It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

WikiLeaks Posts Mysterious 'Insurance' File

page: 31
150
<< 28  29  30    32  33  34 >>

log in

join
share:

posted on Aug, 3 2010 @ 01:12 PM
link   
I think many here and hackers around the world MAY BE MISSING SOMETHING HERE?

Julian is one of us - Humanity.

He did what he did, so that mankind will realise what the US military as well as the Taliban and terrorists had done to innocents on both sides. Without his act of bravery, as well as many other whistleblowers, we would had been happy lapping up lies from the Industrial military complex and every son of a bitch who profits from this murder either financially or radically.

PLEASE think what you are doing if you hack and is successful as someone will likely be... it will means the death of humanity's hero Julian and many other whistleblowers, who will target them from every corner of earth and murder them all, either to keep the lid of secrecy on, or out of frustrations and vengence.

His and every whistleblower's life is precious. That file is their insurance. What man can create, another WILL break in time..

Rather than to focus on the challenge of breaking the codes or soliciting for info on how to break it by TPTB here insidiously on Julian's insurance, get our 15mins of fame with bragging rights, but our precious brothers lost,

lets focus instead on other sources of information that TPTB, from the russians, the chinese communist party, the jews, the arab fat cat hizbollahs, the germans, the french, the vatican, etc, etc, whom had been kept from us. Now, that's a challenge worthy of respect and honour in the tradition of Julian by humanity, for only the truth will set us all free.

Good luck! Cheers! :-)

[edit on 3-8-2010 by SeekerofTruth101]




posted on Aug, 3 2010 @ 01:14 PM
link   

Originally posted by ledled
Mathematicians DESIGNED PKE based on the things that they have NO WAY to shortcut. "Prime factorisation" it's called, and it's one of the toughest mathematical problems in the world and has been for CENTURIES, if not MILLENIA. No-one is going to pop up and find a shortcut just-like-that, in the same manner that DVDCSS was decrypted. We're talking every mathematician in the field for the last 2000 years having worked on the problem all their lives and never making more than 0.1% difference to the outcome.

In this case, we have an encrypted file. We don't have the private key. We don't EVEN have the public key. Thus, the file is a pile of random junk, without any clues, and no amount of "guessing" or "hacking" will reveal anything. We have complete knowledge of the encryption and decryption method - it's still completely useless. We can use any of the several thousand open-source AES decryption routines (PGP is a software version) but without a public key there is nothing we can do to aid decryption. This is the POINT of a public-key encryption algorithm. EVERYONE, from me, to the mathematicians that designed it, to the US military knows HOW to decrypt it. But without the public (or private) key, we can't do a thing. There are, I hesitate to guess but let's hypothesise, "1 with 77 zeroes after it" possible keys. If we analysed a billion billion (1,000,000,000 GHz) a second, it would still take longer than the age of the universe to find the right one - assuming we knew what we were looking for.


So, its not impossible, just a very lengthy process.
We humans are quite amazing at turning what seems impossible or improbable, to possible and probable.
Processing speed increases exponentially every couple of years, who is to say we won't find a way tomorrow to crack this?



posted on Aug, 3 2010 @ 01:20 PM
link   
Would it be prudent to burn this file onto a bazillion cdrs and drop them from balloons?
Mass saturation, and if and when the key is cracked, it will be impossible to supress.

[edit on 3-8-2010 by dashen]



posted on Aug, 3 2010 @ 01:29 PM
link   

Originally posted by EspyderMan

Originally posted by ledled


So, its not impossible, just a very lengthy process.
We humans are quite amazing at turning what seems impossible or improbable, to possible and probable.
Processing speed increases exponentially every couple of years, who is to say we won't find a way tomorrow to crack this?


Still missing the point eh?
even after the post right above yours?

Hello? This is not something we want to 'crack'.


but Im pretty sure I can say, no one will 'crack' it tomorrow. lol



posted on Aug, 3 2010 @ 01:52 PM
link   


the secret-spilling site has posted a mysterious encrypted file labeled “insurance.”

The huge file, posted on the Afghan War page at the WikiLeaks site, is 1.4 GB and is encrypted with AES256. The file’s size dwarfs the size of all the other files on the page combined.


My guess is... it is the insurance policies on every single person in the military/armed forces stationed in Afghanistan.

The government has, no doubt, an insurance policy on every person that joins the service. If they happen to get killed, the government collects.



posted on Aug, 3 2010 @ 01:59 PM
link   
reply to post by sodakota
 


All active-duty service members (deployed or not) have SGLI (servicemembers group life insurance) - the total is $400,000. But the government doesn't collect any benefits from (they pay it).

Further, our government - through closed-bid contract - has certainly already devised a very lucrative plan for making money from war by companies such as Haliburton - typically referred to as special interests and lobbying.

