aspects of the personality as present and real. This act is the essential condition for any kind of self-knowledge. Carl Jung - Aion (1951). CW 9, Part II: P.14
Posts: 16,104
Threads: 1,771
Likes Received: 0 in 0 posts
Likes Given: 0
Joined: Sep 2008
David Guyatt Wrote:Peter Lemkin Wrote:David Guyatt Wrote:Ed Jewett Wrote:[B]... it could very well be internal U.S. elements unhappy with the direction the President is taking things. Wikileaks may have both domestic and foreign sources.
Interesting.
Wikileaks website is down. Suggestions are that China is responsible. But who really knows.
This link is still open and they are getting many attacks, but they also have many servers all over the world and mirrors and supposedly some very clever hacker-types working for them. This is really turning into a 'drama'! :bebored: :evil: :hmmmm:
It's still not accessible here in the UK Pete....
I guess they are able to block from some locations [like UK and USA] using different means than here...still up here. It probably has been secretly rules contrary to the National Secrecy Act - or whatever its called.
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Posts: 9,353
Threads: 1,466
Likes Received: 0 in 0 posts
Likes Given: 0
Joined: Sep 2008
Nice to see that Brown protected Bush and Blair in Iraq Inquiry:
http://www.reuters.com/article/idUSLDE6AT2DX20101201
Quote:UK agreed to shield US interests in Iraq probe-leak
LONDON | Wed Dec 1, 2010 6:17am EST
Dec 1 (Reuters) - Britain's government gave secret assurances to Washington it would limit the scope of an inquiry into the Iraq war to protect U.S. interests, according to diplomatic messages leaked by a whistle-blowing website.
U.S. embassy cables obtained by WikiLeaks reported a British official, Jon Day, as telling U.S. officials in 2009 that Britain had "put measures in place to protect your interests" during the inquiry.
The inquiry was set up in 2009 by former Prime Minister Gordon Brown to learn lessons from the Iraq conflict, the most controversial episode in the 10-year premiership of Tony Blair, Brown's predecessor.
Critics have long argued that Blair promised former U.S. President George W. Bush in April 2002 that Britain would support military action to get rid of Iraqi leader Saddam Hussein, and then exaggerated intelligence reports about weapons of mass destruction. No such weapons were ever found.
A spokeswoman for the inquiry said she would not comment on leaks.
"The Iraq Inquiry is independent of the British government. The protocol agreed between the Iraq Inquiry and the government allows for material to be withheld from publication if publication would damage international relations," she said.
The Foreign Office issued a similar statement and the Ministry of Defence had no immediate comment.
The chairman of the Iraq committee, John Chilcot, has said the inquiry was not a trial but would make criticisms where warranted. He has defended his team from criticisms that they had been too soft on witnesses and that the inquiry would be a whitewash.
The protection mentioned by Day in the leaked cables would be for U.S. intelligence documents supplied before the Iraq war. They could not be brought to light because of the damage that would do to the Anglo-American alliance, they showed officials as saying.
The Sept 22 cable reported a meeting held in London earlier that month between U.S. officials including Under Secretary of State Ellen Tauscher and then British Foreign Secretary David Miliband and several senior officials including Day, the Ministry of Defence Director General for Security Policy.
Andrew Burgin, a spokesman for Stop the War Coalition, called the reported assurances given to Washington "despicable and an affront to the democratic procedures of this country."
"This was meant to be a full public inquiry and we can see that assurances have been given that American interests will not be embarrassed and it is necessary now I think for us to have a new inquiry and for that documentation, if it has been suppressed, to be released," he told Reuters.
The decision to go to war provoked huge protests, divisions within Blair's Labour Party and accusations he had deceived the public about the reasons for invasion. (Writing by William Maclean, Editing by Jon Boyle)
This proves yet again that a British Grubbingment sponsored "independent" inquiry has about as much meaning as the words "freedom & democracy".
