Jump to content

richard_vagina

Member
  • Posts

    576
  • Joined

  • Last visited

Everything posted by richard_vagina

  1. http://www.zdnet.com.au/news/security/soa/...39241748,00.htm mac os x hacking in less than 30 minutes.
  2. VOTE REPUBLICAN SOLIDER! THAT'S AN ORDER!
  3. Carl Bernstein, "The CIA & The Media Rolling Stone, October 27, 1977 there's a source for you
  4. probably hard to ahve concrete figures whenever you discuss the cia here's the article It's propaganda time By Walter Jajko CRITICS OF THE Iraq war are outraged over the revelation that the U.S. military has been paying millions of dollars to plant pro-American, Pentagon-written propaganda articles in Iraqi newspapers and to buy off Iraqi journalists with monthly stipends. But in my opinion, it's about time. Information is a critical part of any war, and the U.S. has for too long — to its own detriment — ignored this powerful and essential tool, a tool especially well-suited to the globalized Information Age. ADVERTISEMENT Even third-rate countries routinely use information and disinformation as an instrument of foreign policy, often against the United States. The U.S., in turn, cannot win the war of ideas by speaking softly or keeping its mouth shut. But we have been doing just that. The United States Information Agency, the only open, global information organization run by the U.S. government, was abolished in 1999, supposedly because it served no purpose in the post-Cold War world. It has not been replaced. U.S.-sponsored entities such as Radio and TV Marti (which broadcast to Cuba) and Al Hurra, the U.S. television station broadcasting to the Arabs, have proven ineffective. We need to be using all the means available in the war of ideas: public diplomacy, psychological operations, influence agents, disinformation and computer information warfare — from open and overt to clandestine and covert, from public explanation of policy to secret subversion of enemies. All of these must be well-orchestrated. Our current situation is quite a turnaround from the Cold War years. In 1953, the CIA's celebrated Cold War information and disinformation arm — centered in the "Mighty Wurlitzer" propaganda offices of OSS veteran Frank Wisner — was an enormous operation, with thousands of employees adept at planting press and radio stories, engaging with labor unions, applying economic pressure, offering direct monetary payments and waging political and cultural warfare in an all-out effort to prevent European countries from falling to the communists. According to a 1977 New York Times investigative series, the CIA owned or subsidized, at various times, more than 50 newspapers, news services, radio stations, periodicals and other communications facilities, most of them overseas. In some cases, these were used for propaganda efforts; in other cases, they served as covers for other operations. Paid CIA agents infiltrated a dozen more foreign news organizations, and at least 22 U.S. news organizations employed American journalists who were also working for the CIA. Nearly a dozen U.S. publishing houses printed some of the more than 1,000 books that had been produced or subsidized by the CIA. Today, this kind of effort has ended, and it is now unimaginable. Few American officials know how to play this game, and fewer would risk doing so. The left has argued that this shouldn't be done — that it's unethical, it's dishonest, it's a violation of journalistic standards. Our use of information today is insufficient, limited to disjointed efforts: the State Department's passive, reactive and defensive public diplomacy; the Defense Department's tactical, battlefield psychological operations; and the CIA's limited covert influence operations. Examples abound. The State Department only seldom (and belatedly) has provided Arabic-speaking interviewees to refute stories on Al Jazeera. The CIA never did establish a clandestine radio station to propagandize against the Iranian mullahs. Each of the few weak, unconnected information efforts has been undertaken episodically, coordinated haphazardly and funded poorly. Each ekes out its existence as transient tools accepted only in extremis, facing resistance from apathetic agencies, clueless congressmen and misinformed media. A permanent leadership is needed in the form of a new Cabinet department that can knock together heads to force integrated influence activities — a Ministry of Propaganda, if you will. Some influence operations are cheap, such as distribution of opinion pieces to newspapers; some are expensive, such as setting up a satellite television station; some are technically sophisticated, such as spreading disinformation into government computer networks; many are simple, such as immediate, vigorous, undiplomatic rebuttals by U.S. ambassadors to false accusations. But all require commitment by the national leadership. In the war against Al Qaeda and its sympathizers, aggressive, relentless and exhaustive attacks are needed, including arguing against the terrorists' theological heresies, rebutting their lies, undermining their popularity, blackening their reputations, falsifying their public and private communications, publicizing intelligence against their fellow-traveler friends and jamming their radio, television and computer networks. America's failure to use the indispensable instrument of information to protect its own national interests is inexcusable, especially as it wages a protracted war to the death against Islamic terrorists to preserve democratic governance, a free society and Western civilization.
