31 December 2010

Poulsen knows as well as anyone what Lamo’s deal is. That picture of Lamo, Poulsen and Mitnick hanging out was taken the first time they met Lamo. It was Lamo’s idea, he was meeting two heroes. These people aren’t BFF’s. Poulsen reports on Lamo and it annoys the shit out of everyone because they know Lamo is a charlatan attention whore and writing about him only makes it worse. But Poulsen’s bottom line is clear: he’s a reporter. If he thinks something is newsworthy he’s going to write it. His only loyalty is to the story.

Poulsen, of all people, knows not to trust Lamo. It’s absurd to think he’d compromise his career to cover for him. It fucking sucks that Manning didn’t know that too.

Fascinating, Captain.
First thing you gotta understand is that just about everyone hates Lamo. Seriously. Fuck that dude. Sure some random kid on IRC (or, say, a vulnerable Private First Class) who just knows what they read in Lamo’s Wikipedia article are going to hero worship him, his friends and his drug fueled downward spiral into the depths of mental illness over the last 15 years. But he was always an asshole, even before he completely lost it.

There is no conspiracy, there is only gayness.

The hacker scene is incredibly insular and interconnected. There are hundreds of people who know these guys personally. We all know Lamo and Poulsen. We are all aware that Lamo is a twitchy little fuck, not to be trusted. We also know that he is queer. And Manning is trans. This is why they were talking to each other. Vagaries of the TVTG world aside, the two have something in common: our society calls them weirdo’s. They obviously connected because of this.

So, we are here to fill in the blanks for you folks out there that think Poulsen is hiding something. Indeed, he is hiding something; he is hiding gayness. Sadly, in our ass-backwards fucked-up little country, gayness is considered a social faux pas. Poulsen is simply respecting the privacy of two people.

Gayness is really cool. We like gayness. But it’s not exactly something Wired should be reporting on. And by withholding the rest of the logs, they are not reporting on it. Rather professional of them, don’t you think?

Manning’s life has been fucked up already. We don’t need to read his dirty, very personal chat logs.

If Mr. Greenwald wants to do some actual research, he is welcome to stop into any hacker IRC channel and ask about the involved parties. We all know them, we all understand exactly what happened here. Obviously, we’re more informed than Mr. Greenwald and his Twitter groupies.

Here is the moral of this story: don’t talk to Adrian Lamo. Even if you think you are connecting with him on a personal level, he will still find a way to stick an unwanted dick in your ass.

We will now digress into the hilarious details. We really don’t give a shit if you believe us, we know these people and anyone else who knows them will tell you what we’re saying is credible.


The militarist, corporatist, liberty-stripping evil that our earnest lovers of humanity fear will come to pass if those evil Republicans come to power is already here, it is happening before their very eyes. "Oh, that Glenn Beck, how terrible he is!" Yes, he is terrible, but I tell you this: Glenn Beck hasn't tortured anyone. Glenn Beck hasn't killed hundreds of defenseless innocent civilians, men, women and children murdered without any warning by robot drones in an undeclared war on an allied nation. Glenn Beck hasn't "surged" an endless, pointless, murderous, money-making war of domination against a broken land and its terrorized people. Glenn Beck is not going to court to defend torturers. Glenn Beck is not proclaiming he has the arbitrary, unchallengeable power to assassinate anyone on earth whenever he feels like it.

But the Peace Laureate has done all these things. He is doing all these things, and more.

"So you end up with a cable in the database that contains embarrassing stuff about [German Prime Minister Angela] Merkel. Is that the kind of stuff that a war fighter really needs to see?"

War fighter = "soldier" = US mercenary or US Empire Centurian

Fighting "for" US values, shouldn't she know about foreign leaders whose "troops" she's fighting with?

26 December 2010



Treat accordingly.

CHICAGO (AP) -- U.S. Rep. Jesse Jackson Jr., who has largely avoided the public eye of late, said in a rare interview Saturday that he is a public servant, not a perfect one, and didn't rule out a future run at higher office.

Jackson, who has been dogged by links to the corruption case against former Illinois Gov. Rod Blagojevich and questions about his own relationship with a female "social acquaintance," told The Associated Press that he continually struggles with his "personal shortcomings."

That includes mending his family relationships over the "immensely personal matter" of the female acquaintance and assessing his political ambitions, which once included Chicago mayor or U.S. senator.

"Every one of us has erred in their personal lives and while I don't claim to be a perfect servant, I'm a public servant," Jackson told the AP. "Often times we carry with us the burdens of our personal shortcomings even as we struggle to articulate and clarify a message that helps other people. That what I dedicated my life to."


Don blame me massa, I'se just a loose niggah!

Required reading: True names and the opening of the cyberspace frontier

The part by Tim C. May.

22 December 2010

or another idiot trying to make a name for themselves

sarah palin, osama bin ladin, julian assange enter a bar.

WASHINGTON (AP) -- President Barack Obama signed a new law Wednesday that will allow gays for the first time in history to serve openly in America's military. And he urged those kicked out under the old law to re-enlist.

Uncle Sam needs all you queer ay-rabs! Sign up now!
So DADT is repealed? Girlie girls in the trenches?

Fall of Rome did not happen in a day, ladies.

"Oh, it's just another idiot trying to make a name for himself. But it's a -- it's a serious business. I mean if we are to have a civil society, you cannot have senior people making calls on national TV to go around the judiciary and illegally murder people. That is incitement to commit murder. That is an offense. Does the United States obey the rule of law? Because Europeans are starting to wonder whether it is still obeying the rule of law. And it needs to be very careful. Is it going to descend into an anarchy where those great Bill of Rights traditions about due process are just thrown to the wind whenever some shock jock politician thinks that they can use it to make a name for themselves? Or do we take things according to laws expressly made by the people and their representatives? That is the way things should be done. And when people call for illegal, deliberate assassination and kidnapping of others, they should be held to account. They should be charged for incitement to commit murder."