While any thing is possibly contained within the insurance file - IMO, your suspicions are not probable.



posted on Aug, 3 2010 @ 02:03 PM
link   
I have a new idea on this file. ( well my new thoughts on it.. I haven't read this whole thread)

Wikileaks gets some of the best damning material it has.. the good stuff with the proof. They release it to the world in this form knowing everyone and their brother will download it for the novelty.

Then if The SHTF they release the encryption key and suddenly the whole world can decrypt the contents.

This is so the Gov will not be able to manipulate the data and or have the Wikileaks ISP shut down to keep the data from getting out.. because it's already out there. Tons of people will have this proof and then the Gov will have egg on their face.

[edit on 3-8-2010 by JohnPhoenix]



posted on Aug, 3 2010 @ 02:07 PM
link   
Looks like all of this has had a positive effect.


aprn.org...

An internal report commissioned by Alyeska Pipeline Company officials has been leaked to the online news organization Truthout.



posted on Aug, 3 2010 @ 02:46 PM
link   

Originally posted by EspyderMan

Originally posted by mryanbrown

Originally posted by muzzleflash
And NO, FOX did NOT ADMIT that NATO funds the Taliban secretly to keep the war going on perpetually and justify a continued presence there.


The US pharmaceutical addiction to opiates is what truly funds the war.

We send over US soldiers to fight the Taliban in Afghanistan.
In turn, warlords sell opium to the official government of Afghanistan.
Who in turn, then legally sell the opium to US pharmaceutical companies with a legal paper trail. Sustaining the American addiction to opiates. Which in turn, funds the warlords paying the Taliban who fight our soldiers.

This is the Military Industrial Complex, simple, and at it's finest.

Americans are supplying the soldiers fighting our own soldiers via proxy.

Good 'ol UCC, Trade Agreements, etc.


Wow, could you possible bring any cold hard facts to support this hypothesis?

Why do people try to talk as if their highly intelligent, but the content itself is pointless banter?

All your preconceived notions on the government, the military and the world in general keep you blind to the real truth. Being a hard core conspiracy buff with no proof of claims is nothing to be proud of, its something to ridicule. I sincerely doubt you have any proof of this statement, matter of fact, i think you made it all up based on other peoples assumptions about government, military and the world.

People like this make it difficult to find the truth because they dilute places like this with pointless, factless conspiracy banter.

As for this insurance file, it is exactly that. Insurance. We can all debate about what it is, but it will lead nowhere. All we can do is wait for the key, or for the cracked version to be leaked.
This is quite the game wikileaks is playing, a very dangerous one too boot. I look forward to more developments.


With all due respect, EspyderMan, there is a very large part of the population who would claim most of the discussion on ATS is pointless, fact-less banter.

I believe "people like this" contribute a great deal to discussions - the more ideas generated, the better one can shift through and refine them.

And by accepting only preferred ideas - one example might be "As for this insurance file, it is exactly that. Insurance." - one is being rather closed-minded...and possibly pompous.



posted on Aug, 3 2010 @ 03:21 PM
link   
Freedom music U@U me you're e-mail and we can collaborate.



posted on Aug, 3 2010 @ 03:36 PM
link   
Statsman, I don't want to hand out my email (just in case)



There isn't much collaborating to do here.

If someone comes up w/ some good keys, I'll try them out ...

Stats, if you want some more scripts, etc, just let me know and I'll post them to a page where you can get them.

Thanks



posted on Aug, 3 2010 @ 03:57 PM
link   

Originally posted by SeekerofTruth101
I think many here and hackers around the world MAY BE MISSING SOMETHING HERE?

Julian is one of us - Humanity.



[edit on 3-8-2010 by SeekerofTruth101]



You might be missing something big here too. lol
"Julian is one of us - Humanity"

(Sorry, just had to mention it....)

RE: earlier post about my comments on Social Networking/Assange's Glyph file, could be related.

www.vertical-leap.co.uk... ith-the-cia/



posted on Aug, 3 2010 @ 04:05 PM
link   

Originally posted by EspyderMan

Originally posted by ledled
...There are, I hesitate to guess but let's hypothesise, "1 with 77 zeroes after it" possible keys. If we analysed a billion billion (1,000,000,000 GHz) a second, it would still take longer than the age of the universe to find the right one - assuming we knew what we were looking for.


So, its not impossible, just a very lengthy process.
We humans are quite amazing at turning what seems impossible or improbable, to possible and probable.
Processing speed increases exponentially every couple of years, who is to say we won't find a way tomorrow to crack this?