  5. http://www.latimes.com/news/printedition/o...la-news-comment there ya go "According to a 1977 New York Times investigative series, the CIA owned or subsidized, at various times, more than 50 newspapers, news services, radio stations, periodicals and other communications facilities, most of them overseas. In some cases, these were used for propaganda efforts; in other cases, they served as covers for other operations. Paid CIA agents infiltrated a dozen more foreign news organizations, and at least 22 U.S. news organizations employed American journalists who were also working for the CIA. Nearly a dozen U.S. publishing houses printed some of the more than 1,000 books that had been produced or subsidized by the CIA." http://www.whatreallyhappened.com/RANCHO/P...ockingbird.html more you guys must think i'm just some fucked up conspiracy nut, but what i'm saying isn't far-fetched, off the top of my head, or out of my ass. check for yourselves. http://www.google.com
  6. haha. you fucked up. you been smokin trees mainter? edit: again.
  7. laptop wireless mini antenna made from an ballpoint pen http://wireless.gumph.org/content/4/3/011-...ss-antenna.html
  8. i do watch the news. it's all b/s. whether it's biased to the left or right. did you know that the cia was caught in the early 80's for planting agents in the news orgs? all of them, papers and tv.. what were they doing there? you tell me.
  9. echelon is monitoring every phone conversation, every email, etc (any communications) all over this world right now. it's computers seek out keywords. keywords used in conversations are tagged and investigated by a real live agent. wow. all of us have something to worry about. yes, the SOA trains death squads. nothing new.
  10. http://www.wired.com/news/politics/0,1283,46852,00.html WASHINGTON -- FBI agents soon may be able to spy on Internet users legally without a court order. On Thursday evening, two days after the worst terrorist attack in U.S. history, the Senate approved the "Combating Terrorism Act of 2001," which enhances police wiretap powers and permits monitoring in more situations. The measure, proposed by Orrin Hatch (R-Utah) and Dianne Feinstein (D-California), says any U.S. attorney or state attorney general can order the installation of the FBI's Carnivore surveillance system. Previously, there were stiffer restrictions on Carnivore and other Internet surveillance techniques. Its bipartisan sponsors argue that such laws are necessary to thwart terrorism. "It is essential that we give our law enforcement authorities every possible tool to search out and bring to justice those individuals who have brought such indiscriminate death into our backyard," Hatch said during the debate on the Senate floor. Thursday's vote comes as the nation's capital is reeling from the catastrophes at the World Trade Center and the Pentagon, and politicians are vowing to do whatever is necessary to preserve the safety of Americans. This week, Sen. Judd Gregg (R-New Hampshire) on the rise. In England, government officials have asked phone companies and Internet providers to collect and record all their users' communications -- in case the massive accumulation of data might yield clues about Tuesday's terrorist attacks. Under the Combating Terrorism Act, prosecutors could authorize surveillance for 48-hour periods without a judge's approval. Warrantless surveillance appears to be limited to the addresses of websites visited, the names and addresses of e-mail correspondents, and so on, and is not intended to include the contents of communications. But the legislation would cover URLs, which include information such as what Web pages you're visiting and what terms you type in when visiting search engines. Circumstances that don't require court orders include an "immediate threat to the national security interests of the United States, (an) immediate threat to public health or safety or an attack on the integrity or availability of a protected computer." That covers most computer hacking offenses. During Thursday's floor debate, Sen. Patrick Leahy (D-Vermont), head of the Judiciary committee, suggested that the bill went far beyond merely thwarting terrorism and could endanger Americans' privacy. He also said he had a chance to read the Combating Terrorism Act just 30 minutes before the floor debate began. "Maybe the Senate wants to just go ahead and adopt new abilities to wiretap our citizens," Leahy said. "Maybe they want to adopt new abilities to go into people's computers. Maybe that will make us feel safer. Maybe. And maybe what the terrorists have done made us a little bit less safe. Maybe they have increased Big Brother in this country." By voice vote, the Senate attached the Combating Terrorism Act to an annual spending bill that funds the Commerce, Justice and State departments for the fiscal year beginning Oct. 1, then unanimously approved it. Since the House has not reviewed this version of the appropriations bill, a conference committee will be created to work out the differences. Sen. Jon Kyl (R-Arizona), one of the co-sponsors, said the Combating Terrorism Act would give former FBI Director Louis Freeh what he had lobbied for years ago: "These are the kinds of things that law enforcement has asked us for. This combination is relatively modest in comparison with the kind of terrorist attack we have just suffered." "Experts in terrorism have been telling