21 December 2010

Its raining
I'm a cat

Its still raining
I'm sill a cat

Its still raining
I'm still a cat
under the car its not raining
but its raining on the way there
I'm a cat
Its raining

elbow gout or dorked elbow?

WASHINGTON - Metro Police started randomly inspecting bags at the Braddock Road and College Park Metro stations Tuesday.

These people are not citizens, they are livestock, and need to be culled.
My roof doesn't have gutters in most places. So it drips more in certain places than others. Temporary winter streams at the base of the watersheds of my SoCal tiled house. (Which
explains the lack of gutters; I've lived where its cold and you have gutters, winter tires, basements where you store your stuff instead of garages which keep your cars' blocks from cracking..)

Anyway if you put a thin plate --trash can lid or inverted bucket-- under a drip from the major "waterfall" you can hear it better. Because you have a bigger watershed, the roof, concentrating it, and a nice sounding board for the waterfall.

With drips, concentrated by a roof, you gain sensitivity but would be swamped by bigger outbursts. A waterfall would be hard to measure.

A computer program could do pulse (droplet) counting. How would it compare (sensitivity, response time, etc) to a traditional graduated cylinder and funnel opening? Extension cable, microphone covered by bucket, computer, pulse counter software.

Actually you could just skip the latter two and just record the sound for later analysis.

That way one teacher could help a bunch of kids ---all they need is the mic, cable, bucket. Or they could bag their iGizmo, set it on record, and put it under the bucket and on a brick.

The "splats per minute collected over an area of A square meters (in flat projection, not tiles :-)" would be a good local measure of precipitation intensity.

You can add nuances like dry tiles at first. There is some delay between rain changes and the effects at the bucket-sensor.

The best way to ensure that your family's vision is healthy is to make sure every member of your family has a regular comprehensive eye exam. Some vision problems are symptom-less and pain-free, making it hard to know whether or not you might have a problem. The most effective method for detecting vision problems is through a comprehensive eye exam performed by an eye doctor. Costco Optical recommends yearly eye exams. Most Costco Optical locations have an Independent Doctor of Optometry in or near the optical department.
The best way to ensure that your family's vision is healthy is to make sure every member of your family has a regular comprehensive eye exam. Some vision problems are symptom-less and pain-free, making it hard to know whether or not you might have a problem. The most effective method for detecting vision problems is through a comprehensive eye exam performed by an eye doctor. Costco Optical recommends yearly eye exams. Most Costco Optical locations have an Independent Doctor of Optometry in or near the optical department.

18 December 2010

In an interview with Computerworld in 2009, Mr. Assange said WikiLeaks held five gigabytes worth of information from the hard drive of a Bank of America executive.

16 December 2010

Computer is slow, at least some times.

No meteors tonight, clouds building.

Total lunar eclipse on the 20th. Moon 3/4 there now.

Total, dude.

Line 'em up.

15 December 2010


That TIME should cower so obviously indicates that Assange not only wins, but instills fear.

Courage is contagious.
We are all journalists now.

They never deserved better treatment than us proles.

Now, everyone reading this has a better printing press and distribution network than the finest NY Times dead tree masher. We can all use Times Roman and reach a million readers much faster.

The first is about proles, not Murdoch. The second is about tyrants, not ducks or deer.

Meanwhile, WikiLeaks is taking steps to distance itself from the suggestion that it actively encourages people to send in classified material. It has changed how it describes itself on its submissions page. “WikiLeaks accepts a range of material, but we do not solicit it,” its Web site now says.

It also deleted the word “classified” from a description of the kinds of material it accepts. And it dropped an assertion that “Submitting confidential material to WikiLeaks is safe, easy and protected by law,” now saying instead: “Submitting documents to our journalists is protected by law in better democracies.”

WikiLeaks is also taking steps to position itself more squarely as a news organization, which would it easier to invoke the First Amendment as a shield. Where its old submissions page made few references to journalism, it now uses “journalist” and forms of the word “news” 23 times.

What is hilarious is the source


Even if prosecutors could prove that it was Private Manning writing the messages to Mr. Lamo, a court might deem the whole discussion as inadmissible hearsay evidence.

And Mr. Lamo is such a fine and credible witness on the stand.

14 December 2010

"We now know that Visa, MasterCard and PayPal are instruments of US foreign policy. It's not something we knew before.

13 December 2010


Ironic he'd be burned twice by normal behavior, and in no case did he do anything wrong. Ironic a cpunk would get burned by anonymity. I'm a few years older and haven't dabbled there.

And Geoff Morrell still has sex with Rummsfeld, I hear. But its consensual, neither have done anything wrong. Except in their professional careers as warmongers, war criminals.

Formal background in neuro, math, physics, philosophy.

Sounds good to me

One of the women, a political activist in her 30s described as Miss A, claims she was unlawfully coerced and subjected to sexual molestation and deliberate molestation. The other woman, Miss B, who is in her 20s, has alleged he had sex with her without a condom while she was sleeping.

Mr Assange told Mr Hurtig he had a brief affair with Miss A – who had organised a seminar for the Centre-Left group Brotherhood Movement – while staying in her flat.

Miss B admitted in her police statement that she sought out Mr Assange after seeing him on TV and, clearly infatuated, attended the seminar he was giving. They had a ‘sexual encounter’ in a cinema on their first meeting and two days later had protected sex at her flat, 40 miles from Stockholm. But the woman told police that she woke up next morning to find him having sex with her without a condom.

