Or does it?
None other than Cass Sunstein introduced Wikileaks to the world in the Washington Post in February of 2007, strangely identifying those behind it as Chinese dissidents. This is the same Cass Sunstein that serves as Obama’s Regulatory Czar. He favors internet free speech limits, as was pointed out in this blog entry. Odd that a guy in favor of limiting speech on the internet introduces Wikileaks to the U.S. via mainstream media.
Is it possible that Julian Assange, the face of Wikileaks, is analogous to Osama Bin Laden, the face of the war on terror?
In an earlier blog entry featuring CNN’s fear mongering Cyber ShockWave special, the possibility that the internet would be shut down at some point to “protect us” was discussed. As the public increasingly gravitates to alternative media for information, at the same time it decreasingly trusts the government and mainstream media – one has to wonder how those accustomed to controlling the information will combat these trends.
Could hacker attacks in the name of Wikileaks, like the one on Amazon.com in Europe today, lead to cybersecurity legislation much as the 9/11 attack led to (wink wink) the Patriot Act?
John Young of cryptome.org has stated that it is possible that Wikileaks will be used to release increasingly dramatic bombshells so that money can be raised on both sides of the battle. Using tax dollars to “protect” us from hackers, while at the same time limiting our internet freedoms would be par for the course. Problem. Reaction. Solution.
Boogie Man? Check
Legislation that limits freedom? Check
Potential for continual “war” to create fear and expand control grid? Check
Who are they? Well there are tens of thousands of documents in cryptome.org’s online library . . . but just to name a few:
tsa-screening.zip TSA Sensitive Screening Doc Redactions Lifted December 6, 2009 (1.8MB)
att-spy-doc-01.pdf ATT Lawful Spying Document 1 December 6, 2009
att-spy-doc-02.zip ATT Lawful Spying Document 2 December 6, 2009 (2.9MB)
verizon-spy.pdf Verizon Lawful Spying Guide December 6, 2009
sprint-spy2.pdf Sprint CALEA Spying Delivery System December 6, 2009
Click here to browse cryptome.org. Thank you John Young. Enjoy.