31 December 2010
The hacker scene is incredibly insular and interconnected. There are hundreds of people who know these guys personally. We all know Lamo and Poulsen. We are all aware that Lamo is a twitchy little fuck, not to be trusted. We also know that he is queer. And Manning is trans. This is why they were talking to each other. Vagaries of the TVTG world aside, the two have something in common: our society calls them weirdo’s. They obviously connected because of this.
So, we are here to fill in the blanks for you folks out there that think Poulsen is hiding something. Indeed, he is hiding something; he is hiding gayness. Sadly, in our ass-backwards fucked-up little country, gayness is considered a social faux pas. Poulsen is simply respecting the privacy of two people.
Gayness is really cool. We like gayness. But it’s not exactly something Wired should be reporting on. And by withholding the rest of the logs, they are not reporting on it. Rather professional of them, don’t you think?
Manning’s life has been fucked up already. We don’t need to read his dirty, very personal chat logs.
If Mr. Greenwald wants to do some actual research, he is welcome to stop into any hacker IRC channel and ask about the involved parties. We all know them, we all understand exactly what happened here. Obviously, we’re more informed than Mr. Greenwald and his Twitter groupies.
Here is the moral of this story: don’t talk to Adrian Lamo. Even if you think you are connecting with him on a personal level, he will still find a way to stick an unwanted dick in your ass.
We will now digress into the hilarious details. We really don’t give a shit if you believe us, we know these people and anyone else who knows them will tell you what we’re saying is credible.
The militarist, corporatist, liberty-stripping evil that our earnest lovers of humanity fear will come to pass if those evil Republicans come to power is already here, it is happening before their very eyes. "Oh, that Glenn Beck, how terrible he is!" Yes, he is terrible, but I tell you this: Glenn Beck hasn't tortured anyone. Glenn Beck hasn't killed hundreds of defenseless innocent civilians, men, women and children murdered without any warning by robot drones in an undeclared war on an allied nation. Glenn Beck hasn't "surged" an endless, pointless, murderous, money-making war of domination against a broken land and its terrorized people. Glenn Beck is not going to court to defend torturers. Glenn Beck is not proclaiming he has the arbitrary, unchallengeable power to assassinate anyone on earth whenever he feels like it.
But the Peace Laureate has done all these things. He is doing all these things, and more.
26 December 2010
CHICAGO (AP) -- U.S. Rep. Jesse Jackson Jr., who has largely avoided the public eye of late, said in a rare interview Saturday that he is a public servant, not a perfect one, and didn't rule out a future run at higher office.
Jackson, who has been dogged by links to the corruption case against former Illinois Gov. Rod Blagojevich and questions about his own relationship with a female "social acquaintance," told The Associated Press that he continually struggles with his "personal shortcomings."
That includes mending his family relationships over the "immensely personal matter" of the female acquaintance and assessing his political ambitions, which once included Chicago mayor or U.S. senator.
"Every one of us has erred in their personal lives and while I don't claim to be a perfect servant, I'm a public servant," Jackson told the AP. "Often times we carry with us the burdens of our personal shortcomings even as we struggle to articulate and clarify a message that helps other people. That what I dedicated my life to."
http://hosted.ap.org/dynamic/stories/U/US_JESSE_JACKSON_JR?SITE=FLTAM&SECTION=US
Don blame me massa, I'se just a loose niggah!
22 December 2010
21 December 2010
18 December 2010
16 December 2010
15 December 2010
Meanwhile, WikiLeaks is taking steps to distance itself from the suggestion that it actively encourages people to send in classified material. It has changed how it describes itself on its submissions page. “WikiLeaks accepts a range of material, but we do not solicit it,” its Web site now says.
It also deleted the word “classified” from a description of the kinds of material it accepts. And it dropped an assertion that “Submitting confidential material to WikiLeaks is safe, easy and protected by law,” now saying instead: “Submitting documents to our journalists is protected by law in better democracies.”
WikiLeaks is also taking steps to position itself more squarely as a news organization, which would it easier to invoke the First Amendment as a shield. Where its old submissions page made few references to journalism, it now uses “journalist” and forms of the word “news” 23 times.
