It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

WikiLeaks Posts Mysterious 'Insurance' File

page: 10
150
<< 7  8  9    11  12  13 >>

log in

join
share:

posted on Jul, 31 2010 @ 01:57 PM
link   



posted on Jul, 31 2010 @ 01:58 PM
link   
I still think it could be the Iraq files



posted on Jul, 31 2010 @ 01:59 PM
link   
reply to post by ~Lucidity
 


Thanks for that Lucidity, watching now...



posted on Jul, 31 2010 @ 02:15 PM
link   

Originally posted by schuyler


This leads me to believe either that it is fake, or that it has been padded so that it appears huge. This could have been done either to make it appear menacing, or to make it difficult to move around. I downloaded a Garmin GPS map update a few days ago that was about a gig on my normal DSL line. It took several hours to do it.



I think it's either a video or a few different videos and maybe some memos/paper stuff



posted on Jul, 31 2010 @ 02:23 PM
link   
reply to post by brill
 

Two points. These are true if Assange is just who he claims to be and the file posted contains real information.

First: While it is highly unlikely that anyone will be able to do it, deciphering the data and making the results known would void the 'insurance' and could well endanger Mr. Assange's life.

Second: Part of deciphering information is knowing when it has been successfully deciphered. If my life depended on the data, I'd make sure it was encrypted at multiple levels, Russian-doll-style. Someone with really good computers might successfully decipher the first level. But how would they know they'd done so when the result just looks like another stream of random bits and not some recognizable words or document signature? And what if the attacker doesn't know how many layers of encryption are present? You can see that the problem is mind-numbing. The complexity goes up exponentially with the layers of encryption.



posted on Jul, 31 2010 @ 02:29 PM
link   

Originally posted by Detergent
Second: Part of deciphering information is knowing when it has been successfully deciphered. If my life depended on the data, I'd make sure it was encrypted at multiple levels, Russian-doll-style. Someone with really good computers might successfully decipher the first level. But how would they know they'd done so when the result just looks like another stream of random bits and not some recognizable words or document signature? And what if the attacker doesn't know how many layers of encryption are present? You can see that the problem is mind-numbing. The complexity goes up exponentially with the layers of encryption.


Which is why I am not at all interested at this point in the decryption of the insurance files...despite my complete lack of computer/coding wherewithal.

I would expect it it to be of high caliber with safeguards and redundancy...

But speculation I can do...



posted on Jul, 31 2010 @ 02:31 PM
link   
My opinion, not worth much:

The stuff in the "Insurance" file is related to things like the racial slurs and bigoted remarks said to have been in the original 200k + that were reported to have been given to Wikileaks. I would expect that data was combined with stuff they already had.



But i would further state that it seems that there is a battle going on at high levels. I do not trust Wikileaks. Not fully. But then i do not trust anyone other than myself, my wife, my mother, and my son. And i don't trust any of them completely with everything (i know my son will eat my candy bar if given a chance, for a silly example).

Regardless, all i do with Wiki is what i do with others. I take it for what its worth, apply logic to what it says, and examine within the overall context. In the end what i am left with is, if nothing else, validation that the government that is supposed to represent me has completely gone astray (and likely has been in such a state since in the end of WWII).



posted on Jul, 31 2010 @ 02:36 PM
link   
reply to post by bigfatfurrytexan
 

I'm totally with you on the battle going on at high levels
Posted just that in the thread about how is WikiLeaks not a threat to national security. Something these leaks might prevent could be an even bigger threat, you know? Or they could just not care.



posted on Jul, 31 2010 @ 02:49 PM
link   
Ok so we could have encryption within encryption at different levels and that complicates things. I wonder if it is possible with the 'straw bottle' hint if a key or password could be in a constant process of changing, meaning that the program used to encrypt would put into play a process where there would be a set of keys or passwords that would change on an hourly, daily or weekly basis. Would anyone know if this is feasible, possible or practical?