‘This is what they are saying is rape,’ said Mr Hurtig. He said Mr Assange and Miss B parted on good terms, with Miss B buying his train ticket back to Stockholm. But Mr Hurtig said that after Mr Assange reneged on his promise to call her and failed to return her phone calls over the next few days, the drama took a ‘bizarre’ turn.

Miss B called the office of Miss A, whom she had briefly met at the seminar, asking the whereabouts of Mr Assange. During the conversation they realised that they had both been ‘victims of his charms’.

Mr Assange told Mr Hurtig he refused their request to take a test for sexually-transmitted diseases.

He said Miss B was especially anxious about the possibility of HIV and pregnancy. It was then that
she and Miss A walked into a police station and told their stories.

Mr Hurtig said: ‘I don’t believe Miss B felt she had been raped until she went to the police station. She was encouraged by a policewoman and a junior female prosecutor to think that way. While I don’t think there was any conspiracy, Julian says he is being victimised because of his role with WikiLeaks. The fact that he has a high profile has made him a target for opponents.’

Read more: http://www.dailymail.co.uk/news/article-1337862/WikiLeaks-rape-victims-hidden-agendas---Ive-seen-proof-says-Assange-lawyer.html#ixzz182yAv1xQ

First lady Michelle Obama plans to warn in remarks Monday that the nation is seeing “a groundswell of support” for curbing childhood obesity, and she is unveiling new ammunition from current and retired military leaders.

“Military leaders … tell us that when more than one in four young people are unqualified for military service because of their weight,” the first lady says in the prepared remarks, “childhood obesity isn’t just a public health threat, it’s not just an economic threat, it’s a national security threat as well."


Michelle Obama is a security threat, and a threat to america's ability to reason as well.


When Asked Where the Constitution Authorizes Congress to Order Americans To Buy Health Insurance, Pelosi Says: 'Are You Serious?'

12 December 2010

Needed, an app which: transmits sound/picture/video to a neutral website which collects and publishes this material. Commercial journalists and propagandists could use it as they use any open or leaked material.


Because otherwise its too easy to confiscate and erase, and your sleight of hand with memory cards is not reliable under stress.

Because your in-phone storage can be stolen before your vacation or wedding is over. Because you want to publish as easily as you tweet.

Because the "Wikileaks" (tm) concept of evidence-based journalism need not be limited to stale information. Need not be filtered or edited or hoarded or doled out or the guilty unnamed or researched.

I'm sure many readers could write such a program for their handsets and also set up the receiver, disk, website to publish. Doing so in a robust
and --if desired-- anonymous manner is a little harder. Finding a business model is the most 'science project' aspect of the endeavor.

Pure leaking, pure reporting, like cryptome, but with the John Young decision function deemed unnecessary. (I was going to write 'taken out' but that sounded hostile.) It might be readily DDoS'd ---on the information supply, not net-bandwidth-out end typical of DDoS. The cellular radio frequencies could be locally jammed or base stations disabled during an Event. It might
devolve into a mindless and biassed combination of youtube and indymedia.org and flickr, but without the censorship.

But, like robust distributed publication (cryptome) and same with slightly easier online submission (WL) and Youtube and cellphones with cameras, these things are inevitable. Youleaks? Wikitubes?

Please choose your type of service: private backup (ReporterApp) / immediate publishing (VidTweet) / immediate anonymous publishing (BlakApp)


A ridiculously huge and sometimes dangerous library maintained by no one master, waiting in one spot to be burned or bombed or bankrupted.

The Library will give you a copy of whatever you ask for, for free; but you must bring them a locked satchel that you store for them at your home.

11 December 2010

By daybreak Refsdal is told that a dozen people -- including Dawran's top lieutenant -- had been killed in a Special Forces raid.

Refsdal finds Dawran "crying like a kid" over his lost men. Later, Dawran flees with his family, fearing for his life.

Refsdal knows that the images he captured will be surprising to many -- and disturbing to some. But he feels confident that the images are authentic, not an attempt at propaganda.

If the Taliban wanted to create propaganda, they would demonstrate a show of strength -- not their softer side, he said. "Showing them[selves] as humans, they don't understand any purpose of that."

"I understand that this is very emotional for people -- especially people in the armed forces," Refsdal told Cooper. "I'm a journalist, I just film what happened."

The war has become "routine" for this band of Taliban fighters, said Refsdal. "They do an ambush and then spend the rest of the day sitting around gossiping on the radio. They sit, they drink a lot of tea and they have some games they are playing."

One of the games is a simple rock throwing contest. Standing in a relatively flat clearing, the men square off to see who can throw heavy rocks the farthest. Most use a two-handed thrust-from-the-chest technique.

"If a person cuts off another person's hand, then according to Islamic law, you have the right to retaliate and cut his hand off. It's the same with the ears, the teeth the eyes and the nose."

And if Clinton cruise-missiles a foreign country, isn't it fair if US airplanes are turned into cruise-missiles?

As he urges his fighters to battle, Dawran questions coalition motives. "For what purpose are they fighting us?" asks Dawran. "Are they oppressed? Have they been treated unfair? Are they living in a dictatorship?"

Yes we are oppressed, treated unfairly, and living in a dictatorship. We citizens don't know why we're fighting you, and our government will dissolve (like the Soviets') in a few years.

Meanwhile, keep it up! And help your western comrades learn how to mortar the Green Zone.

Operation UBL going perfectly. Paki nukes have been...

message over
According to the Pentagon, more than 2,200 coalition troops have died in Afghanistan since U.S. forces invaded in response to the 9/11 attacks. More than 1,400 Americans are among those coalition deaths.

And the US will be there until 2014 at least. Fill those Irvine Long War Memorial plaques!
"We fight for our freedom, our religion, our honor and we fight for our land,"

10 December 2010


It better be. Anything less is pussy, Vladimir. And you are not that.


