lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <AANLkTik+9C6oDBuihZjKHXMjE_f97ffd94gdEvn02LO7@mail.gmail.com>
Date: Thu, 21 Oct 2010 22:59:47 +0100
From: "Cal Leeming [Simplicity Media Ltd]"
	<cal.leeming@...plicitymedialtd.co.uk>
To: Camden Buzard <camden.b@...alaska.net>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: wikileaks still under attack,
	pressure revved up

I apologise for this, I had heard this in, what I had believed to be, a
credible news report.

On Thu, Oct 21, 2010 at 8:58 PM, Camden Buzard <camden.b@...alaska.net>wrote:

>  According to the secretary of defense, it's definitely a rumor:
>
> A letter from Secretary of Defense Robert M. Gates to Comittee of Armed
> Services Chairman Carl Levin dated August 16 but recently made available to
> the public says, “The initial assessment in no way discounts the risk to
> national security; however, the review to date has not revealed any
> sensitive intelligence sources and methods compromised by this disclosure.”
>
> http://mashable.com/2010/10/18/wikileaks-dod-intelligence/
> direct pdf link:
> http://www.fas.org/sgp/othergov/dod/gates-wikileaks.pdf
>
> --Camden
>
>
> On 10/21/2010 11:49 AM, Ana Kismet wrote:
>
> I have seen nothing released that reveals sensitive information such as
> "GPS co-ords + details of those who co-op'd with soldiers."
>
> This is a rumor. If you have proof that this is not a rumor, please post
> it.
>
>
>
> On Thu, Oct 21, 2010 at 11:51 AM, Cal Leeming [Simplicity Media Ltd] <
> cal.leeming@...plicitymedialtd.co.uk> wrote:
>
> This will be my first and last post on this topic (again).
>
>  I've just finished watching some videos about what wikileaks have been
> doing.
>
>  It appears that they released a bunch of documents that revealed
> information such as GPS co-ords + details of those who co-op'd with
> soldiers. He also posted the names of these people too, and a bunch of
> information which could jeopardise the protection of soldiers on the ground,
> from all countries.
>
>  I can appreciate his previous efforts, but what he has done here is put
> many lifes at risk, both civilians and soldiers.
>
>  So, if the US military have launched an all our war on Wikileaks, whether
> it be legal or not, I can't say it would be entirely shocking.
>
>  On Thu, Oct 21, 2010 at 5:32 PM, Harry Behrens <harry@...rens.com> wrote:
>
> Sorry to all of those who think this is "gossiping", but:
>
> Wikileaks has been down for ca. 2 weeks now during which time the US has
> at least cut off their financial channels.
> This during a period where WL has announced another major leak release
> this time re. Iraq.
> What is also extremely disconcerting is the absolute silence of _all_
> main street media to the topic (gag...?)
>
> Now the latest tweet reads:
> "WikiLeaks communications infrastructure is currently under attack.
> Project BO move to coms channel S. Activate Reston5."
>
> Yet again I would like to pint out that there seems to be a concerted
> high power attack going on against WL
> And yet again I would like to point out it would be interesting to know
> what is rally happening.
> And yet again I'd like to emphasize that this indeed a security issue;
> it does concern netizens and citizens in general if major government
> organisations engage in what seems to be a dirty war against a
> whistleblowing organisation.
>
> If anybody knows more, pls. do share insights...
>
>     Harry
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>
>
>
>   --
>
> Cal Leeming
>
> Operational Security & Support Team
>
> *Out of Hours: *+44 (07534) 971120 | *Support Tickets: *
> support@...plicitymedialtd.co.uk
> *Fax: *+44 (02476) 578987 | *Email: *cal.leeming@...plicitymedialtd.co.uk
> *IM: *AIM / ICQ / MSN / Skype (available upon request)
> Simplicity Media Ltd. All rights reserved.
>  Registered company number 7143564
>
>
>
>
> --
>
> Cal Leeming
>
> Operational Security & Support Team
>
> *Out of Hours: *+44 (07534) 971120 | *Support Tickets: *
> support@...plicitymedialtd.co.uk
> *Fax: *+44 (02476) 578987 | *Email: *cal.leeming@...plicitymedialtd.co.uk
> *IM: *AIM / ICQ / MSN / Skype (available upon request)
> Simplicity Media Ltd. All rights reserved.
>  Registered company number 7143564
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>



-- 

Cal Leeming

Operational Security & Support Team

*Out of Hours: *+44 (07534) 971120 | *Support Tickets: *
support@...plicitymedialtd.co.uk
*Fax: *+44 (02476) 578987 | *Email: *cal.leeming@...plicitymedialtd.co.uk
*IM: *AIM / ICQ / MSN / Skype (available upon request)
Simplicity Media Ltd. All rights reserved.
Registered company number 7143564

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