The shadow is a moral problem that challenges the whole ego-personality, for no one can become conscious of the shadow without considerable moral effort. To become conscious of it involves recognizing the dark aspects of the personality as present and real. This act is the essential condition for any kind of self-knowledge. Carl Jung - Aion (1951). CW 9, Part II: P.14
Posts: 16,104
Threads: 1,771
Likes Received: 0 in 0 posts
Likes Given: 0
Joined: Sep 2008
So, no major revelations, but death by a thousand cuts to the USG and UK and many others....shit on all of their faces now. Assange has called for Clinton's resignation. Many in USA have called for Assange being killled - some without any legal process. the European [that doesn't include UK, sorry to say] Press is really abuzz with all this and I think many people around the world are waking up to what most of us on this Forum have long known......the system is rotten and corrupt to the core....it lies and is only self-serving or trading favors for the elites. The publics around the world be damned. Name me one major or mid-size country where democracy even has a chance, at the moment. mokin: I think these leaks, while not revelations are bringing in some fresh air and stirring things up quite a bit!!!:bike:
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Posts: 151
Threads: 21
Likes Received: 0 in 0 posts
Likes Given: 0
Joined: Sep 2010
Quote:Many in USA have called for Assange being killled - some without any legal process.
December 1, 2010 by legitgov
Harper advisor calls for assassination of Wikileaks director Posted by looncanada 30 Nov 2010 In a shockingly flippant comment to a Canadian television news anchor Evan Solomon of the CBC News Network on live TV, Tom Flanagan, a senior advisor and strategist to the Canadian Prime Minister Stephen Harper today called for the assassination of Wikileaks director Julian Assange.... Amazingly, although news anchor Solomon afforded Flanagan the opportunity to retract his statement, Flanagan balked at doing so and instead reiterated that U.S. President should put out a "contract" on Assange or use "a drone" and that he would not be unhappy if Assange "disappeared."
Posts: 9,353
Threads: 1,466
Likes Received: 0 in 0 posts
Likes Given: 0
Joined: Sep 2008
Bank of America shares drop amid Wikileaks rumours
http://www.independent.co.uk/news/world/...48150.html
Quote:Bank of America shares fall amid leak rumours
By Tom Peck
Wednesday, 1 December 2010
Shares in Bank of America, the largest US bank, fell by more than 3 per cent amid speculation it is to be Wikileaks' next target. The whistle-blowing website's founder, Julian Assange, the subject of a US criminal investigation, claimed a fresh "megaleak" will target a major US bank "early next year".
The controversial Australian told Forbes magazine that he was ready to release tens of thousands of documents that could "take down a bank or two".
Assange said the leak would "give a true and representative insight into how banks behave at the executive level in a way that will stimulate investigations and reforms, I presume".
The Forbes interview was conducted several weeks ago, before Sunday's publication of around a quarter of a million leaked US embassy cables, but had not been published.
Assange did not mention Bank of America, but in an interview last year he claimed to be in possession of the hard drive of one of the bank's executives.
Goldman Sachs were mentioned by name in the interview, but Assange did not confirm the Wall Street investment giant will be the target of the leak.
Let's hope it is Goldmans.
The shadow is a moral problem that challenges the whole ego-personality, for no one can become conscious of the shadow without considerable moral effort. To become conscious of it involves recognizing the dark aspects of the personality as present and real. This act is the essential condition for any kind of self-knowledge. Carl Jung - Aion (1951). CW 9, Part II: P.14
Posts: 16,104
Threads: 1,771
Likes Received: 0 in 0 posts
Likes Given: 0
Joined: Sep 2008
01-12-2010, 03:54 PM
(This post was last modified: 01-12-2010, 04:04 PM by Peter Lemkin.)
Christer Forslund Wrote:Quote:Many in USA have called for Assange being killled - some without any legal process.