Unfortunately, probability theory says we're not quiet that amazing, and even if future increases in processing speeds kept up with past rates (which they won't, they already aren't), it would still be...I'm getting a headache, I can't do the math...but I'll bet we'll be gone.



posted on Aug, 3 2010 @ 04:06 PM
link   
Well IT would be easier or work on AIm or something... since we can't talk about cracking the file, but could you write a script that uses a word list? like a text file with maybe thousands of words?



posted on Aug, 3 2010 @ 04:07 PM
link   
reply to post by hadriana
 


From the article you linked:


CEO of Recorded Future, Christopher Ahlberg, spoke to Wired about the project, saying: ”The cool thing is, you can actually predict the curve, in many cases – we are right there as it happens and we can assemble actual real-time dossiers on people.” Source: Google to predict the future with the CIA | Search Engine Marketing News


Scary stuff



posted on Aug, 3 2010 @ 04:13 PM
link   
My first thought on "insurance" isn't insurance policies like the traditional ones, but insurance against someone or some group. And 1.4GB? That sounds like a database to me.



posted on Aug, 3 2010 @ 04:50 PM
link   
To all the curious minds willing to test any key you may think it's worth testing, i want to share with you my unix-based way of doing the thing: not that my way is better than another one, but you may find it useful if you know what your looking for (file headers, magic numbers, recognizable signatures..).
I assume:

- the command line doesn't scare you

- you have at least 1.5/2GB free RAM (you are going to create a ramdisk to perform the decryption faster, so you don't need to write to disk all the times).
- some knowledge about bit/bytes and stuff like that and you are able to identify and recognize files' content by inspecting their header (RIFF->audio/video/corel, MZ/PE/COFF->(portable) executables, ELF->linux binaries, BM->bitmap.. else use this).

The last point rules out the possibility to recognize any TrueCrypt-encrypted (hidden) volume (you wouldn't be able to recognize it anyway) and any other case where, in the case a successfull decrption would occur, the file is still encrypted but lacking an identifiable header ('Salted__' and such): in fact you are going to try to decrypt the file by assuming WL want us all to decrypt it anyway, and this imply the password has to be guessed in some way.

** YOU DON'T WANT TO BRUTEFORCE THIS BEAST. NEVER. AND A FAST GPU CAN JUST IMPROVE THE DECRYPTION STAGE BY ONE SINGLE MAGNITUDE **

Trying to do that isn't going to hurt anyone and if people are lucky enough to win the national lottery then this is a way to win our own.. or just get dumped by your sweetheart, please consider the risk


Open your terminal and for simplicity "cd" where your 'insurance.aes256' file resides:

Setup your ramdisk:


mkdir ramdisk
chmod 777 ramdisk
sudo mount -t tmpfs -o size=2048M tmpfs ./ramdisk


Open another terminal/screen window/whatever and setup a "watch" (substitute 512 with the number of bytes you want to look at whenever the header is dumped):


cd ./ramdisk
watch hexdump -C -n 512 out


Use the other spare terminal to try out your passwords:


openssl enc -d -aes256 -in insurance.aes256 -out ramdisk/out -pass pass:a-password

OR

openssl enc -d -aes256 -in insurance.aes256 -out ramdisk/out -pass pass:'a password'


Whenever you give up, because sooner or later you'll do
, unmount the ramdisk:


sudo umount ./ramdisk


Then close your "watch" window by CTRL+C.
At this point you can either remove the "ramdisk" directory or leave it there for your next match


[edit on 3-8-2010 by dudez, syntax errors]
[edit on 3-8-2010 by dudez, added CTRL+C]

[edit on 3-8-2010 by dudez]



posted on Aug, 3 2010 @ 05:07 PM
link   

Originally posted by Faiol
www.democracynow.org...

Assange just said about the file:

it might be important assuring that important part of the history do not disappear


Why has this been over-looked. This thread needs to be bumped back to the front page, or a new one created, for that quote alone. It's certainly a line to fuel us conspiracy theorists, I mean come on, it implies something big. I assume by 'history' he means our collective history and not just Wikileaks. This really could be 'Insurance' considering TPTB have stepped up their surveillance and pursuit of WL and it's personnel.

Without wanting to get carried away this is pretty exciting. We've seen it for years in Hollywood action films and so on but could it be possible that one man and his organization is effectively holding a government to ransom - and furthermore not for monetary purposes or self-gain but on moral grounds.
Will continue to wait and watch with bated-breath.



posted on Aug, 3 2010 @ 05:53 PM
link   
reply to post by Noah23
 


That quote is from this interview.

The interviewer asks him directly about the file and he says "Well, I think it’s better that we don’t comment on that. But, you know, one could imagine in a similar situation that it might be worth ensuring that important parts of history do not disappear. "

If he identified it as classified material, those people who have a copy could not as plausibly deny they knew it was classified.

[edit on 3-8-2010 by mikeATSuser]



posted on Aug, 3 2010 @ 06:06 PM
link   
statsman, we can jump on wikileaks irc if you want and chat ...

But reading a file is easy to add.

PASSES=`cat passwords.txt`;

I'm gonna check out the ramdisc suggestion




top topics



 
150
<< 28  29  30    32  33  34 >>

log in

join