I wouldn't be surprised if the key is already on the wikileaks website already and visible, the challenge here is to try and find it...lol



posted on Jul, 31 2010 @ 02:50 PM
link   
good insurance policy for Assange, if the CIA,NSA etc try to kill him this file which seems rather to important to be released now will be sent to every news group in the world, they all have the file, they all just need a key to see whats inside, it could be anything documentation from the Pentagon or something else serious like operations data,

if you open this file while it downloads on notepad i get chinese text
makes you wonder if this doc invokes plans for the Chinese ?





bigger i26.tinypic.com...

[edit on 31-7-2010 by aspx]



posted on Jul, 31 2010 @ 02:53 PM
link   
Straw and glass bottle is the directory where all the other files are located on that page too, so I doubt it's anything to take notice to.



posted on Jul, 31 2010 @ 02:56 PM
link   
Does anyone think that this is thier false flag to pass the Cyber Security Bill??? I do!!!!



posted on Jul, 31 2010 @ 02:58 PM
link   
The 'straw bottle' hint was reference to the revolving straw on the bottle experiment, psychokinesis.



posted on Jul, 31 2010 @ 02:59 PM
link   
reply to post by bigfatfurrytexan
 


Does anyone think that this is thier false flag to pass the Cyber Security Bill??? just a thought..



posted on Jul, 31 2010 @ 02:59 PM
link   

Originally posted by resist the nwo
Does anyone think that this is thier false flag to pass the Cyber Security Bill??? I do!!!!


I've always had that in the back of my mind and look at it as a good possibility.



posted on Jul, 31 2010 @ 03:00 PM
link   
You can't SAY that the file is 1.4 gig so it must be video.

It is ENCRYPTED. No one has any idea of how much padding might be in it.

There was an operation strawman about the mob, there's the strawman memory model (C++)

Since all the wiki files are in that same directory, prior to this, it is probably not that important. It probably has SOMETHING to do with logic or programming though.

www.philosophicaladvisor.com... is a powerpoint recently done that includes all 3 words in logic fallacies. It's probably not related, but it was a darn good read. lol

Am I just old or does anyone else remember the EARLY days of hacking, where the information itself WAS the prize, that getting and exposing truth and corruption were a way up the ladder of the hacking mertitocracy? That putting time and effort into "power to the people' projects like providing open source software - and intelligence - was a noble pursuit?

Assange really does seem to hold those principles in mind. I remember them. Remember the Hacker's Manifesto?




posted on Jul, 31 2010 @ 03:03 PM
link   
reply to post by porschedrifter
 


Consider every time you've created a directory or folder... For me, I know no matter how general (or even cryptic) that directory name was, it was made for a reason...

So, what connects "straw and glass bottle" with the leaked docs and their accompanied encrypted file?

Not saying the connection is of any significance what-so-ever.. But whoever created that directory name, it meant something to them.. And perhaps through speculation, we can arrive at the previously stated conjecture regarding what reference it may have...

What else do we do on a conspiracy site if not arrive at conjecture?



posted on Jul, 31 2010 @ 03:06 PM
link   
reply to post by hadriana
 


I have a hard time connecting the "strawman" speculation with the directory name "straw and glass bottle".

It seems much more logical to me to draw a parallel between the straw and glass bottle DoD experiments, than to connect "strawman" with "straw and glass bottle". Just sayin'



posted on Jul, 31 2010 @ 03:10 PM
link   
Does anyone know why the filesize of the file on wikileaks keeps changing?
The one i got directly from the wikileaks site is only 214MB.



posted on Jul, 31 2010 @ 03:11 PM
link   
reply to post by misinformational
 


IF the directory has been in use for a long while, with multiple documents being served from it, I don't think it is relevant anyway.
Unless there is something else linking this particular file to that, that I am not aware of?




top topics



 
150
<< 7  8  9    11  12  13 >>

log in

join