Me workin on video. High bandwidth stuff, chromakey, data overlay and h164.


vladimir f'in putin. yeah, I'd drink some vodka with you. jesus.

I'd blow you off for Julian Assange, but few others.

What do you think he carries? 5.7x28mm


Note that JA is not an american, yet the american fascists want to persecute for amerikan crimes.

When obviously, its the amerikans who are the war criminals.

Yet Obama (ie Bush) gets the Nobel. And JA gets a red notice. Bass ackwards.

Do not fuck with us.

"Technology and journalism are changing quickly. The law may not be keeping up but the government responsibility is the same."

To charge Assange under the Espionage Act, the government must prove that he knowingly acted in bad faith with the intent of harming the government and that his freedom to publish isn't protected under the First Amendment, which prohibits Congress from passing laws that restrict the freedom of the press.

Read more: http://www.mcclatchydc.com/2010/12/10/105110/wikileaks-tying-assange-to-manning.html#ixzz17mM9gNeF
creative legal territory

its not like we've ;built civiiliz on the most fragile and trusting of RFPs.

bwah hah hah.

the first woodpecker......

Got BGP ????
Bill clinton: sends a few cruise missiles at UBL

911 UBL sends a message back, also on cruise missiles. And takes down two expensive buildings too.

Now, hillary is on cspan pretending that wikileaks and assange and bradley manning never happened.

Enjoy your retirement, bitch.

Enjoy your heart attack. Real or synthetic.

08 December 2010

Eric Holder

Peter King

Tom Flanagan

, an ex-hippie and co-founder of the civil liberties group Electronic Frontier Foundation, addressed Internet activists with the following Twitter message: "The first serious infowar is now engaged. The field of battle is WikiLeaks. You are the troops."
He may be on the short list for Time magazine's "person of the year," but many Americans consider Julian Assange to be a criminal and a terrorist.

Lieberman is here to make sure US foreign policy is Israeli.

Obama, to make sure the economy is chinese.

Assange is a hero. DC needs to be nuked for the good of america and the world.

Indeed, the use of rogue and banal programs and technology
to conceal novel penetrations and takeovers or covertly aid
their success is venerable subterfuge.

Most of them taught at Ft Huachuca to the Bradley Mannings
and deployled by hotshit newbies at Cyberwarcom. Beta tested in the
wild, say like the Lady Gaga download stratgem. Some go
haywire and escape control or have unintended consequences
like Morris's worm. Shh, national security at stake.

Bizarre and comical behavior to hide the diabolical and malign.
Jesters and courtesans and priests and housekeepers and grunts
were always the best insider spies and spreaders of undermining
disinfo, and SDT mental and corporeal.

Disengineering strong crypto, a variation on stuxnetting. A bit of
code inserted on PGP servers or PGP users via key verification.

Weak attacks to assay powerful defenses. SOP in the military
to boost budgets way beyond need.

Covertly clouding illicit archives and snoops on systems of clueless
users of Skype, IM, social media, any commercial or Internet operational

Backflowing program updates used to plant snoopers on the updater

Prepositioned tick-tickers at IANA, CERT, Cyberwarcom, IRS,
eop.gov and vatican.org.

Thanks to Tesla, no thanks to Edison who kept it quiet, anything
electromagnetic can be taken over, especially those which foolishly
aim for asymmetrical control.

Following Tesla's roguosity, the Internet is a vast reverse spying
machine, with bountiful EM inititative hiding places beneath those
listed handily by those who warn only of threats they want to sell
protection for and try like hell to dismiss the others as amateurish.

You try to patent any of these, it will be classified upon receipt.

Look, it would be appreciated if you didn't put this on the Internet.

06 December 2010

Terrorists do not drink this much.

Well, no, the IRA probably drank a bunch, though it was against orders.

Nor were the 'terrorists' (tm) atheists. I didn't say anarchists; I believe in a govt that doesn't
farm citizens as livestock, but merely mediates disputes or crimes. Which
does't entangle itself in foreign disputes, but merely extract a foreign tax,
and controls its borders while welcoming both economic and ideological refugees. Or employed intellectuals with
I was typing blind there. That's how bad my open loop typing is.
I can touchtype well if I have a fast right pinkie ---the Delete Finger,
so ironic that the least appreciated finger should, in the 20th et seq centuries,
become so useful!

Science is tedious.

My kid, growing algae in sixth grade, found this out. But he could use computers and color printers to plot his stuff.

Major problem is that his mom...

In engineering you use the scientific method dozens of times more a day.

My cat, on my lap and uderthis laptop, is sneezing, ting a label that has come loose, etc.

I'm typing blin ritghyt now.

05 December 2010

This is composed on an ACER Aspire One AOD-250 model with 2 GB of RAM. The original is sold with 1 GB and advertised as not expandable. That is BS: Microsoft wanted to kill XP so they made the netbook manufacturers cripple machines.

A $50 2GB DDR2 SODIMM and we're working much much better.

This was motivated by a memory tripling on the tower which vastly improved responsiveness.

04 December 2010

Barak "Fascist" Obama wouldn't have been born had his impulsive irresponsible and slutty mother not banged a kenyan negro.

Just another reason to sterilize africa.

Now his illegal immigrant relative is scamming the US by collecting free rent and board.

Off da bitch, hang da nigga, deport dat immie.
until a person is faced with death its impossible to tell whether they have what it takes to survive
"Barack Obama is not God, able to freely decide about life and death," he says. "Nevertheless he behaves like an Old Testament God who kills people as he sees fit with fire and brimstone."