December 1, 2010 by legitgov
Harper advisor calls for assassination of Wikileaks director Posted by looncanada 30 Nov 2010 In a shockingly flippant comment to a Canadian television news anchor Evan Solomon of the CBC News Network on live TV, Tom Flanagan, a senior advisor and strategist to the Canadian Prime Minister Stephen Harper today called for the assassination of Wikileaks director Julian Assange.... Amazingly, although news anchor Solomon afforded Flanagan the opportunity to retract his statement, Flanagan balked at doing so and instead reiterated that U.S. President should put out a "contract" on Assange or use "a drone" and that he would not be unhappy if Assange "disappeared."
Yes, THAT is what America/some in Canada has/have become [even though this was but one deranged person - this is a commonly shared and growing 'idea']. How, I ask, does this differ from the behavior of the SS or Gestapo; Stalin's GRU and other kill agencies....and I could name others we all revile....
"...we have met the enemy; and the enemy is us." - Pogo
We learned NOTHING from WWII [or I - or any war or conflict! - nothing from the Enlightenment through the various battles for Peace, Freedom, Justice, Human Rights over the last centuries]; nothing from the Nuremberg Principles and Trials; We have in fact learned nothing from history and the history of humanist/progressive/anti-Oligarchic ideas. We are barbarian/serfs again - having come full circle...I know why, but that is too long a diatribe for this thread.
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Posts: 2,221
Threads: 334
Likes Received: 0 in 0 posts
Likes Given: 0
Joined: Oct 2008
11.30.10 - 11:37 AM
Taking Wikileaks Down
Another denial-of-service attack has brought down the Wikileaks site, at least temporarily. Responsibility for an attack Sunday has been claimed by a hacker known as the Jester, who charged Wikileaks with "attempting to endanger the lives of our troops."
30 November 2010 Attack hits Wikileaks cable site
The attack on the site managed to make it inaccessible on the afternoon of 30 November
Continue reading the main story A web attack has been launched against the Wikileaks site set up to host leaked US diplomatic cables.
The deluge of data launched against the site managed to briefly make it unreachable around 1200 GMT on 30 November.
So far no-one has come forward to claim responsibility for the so-called denial-of-service (DoS) attack.
A similar attack was launched against the main Wikileaks site prior to the public release of the first cables.
Wikileaks revealed that the separate cablegate website was suffering a distributed denial of service (DDoS) attack via a message posted to its Twitter stream.
The cablegate site went live on Sunday night and soon after started to suffer occasional downtime.
A DDoS attack involves swamping a site with so many requests for access that it becomes overwhelmed.
Data gathered by net monitoring firm Netcraft showed that the cablegate site was intermittently available around Tuesday lunchtime and early afternoon because of the attack.
Prior to the launch of the site, Wikileaks had taken the precaution of hosting it on three separate IP addresses to cope with any attack.
"This does not appear to have prevented the current attack from succeeding," wrote Paul Mutton, a security analyst at Netcraft, in a blog post
He told the BBC that it was hard to work out what type of attack was under way. At the weekend before the cablegate site went live, a hacktivist known only as The Jester threatened to attack Wikileaks claiming its leak of cables would endanger US troops.
Mr Mutton said the latest attack was unlikely to be the work of The Jester as he has typically used Twitter to announce his targets. Something that was not done before the latest attack began.
"The cablegate site has only released 281 of the 251,287 leaked cables, so these attacks are likely to be symbolic action more than anything else," said Mr Mutton.
As cablegate came under attack, a separate ongoing assault against the main Wikileaks site made it unreachable on Tuesday afternoon.
From the Jesters website:
WikiLeaks – Insurance Policy Expired?
Posted: September 17, 2010 by th3j35t3r in General, Wikileaks, WikiSneaks
UPDATE: I have re-uploaded ‘gap-insurance.aes256‘ and it appears to be staying put for now, however please download and upload to your favorite filer host and tell us where you put it in comments section below @1000am EST 18th Sept.
