dagblog - Comments for "WikiLeaks Debate on Democracy Now" http://dagblog.com/politics/wikileaks-debate-democracy-now-7620 Comments for "WikiLeaks Debate on Democracy Now" en Windows has had user-level http://dagblog.com/comment/95629#comment-95629 <a id="comment-95629"></a> <p><em>In reply to <a href="http://dagblog.com/comment/95548#comment-95548">In my opinion, this WikiLeaky</a></em></p> <div class="field field-name-comment-body field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p>Windows has had user-level permissions implemented since Win95/NT. It's perfectly possible to administer a MS network reasonably securely much as you describe ... at least from an non-exploited operational point of view. (FWIW, Novell probably provided the best backbone solution for the DoD/State enterprise)</p><p>Read/Write/Execute is a directory/file access level thing. Once someone is granted access to "read" a file, it allows copying the file into a user's local memory. A user without "write" privileges would be prevented from saving any changes made *back to the original* file. But once it's in local memory, there's nothing to keep the user from saving the information any damn place the local machine has the hardware to accommodate. This would be true on both Unix or MS. In his chats with Lamo, Manning focused on a slightly different aspect of what you are talking about; the lack of physical controls in place at the operational level and a lack of proactive security monitoring of the data network. He pretty much nails the biggest hole in that respect IMO.</p><p>But you ultimately get to a crux of difficulty with data technologies. The whole power of the distributed database is that people across the organization have instant access to the entire pool of knowledge - typically sorted and queried in a fashion relevant to their tasks. None of this leaked stuff is in the "need to know" category. "Secret" is a pretty huge category and "Classified" is even larger. Some of it is tagged not to be shared with foreign nationals but it's ops level stuff. In order for the system to actually work, any one with the specified clearance level *has* to be able to access the data pool. It appears that what a lot of analysts do is perform specialized queries on these databases when requested by superiors. It's a solid idea technologically speaking ... but by it's nature it kind of requires a vast number of people accessing on a read-only nature and a huge number accessing on a read-write basis (the analyst doesn't do the data entry ... I *think* that is happening more or less directly from the field).</p><p>We don't actually know if all the information released by Wikileaks is from the same source so it's pretty difficult to know if they had access to stuff that was well above what their clearance allowed. Assange has said on several occasions things came in from several different places. That said, Manning's clearance and role likely would have allowed him to access the stuff we've seen so far. Military commanders have to decide how to deal with random civilian leaders from all over the place and really need to know what's going on when both military and diplomatic officials are are operating in the same place - I can see how giving DoD analysts access to the State data pool for prepping reports would be a real benefit.</p><p>I agree criticizing Wikileaks seems rather to be like shooting the messenger here. But I think the internal strife is far more systemic than just a data management/security problem (although we do seem to have one of those too). Ultimately there is a reason some people have taken to dumping internal data wholesale. Either we accept they are genuinely traitors and just want to destroy America or we have to ask ourselves why those who are leaking the information ended up deciding Wikileaks was the only place to turn.</p><p> </p></div></div></div> Sat, 04 Dec 2010 20:59:05 +0000 kgb999 comment 95629 at http://dagblog.com In a sense this was not even http://dagblog.com/comment/95608#comment-95608 <a id="comment-95608"></a> <p><em>In reply to <a href="http://dagblog.com/comment/95551#comment-95551">I didn&#039;t see a clear winner.</a></em></p> <div class="field field-name-comment-body field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><span style="font-size: small;">In a sense this was not even a debate as nobody presented a thesis which one defended and the other attacked. It was more a broad conversation in which each party discussed and expressed opinions about Wikileaks and Assange ranging from right and wrong, effectiveness, legaliy, responsibility, and potential harm versus benefit.  and those opinions were sometimes the same and sometimes very different. </span><br /><span style="font-size: small;"> From Wikipedia:</span><br /><br /><span style="font-size: small;"> "Though logical consistency, factual accuracy and some degree of emotional appeal to the audience are important elements of the art of persuasion,<strong> in debating, one side often prevails over the other side by presenting a superior "context" and/or framework of the issue, which is far more subtle and strategic."</strong></span><br /><br /><span style="font-size: small;"> This is where I judge that Greenwald did a much better job than Steven Aftergood.</span></p></div></div></div> Sat, 04 Dec 2010 18:44:39 +0000 A Guy Called LULU comment 95608 at http://dagblog.com I ran into this at wired.com http://dagblog.com/comment/95590#comment-95590 <a id="comment-95590"></a> <p><em>In reply to <a href="http://dagblog.com/comment/95582#comment-95582">I&#039;ve seen both types in</a></em></p> <div class="field field-name-comment-body field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><span style="font-size: small;">I ran into this at wired.com while I was looking for something else, and pardon me if this has been discussed on this thread already.  Paulson says a lot of missteps by Assange's folks could have been avoided easily, and he posits that <em>maybe they're not as tech savvy as they think.  (</em>I understand not one jot of it.)