It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

WikiLeaks Posts Mysterious 'Insurance' File

page: 44
150
<< 41  42  43    45  46  47 >>

log in

join
share:

posted on Aug, 13 2010 @ 02:23 PM
link   
Verbatim transcription of conference from here: , regarding the insurance file.

BBC Journalist: On the War Diaries Site, there’s a 1.4Gb encrypted file. It would be lovely if you tell us what was in it, I suspect you won’t. But how is using encryption like that, a technique that you envisage being used to prevent things like prior restraint, and other legal threats?

Julian Assange: Yeah, so we have over a long period of time, distributed encrypted back-ups of material we have yet to release, and that means that all we have to do is release the password of that material and it’s instantly available.

Now, of course, we don’t like to do that because there’s various harm minimisation procedures to go through. But we understand the historical significance of the material that we have been publishing and the material that we will publish in the future, about a number of different countries, and that duty to history is something that weighs heavily on us.

If you had the [inaudible 1:00:25] archives in your pocket, that is a very heavy pocket indeed, and so we take precautions to make sure that sort of material is not going to disappear from history, regardless of the sort of threats to this organisation.

END*

So, it seems that it is information that hasn't been released yet.

* I have only transcribed the part of the conference that is relevant to the insurance file.



posted on Aug, 13 2010 @ 02:25 PM
link   
reply to post by hiltonxyz
 


No, no. It was totally my misunderstanding



posted on Aug, 13 2010 @ 06:32 PM
link   

Originally posted by qualitygossip
If you had the [inaudible 1:00:25] archives in your pocket, that is a very heavy pocket indeed, and so we take precautions to make sure that sort of material is not going to disappear from history, regardless of the sort of threats to this organisation.

I think that what he said was "the Stasi archives".

By using that name he may be giving some kind of hint of what that file has.



posted on Aug, 13 2010 @ 10:10 PM
link   
the ony thing that keeps me double guessing assange is... is he one of those guys who nows he has the worlds fates in his hands and too publicly stupid to realise it or ...from his run of the ,outh of almost confessions... hes givi like so much info, or hints about what kind of file, the type of encyptian, his thoughts of...bleh, hes giving away too much outer intel ..shut the ## up dude just hide and ......hide man god.



posted on Aug, 13 2010 @ 10:15 PM
link   
my apologies for all the grammar mishaps but my computers running slow and after reading that transcript im super anxious so... i just wish hed keep quiet and do his thing and not lead on to this cia operative bs that might actually apply to some other country at this point what with russia going public helping iran and such.



posted on Aug, 13 2010 @ 11:19 PM
link   
www.guardian.co.uk...


The data came to us as a huge excel file – over 92,201 rows of data, some with nothing in at all or were the result of poor formatting. Anything over 60,000 rows or so brings excel down in dramatic fashion – saving takes a painfully long period of time (tip number one – turn automatic saving off in preferences…). It doesn't help reporters trying to trawl through the data for stories and it's too big to run meaningful reports on


So is this one big encrypted excel file?



posted on Aug, 14 2010 @ 05:23 AM
link   
reply to post by JBA2848
 


Hrm, only if it's the original uncompressed excel file. Which makes no sense as it would have an amazing compress ratio which would make the distribution a whole lot easier. But will check it.



posted on Aug, 14 2010 @ 06:44 AM
link   

Originally posted by JBA2848
So is this one big encrypted excel file?

I don't think so.

I created a SQL database with the released data (76,911 records) and, uncompressed, it's only a 100 MB file. Compressed would become something like 10% or 15% of that size.



posted on Aug, 14 2010 @ 07:36 AM
link   
The next bunch of Afghan war documents to be published in a "couple of weeks".



posted on Aug, 14 2010 @ 02:42 PM
link   
I guess SIPRNET runs a excel stream and its aes 256 encrypted through the router. Then decrypted at the other end with a router.

www.grrip.net...
I know the lap top (Panasonic CF-19) from the above has had its wifi hacked. They have a live cd that cracks the code it uses in seconds. The HAIPE protection is only built into the router not the laptop.

www.disa.mil...
iase.disa.mil...
iase.disa.mil...