So we all know it’s been pretty quiet round these parts. Why? WikiLeaks recently published a mysterious encrypted 1.4GB file titled “insurance.aes256′′ on their Afghan War Logs page, with no explanation. While much speculation has been going on as to the origins and purpose of the file, much of it saying that it is ‘insurance’ against WikiLeaks being taken down by the United States government, and contains ‘terrible secrets.’ WikiLeaks neither confirms nor denies the purpose of the file. But it remains there.
This annoyed me… so I got busy.
Anyone can download the actual ‘insurance.aes256′ file direct from WikiLeaks’ own servers here: http://leakmirror.wikileaks.org/file/straw-glass-and-bottle/insurance.aes256 and various other P2P and file-sharing hosts all over the internet.
So, in effect, Wikileaks is attempting to hold the U.S. Government ransom by holding this file ‘hostage’ – allowing anyone to download it, but rendering it useless without the key. Whether or not it’s a bluff, and the file is just (encrypted) random noise, or if it actually has sensitive information contained within it, is irrelevant.
An Analogy
There are two guys sitting at a table, one is Mr. X – a wealthy business owner – having tried to do good, and incurred cost to himself personally and his company in his efforts to look after his employees over his lifetime. His actions were always in the best interests of his staff and ‘mostly’ honorable.
The other guy, Mr. Y – was less wealthy and had a smaller business, with a following of loyal clients who always trusted his (alleged) integrity and high moral standpoint, his whole ethos and approaches. This is important to the clients because by the nature of the business they are all in – lives are at stake – and Mr. Y relies above all on this perceived client/trust relationship in order to continue to operate. Without it he’s in trouble.
Before them is a box, and in the box is a 3×5 index card with a list of the worst things they’ve ever done. I’ll let them be alone with their boxes for one hour, and after that hour I’ll open each of the boxes and make public the contents of each box. Who’s going to sweat more? We will see what we will see.
There’s a problem with this analogy: they both have their box in front of them, whereas in the current real-world situation, only ‘Mr. X‘ has a box. And worse still, it’s ‘Mr. Y’ who put it there.
Not cool.
I’d like to take a moment to describe what a “self-working card trick” is. A self-working card trick is a specific type of card trick (or magic) which does not require any skill to pull off. These tricks do not require sleight of hand, deception or any of the other things we normally associate with magic. They don’t even require a magician. Despite this, self-working card tricks can be some of the best because they are so baffling and can be pulled off with the audience watching as intently as they may- they will never see what’s going on until they realize the trick is based around a formula…not deception.
Now Here is the formula for the trick Assange is pulling on the U.S. Government:
The U.S. Government will dedicate resources to decrypting the file Assange has uploaded, proportional to the amount of damage they “believe” the information will do, if released. The best defense against damage from the information being decrypted is to determine what the information is so that denials, defenses, etc., can be prepared in advance. Without knowing exactly what information is encrypted in the file, the U.S. Government will presumably allocate resources proportional to the “most damaging thing” they believe the encrypted information is likely to conceal.
That’s assuming they give a shit.
Which they don’t. You see the only reason they would care about your file, Assange, is if you had already given the U.S. Government the key to the file (which you haven’t). Or maybe you are hoping that they use the much speculated upon ‘skeleton key’ or backdoor to AES256 encryption, that you believe the NSA has at their disposal? But even if they do have it (which they don’t), exactly how do you plan on ever finding out? By judging the NSA’s reaction to the contents of your file? LOL
Simple probability analysis to see if there were any statistical anomalies in the file has been performed, giving clues about the file. According to the results, the file is almost completely random. There is a very tiny bias towards 0 bits showing up more than 1 bits, but this is insignificant. Again, it could just be 1.4GB of random garbage. Or not.