us for a long time and the director of the FBI has been telling us (to make) a few changes in the law that make it easier for our law enforcement people to do their job," Kyl said. It's unclear what day-to-day effects the Combating Terrorism Act would have on prosecutors and Internet users. Some Carnivore installations apparently already take place under emergency wiretap authority, and some civil liberties experts say part of this measure would give that practice stronger legal footing. "One of the key issues that have surrounded the use of Carnivore is being addressed by the Senate in a late-night session during a national emergency," says David Sobel, general counsel of the Electronic Privacy Information Center. A source close to the Senate Judiciary committee pointed out that the wording of the Combating Terrorism Act is so loose -- the no-court-order-required language covers "routing" and "addressing" data -- that it's unclear what its drafters intended. The Justice Department had requested similar legislation last year. "Nobody really knows what routing and addressing information is.... If you're putting in addressing information and routing information, you may not just get (From: lines of e-mail messages), you might also get content," the source said. The Combating Terrorism Act also expands the list of criminal offenses for which traditional, court-ordered wiretaps can be sought to explicitly include terrorism and computer hacking. Other portions include assessing how prepared the National Guard is to respond to weapons of mass destruction, handing the CIA more flexibility in recruiting informants and improving the storage of U.S. "biological pathogens." p.s.: i recall carnivore as being an issue before terrorist attacks.....
  11. "Echelon is perhaps the most powerful intelligence gathering organization in the world. Several credible reports suggest that this global electronic communications surveillance system presents an extreme threat to the privacy of people all over the world. According to these reports, ECHELON attempts to capture staggering volumes of satellite, microwave, cellular and fiber-optic traffic, including communications to and from North America. This vast quantity of voice and data communications are then processed through sophisticated filtering technologies. This massive surveillance system apparently operates with little oversight. Moreover, the agencies that purportedly run ECHELON have provided few details as to the legal guidelines for the project. Because of this, there is no way of knowing if ECHELON is being used illegally to spy on private citizens. This site is designed to encourage public discussion of this potential threat to civil liberties, and to urge the governments of the world to protect our rights." http://www.echelonwatch.org/
  12. what? echelon is an american program. it just so happens we have 'friends' helping out and gleening info off it, too. carnivore is a intell program started by the fbi. gah!.
  13. haha, touche'. it is getting off topic, indeed. 'lots of shit' refers to echelon, carnivore, etc.... you can find lots of info of those programs. well, those two programs. echelon is still active, carnivore has been updated. probably several times. as for the history if the SOA, no need to go into that. too much crap. i'm still looking for the docs confirming bin ladens time there (fort benning, ga).
  14. learn to spell....j/k i would get a place of my own. one room apt. yeah. fuck people. have a nice day.
  15. SOA is very dangerous. how do we know he's ina cave somewhere? as for the spying, do any of you know what ECHELON and it's predecesor programs are? any clue at all? shit, we've been doing this for so long we ahve allies helping us. australia has admitted its part in the echelon program. what about carnivore or it's predecessors? that happened in clintons era if i'm not mistaken. lots of shit.
  16. i agree. pc laptop are much more flexible. don't listen to the 'macs don't have viruses or spyware problems' that is b/s
  17. i already said that way back in the thread.
  18. my boy did this and let me tell you that it is a complete waste of time and energy unless you have the exact species of poppy and a very large area to grow the crop. you won't yield a gram unless you have a yardfull. but yes i think it is legal to grow them. Quoted post [/b] 30 something of those. papaver somniferum....breadseed poppy (hint). i have about 10 different types atm. opium is illegal. Don't harvest.
  19. why whats the major problem with java besides allowing a maliciously written applet to run arbitrary code Quoted post [/b] haha.....exactly. become your own webhost http://www.publisheraid.com/hosting/Become...n+75+Steps.html JAP anonymity proggie http://anon.inf.tu-dresden.de/win/download_en.html i still like tor more...... http://www.smoothwall.org/ turn a spare computer into a firewall...... gotta keep those feds out.....
  20. Posted by Kiki (205.188.116.132) on February 26, 2005 at 19:13:19: My 9 year old male cat (neutered) has been licking his rear end all day long. He is acting a little strange. Then I found a feces track through my living room where he had dragged his rear (yuck!). Is there something wrong? Kiki, sounds like you haven't been giving your cat the proper fucking if it's still able to walk.
  21. dear asslickers: i'm no longer your friend. sincerely, casek. p.s.: your breath smells like shit. go brush yo teef.
  22. thesmokinggun has it, i think.
×
×
  • Create New...