1. Material we accept

Wikileaks will accept restricted or censored material of political, ethical, diplomatic or historical significance. We do not accept rumor, opinion, other kinds of first hand accounts or material that is publicly available elsewhere. This is because our journalists write news stories based on the material, and then provide a link to the supporting documentation to prove our stories are true. It's not news if it has been publicly available elsewhere first, and we are a news organisation. However, from time to time, the editors may re-publish material that has been made public previously elsewhere if the information is in the public interest but did not have proper news analysis when first released.

If you are sending us something, we encourage you to include a brief description of why the documents is important and what the most significants parts are within the document. It will help our journalists to write up and released the story much faster.

2 Our anonymous electronic drop box

Wikileaks has an anonymous electronic drop box if you wish to provide original material to our journalists. Wikileaks accepts a range of material, but we do not solicit it. If you are going to send in material it should be done as securely as possible. That is why we have created our novel method of submission based on a suite of security technologies designed to provide anonymity. We have put a great deal of technical and design work into the drop box because we take the journalist-source relationship very seriously.

2.1 Its easy to submit

Our drop box is easy to use and provides military-grade encryption protection.

Submitting documents to our journalists is protected by law in better democracies. For other countries, the electronic drop box is there to offer help and protection. It is particularly designed to keep your identity hidden from everyone, including WikiLeaks. We never keep logs of who uses the drop box or where they are coming from.

There are several ways to send in material, but the most secure and anonymous is at the following link.

(currently closed for re-engineering security and useability improvements)

To add another layer of protection,you might also want to use the secure TOR network (http://suw74isz7qqzpmgu.onion/) Tor is a secure anonymous distributed network that provides maximum security.

2.2 Help with any questions about submitting

You can also chat to us online and we will answer any questions or solve any problems you might have with submitting (https://chat.wikileaks.org) (Currently temporarily closed with the electronic drop box for re-engineering.) Our chat is designed to be secure and anonymous. Visitors are protected by many layers of security. They can not see each other. There is a mechanism in place to stop logging and the server forbids potentially dangerous commands that could reveal other user's identity. Communication is secured with SSL encryption.

2.3 Protection for you

Wikileaks does not record any source-identifying information and there are a number of mechanisms in place to protect even the most sensitive submitted documents from being sourced. We do not keep any logs. We can not comply with requests for information on sources because we simply do not have the information to begin with. Similarly we can not see your real identity in any anonymised chat sessions with us. Our only knowledge of you as a source is if you provide a coded name to us. A lot of careful thought by world experts in security technologies has gone into the design of these systems to provide the maximum protection to you. Wikileaks has never revealed a source.

2.4 How it works

When WikiLeaks receives a document, our accredited journalists assess the submission. If it meets the criteria, our journalists then write or produce a news piece based on the document. This typically includes a description of the document, an analysis of why it is important, and an explanation of what it signifies to broader society. The news piece might also highlight the parts of the document that are most newsworthy. Our news stories are deliberately analytical regarding the wider significance of the document. We then link from the news piece to the original submission.

Submissions establish a journalist-source relationship. Online submissions are routed via countries which have strong shield laws to provide additional protection to sources and journalists.

Some documents submitted contain highly sensitive information. WikiLeaks has developed a harm minimisation proceedure to clean documents which might endanger innocent lives. In other instances, WikiLeaks may delay publishing some news stories and their supporting documents until the publication will not cause danger to such people. However in all cases, WikiLeaks will only redact the details that are absolutely necessary to this end. Everything else will be published to support the news story exactly as it appeared in the original document.

WikiLeaks has a overriding objective to publish and bring information into the public arena to encourage an informed society. It will stay doggedly true to this goal.

3. Directions for how to submit material

If you want to send us a message of your own, as opposed to a document, please see Contact.

3.1 Submissions via secure upload

Fast, easy and automatically encrypted with the best banking-grade encryption. We keep no records as to where you uploaded from, your time zone, browser or even as to when your submission was made (if you choose a non-zero publishing delay, we set the file time record to be the release date + a random time within that day).

If you are anonymously submitting a Microsoft word file (".doc") that you have edited at some stage, please try to send a PDF document (".pdf") instead, as Word documents may include your name or the name of your computer, see Word file redaction for further information. If you have no means to produce a PDF file your document will be converted by WikiLeaks staff.

The process your document will undergo is outlined for understanding submissions.

NOTE: At the moment WikiLeaks is not accepting new submissions due to re-engineering improvements the site to make it both more secure and more user-friendly. Since we are not currently accepting submissions during the re-engineering, we have also temporarily closed our online chat support for how to make a submission. We anticipate reopening the electronic drop box and live chat support in the near future.
You can also use secure TOR network (secure, anonymous, distributed network for maximum security)

3.2 Submissions via our discreet postal network

Submissions to our postal network offer a strong form of anonymity and are good for bulk truth-telling.


First place your leak onto a floppy disk, CD, DVD or a USB Flash Drive. If you are using a floppy disks, please create two as they are often unreliable. If you only have paper documents, we will scan them if they are of significant political or media interest (if you are unsure whether this may be the case, please contact us first). This will delay the process however.
Post your information to one of our trusted truth facilitators listed below. You may post to whatever country in the list that you feel most suitable given the nature of the material and your postal service. If your country's mail system is unreliable, you may wish to send multiple copies, use DHL, FedEX or another postal courier service.
WikiLeaks truth facilitators will then upload your submission using their fast internet connection. If you use a floppy disk, be sure to send two for increased reliability.

You can use whatever return address you like, but make doubly sure you have written the destination correctly as postal workers will not be able to return the envelope to you.

After receiving your postal submission our facilitators upload the data to WikiLeaks and then destroy the mailed package.

3.3 High risk postal submissions

If your leak is extremely high risk, you may wish to post away from your local post office at a location that has no witnesses or video monitoring.

