Saturday, December 11, 2010

How To Strap On Goalie Pads Correctly

WikiLeaks, again

What position you take on certain "WikiLeaks" - a phenomenon?

At the current phenomenon of "WikiLeaks" is everywhere now so reflected and theorized.

For example here:

http://www.eurozine.com/articles/2010-12-07-lovinkriemens-en.html

here in German:

http://www.fr-online.de/ kultur/debatte/die-anarchie-der-transparenz/-/1473340 ...

and in response, here:

http://cryptome.org/0003/wikileaks-six.htm

bottom line is the "Diplomatic Cables" documented the extraordinarily high level of U.S. diplomacy and that bypassing a customary lock-up period of 40 years, as it is today, the NYT on the example of Eisenhower's farewell speech of 1961 on the conceptual development of the be seen "industrial-military complex" online:

http://www.nytimes.com/2010/12/11/us/politics/11eisenhower.html


reacts to the U.S. state policy all over uncontrolled, like this how to do it just by the example of China could follow in Oslo:

http://www.welt.de/debatte/kommentare/article11549982/China-fuehrt-den-Kampf- ...


was instead just an empty chair's empty bank accounts:

http://www.heise.de/tp/r4/artikel/33/33802/1.html


If the target of repeated actions, however, the disavowal, exposing and damage to democratic institutions in den USA gewesen sein sollte, dann waren die bisherigen Aktionen als Provokation ein voller Erfolg. Es fragt sich nur: von wem veranlasst und von wem durchgeführt?


Im ganzen Diskurs um WikiLeaks fehlt mir bislang nämlich die Dimension der Handwerklichkeit:
Wie hat man sich den Datenraub also ganz praktisch vorzustellen?

1. Ein Eindringen mit Root-Rechten ins Allerheiligste des US-amerikanischen Außenministeriums, um die Datenbankinhalte samt Anwendungssoftware datentechnisch zu überspielen, um sie auf einem anderen Rechner neu zu installieren, damit man dann GB um GB in TB-Größenordnung in Ruhe "auswerten" kann -- und das ohne Spuren zu hinterlassen?

Möglich, aber wohl kaum durch 16-jährige Amateur hacker. That sounds more like professional teams that make the whole day probably nothing more than that - and have for the technical infrastructure of collaboration. And about the duplicate, if necessary, physically move without data network to data: shutdown, temporary technical fault, local dubbing, on again, nothing had happened ...

Or the Foreign Office website to "security reasons" in principle, reflected in the "security forces".

second Another possibility: a Deuce and scripts bulk queries the relevant database (s) to run via the intranet, on the same hang as much as possible in their own network remains. Also a possibility, but hardly without leaving traces that could have just too much for 'asterisks and other jokers actually a monitoring immediately and may have to stop, and the tracks would have to investigate leaks of data. So it is just been the bad "anonymous" hackers. Where are the log files of data rape?


If one (1) excludes, because it was no more the same power as the democratic institutions in the state and can be anything, remains variant (2) left. Unfortunately, then, that raises another since 2001 and already well-known, familiar phenomenon again: Bad luck and mishaps. All, it might have known, have failed and the wicked are to blame.

In other words: the White Rabbit is back! The White Rabbit is always useful when it is just instrumental needs and can pull from his sleeve - and it has a name and means: Osama Bin Assange. Instead of just white beard white hair.

instead - as suspected - there was this time so 9/11-Material "Diplomatic Cables". The excitement around Nothing is great, the sensitivity of Kairos is artificially produced, distributed well fertilized and well, ready for the final blow. One should be mentally prepared. Westerwelle spied concept of "late Roman decadence" the Foreign Office was already guessed right, but completely wrong target, somehow in the wrong continent. For here is already operating out of a covered position. Benefice which you want to keep on threatening to get lost, because they are already lost. "Follow the money," Deep Throat said, then ...

JP

0 comments:

Post a Comment