Levelling the Field:
Now, hypothetically you understand, if errrrr ‘someone’ had been independently looking into WikiLeaks operations, (obviously this is not why you have heard so little from me lately) and had damning information regarding hmmm let’s say…- so-called ‘source handling/protection’ – (leak submission failings, log files, TOR?? Secure?? – really? Are WL themselves not accused of sniffing TOR traffic?)
- the embedding of what can only be described as spyware within PDF files downloadable from WikiLeaks site –(now, even if WikiLeaks didn’t put it there, how did it pass the WikLeaks stringent ‘cleansing’ process and end up on multiple documents available to an ‘interested public’? (Who’s spying on who?)
- who’s financing and donating – (few surprises here, wonder why ‘those guys’ are donating large amounts of $$$ to WikiLeaks, and if I know about it – who else does?)
- advisory board – (J, B, W, N, D, T, Y, X, P, C, C – you know who you are
- more information pertaining to recent ‘allegations’ against WikiLeaks staffers.
- Plus 3 additional subjects (hypothetically speaking you understand)
.
.. then made a nice portable 384Mb encrypted ISO 9660 image (for example) of a volume containing said findings, he sure as heck wouldn’t just put it, say…
RIGHT HERE (whooopsy daisy.)
(MD5SUM: 5488d43eb8e56166a8a08f3772c9c312)
Note for the interested party:
There are ways to conceal information in a file where the same file can be accessed, with different passwords where each password yields different information.
Why do I point this out?
Well obviously, hypothetically, the ISO could contain a series of nested sub-volumes – well eight (hypothetically). Each volume would have it’s own key, in this way, individual sections of said research could be dispensed at leisure – without divulging all contents immediately. A single file could be used to provide information on WikiLeaks and/or it’s cohorts and financiers for months or years to come, merely by meting out the various passwords which apply to various nested sub-volumes, over time.
Surely, this is all speculation and conjecture… right?
Surely WikiLeaks really does take their ‘duty of care’ to their sources seriously… right?
Surely WikiLeaks knows how to protect their ‘infrastructure’ don’t they, and furthermore if they were not covering their arcs, would make sure that nobody ever found out… right?
Now here’s a thing – if I trusted WikiLeaks, I might have uploaded this file to their site, but for some reason, I just don’t trust them. I can’t see them publishing it. Maybe I am paranoid, but what if I am not? We all know that WikiLeaks has been hiding behind the whole ‘freedom of the press’ card for way to long. They are now starting to cost lives, which is fine, as long as they are not innocent lives of Afghan Informants, and U.S./European troops.
Oh, and while I am on the subject, quit randomly downing your site because ‘you can’t afford’ to keep it running. LOL But somehow people are still strangely able to ‘donate’ on the exact same URL resolving to the exact same IP?? Come on guys – Periquito AB is not that expensive, which is a good thing because their approach to providing secure infrastructure is questionable.
Damn… I promised myself I wasn’t going to get into that… my sincere apologies… I digressed.
….So what do I, personally think is contained within the WikiLeaks ‘insurance.aes256′ file?
I would like to think, it contains mainly this:
http://tinyurl.com/y8ufsnp
…but who knows? Ya hear me Assange? – ‘Who knows? Who cares?’
Furthermore who even knows who knows? One thing however, that IS KNOWN and has been demonstrated time and again, neither WikiLeaks, Assange, or myself are particularly well known for pulling a bluff. We say what we mean, and mean what we say.
Is my research just food-for-thought-for-the-masses or a direct engagementagainst WikiLeaks? Or neither, or both? Who cares?
Poker anyone?
gap-insurance.aes256is released under a Creative Commons license. Please feel free to disseminate over your favorite file-sharing and p2p networks, and if you do, please put a link in the comments below so others can grab it.
<<< peace out.
