Harleyman Posted February 7, 2011 Share Posted February 7, 2011 Senility is nothing to be proud of:confused:. You'll have to try harder than that I'm afraid (I'm an atheist, and have worked with quite a few Americans on various OS projects so am most certainly not "anti-american" as you try to label anyone who doesn't agree with all aspects of American policy). Methinks you read too much into too many posts on here. Garn! Did one of them call you a pussy and your sensitivies were ever after permanenty bruised Link to comment Share on other sites More sharing options...
sccsux Posted February 7, 2011 Share Posted February 7, 2011 Garn! Did one of them call you a pussy and your sensitivies were ever after permanenty bruised Well done for proving yourself a troll:thumbsup:. Your petty snipes and veiled insults simply highlight what a troll you are. Now, do grow up. Link to comment Share on other sites More sharing options...
Alien Posted February 7, 2011 Share Posted February 7, 2011 A thought. Why the concentration on Wikileaks? These docs were obviously classified and top secret. The fact they got out says something about CIA and homeland security? Is it deflecting from the real issue that US security at high office level is suspect? I've not checked but how many heads have rolled in the top brass for treason? Or am I being too simplistic? Link to comment Share on other sites More sharing options...
spooky3 Posted February 7, 2011 Share Posted February 7, 2011 A thought. Why the concentration on Wikileaks? These docs were obviously classified and top secret. The fact they got out says something about CIA and homeland security? Is it deflecting from the real issue that US security at high office level is suspect? I've not checked but how many heads have rolled in the top brass for treason? Or am I being too simplistic? If I understand you correctly... Most securities weakest link is the human element. Many people refuse to implement proper security protocols and therefore it's easier to just encrypt the data channels rather than the data itself. This can also save the data if keys are lost. Link to comment Share on other sites More sharing options...
Alien Posted February 7, 2011 Share Posted February 7, 2011 Whatever the extent of his involvement the fact is that these leaks have compromised valuable intelligence gathering, the lives of personnel involved and the ongoing war against terrorism. . He didn't leak them. he published that which was already leaked, hence no longer top secret. Surely? Link to comment Share on other sites More sharing options...
spooky3 Posted February 7, 2011 Share Posted February 7, 2011 He didn't leak them. he published that which was already leaked, hence no longer top secret. Surely? He received stolen goods! (How journalists can circumvent this and how he didn't is a question though) Link to comment Share on other sites More sharing options...
Alien Posted February 7, 2011 Share Posted February 7, 2011 He received stolen goods! (How journalists can circumvent this and how he didn't is a question though) Received stolen goods? Or received leaked classified documents? If it was a fridge and 2 plasma tv's I don't think they'd be making such a fuss. The point I'm trying to make is once leaked they are useless documents from the outset and perspective of the owner of those documents. It would seem to me that the source of the first and only leak is the US's problem. I might add a serious one, if not an embarrassing one, or both. Link to comment Share on other sites More sharing options...
Chris_Sleeps Posted February 7, 2011 Share Posted February 7, 2011 Yep! Hope they send him to Texas. They execute people quickly there You would execute a man for leaking information? Link to comment Share on other sites More sharing options...
spooky3 Posted February 7, 2011 Share Posted February 7, 2011 Received stolen goods? Or received leaked classified documents? If it was a fridge and 2 plasma tv's I don't think they'd be making such a fuss. ... You can rename it any way you want, in reality the documents were stolen, then passed on to a receiver. Anything else is pointless semantics, what happened isn't in dispute. Link to comment Share on other sites More sharing options...
Alien Posted February 7, 2011 Share Posted February 7, 2011 You can rename it any way you want, in reality the documents were stolen, then passed on to a receiver. Anything else is pointless semantics, what happened isn't in dispute. Do you know who stole the documents? Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.