Many CD and DVD writers will include the serial number of the DVD or CD writer onto the CD/DVDs they write. If the post is intercepted this information can in theory be used to track down the manufacturer and with their co-operation, the distributor, the sales agent and so on. Consider whether there are financial records connecting you to the CD/DVD writer sale if your adversary is capable of intercepting your letter to us and has the will to do this type of expensive investigation. Pay cash if you can for the CD/DVD writer.

Similarly, CD and DVD media themselves include a non-unique manufacturing "batch number" for each group of around 10,000 CD/DVDs made. Pay cash when buying the CD or DVD. Try to choose a store without video cameras at the register.

Although we are aware of no instances where the above has been successfully used to trace an individual, anti-piracy operations have used the information to trace piracy outfits who sell tens or hundreds of thousands of counterfeit CDs or DVDs.

If you post it to us, a good option is to encrypt the USB file/CD file and then contact us at a later date via live online chat with the encryptin passphrase. That way if the post is intercepted, the data can not be copied.

If you suspect you are under physical surveillance, discreetly give the letter to a trusted friend or relative to post. On some rare occasions, targets of substantial political surveillance have been followed to the post office and have had their posted mail seized covertly. In this rare case if you are not intending to encrypt the data and if the police or intelligence services in your country are equipped to perform DNA and/or fingerprint analysis you may wish to take the appropriate handling precautions.

3.4 Postal addresses of our trusted truth facilitators

You may post to any country in our network.

Pick one that best suits your circumstances. If the country you are residing in has a postal system that is unreliable or frequently censored, you may wish to send your material to multiple addresses concurrently. For unlisted postal addresses, please contact us.

In Australia:

To: "WL" or any name likely to evade postal censorship in your country.

BOX 4080
Australia Post Office - University of Melbourne Branch
Victoria 3052

he Social Security Administration has also sent an alert to all its employees warning them that reading anything related to the WikiLeaks release could subject them to “federal criminal statutes for unlawful access to or transmission of classified information.”

Even the Library of Congress is getting into the game, with attempts to visit the website at the Library resulting in a warning that the site is “malicious content” and has been blocked.
State Department spokeswoman Nicole Thompson insisted the warning wasn’t an official Department directive but added that making public comments or posting links to WikiLeaks content wasn’t “a good move for any US citizen.”
Columbia University’s Office of Career Service is said to have passed around an email warning students that if they read WikiLeaks or make comments related to the releases it would render them ineligible for any government jobs in the future, based on a warning sent by a former student working at the State Department.


Guess what, State Dept students? Having worked for the State Dept will disqualify you from any honest job in the future.
Love wikileaks.ch

The parody of the widipedia banner. The middle finger to the eye.

Only thing missing is swedish flag and vids of the spookchicks going down,
get the double-entendre, consensually.

03 December 2010

Assange is a better american than most americans

Does anyone else find it offensive that computers or websites use exclamations with me?


Your blog post published successfully!

Well FU computer, you're a f'in server that's what you do, don't get so excited, I don't.

I don't!!!!!!!!!!!!!! Huh huh huh !!!!!!

Take your search dog and kill it with your Clippy paperclip.

Grep you. Fsck you, mofo. Pissoff and defrag yourself before some frags you.
Having been an atheist forever, I won the theology prize at my school.

When I was naif I got 100% on health tests about droogs.

Nearly celibate I understand anatomy and psychology much better now.

02 December 2010

Which is exactly how it should be. "Treason" to and "betrayal" of the state is service to humanity. Wikileaks is your friend. Hillary Clinton is your enemy. Never forget that.
The strength of Wikileaks is that it faces no similar choice. It’s not a state, nor do its principals evince any intention of making it one. Truth is its entire portfolio, and this drives the Hillary Clintons of the world insane.
Like vampires, politicians will choose gunfire over sunlight every time.
But, if this be treason, make the most of it.
With millions and millions of people losing their houses, and almost 40 million people receiving food stamps, while corporate execs loot their publicly-traded and government-subsidized employers for billions in bonuses, and inflation set to take off in the not-too-distant future, these sorts of indignities could push people over the edge.
L: But you’ve said before that the Land of the Free and the Home of the Brave has been turned into Land of the Lapdogs and the Home of the Whipped Dogs. Do you actually think there’s a line beyond which U.S. citizens can’t be pushed and will develop the spine to act like Americans?

Doug: Well, one can hope.
But Israel is a theocratic, ethnically exclusive police state — hardly a model to follow. And I don’t like being interrogated by some fool in a uniform, either.

On the bright side, this gross violation of people’s rights by the TSA is so personal, it could be the thing that actually pushes the U.S. over a psychological tipping point, and gets Americans to act like Americans, and say, "I’m not going to take anymore!" At some point even a cowering dog will stop cowering and bite.
I just have to keep my cool. These people can sense I have an attitude about these things — and frankly I have only contempt for people who don’t have an attitude. They either have no self-respect, or no intelligence. But it’s pointless to lose your temper, since you’re dealing with robots. Raging against the machine just depletes your own resources, and can actually strengthen the machine.
It’s like the Milgram Experiment. You can put an ordinary person into an authority system, and he starts acting as he’s told to. And the public starts acting like sheep. This is why it only takes one guard to intimidate 100 prisoners.

Also the ratio of cops to livestock in some areas.
At this point, the average government employee makes about 50% more than a civilian worker. It’s appealing to those who have not bothered to learn a useful trade.


