CO-04 (Special Election) See Full Big Line

(R) Greg Lopez

(R) Trisha Calvarese

90%

10%

President (To Win Colorado) See Full Big Line

(D) Joe Biden*

(R) Donald Trump

80%

20%↓

CO-01 (Denver) See Full Big Line

(D) Diana DeGette*

90%

CO-02 (Boulder-ish) See Full Big Line

(D) Joe Neguse*

90%

CO-03 (West & Southern CO) See Full Big Line

(D) Adam Frisch

(R) Jeff Hurd

(R) Ron Hanks

40%

30%

20%

CO-04 (Northeast-ish Colorado) See Full Big Line

(R) Lauren Boebert

(R) Deborah Flora

(R) J. Sonnenberg

30%↑

15%↑

10%↓

CO-05 (Colorado Springs) See Full Big Line

(R) Dave Williams

(R) Jeff Crank

50%↓

50%↑

CO-06 (Aurora) See Full Big Line

(D) Jason Crow*

90%

CO-07 (Jefferson County) See Full Big Line

(D) Brittany Pettersen

85%↑

 

CO-08 (Northern Colo.) See Full Big Line

(D) Yadira Caraveo

(R) Gabe Evans

(R) Janak Joshi

60%↑

35%↓

30%↑

State Senate Majority See Full Big Line

DEMOCRATS

REPUBLICANS

80%

20%

State House Majority See Full Big Line

DEMOCRATS

REPUBLICANS

95%

5%

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
December 11, 2010 12:38 AM UTC

Merry Wikimas

  • 0 Comments
  • by: JO

In the latest chapter:

WikiLeaks supporters on Friday downloaded increasing amounts of the spam-shooting software used to attack companies seen as hostile – a development that could challenge even Internet giants such as PayPal and Amazon.com during the crucial Christmas shopping season. (AP) http://www.nytimes.com/aponlin…

Cyber guerrilla warfare? One possible description in a mounting conflict that includes on the other side a disinformation campaign by GOTUS, to say nothing of unproved “rape” charges filed, unfiled, and refiled by prosecutors in Sweden.

Example: WikiLeaks has put American lives in jeopardy by making public sensitive, secret documents. Of course, there are no examples provided of instances, or even a single instance, of a life being in jeopardy, much less any “blood on their hands.” Less known, I believe, is that WikiLeaks has never (to my knowledge) released any document marked Top Secret. The WikiLeaks release has not been indiscriminate; so far as we know, the documents have been vetted before being made public; all three of the most notorious WikiLeaks releases have come from Siprnet, which was specifically designed to facilitate different branches of the GOTUS to share information with lower security classifications, of which “secret” is the top. Top secret information, such as battle plans, are not distributed via Siprnet and have not been released by WikiLeaks.

Example: In the third release, of State Department cables, WikiLeaks made public about a quarter million documents. Fact: The latest number that I saw of documents actually released was under 2,000, from a cache (supposedly) of 250,000. These documents were released beforehand to credible news organizations, which themselves have not published the actual documents–just stories about the documents. Embarassing? Maybe. But not as embarrassing as the campaign to discredit WikiLeaks and its founder/editor/dickhead-in-chief (nod to SSG Dan, and also to introduce vocab judged appropriate to this site), Julian Assange.

Example: The government of China in particular is to be condemned, has been condemned, for interfering with the free flow of information over the Internet when that information reflects badly on the government of China. Government should be transparent. Well, foreign government should be transparent. There are limits, you know, and they begin where the ocean ends.

And then we have the cases of Amazon.com, PayPal, MasterbCard, Visa, and the Swiss postal bank, to which list we should add Senator Joe Lieberman (or, if that proves embarrassing in the future, a member of Senator Joe Lieberman’s staff) who mentioned to Amazon.com that offering its computer hosting facilities to WikiLeaks just might be the subject of future inquiry by the United States Senate–and, hide under your beds kiddies, the F-B-I.

All of which has been followed by the widespread downloading of DNS attack software. How long can it be before the word “terrorism” is introduced to the conversation, if “rape” doesn’t do the job? Who will be the first? Fox? Limbaugh? Beck? “Wasilla: Techosophisticate Sarah Palin today denounced cyberterrorists who…”

Cyberwarfare, including cyber guerrilla warfare, has its parallels in, say, iTunes. Let the people decide what’s public and what’s not; let the people decide which songs they want to buy and which not. The WikiLeaks saga has quickly expanded into a much larger phenomenon: who will control what information is made available on the internet? The governments in Beijing and Washington, plus the governing boards of Amazon and–who knows whether? who knows when? — the board of Comcast and other friendly internet service providers?

Or We the Wiki?

To be continued…on and on and on.  

Comments

Leave a Comment

Recent Comments


Posts about

Donald Trump
SEE MORE

Posts about

Rep. Lauren Boebert
SEE MORE

Posts about

Rep. Yadira Caraveo
SEE MORE

Posts about

Colorado House
SEE MORE

Posts about

Colorado Senate
SEE MORE

55 readers online now

Newsletter

Subscribe to our monthly newsletter to stay in the loop with regular updates!