What is hilarious is the source
14 December 2010
13 December 2010
One of the women, a political activist in her 30s described as Miss A, claims she was unlawfully coerced and subjected to sexual molestation and deliberate molestation. The other woman, Miss B, who is in her 20s, has alleged he had sex with her without a condom while she was sleeping.
Mr Assange told Mr Hurtig he had a brief affair with Miss A – who had organised a seminar for the Centre-Left group Brotherhood Movement – while staying in her flat.
Miss B admitted in her police statement that she sought out Mr Assange after seeing him on TV and, clearly infatuated, attended the seminar he was giving. They had a ‘sexual encounter’ in a cinema on their first meeting and two days later had protected sex at her flat, 40 miles from Stockholm. But the woman told police that she woke up next morning to find him having sex with her without a condom.
‘This is what they are saying is rape,’ said Mr Hurtig. He said Mr Assange and Miss B parted on good terms, with Miss B buying his train ticket back to Stockholm. But Mr Hurtig said that after Mr Assange reneged on his promise to call her and failed to return her phone calls over the next few days, the drama took a ‘bizarre’ turn.
Miss B called the office of Miss A, whom she had briefly met at the seminar, asking the whereabouts of Mr Assange. During the conversation they realised that they had both been ‘victims of his charms’.
Mr Assange told Mr Hurtig he refused their request to take a test for sexually-transmitted diseases.
He said Miss B was especially anxious about the possibility of HIV and pregnancy. It was then that
she and Miss A walked into a police station and told their stories.
Mr Hurtig said: ‘I don’t believe Miss B felt she had been raped until she went to the police station. She was encouraged by a policewoman and a junior female prosecutor to think that way. While I don’t think there was any conspiracy, Julian says he is being victimised because of his role with WikiLeaks. The fact that he has a high profile has made him a target for opponents.’
Read more: http://www.dailymail.co.uk/news/article-1337862/WikiLeaks-rape-victims-hidden-agendas---Ive-seen-proof-says-Assange-lawyer.html#ixzz182yAv1xQ
First lady Michelle Obama plans to warn in remarks Monday that the nation is seeing “a groundswell of support” for curbing childhood obesity, and she is unveiling new ammunition from current and retired military leaders.
“Military leaders … tell us that when more than one in four young people are unqualified for military service because of their weight,” the first lady says in the prepared remarks, “childhood obesity isn’t just a public health threat, it’s not just an economic threat, it’s a national security threat as well."
http://www.politico.com/news/stories/1210/46303.html
Michelle Obama is a security threat, and a threat to america's ability to reason as well.
12 December 2010
11 December 2010
By daybreak Refsdal is told that a dozen people -- including Dawran's top lieutenant -- had been killed in a Special Forces raid.
Refsdal finds Dawran "crying like a kid" over his lost men. Later, Dawran flees with his family, fearing for his life.
Refsdal knows that the images he captured will be surprising to many -- and disturbing to some. But he feels confident that the images are authentic, not an attempt at propaganda.
If the Taliban wanted to create propaganda, they would demonstrate a show of strength -- not their softer side, he said. "Showing them[selves] as humans, they don't understand any purpose of that."
"I understand that this is very emotional for people -- especially people in the armed forces," Refsdal told Cooper. "I'm a journalist, I just film what happened."
The war has become "routine" for this band of Taliban fighters, said Refsdal. "They do an ambush and then spend the rest of the day sitting around gossiping on the radio. They sit, they drink a lot of tea and they have some games they are playing."
One of the games is a simple rock throwing contest. Standing in a relatively flat clearing, the men square off to see who can throw heavy rocks the farthest. Most use a two-handed thrust-from-the-chest technique.
10 December 2010
"Technology and journalism are changing quickly. The law may not be keeping up but the government responsibility is the same."
To charge Assange under the Espionage Act, the government must prove that he knowingly acted in bad faith with the intent of harming the government and that his freedom to publish isn't protected under the First Amendment, which prohibits Congress from passing laws that restrict the freedom of the press.
Read more: http://www.mcclatchydc.com/2010/12/10/105110/wikileaks-tying-assange-to-manning.html#ixzz17mM9gNeF
08 December 2010
06 December 2010
My kid, growing algae in sixth grade, found this out. But he could use computers and color printers to plot his stuff.
Major problem is that his mom...
In engineering you use the scientific method dozens of times more a day.