Jester
"You never change things by fighting the existing reality. To change something, build a new model that makes the existing model obsolete.â€
Buckminster Fuller
Posts: 16,104
Threads: 1,771
Likes Received: 0 in 0 posts
Likes Given: 0
Joined: Sep 2008
David Guyatt Wrote:Bank of America shares drop amid Wikileaks rumours
http://www.independent.co.uk/news/world/...48150.html
Quote:Bank of America shares fall amid leak rumours
By Tom Peck
Wednesday, 1 December 2010
Shares in Bank of America, the largest US bank, fell by more than 3 per cent amid speculation it is to be Wikileaks' next target. The whistle-blowing website's founder, Julian Assange, the subject of a US criminal investigation, claimed a fresh "megaleak" will target a major US bank "early next year".
The controversial Australian told Forbes magazine that he was ready to release tens of thousands of documents that could "take down a bank or two".
Assange said the leak would "give a true and representative insight into how banks behave at the executive level in a way that will stimulate investigations and reforms, I presume".
The Forbes interview was conducted several weeks ago, before Sunday's publication of around a quarter of a million leaked US embassy cables, but had not been published.
Assange did not mention Bank of America, but in an interview last year he claimed to be in possession of the hard drive of one of the bank's executives.
Goldman Sachs were mentioned by name in the interview, but Assange did not confirm the Wall Street investment giant will be the target of the leak.
Let's hope it is Goldmans.
That would definitely call for a few full bottles of the best "uisce beatha" available!
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Posts: 16,104
Threads: 1,771
Likes Received: 0 in 0 posts
Likes Given: 0
Joined: Sep 2008
Keith Millea Wrote:11.30.10 - 11:37 AM
Taking Wikileaks Down
Another denial-of-service attack has brought down the Wikileaks site, at least temporarily. Responsibility for an attack Sunday has been claimed by a hacker known as the Jester, who charged Wikileaks with "attempting to endanger the lives of our troops."
30 November 2010 Attack hits Wikileaks cable site
The attack on the site managed to make it inaccessible on the afternoon of 30 November
Continue reading the main story A web attack has been launched against the Wikileaks site set up to host leaked US diplomatic cables.
The deluge of data launched against the site managed to briefly make it unreachable around 1200 GMT on 30 November.
So far no-one has come forward to claim responsibility for the so-called denial-of-service (DoS) attack.
A similar attack was launched against the main Wikileaks site prior to the public release of the first cables.
Wikileaks revealed that the separate cablegate website was suffering a distributed denial of service (DDoS) attack via a message posted to its Twitter stream.
The cablegate site went live on Sunday night and soon after started to suffer occasional downtime.
A DDoS attack involves swamping a site with so many requests for access that it becomes overwhelmed.
Data gathered by net monitoring firm Netcraft showed that the cablegate site was intermittently available around Tuesday lunchtime and early afternoon because of the attack.
Prior to the launch of the site, Wikileaks had taken the precaution of hosting it on three separate IP addresses to cope with any attack.
"This does not appear to have prevented the current attack from succeeding," wrote Paul Mutton, a security analyst at Netcraft, in a blog post
He told the BBC that it was hard to work out what type of attack was under way. At the weekend before the cablegate site went live, a hacktivist known only as The Jester threatened to attack Wikileaks claiming its leak of cables would endanger US troops.
Mr Mutton said the latest attack was unlikely to be the work of The Jester as he has typically used Twitter to announce his targets. Something that was not done before the latest attack began.
"The cablegate site has only released 281 of the 251,287 leaked cables, so these attacks are likely to be symbolic action more than anything else," said Mr Mutton.
As cablegate came under attack, a separate ongoing assault against the main Wikileaks site made it unreachable on Tuesday afternoon.
From the Jesters website:
WikiLeaks – Insurance Policy Expired?
Posted: September 17, 2010 by th3j35t3r in General, Wikileaks, WikiSneaks
UPDATE: I have re-uploaded ‘gap-insurance.aes256‘ and it appears to be staying put for now, however please download and upload to your favorite filer host and tell us where you put it in comments section below @1000am EST 18th Sept.
