Did Uncle Sam try to kill Wikileaks?

15.03.2010

The obscurification technology used by Wikileaks.org has exploitable vulnerabilities. Organizations with properly trained cyber technicians, the proper equipment, and the proper technical software could most likely conduct computer network exploitation (CNE) operations or use cyber tradecraft to obtain access to Wikileaks.org's Web site, information systems, or networks that may assist in identifying those persons supplying the data and the means by which they transmitted the data to Wikileaks.org....

Successful identification, prosecution, termination of employment, and exposure of persons leaking the information by the governments and businesses affected by information posted to Wikileaks.org would damage and potentially destroy [its] center of gravity and deter others from taking similar actions.

This intelligence program has been brought to you by Big Brother. Please do not attempt to adjust your computer screen. We are watching.

The big caveat: We don't know what, if anything, came as a result of this memo. . No major exposures of its sources have come to light. Maybe somebody in the DoD saw this report and put it in the circular file (or, probably, shared it with Wikileaks).

Still, this is the kind of document that makes you believe all your paranoid conspiracy theories are true.