My cat, on my lap and uderthis laptop, is sneezing, ting a label that has come loose, etc.
I'm typing blin ritghyt now.
05 December 2010
A $50 2GB DDR2 SODIMM and we're working much much better.
This was motivated by a memory tripling on the tower which vastly improved responsiveness.
04 December 2010
Wikileaks will accept restricted or censored material of political, ethical, diplomatic or historical significance. We do not accept rumor, opinion, other kinds of first hand accounts or material that is publicly available elsewhere. This is because our journalists write news stories based on the material, and then provide a link to the supporting documentation to prove our stories are true. It's not news if it has been publicly available elsewhere first, and we are a news organisation. However, from time to time, the editors may re-publish material that has been made public previously elsewhere if the information is in the public interest but did not have proper news analysis when first released.
If you are sending us something, we encourage you to include a brief description of why the documents is important and what the most significants parts are within the document. It will help our journalists to write up and released the story much faster.
2 Our anonymous electronic drop box
Wikileaks has an anonymous electronic drop box if you wish to provide original material to our journalists. Wikileaks accepts a range of material, but we do not solicit it. If you are going to send in material it should be done as securely as possible. That is why we have created our novel method of submission based on a suite of security technologies designed to provide anonymity. We have put a great deal of technical and design work into the drop box because we take the journalist-source relationship very seriously.
2.1 Its easy to submit
Our drop box is easy to use and provides military-grade encryption protection.
Submitting documents to our journalists is protected by law in better democracies. For other countries, the electronic drop box is there to offer help and protection. It is particularly designed to keep your identity hidden from everyone, including WikiLeaks. We never keep logs of who uses the drop box or where they are coming from.
There are several ways to send in material, but the most secure and anonymous is at the following link.
(currently closed for re-engineering security and useability improvements)
To add another layer of protection,you might also want to use the secure TOR network (http://suw74isz7qqzpmgu.onion/) Tor is a secure anonymous distributed network that provides maximum security.
2.2 Help with any questions about submitting
You can also chat to us online and we will answer any questions or solve any problems you might have with submitting (https://chat.wikileaks.org) (Currently temporarily closed with the electronic drop box for re-engineering.) Our chat is designed to be secure and anonymous. Visitors are protected by many layers of security. They can not see each other. There is a mechanism in place to stop logging and the server forbids potentially dangerous commands that could reveal other user's identity. Communication is secured with SSL encryption.
2.3 Protection for you
Wikileaks does not record any source-identifying information and there are a number of mechanisms in place to protect even the most sensitive submitted documents from being sourced. We do not keep any logs. We can not comply with requests for information on sources because we simply do not have the information to begin with. Similarly we can not see your real identity in any anonymised chat sessions with us. Our only knowledge of you as a source is if you provide a coded name to us. A lot of careful thought by world experts in security technologies has gone into the design of these systems to provide the maximum protection to you. Wikileaks has never revealed a source.
2.4 How it works
When WikiLeaks receives a document, our accredited journalists assess the submission. If it meets the criteria, our journalists then write or produce a news piece based on the document. This typically includes a description of the document, an analysis of why it is important, and an explanation of what it signifies to broader society. The news piece might also highlight the parts of the document that are most newsworthy. Our news stories are deliberately analytical regarding the wider significance of the document. We then link from the news piece to the original submission.
Submissions establish a journalist-source relationship. Online submissions are routed via countries which have strong shield laws to provide additional protection to sources and journalists.
Some documents submitted contain highly sensitive information. WikiLeaks has developed a harm minimisation proceedure to clean documents which might endanger innocent lives. In other instances, WikiLeaks may delay publishing some news stories and their supporting documents until the publication will not cause danger to such people. However in all cases, WikiLeaks will only redact the details that are absolutely necessary to this end. Everything else will be published to support the news story exactly as it appeared in the original document.
WikiLeaks has a overriding objective to publish and bring information into the public arena to encourage an informed society. It will stay doggedly true to this goal.
3. Directions for how to submit material
If you want to send us a message of your own, as opposed to a document, please see Contact.
3.1 Submissions via secure upload
Fast, easy and automatically encrypted with the best banking-grade encryption. We keep no records as to where you uploaded from, your time zone, browser or even as to when your submission was made (if you choose a non-zero publishing delay, we set the file time record to be the release date + a random time within that day).