So we all know it’s been pretty quiet round these parts. Why? WikiLeaks recently published a mysterious encrypted 1.4GB file titled “insurance.aes256′′ on their Afghan War Logs page, with no explanation. While much speculation has been going on as to the origins and purpose of the file, much of it saying that it is ‘insurance’ against WikiLeaks being taken down by the United States government, and contains ‘terrible secrets.’ WikiLeaks neither confirms nor denies the purpose of the file. But it remains there.
This annoyed me… so I got busy.
Anyone can download the actual ‘insurance.aes256′ file direct from WikiLeaks’ own servers here: http://leakmirror.wikileaks.org/file/straw-glass-and-bottle/insurance.aes256 and various other P2P and file-sharing hosts all over the internet.
So, in effect, Wikileaks is attempting to hold the U.S. Government ransom by holding this file ‘hostage’ – allowing anyone to download it, but rendering it useless without the key. Whether or not it’s a bluff, and the file is just (encrypted) random noise, or if it actually has sensitive information contained within it, is irrelevant.
An Analogy
There are two guys sitting at a table, one is Mr. X – a wealthy business owner – having tried to do good, and incurred cost to himself personally and his company in his efforts to look after his employees over his lifetime. His actions were always in the best interests of his staff and ‘mostly’ honorable.
The other guy, Mr. Y – was less wealthy and had a smaller business, with a following of loyal clients who always trusted his (alleged) integrity and high moral standpoint, his whole ethos and approaches. This is important to the clients because by the nature of the business they are all in – lives are at stake – and Mr. Y relies above all on this perceived client/trust relationship in order to continue to operate. Without it he’s in trouble.
Before them is a box, and in the box is a 3×5 index card with a list of the worst things they’ve ever done. I’ll let them be alone with their boxes for one hour, and after that hour I’ll open each of the boxes and make public the contents of each box. Who’s going to sweat more? We will see what we will see.
There’s a problem with this analogy: they both have their box in front of them, whereas in the current real-world situation, only ‘Mr. X‘ has a box. And worse still, it’s ‘Mr. Y’ who put it there.
Not cool.
I’d like to take a moment to describe what a “self-working card trick” is. A self-working card trick is a specific type of card trick (or magic) which does not require any skill to pull off. These tricks do not require sleight of hand, deception or any of the other things we normally associate with magic. They don’t even require a magician. Despite this, self-working card tricks can be some of the best because they are so baffling and can be pulled off with the audience watching as intently as they may- they will never see what’s going on until they realize the trick is based around a formula…not deception.
Now Here is the formula for the trick Assange is pulling on the U.S. Government:
The U.S. Government will dedicate resources to decrypting the file Assange has uploaded, proportional to the amount of damage they “believe” the information will do, if released. The best defense against damage from the information being decrypted is to determine what the information is so that denials, defenses, etc., can be prepared in advance. Without knowing exactly what information is encrypted in the file, the U.S. Government will presumably allocate resources proportional to the “most damaging thing” they believe the encrypted information is likely to conceal.
That’s assuming they give a shit.
Which they don’t. You see the only reason they would care about your file, Assange, is if you had already given the U.S. Government the key to the file (which you haven’t). Or maybe you are hoping that they use the much speculated upon ‘skeleton key’ or backdoor to AES256 encryption, that you believe the NSA has at their disposal? But even if they do have it (which they don’t), exactly how do you plan on ever finding out? By judging the NSA’s reaction to the contents of your file? LOL
Simple probability analysis to see if there were any statistical anomalies in the file has been performed, giving clues about the file. According to the results, the file is almost completely random. There is a very tiny bias towards 0 bits showing up more than 1 bits, but this is insignificant. Again, it could just be 1.4GB of random garbage. Or not.
