Some say attacking WikiLeaks would be fruitless. Really? In the past year, the Iranian nuclear system has been crippled by a computer worm called "Stuxnet," which has attacked Iran's industrial systems and the personal computers of Iranian nuclear scientists. To this day, no one has traced the origin of the worm. Imagine the impact on WikiLeaks's ability to distribute additional classified information if its systems were suddenly and mysteriously infected by a worm that would fry the computer of anyone who downloaded the documents. WikiLeaks would probably have very few future visitors to its Web site.It all gives me this vision of Thiessen dreaming about single-handedly stopping Wikileaks by typing "OVERRIDE PASSWORD" into Julian Assange's laptop, then hitting the delete button after a stern British female voice declares "ACCESS GRANTED." Then there is a tense moment as a glowing neon blue progress bar slowly deletes Wikileaks, but will it finish before Julian returns from the virtual reality cyber conference with George Soros where they are laughing about having just gotten an oblivious Julian Sands thrown in jail?
In addition to a massive list of other articles and images stolen outright by Cooks Source Magazine, intrepid Facebook users* have been posting other awful revelations about Cooks Source, including the magazine's responsibility for MySpace, the recent Qantas engine malfunction, the withering of crops in Farmville, the Kennedy assassination, Windows Vista, the loss of the original Twinkie filling, and a keyboard containing only 3 buttons: C, V, and Ctrl. In fact, one user even blames Cooks Source for his crack-like addiction to uncovering their misdeeds. (via)
* I have only included nefarious discoveries by users who stole Cooks Source's profile image.
Among the greatest U.S. government screw-ups are the failures to invest sufficiently in developing a more secure Internet protocol, to call out other governments who are harboring the worst of the worst, and to warn the public that nothing they do online is secure. I could go on at length, but I have elsewhere.
Instead, let's talk about the arrogance of U.S. law enforcement abroad and about Viggo Mortensen naked. In the movie "Eastern Promises," which features Viggo Mortensen nude [Hey, when your book comes out in paperback, I'll be happy to discuss SEO ethics], there's a bit after he has been initiated into the most central Russian gang with a tattoo. "I am through the door," he tells an associate.
A 20-year old guy named Zachary Adam Chesser pled guilty on Wednesday to three federal charges: communicating threats against South Park's writers, soliciting violent jihadists to desensitize law enforcement, and attempting to provide material support to Al-Shabaab, an organization designated by the US as a terrorist group.
Chesser is so busted. He faces a maximum penalty of 30 years in prison when sentenced on February 25, 2011. He was born Jewish, and converted in his teens to an extremist strain of Islam, adopting the name Abu Talhah al-Amrikee.
Above, from left to right, his high school yearbook photo; a pic in the school paper about his mad breakdancing skills, and Chesser transformed into Abu Talhah al-Amrikee: a violent fundamentalist who will likely spend the next three decades in prison.
Chesser also admitted that in May 2010, he posted to a jihadist website the personal contact information of individuals who had joined the "Everybody Draw Muhammad Day" group on Facebook, with the prompting that this is, "Just a place to start."
Chesser also pleaded guilty to soliciting others to desensitize law enforcement by placing suspicious-looking but innocent packages in public places. Chesser explained through a posting online that once law enforcement was desensitized, a real explosive could be used. Chesser ended the posting with the words, "Boom! No more kuffar." According to court documents, "kuffar" means unbeliever, or disbeliever.
(...) Chesser admitted that he promoted online what he called "Open Source Jihad," where he would direct jihadists through his online forums to information on the Internet that they could use to elude capture and death while maintaining relevance and striking capability. This included linking to the entire security screening manual used by the Transportation Security Administration and hundreds of books that contained information on the construction of antiaircraft missiles, and tactics, techniques and weapons for targeting aircraft such as jet airplanes and helicopters.
Read the rest
Read the rest