If you are anonymously submitting a Microsoft word file (".doc") that you have edited at some stage, please try to send a PDF document (".pdf") instead, as Word documents may include your name or the name of your computer, see Word file redaction for further information. If you have no means to produce a PDF file your document will be converted by WikiLeaks staff.
The process your document will undergo is outlined for understanding submissions.
NOTE: At the moment WikiLeaks is not accepting new submissions due to re-engineering improvements the site to make it both more secure and more user-friendly. Since we are not currently accepting submissions during the re-engineering, we have also temporarily closed our online chat support for how to make a submission. We anticipate reopening the electronic drop box and live chat support in the near future.
You can also use secure TOR network (secure, anonymous, distributed network for maximum security)
3.2 Submissions via our discreet postal network
Submissions to our postal network offer a strong form of anonymity and are good for bulk truth-telling.
Steps:
First place your leak onto a floppy disk, CD, DVD or a USB Flash Drive. If you are using a floppy disks, please create two as they are often unreliable. If you only have paper documents, we will scan them if they are of significant political or media interest (if you are unsure whether this may be the case, please contact us first). This will delay the process however.
Post your information to one of our trusted truth facilitators listed below. You may post to whatever country in the list that you feel most suitable given the nature of the material and your postal service. If your country's mail system is unreliable, you may wish to send multiple copies, use DHL, FedEX or another postal courier service.
WikiLeaks truth facilitators will then upload your submission using their fast internet connection. If you use a floppy disk, be sure to send two for increased reliability.
You can use whatever return address you like, but make doubly sure you have written the destination correctly as postal workers will not be able to return the envelope to you.
After receiving your postal submission our facilitators upload the data to WikiLeaks and then destroy the mailed package.
3.3 High risk postal submissions
If your leak is extremely high risk, you may wish to post away from your local post office at a location that has no witnesses or video monitoring.
Many CD and DVD writers will include the serial number of the DVD or CD writer onto the CD/DVDs they write. If the post is intercepted this information can in theory be used to track down the manufacturer and with their co-operation, the distributor, the sales agent and so on. Consider whether there are financial records connecting you to the CD/DVD writer sale if your adversary is capable of intercepting your letter to us and has the will to do this type of expensive investigation. Pay cash if you can for the CD/DVD writer.
Similarly, CD and DVD media themselves include a non-unique manufacturing "batch number" for each group of around 10,000 CD/DVDs made. Pay cash when buying the CD or DVD. Try to choose a store without video cameras at the register.
Although we are aware of no instances where the above has been successfully used to trace an individual, anti-piracy operations have used the information to trace piracy outfits who sell tens or hundreds of thousands of counterfeit CDs or DVDs.
If you post it to us, a good option is to encrypt the USB file/CD file and then contact us at a later date via live online chat with the encryptin passphrase. That way if the post is intercepted, the data can not be copied.
If you suspect you are under physical surveillance, discreetly give the letter to a trusted friend or relative to post. On some rare occasions, targets of substantial political surveillance have been followed to the post office and have had their posted mail seized covertly. In this rare case if you are not intending to encrypt the data and if the police or intelligence services in your country are equipped to perform DNA and/or fingerprint analysis you may wish to take the appropriate handling precautions.
3.4 Postal addresses of our trusted truth facilitators
You may post to any country in our network.
Pick one that best suits your circumstances. If the country you are residing in has a postal system that is unreliable or frequently censored, you may wish to send your material to multiple addresses concurrently. For unlisted postal addresses, please contact us.
In Australia:
To: "WL" or any name likely to evade postal censorship in your country.
BOX 4080
Australia Post Office - University of Melbourne Branch
Victoria 3052
Australia
http://wikileaks.ch/submissions.html
Even the Library of Congress is getting into the game, with attempts to visit the website at the Library resulting in a warning that the site is “malicious content” and has been blocked.
http://news.antiwar.com/2010/12/03/state-dept-warning-students-not-to-read-share-wikileaks/
Guess what, State Dept students? Having worked for the State Dept will disqualify you from any honest job in the future.
03 December 2010
E.g,
Your blog post published successfully!
Well FU computer, you're a f'in server that's what you do, don't get so excited, I don't.