Levelling the Field:
Now, hypothetically you understand, if errrrr ‘someone’ had been independently looking into WikiLeaks operations, (obviously this is not why you have heard so little from me lately) and had damning information regarding hmmm let’s say…- so-called ‘source handling/protection’ – (leak submission failings, log files, TOR?? Secure?? – really? Are WL themselves not accused of sniffing TOR traffic?)
- the embedding of what can only be described as spyware within PDF files downloadable from WikiLeaks site –(now, even if WikiLeaks didn’t put it there, how did it pass the WikLeaks stringent ‘cleansing’ process and end up on multiple documents available to an ‘interested public’? (Who’s spying on who?)
- who’s financing and donating – (few surprises here, wonder why ‘those guys’ are donating large amounts of $$$ to WikiLeaks, and if I know about it – who else does?)
- advisory board – (J, B, W, N, D, T, Y, X, P, C, C – you know who you are
- more information pertaining to recent ‘allegations’ against WikiLeaks staffers.
- Plus 3 additional subjects (hypothetically speaking you understand)
.
.. then made a nice portable 384Mb encrypted ISO 9660 image (for example) of a volume containing said findings, he sure as heck wouldn’t just put it, say…
RIGHT HERE (whooopsy daisy.)
(MD5SUM: 5488d43eb8e56166a8a08f3772c9c312)
Note for the interested party:
There are ways to conceal information in a file where the same file can be accessed, with different passwords where each password yields different information.
Why do I point this out?
Well obviously, hypothetically, the ISO could contain a series of nested sub-volumes – well eight (hypothetically). Each volume would have it’s own key, in this way, individual sections of said research could be dispensed at leisure – without divulging all contents immediately. A single file could be used to provide information on WikiLeaks and/or it’s cohorts and financiers for months or years to come, merely by meting out the various passwords which apply to various nested sub-volumes, over time.
Surely, this is all speculation and conjecture… right?
Surely WikiLeaks really does take their ‘duty of care’ to their sources seriously… right?
Surely WikiLeaks knows how to protect their ‘infrastructure’ don’t they, and furthermore if they were not covering their arcs, would make sure that nobody ever found out… right?
Now here’s a thing – if I trusted WikiLeaks, I might have uploaded this file to their site, but for some reason, I just don’t trust them. I can’t see them publishing it. Maybe I am paranoid, but what if I am not? We all know that WikiLeaks has been hiding behind the whole ‘freedom of the press’ card for way to long. They are now starting to cost lives, which is fine, as long as they are not innocent lives of Afghan Informants, and U.S./European troops.
Oh, and while I am on the subject, quit randomly downing your site because ‘you can’t afford’ to keep it running. LOL But somehow people are still strangely able to ‘donate’ on the exact same URL resolving to the exact same IP?? Come on guys – Periquito AB is not that expensive, which is a good thing because their approach to providing secure infrastructure is questionable.
Damn… I promised myself I wasn’t going to get into that… my sincere apologies… I digressed.
….So what do I, personally think is contained within the WikiLeaks ‘insurance.aes256′ file?
I would like to think, it contains mainly this:
http://tinyurl.com/y8ufsnp
…but who knows? Ya hear me Assange? – ‘Who knows? Who cares?’
Furthermore who even knows who knows? One thing however, that IS KNOWN and has been demonstrated time and again, neither WikiLeaks, Assange, or myself are particularly well known for pulling a bluff. We say what we mean, and mean what we say.
Is my research just food-for-thought-for-the-masses or a direct engagementagainst WikiLeaks? Or neither, or both? Who cares?
Poker anyone?
gap-insurance.aes256is released under a Creative Commons license. Please feel free to disseminate over your favorite file-sharing and p2p networks, and if you do, please put a link in the comments below so others can grab it.
<<< peace out.
Jester
It seems to be 'full-out' cyberwarfare at this point. Whatever side you my USG on on [or your phony surrogates] I'm on the other side...please not this in my 'files'...thank you!
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
|