It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
TEHRAN (FNA)- A former Pakistani army commander said that the disclosure of classified documents by the whistleblower site of Wikileaks is a US plot to create rift among friendly and neighboring states.
Arguing that anonymity on the Internet is dangerous, Schmidt had reportedly said, "In a world of asynchronous threats, it is too dangerous for there not to be some way to identify you."
He also said governments may eventually put an end to anonymity. "We need a (verified) name service for people," he said. "Governments will demand it."
The bureau's justification for next year's budget, in which it has requested an additional 70 agents and more than 100 support personnel for its cyber division, says the task force "seeks to address cyber intrusions presenting a national security threat."
The budget justification says the task force will "develop a global view of information warfare activity; identify intelligence gaps; create a strategic framework to develop operations; de-conflict investigations and operations (and) generate timely intelligence."
Homeland Security Secretary Michael Chertoff told a bloggers' roundtable last month that cybersecurity was "the one area in which I feel we've been behind where I would like to be."
"The general public is not aware (enough) of the threats," he said. "People need to be sensitized to potential vulnerabilities"
MasterCard's payment processing systems were affected during the first DDoS attack on Wednesday, with many consumers reporting that they were unable to pay for goods online. Businesses reported a corresponding drop in trade during that first attack.
Protections for anonymous speech are vital to democratic discourse. Allowing dissenters to shield their identities frees them to express critical, minority views . . . Anonymity is a shield from the tyranny of the majority. . . . It thus exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular: to protect unpopular individuals from retaliation . . . at the hand of an intolerant society.
Wikileaks is the perfect opportunity to get the public aware about the threats we face from the cyber domain. But where did their documents come from? Anyone can submit information to wikileaks. If the info is from Private Manning, how did a private get access to so many classified documents? Did someone maybe have foreknowledge that he would do what he did?
Originally posted by againuntodust
If the info is from Private Manning, how did a private get access to so many classified documents? Did someone maybe have foreknowledge that he would do what he did?
The commission investigating the terrorist attacks of 9/11 found that "poor information sharing was the single greatest failure of our government in the lead-up to the 9/11 attacks,"
The State Department created something that went by the unlovely name of Net-Centric Diplomacy database, or NCD. The department stored classified information on the database right up to the top-secret level. Agencies across the government had access to State's information through their own secure networks. The Pentagon's network, created in 1995, was called the Secure Internet Protocol Router Network, or SIPRNet, and was available to everyone from top officers in the Pentagon to troops in the field helping to track intelligence for their units. Read more: www.time.com...
Originally posted by RelentlessLurker
i have suspected this for quite some time.
i believe its a select few, that "encourage" (perfect word) the army of 15 year olds.
Originally posted by mr-lizard
reply to post by againuntodust
Well if you did your research, you'd find the attacks were 'organised' via collective discussion on public IRC channels and no single person made a decision.
I was witness to such a discussion and i can honestly say that no 'anonymous member' has any more control over anything than any other.
You mess with classified information, and sure some citizens might get upset over the principle of the matter - but they'll move on with their life. People have short memories.
You mess with their money, though, and watch out. There's nothing a consumer society will condemn more than those who try to put the brakes on their consumerism. Can't buy gas? Can't play on e-bay? Can't Christmas shop? "It's those evil internet hackers, the anonymous ones. Damn that anonymity to hell." The people, and the government, soon will be seeking... no, DEMANDING, the END of internet anonymity.
"Minimanual broadcast live" - Unnamed "How about expanding the power of the demonstrations? Does not convey online? in - Create an account at twitter.com... and twitcasting.tv... b - Use a suggestive name for your account as "vemprarua_uf_cidade". c - Your cell phone camera and need access 3g or wifi d - Download and install "TwitCasting live (free)" (google play store) and - Once logged in, the application has a "record" button, and welcome to the live broadcast. Tips: I - Turn on the flash at night and in the shade II - Depending on your connection, change the form of recording (button "normal" app) III - Interact with viewers during transmission IV - Predict the transmission time, create an event in the face and tell us to disclose on pages and groups. V - Please let us know in advance about the broadcast schedule - do not miss with your audience. VI - At the end of transmission, always choose to record. Need help? Please contact one of the events in your city, do not know where you will be? www.facebook.com... Predict the transmission time, create an event in the face and tell us to disclose. Do not know this kind of work: See more in www.postv.org... Successfully created your event? Tell us your channel and broadcast events for: www.facebook.com... We will do our best to keep people updated on the manifests of the city. 'Minimanual the Ninja "