</span></p><p><span style="font-size: small;"><a href="http://www.wired.com/threatlevel/2010/12/wikileaks-domain/">http://www.wired.com/threatlevel/2010/12/wikileaks-domain/</a></span></p><p><span style="font-size: small;"><em> </em></span></p></div></div></div> Sat, 04 Dec 2010 17:23:46 +0000 we are stardust comment 95590 at http://dagblog.com never argue with a fool, http://dagblog.com/comment/95586#comment-95586 <a id="comment-95586"></a> <p><em>In reply to <a href="http://dagblog.com/comment/95582#comment-95582">I&#039;ve seen both types in</a></em></p> <div class="field field-name-comment-body field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><blockquote><p>never argue with a fool, especially once he's been certified.</p></blockquote><p>If I were DD… (especially for those of us who understand the context)</p></div></div></div> Sat, 04 Dec 2010 16:22:32 +0000 Atheist comment 95586 at http://dagblog.com I've seen both types in http://dagblog.com/comment/95582#comment-95582 <a id="comment-95582"></a> <p><em>In reply to <a href="http://dagblog.com/comment/95564#comment-95564">It has changed, and for the</a></em></p> <div class="field field-name-comment-body field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even">I've seen both types in action. Unix Sys Admins are hard-core computer scientist types and know the language and hardware inside and out. Whereas, Windows Sys Admins are bootcamp specialist willing to fork out lots of $$$ for a simple certification that says they know what their doing. I had many discussions with certified guru's and noted they rely upon their training rather than read the documentation. For instance, Cisco switches and 3Comm NICs were incompatible so the switch and NIC needed to be hardwired with matching speed and duplex. However, the Microsoft Certified Engineer running the PC shop refused to listen or read the documentation because he learned in bootcamp they should always set the NIC to auto negotiate...never argue with a fool, especially once he's been certified.</div></div></div> Sat, 04 Dec 2010 16:08:53 +0000 Beetlejuice comment 95582 at http://dagblog.com Happy to oblige. http://dagblog.com/comment/95580#comment-95580 <a id="comment-95580"></a> <p><em>In reply to <a href="http://dagblog.com/comment/95576#comment-95576">Lulu, I wonder if you might</a></em></p> <div class="field field-name-comment-body field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><span style="font-size: small;">Happy to oblige.</span></p></div></div></div> Sat, 04 Dec 2010 15:56:43 +0000 A Guy Called LULU comment 95580 at http://dagblog.com That's were the breakdown http://dagblog.com/comment/95578#comment-95578 <a id="comment-95578"></a> <p><em>In reply to <a href="http://dagblog.com/comment/95558#comment-95558">To extend the Unix metaphor</a></em></p> <div class="field field-name-comment-body field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p>That's were the breakdown was...they didn't take the time or make the effort to catalog the info then establish a need-to-know criteria for users to establish who is or is not authorized to view, copy and edit. One would think as sensitive as the info seems to appear by the way the government is reacting they would have gone the extra mile to safeguard access. So it's not the leaker who is the criminal, but the victim themselves for not taking care their info was secure and on a need-to-know basis with credible and trustworthy users. That's why all the noise being manufactured is dingy...it's all for the wrong reasons and serves no useful purpose...the government will not tackle upgrading their access methods cause WikiLeaks is the public's enemy now.</p></div></div></div> Sat, 04 Dec 2010 15:55:14 +0000 Beetlejuice comment 95578 at http://dagblog.com What Stardust said. http://dagblog.com/comment/95577#comment-95577 <a id="comment-95577"></a> <p><em>In reply to <a href="http://dagblog.com/comment/95573#comment-95573">This short article is</a></em></p> <div class="field field-name-comment-body field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><span style="font-size: 5px;">What Stardust said.</span></p></div></div></div> Sat, 04 Dec 2010 15:48:33 +0000 Atheist comment 95577 at http://dagblog.com Lulu, I wonder if you might http://dagblog.com/comment/95576#comment-95576 <a id="comment-95576"></a> <p><em>In reply to <a href="http://dagblog.com/comment/95573#comment-95573">This short article is</a></em></p> <div class="field field-name-comment-body field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><span style="font-size: small;">Lulu, I wonder if you might be enticed to hit the font-size drop down menu and hit #3, (12 pt) before composing.  Man; that default font is hard to see...  <img title="Frown" src="/sites/all/libraries/tinymce/jscripts/tiny_mce/plugins/emotions/img/smiley-frown.gif" border="0" alt="Frown" /></span></p></div></div></div> Sat, 04 Dec 2010 15:46:45 +0000 we are stardust comment 95576 at http://dagblog.com This short article is http://dagblog.com/comment/95573#comment-95573 <a id="comment-95573"></a> <p><em>In reply to <a href="http://dagblog.com/comment/95553#comment-95553">Not to mention his attorney</a></em></p> <div class="field field-name-comment-body field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p>This short article is interesting. To me it is filled with darkly humorous ironic hypocrisy. An intelligence "source" leaks NSA findings, presumably everything from the NSA is classified, to "The Daily Beast".</p><p><a href="http://warincontext.org/2010/12/03/moscows-bid-to-blow-up-wikileaks/">http://warincontext.org/2010/12/03/moscows-bid-to-blow-up-wikileaks/</a></p><p><br />The source implies that the U.S. would not do anything underhanded. No, not us, who would even think it, but those Russkies? <em>They </em>play by different rules and <em>they</em> are outraged. <em>They</em> might do something dirty. <br /> Is the leak a heads up to Assange so he will keep his head down? I doubt it. So, what might have been the reason for this information to be released? To get an early start at deflecting blame in case our good=guys get the chance to pop Assange? No, that sounds too conspiratorial. That couldn't be it.</p></div></div></div> Sat, 04 Dec 2010 15:39:00 +0000 A Guy Called LULU comment 95573 at http://dagblog.com