01 December 2010

first amendment, cablegate, Assange, Anonymity, eternity, ross anderson,Wikileaks,

Bittorrent protocol as extremely efficient use of bandwidth

Interesting documents retaining / replicating themselves because of interest

Free permenant archiving


Bittorrent as a robust distributed highly efficient super-supercomputer-scale i/o architecture has become the transport layer for Prof. Ross Anderson's Eternity file system. Combined with cryptome or wikileaks' physical or electronic submission and publication mechanisms,one can submit a document for publication irrevocably and anonymously.

Deal with it, hillary.
"He is a lovely boy, very sensitive, good with animals, quiet and has a wicked sense of humour," she said.

What more can you say of someone? Really?

A hero. An AMERICAN HERO. Heh.

Not like the stupid colonial mercs.

Can you HANDLE the TRUTH, dumbshit prole americans?


Theist monsters.

The government is not your herdsman, you are not their livestock. The government exists only to defend you from outsiders and allow recompense and prosecutation againsty fraudulent or violent insiders. It does not exist to create jobs, occupy distant lands, entangle with foreign governments (see the opinions of G. Washinton, Genl, ret), teach, build, subsidize, regulate, etc.

Not morally, not constitutionally, not legally, not ethically.

Might may make right for a while, but bullies sleep, and glass empires shouldn't fly dfrones.

And 3e6 SIPR accounts? You've GOT to be kidding me. Secrets beyond two are not secrets.

Can't wait for a higher access level patriot with a thumb drive.

Everyone can publish, and republish, for free. Welcome to the 21st. And you can publish anonymously.

Kinda hard to keep secrets if both fnord parties aren't similarly motivated.

Maybe you should enjoy the sunshine.
"Whether you agree with what Julian does or not, living by what you believe in and standing up for something is a good thing."

She said Julian Assange had put his life on hold when he was just 18 to care for his newborn son, Daniel, who is now 20 and works as a software developer in the southern city of Melbourne.

"Jules put his life and university studies on hold to parent Daniel and be there for him," Christine Assange said.

"He's a very good father -- not many men of that age will fight for their kid, but he stepped up to the responsibility."


A hero. That simple. May Rummy, Obama, Cheney, Bush, Libby, and the rest die of rectal cancer.

And if JA is harmed, you have no idea what you're dealing with, dinosaur.
He didn't actually come from a background of high technology, he came from a background of creativity and a love of learning and books," Christine Assange said.

Assange is polite and extremely smart and combative.

Condosleeza Rice and HFellatio Clinton are rude, stupid, and have no idea who they're dealing with, believing themselves some incarnate divine manifest.

Epic fail.

The secretary of state's husband is a rapist. Julian Assange is merely charismatic and handsome.
"As we were racking our brains trying to find Julian Assange, we realized: You know who we could use around here? Someone like Julian Assange, who understands, how you say, the computer devices,"

-- Interpol chief Jean-Louis Perdu
who has sex with animals
You're going to publicly state that there is no underground group. Or... these guys are going to take your balls. They're going to send one to the New York Times, one to the LA Times press-release style. Look, the people you are after are the people you depend on. We cook your meals, we haul your trash, we connect your calls, we drive your ambulances. We guard you while you sleep. Do not... fuck with us.
We cook your meals, we haul your trash, we connect your calls, we drive your ambulances. We guard you while you sleep. Do not... fuck with us.

FC was an acronym also used by Dr. Ted K.
The head of FBI was resolute today about his organization's pursuit of missing Israeli agent Joe Lieberman, telling reporters, "We will find Joe Lieberman, and then we will hang him."

Lieberman is widely known as an unregistered, illegal israeli agent.
Many of our clients who use PI to better understand their employees’ behaviors and key drivers have found that a minor pay boost is sometimes only a short term fix. To enable long term growth, smart companies understand the importance of assessing their employees’ overall needs now, so they stick around later.
When deciphering which rewards will help retain employees, organizational psychologists suggest considering:
The “Equity” Angle: Employees will look at the fairness with which organizational rewards such as compensation are allocated, and this evaluation can have a substantial impact on their motivation and subsequent commitment to the organization. An “across-the-board” pay raise of 10% for example, may violate some employees’ conceptions of fairness.

The “Cross-Cultural” Angle: Global companies like Google have a highly diverse workforce, drawing talent from all over the world. There is a significant amount of evidence indicating that compensation practices and preferences differ substantially across cultures. For example, a recent study reported that Swedes often prefer additional time off for superior job performance, whereas Japanese workers prefer financial incentives based on group and company performance.
So how can an employer determine the best route to solving their employee retention and talent management issues in the long-run? It all goes back to understanding employee behavior.

The Predictive Index® (PI®) assessment was developed and validated in compliance with Equal Employment Opportunity Commission (EEOC) Guidelines, as well as the professional standards established by the American Psychological Association (APA) and the Society of Industrial & Organizational Psychology (SIOP).


Psych losers trying to make money selling to insecure businesses.
DDOS attack now exceeding 10 Gigabits a second.

And the USG and the civilian infrastructure thinks that can't happen to them?

How are your sewage water and electric plants doing?

Folks in glass empires shouldn't fly drones. Or tip cyberwar.

Or run Pakistani drones from Nevada.

With cypherpunks.
WikiLeaks servers at Amazon ousted. Free speech the land of the free--fine our $ are now spent to employ people in Europe.
“if Amazon are so uncomfortable with the first amendment, they should get out of the business of selling books.”
Sam Cohen is gone

"It's the most sane and moral weapon ever devised," Cohen said in an interview with the New York Times shortly before his death. "It's the only nuclear weapon in history that makes sense in waging war. When the war is over, the world is still intact."


