| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | STATE DEPARTMENT LEAKS |
On 12-01-10, JEFF BINKLEY said to BOB ACKLEY: BA>I note that the US government apparnently engaged in cyber attacks BA>against the Wiki site to try to shut it down. I would not be a bit BA>surprised if the US government BA>kidnapped the people running Wiki and brought them here for trial. JB>That could happen but we need to go after the source. Someone or some JB>group within the government had to leak the documents. I have long suspected that there is inside the federal government, in positions close to the inside info, maybe even involved in some of the top level stuff, people who regularly leak information to the media. If you look back over the years and recall some of the sudden rash of `exposed' info the media suddenly comes up with, you can't fail to see that it isn't something some single whistle blower is doing. It occurs far too regularly, the info leaked is usually extremely sensitive, and typically the only people who do get caught (if anyone at all gets caught) are low-level people who aren't real important. But the leaks go on, almost uninterrupted. And they never get plugged. As for this clown who just spilled all this sensitive info...Assange? ...I'm surprised some clandestine outfit, either ours or someone elses, hasn't taken him out, yet. --- *Durango b301 #PE** Origin: Doc's Place BBS Fido Since 1991 docsplace.tzo.com (1:123/140) SEEN-BY: 10/1 11/200 331 14/400 19/75 34/999 123/500 128/2 187 140/1 226/0 SEEN-BY: 230/150 249/303 250/306 261/20 38 100 1381 1404 1418 266/1413 SEEN-BY: 280/1027 320/119 396/45 633/260 267 285 712/848 800/432 801/161 189 SEEN-BY: 2320/105 5030/1256 @PATH: 123/140 500 261/38 633/260 267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.