Owl: Anonymous Makes a Statement – Has Meat, Add Salt

Advanced Cyber/IO, Civil Society, Commerce, Cultural Intelligence, Government, Hacking, Liberation Technology, Non-Governmental
Who? Who?

This interview overall undoubtedly has misconceptions, self-inflated bravado, gross exaggerations and so forth, but if the last statement he utters is true about people coming to them, even to a significantly lesser degree than he indicates, the world-ruling elites might be quaking ever-so-slightly, but involuntarily, in their boots. And much more so if indeed insiders are giving Anonymous the “keys to the kingdom,” the passwords into it.

Insider tells why Anonymous ‘might well be the most powerful organization on Earth

EXTRACT:

Q. What’s next for Anonymous?

A: Right now we have access to every classified database in the U.S. government. It’s a matter of when we leak the contents of those databases, not if. You know how we got access? We didn’t hack them. The access was given to us by the people who run the systems. The five-star general (and) the Secretary of Defence who sit in the cushy plush offices at the top of the Pentagon don’t run anything anymore. It’s the pimply-faced kid in the basement who controls the whole game, and Bradley Manning proved that. The fact he had the 250,000 cables that were released effectively cut the power of the U.S. State Department in half. The Afghan war diaries and the Iran war diaries effectively cut the political clout of the U.S. Department of Defence in half. All because of one guy who had enough balls to slip a CD in an envelope and mail it to somebody. Now people are leaking to Anonymous and they’re not coming to us with this document or that document or a CD, they’re coming to us with keys to the kingdom, they’re giving us the passwords and usernames to whole secure databases that we now have free reign over. … The world needs to be concerned.

Read full article.

Phi Beta Iota:  01  Any system built by humans can be hacked by humans.  02  A system’s security is heavily dependent on the legitimacy of the system owner in the eyes of those using the system.

See Also:

Journal: Reflections on Integrity UPDATED + Integrity RECAP

The Search for Security: A U.S. Grand Strategy for the Twenty-First Century