Saturday, December 11, 2010

Play Poptropica Funbrain

WikiLeaks, again

What position you take on certain "WikiLeaks" - a phenomenon?

At the current phenomenon of "WikiLeaks" is everywhere now so reflected and theorized.

For example here:

http://www.eurozine.com/articles/2010-12-07-lovinkriemens-en.html

here in German:

http://www.fr-online.de/ kultur/debatte/die-anarchie-der-transparenz/-/1473340 ...

and in response, here:

http://cryptome.org/0003/wikileaks-six.htm

bottom line is the "Diplomatic Cables" documented the extraordinarily high level of U.S. diplomacy and that bypassing a customary lock-up period of 40 years, as it is today, the NYT on the example of Eisenhower's farewell speech of 1961 on the conceptual development of the be seen "industrial-military complex" online:

http://www.nytimes.com/2010/12/11/us/politics/11eisenhower.html


reacts to the U.S. state policy all over uncontrolled, like this how to do it just by the example of China could follow in Oslo:

http://www.welt.de/debatte/kommentare/article11549982/China-fuehrt-den-Kampf- ...


was instead just an empty chair's empty bank accounts:

http://www.heise.de/tp/r4/artikel/33/33802/1.html


If the target of repeated actions, however, the disavowal, exposing and damage to democratic institutions in should have been the U.S., you were the recent actions as provocative a success. The only question is: by whom initiated and carried out by whom?


missing the whole discourse on WikiLeaks me so far that is the dimension of craftsmanship:
How did you look at the data theft that is present in handy?

first Penetration with root privileges to the inner sanctum of the U.S. State Department, to transfer the database content, including application software, data systems, to install it on another computer so that you "evaluate" then GB to GB to TB-magnitude alone can - - and without leaving a trace?

Possible, but unlikely by 16-year-old Amateur hacker. That sounds more like professional teams that make the whole day probably nothing more than that - and have for the technical infrastructure of collaboration. And about the duplicate, if necessary, physically move without data network to data: shutdown, temporary technical fault, local dubbing, on again, nothing had happened ...

Or the Foreign Office website to "security reasons" in principle, reflected in the "security forces".

second Another possibility: a Deuce and scripts bulk queries the relevant database (s) to run via the intranet, on the same hang as much as possible in their own network remains. Also a possibility, but hardly without leaving traces that could have just too much for 'asterisks and other jokers actually a monitoring immediately and may have to stop, and the tracks would have to investigate leaks of data. So it is just been the bad "anonymous" hackers. Where are the log files of data rape?


If one (1) excludes, because it was no more the same power as the democratic institutions in the state and can be anything, remains variant (2) left. Unfortunately, then, that raises another since 2001 and already well-known, familiar phenomenon again: Bad luck and mishaps. All, it might have known, have failed and the wicked are to blame.

In other words: the White Rabbit is back! The White Rabbit is always useful when it is just instrumental needs and can pull from his sleeve - and it has a name and means: Osama Bin Assange. Instead of just white beard white hair.

instead - as suspected - there was this time so 9/11-Material "Diplomatic Cables". The excitement around Nothing is great, the sensitivity of Kairos is artificially produced, distributed well fertilized and well, ready for the final blow. One should be mentally prepared. Westerwelle spied concept of "late Roman decadence" the Foreign Office was already guessed right, but completely wrong target, somehow in the wrong continent. For here is already operating out of a covered position. Benefice which you want to keep on threatening to get lost, because they are already lost. "Follow the money," Deep Throat said, then ...

JP

0 comments:

Post a Comment