I don't!!!!!!!!!!!!!! Huh huh huh !!!!!!
Take your search dog and kill it with your Clippy paperclip.
Grep you. Fsck you, mofo. Pissoff and defrag yourself before some frags you.
02 December 2010
Doug: Well, one can hope.
On the bright side, this gross violation of people’s rights by the TSA is so personal, it could be the thing that actually pushes the U.S. over a psychological tipping point, and gets Americans to act like Americans, and say, "I’m not going to take anymore!" At some point even a cowering dog will stop cowering and bite.
01 December 2010
Bittorrent protocol as extremely efficient use of bandwidth
Interesting documents retaining / replicating themselves because of interest
Free permenant archiving
----
Bittorrent as a robust distributed highly efficient super-supercomputer-scale i/o architecture has become the transport layer for Prof. Ross Anderson's Eternity file system. Combined with cryptome or wikileaks' physical or electronic submission and publication mechanisms,one can submit a document for publication irrevocably and anonymously.
Deal with it, hillary.
What more can you say of someone? Really?
A hero. An AMERICAN HERO. Heh.
Not like the stupid colonial mercs.
Can you HANDLE the TRUTH, dumbshit prole americans?
Fascists.
Theist monsters.
The government is not your herdsman, you are not their livestock. The government exists only to defend you from outsiders and allow recompense and prosecutation againsty fraudulent or violent insiders. It does not exist to create jobs, occupy distant lands, entangle with foreign governments (see the opinions of G. Washinton, Genl, ret), teach, build, subsidize, regulate, etc.
Not morally, not constitutionally, not legally, not ethically.
Might may make right for a while, but bullies sleep, and glass empires shouldn't fly dfrones.
And 3e6 SIPR accounts? You've GOT to be kidding me. Secrets beyond two are not secrets.
Can't wait for a higher access level patriot with a thumb drive.
Everyone can publish, and republish, for free. Welcome to the 21st. And you can publish anonymously.
Kinda hard to keep secrets if both fnord parties aren't similarly motivated.
Maybe you should enjoy the sunshine.
She said Julian Assange had put his life on hold when he was just 18 to care for his newborn son, Daniel, who is now 20 and works as a software developer in the southern city of Melbourne.
"Jules put his life and university studies on hold to parent Daniel and be there for him," Christine Assange said.
"He's a very good father -- not many men of that age will fight for their kid, but he stepped up to the responsibility."
---
A hero. That simple. May Rummy, Obama, Cheney, Bush, Libby, and the rest die of rectal cancer.
And if JA is harmed, you have no idea what you're dealing with, dinosaur.
Assange is polite and extremely smart and combative.
Condosleeza Rice and HFellatio Clinton are rude, stupid, and have no idea who they're dealing with, believing themselves some incarnate divine manifest.
Epic fail.
The secretary of state's husband is a rapist. Julian Assange is merely charismatic and handsome.
When deciphering which rewards will help retain employees, organizational psychologists suggest considering:
The “Equity” Angle: Employees will look at the fairness with which organizational rewards such as compensation are allocated, and this evaluation can have a substantial impact on their motivation and subsequent commitment to the organization. An “across-the-board” pay raise of 10% for example, may violate some employees’ conceptions of fairness.
The “Cross-Cultural” Angle: Global companies like Google have a highly diverse workforce, drawing talent from all over the world. There is a significant amount of evidence indicating that compensation practices and preferences differ substantially across cultures. For example, a recent study reported that Swedes often prefer additional time off for superior job performance, whereas Japanese workers prefer financial incentives based on group and company performance.
So how can an employer determine the best route to solving their employee retention and talent management issues in the long-run? It all goes back to understanding employee behavior.
http://www.piworldwide.com/Blog/Can-Money-Buy-You-Happiness-in-the-Workplace.aspx
http://www.piworldwide.com/Products/Predictive-Index-System/Science-of-the-Predictive-Index.aspx
Psych losers trying to make money selling to insecure businesses.
"It's the most sane and moral weapon ever devised," Cohen said in an interview with the New York Times shortly before his death. "It's the only nuclear weapon in history that makes sense in waging war. When the war is over, the world is still intact."
http://www.latimes.com/news/obituaries/la-me-sam-cohen-20101202,0,7039951.story