Above links are about SIPRNET and the use of PKI. PKI uses certificats to authenticate. PKI has been hacked by going through Google. Using google translate and other similar websites gives the certificates to google not the person using the google website.

Example go to google images look up iase.disa.mil follow any of those links that goes to iase.disa.mil and certificates will be given out due to not having certificate for website. But if you go directly to iase.disa.mil it reads the certificates from your computer.

But anything accessed through PKI system would not be top secret. They would have to have a posix system to gain access to anything highly classifiied. So you would need that suit case from the top link.

Bradley Manning was using SIPRNET when he stole the information that he gave to Wikileaks. So what did he steal and give to Wikileaks? Could it be he stole software from his laptop. And then gave out the password So that Assange could have acccess to SIPRNET. But the access Bradley Manning could get to would only be for coalition forces in Iraq and Afghanistan excel streams. The other streams like the Diplomatic stream would not be connected to the stream for coalition forces. So there is more Bradley Mannings if thats the case or Wikileaks has truely hacked SIPRNET.

Heres an idea of what kind of software Bradley Manning might have gave to Assange.

www.gdc4s.com...

[edit on 14-8-2010 by JBA2848]



posted on Aug, 14 2010 @ 03:15 PM
link   
reply to post by JBA2848
 


Some questions, if you don't mind.



I guess SIPRNET runs a excel stream and its aes 256 encrypted through the router. Then decrypted at the other end with a router.

What is an excel stream?


www.disa.mil...
iase.disa.mil...
iase.disa.mil...

Above links are about SIPRNET and the use of PKI. PKI uses certificats to authenticate. PKI has been hacked by going through Google. Using google translate and other similar websites gives the certificates to google not the person using the google website.

Example go to google images look up iase.disa.mil follow any of those links that goes to iase.disa.mil and certificates will be given out due to not having certificate for website. But if you go directly to iase.disa.mil it reads the certificates from your computer.

So, does it mean that if we go to one of the links that you provided, those sites will read the certificates from my computer? What certificates?


But anything accessed through PKI system would not be top secret. They would have to have a posix system to gain access to anything highly classifiied. So you would need that suit case from the top link.

What's the connection between a posix system and that suit case?

There are several posix operating systems, some free (and open source), no need for any special suit case (unless you want to carry a suit
).


Bradley Manning was using SIPRNET when he stole the information that he gave to Wikileaks.

Is that a fact? I ask because I haven't followed that side of this case.


So what did he steal and give to Wikileaks? Could it be he stole software from his laptop. And then gave out the password So that Assange could have acccess to SIPRNET.

It's not easy to steal software from a computer and making it work in a different computer, it's easier to steal the hardware.



posted on Aug, 14 2010 @ 03:59 PM
link   
reply to post by ArMaP
 


Well, I don't see an Excel file yet.
The reason I picked this idea up is precisely because it's idiotic yet possible.



posted on Aug, 14 2010 @ 07:07 PM
link   
boingboing.net...

Here a web site that shows his charges and he illegally used secret internet protocal router network (SIPRNET) To gain access to a secret microsoft office power point presentation. That could be the excel streaming file.

I guess the streaming file is all excel files changed to binary and sent out. Since the computers using this excel stream know what the files are there using the normal headers of the files for other data. Instead of the file telling windows this is a excel file for a spread sheet it tells the computer this is from PFCSpecialist Bradley Manning Operation Leak to Wiki Classified TS/SCI. The program they use would run a ticker like they do for the stock market. Reading the file header when they click on it if they have clearance they get to see it if not its empty. That explains why when they went through the files they found empty folders. Those files were above there clearance.

The use of Posix for the highly classified stuff I guess is there running a live cd for boot. The PBA hidden sector would then run in the Bios memory and lock the cd driver and only open approved ports and search for the needed hardware for the encrypting decrypting. Then search for tokens certificates and other needed verifiers. Since the Posix system ran from start up and locked the system into a secure mode they know the information will go no further than that screen. The use of windows and linux is limited to PKI security which only would go so high. I guess most devices that are Posix are just compliant and not true Posix systems. I think Windows ME is the only Posix proven Windows.