30 November 2010

Asked what his "moral calculus" was to justify publishing the leaks and whether he considered what he was doing to be "civil disobedience," Assange said, "Not at all. This organization practices civil obedience, that is, we are an organization that tries to make the world more civil and act against abusive organizations that are pushing it in the opposite direction." As for whether WikiLeaks was breaking the law, he said, "We have now in our four-year history, and over 100 legal attacks of various kinds, been victorious in all of those matters." He added, "It's very important to remember the law is not what, not simply what, powerful people would want others to believe it is. The law is not what a general says it is. The law is not what Hillary Clinton says it is."


29 November 2010

"It's like trying to catch a ghost," former Deputy U.S. Marshal Rich Knighten said shortly after Boone's indictment in 2008.
If Boone's friends have their way, he'll remain uncaught. Some complain it's not worth a life sentence - which Boone faces under the federal three-strikes provision - for a nonviolent drug charge.
"I never seen nobody get mad in my life smoking dope," said former Raywick mayor Charlie Bickett, who runs Charlie's Place, a bar filled with hand-painted milk cans and saws, including a painting of Boone looking out over the water while smoking a joint.
Friends also recall him as a heck of a farmer who grew corn and who just happened to also grow marijuana, which to some locals made Boone an outlaw, not a criminal.
Those who would talk about Boone offered similar descriptions - a friendly, nonconfrontational man who was quick to open his wallet when friends were having trouble making ends meet. For example, a man who mowed the grass on Boone's sprawling property was given twice the fee he requested at the end of the job.
When Cecil got out of prison, Boone gave him money to get back on his feet.
"With the poverty at home, marijuana is sometimes one of the things that puts bread on the table," Boone said. "We were working with our hands on earth God gave us."
The area was home to moonshine runners during Prohibition, who often darted into rows of corn stalks and barns to hide from federal agents. In the early 1980s, as the economy soured and prices for tobacco and farm products dropped, parts of central Kentucky had unemployment rates nearing 14 percent. The rate in the area now is around 9 percent - similar to the national average.
"A lot of the sons of moonshine makers turned to marijuana," said Smith, a native of the area who now practices in Louisville. "That particular part of the state, that was the hometown of marijuana."
The tunnel found Thursday is more than seven football fields in length

Yeah, amerikans can't understand distance except in footbawl field lengths. Idiots, half their population is below average.
"He was the player. There might have been one or two close to him," said Jack Smith, a former federal prosecutor who represented Boone in the 1980s case. "I never heard of anybody who was bigger."
Eventually, 70 Kentuckians were accused of growing 182 tons of marijuana.
"That's all he's ever done, raising pot," said longtime friend Larry Hawkins, who owns a bar and restaurant called Hawk's Place. "He never hurt nobody."
SPRINGFIELD, Ky. (AP) -- With authorities closing in to seize 2,400 marijuana plants on John Robert Boone's farm two years ago, the legendary Kentucky outlaw vanished like a puff of smoke. The prolific grower has been dodging the law ever since, his folk-hero status growing with every sale of a "Run, Johnny, Run" T-shirt and click on his Facebook fan page.

Suckass mercenaries like John Daily are just military scum. Boone is a true american hero.
BALTIMORE (AP) -- Lawyers for a former National Security Agency employee accused of mishandling classified information won't have to share the names of their expert consultants with the government.
GWH Bush goes to the bigge$t riche$t church in socal, gets a reacharound from paster warren.

Epic fail. Fat fake blonde rancho pigs, this is why the message arrives on planes.
Another would be to trigger the punitive measures included in the Antiterrorism and Effective Death Penalty Act, which made it a federal felony to provide "material support or resources" to a terrorist organization

Read more: http://news.cnet.com/8301-13578_3-20023941-38.html#ixzz16jpOa85Z

Congress and the previous several administrations have been war criminals. Causing violence against the american people thanks to their foreign policies.

Have a fun 21st.
"nothing short of a political meltdown for U.S. foreign policy."

Read more: http://news.cnet.com/8301-13578_3-20023941-38.html#ixzz16jpEF5jY
Rep. Peter King: just look at how evil fat patriotic he is.

Off that bitch.
King Abdullah of Saudi Arabia urged the US to attack Iran, according to US diplomatic cables released to WikiLeaks

this terrorist king is now in the US to receive medical care
“If that data happens in the moment to be in the U.S., that’s really good because we have a First Amendment,” said Eben Moglen, a law professor at Columbia Law School.

Hemophiliac inbreds with nuclear weapons, colonial past, imperialist future. Nice.
Sukhee Kang (SUCKY Kang) is the mayor of irvine. He approved a war memorial listing names of dead mercs from unending wars. Now, Korea (which has sucked the US into defending it) is at war again. Notice the confluence? Korean immie mayor supports chronic war memorial, and is from country in chronic war which sucks the US into it.

Sucky Kang. Warpig.
The directives, signed simply "Clinton" or "Rice", referring to the current and former secretaries of state, Hillary Clinton and Condoleezza Rice, form a central plank of America's intelligence effort and reveal how Washington is using its 11,500-strong foreign service to glean highly sensitive information on both allies and enemies.
It even called for "biographic and biometric" information on Dr Margaret Chan, the director general of WHO, as well as details of her personality, role, effectiveness, management style and influence.
The emergence of the directive also risks undermining political trust between the UN leadership and the US, which is the former's biggest paying member, supplying almost a quarter of its budget – more than $3bn (£1.9bn) this year.

As justification for the espionage orders, Clinton emphasized that a large share of the information that the US intelligence agencies works with comes from the reports put together by State Department staff around the world.

The level of technical and personal detail demanded about the UN top team's communication systems could be seen as laying the groundwork for surveillance or hacking operations. It requested "current technical specifications, physical layout and planned upgrades to telecommunications infrastructure and information systems, networks and technologies used by top officials and their support staff", as well as details on private networks used for official communication, "to include upgrades, security measures, passwords, personal encryption keys and virtual private network versions used".