I think Assange has gained access to this data stream only on the lower PKI area and not deep enough to get to any thing really secret.

But from what I can tell there using things like file headers, hidden pba headers ATA headers and SATA headers in different ways then they are normally done.



posted on Aug, 14 2010 @ 07:21 PM
link   
reply to post by JBA2848
 


There is no Top Secret data on the SIPRNET. TS/SCI data is on the JWICS networks:

Source

So if Manning only had access to the SIPRNET, he only had access to data classified Secret. And since we haven't heard of any leaked TS or SCI data, then we should be inclined to believe that this was the case.

FYI: Just because he held a TS/SCI clearance doesn't necessarily mean he had access to JWICS - especially being forward-deployed.



posted on Aug, 14 2010 @ 07:33 PM
link   
reply to post by misinformational
 


Thats why I think he gave up software and not information from a file. If he gave up the software Assange could use it to get into SIPRNET feed. But when it comes to the diplomatic feeds Assange got it has to be another person. But does that diplomatic feed use the same basic software to sort through the feed? If it does then software from Bradley Manning would be more useful to Assange then files.



posted on Aug, 14 2010 @ 07:48 PM
link   
reply to post by JBA2848
 


It was in the Manning/Lamo chats that Manning claimed to have accessed the 250,000 diplomatic cables and leaked them to Wikileaks.

Assange has continuously denied to have received these leaks (as he would to protect his source).

But still, the only reason we know about the cables is from the Manning/Lamo chats. I have no idea how the cables would be classified (although I seriously doubt it would be Secret).

FYI: Perhaps someone with more free time than I can average the size of each intel report from the Afghan War Logs, then multiply that by 15,000 for the remaining Afghan War Logs reports, then multiply again by 250,000 for the cables - It'd be damn interesting if that total was approx 1GB.

If someone is so inclined, do remember that each step up in data size (e.g. MegaBytes to GigaByte) is 1024 and not 1000 (so 1GB = 1024MB, 1MB = 1024 KB and so on)... Also there are 8bits in one byte.

[edit on 14-8-2010 by misinformational]



posted on Aug, 14 2010 @ 07:58 PM
link   
reply to post by JBA2848
 


For those that haven't seen it here is Bradley Manning's charge sheet from the army.

Warning it's a PDF and you will be prompted to download it.



posted on Aug, 14 2010 @ 08:06 PM
link   

Originally posted by JBA2848
reply to post by misinformational
 


Thats why I think he gave up software and not information from a file. If he gave up the software Assange could use it to get into SIPRNET feed. But when it comes to the diplomatic feeds Assange got it has to be another person. But does that diplomatic feed use the same basic software to sort through the feed? If it does then software from Bradley Manning would be more useful to Assange then files.


This would be impossible - Don't think of these classified networks as feeds, because they're not - They are literally networks.

These networks are hardware encrypted, and without the keys you would not gain access through any software, period - This is not software encryption.

[edit on 15-8-2010 by misinformational]



posted on Aug, 14 2010 @ 09:35 PM
link   
reply to post by misinformational
 


NCTC is the only system I see that would allow him access to so many secret web sites or feeds. And if that is what he had then what was he doing with that type of systems on the front lines.
www.nctc.gov...

State department would be on INRISS / CLASSNET
DOD would be on JWICS / SIPRNET

Unless he was involed in illegal spying taking place abroad by our military. Was the military spying on other US government agencies?



posted on Aug, 14 2010 @ 09:46 PM
link   
reply to post by JBA2848
 


I'm not familiar with NCTC, but JWICS does include the State Department (and by association diplomatic cables):


The Joint Worldwide Intelligence Communications System is a system of interconnected computer networks used by the United States Department of Defense and the United States Department of State to transmit classified information by packet switching over TCP/IP in a secure environment.


Source

(if you haven't, take a look at Manning's charge sheet I posted a couple post up - it details each suspected breach)




top topics



 
150
<< 41  42  43    45  46  47 >>

log in

join