Why? Why Mr Assange, why do you persist?


Many suspect Julian Assange to be a CIA asset. There appears to be no smoking gun (absolute proof) of this, but certainly Western World leaders, who have called for his demise, oddly seem to be enjoying the benefits of having their political agendas advanced as a result of “cablegate”.

There is no hard proof of a CIA – Assange link in the following info, but there are a lot of happy coincidences.

A snap shot into the life of Julian Assange can garnered from the book “Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier” (1997).

The book is authored by Suelette Dreyfus with comprehensive research by Julian Assange.

Assange is also a star character in the novel, a hacker known by the handle “Mendax”. It’s a fascinating read and can be downloaded (legally with permission) from http://www.underground-book.net/download.php3


While the book for all intensive purposes is a fictional work, it in many instances, parallels actual events in history very precisely.

The first thing one finds when reading “Underground”, is Assange demonstrates an uncanny well connectedness beyond the reach of mere mortals.

In a forward to the book he writes:
We conducted over a hundred interviews and collected around 40,000 pages of primary documentation; telephone intercepts, data intercepts, log-files, witness statements, confessions, judgements. Telephone dialog and on-line discussions are drawn directly from the latter. Every significant hacking incident mentioned in this book has reams of primary documentation behind it.
In chapter 4, Par, one of the principle subjects of this book, is being watched by the Secret Service. He's on the run. He's a wanted fugitive.
We had logs of messages Par had written on underground BBS's. We had data intercepts of other hackers in conversation with Par. We had obtained various Secret Service documents and propriety security reports relating to Par's activities.
Every chapter in underground was formed from many stories like it. They're unseen; because a book must not be true merely in details, it must be true in feeling.

Deliberating whether or not the CIA are yanking Assange’s strings, the coincidental anecdotes begin when he was a young child.

When Julian was one year old, his mother Christine married theatre director Brett Assange, who gave him his surname.

Dreyfus writes:
What followed was many turbulent years, moving from town to town as his parents explored the '70s left-wing, bohemian subculture.
One night in Adelaide, when Mendax was about four, his mother and a friend were returning from a meeting of anti-nuclear protesters. The friend claimed to have scientific evidence that the British had conducted high-yield, above-ground nuclear tests at Maralinga, a desert area in north-west South Australia.
A 1984 Royal Commission subsequently revealed that between 1953 and 1963 the British government had tested nuclear bombs at the site, forcing more than 5000 Aborigines from their native lands. In December 1993, after years of stalling, the British government agreed to pay [sterling] 20 million toward cleaning up the more than 200 square kilometres of contaminated lands. Back in 1968, however, the Menzies government had signed away Britain’s responsibility to clean up the site. In the 1970s, the Australian government was still in denial about exactly what had happened at Maralinga.
As Mendax’s mother and her friend drove through an Adelaide suburb carrying early evidence of the Maralinga tragedy, they noticed they were being followed by an unmarked car. They tried to lose the tail, without success. The friend, nervous, said he had to get the data to an Adelaide journalist before the police could stop him. Mendax’s mother quickly slipped into a back lane and the friend leapt from the car. She drove off, taking the police tail with her.

Julian’s mother separated from Brett Assange and later remarried an amateur musician in 1979. With her previous political activist escapades causing untold embarrassment to several governments, was this new husband an intelligence plant?

From Julian’s own accounts, Dreyfus writes:
Mendax was frightened of the man, whom he considered a manipulative and violent psychopath. He had five different identities with plastic in his wallet to match. His whole background was a fabrication, right down to the country of his birth.

Step father No. 2, the “musician”, belonged to a group known as “The Family”.

The Santiniketan Park Association or “The Family”, also known as “The Great White Brotherhood”, formed in Australia under the leadership of Anne Hamilton-Byrne.

During the late 1960s and 1970s, Newhaven Hospital in Kew Victoria was a private psychiatric hospital owned and managed by Marion Villimek, a Santiniketan member; many of its staff and attending psychiatrists were also members.

The hospital was used to recruit potential new members from among the patients, and also to administer LSD to members under the direction of the Santiniketan psychiatrists Dr John Mackay and Dr Howard Whitaker.

Anne Hamilton-Byrne acquired fourteen infants and young children between about 1968 and 1975. Some were the natural children of Santiniketan members; others had been obtained through irregular adoptions arranged by lawyers, doctors and social workers within the group who could bypass the normal processes.

The children’s identities were changed using false birth certificates or deed poll, all being given the surname 'Hamilton-Byrne' and dressed alike even to the extent of their hair being dyed uniformly blonde.


The children were kept in seclusion and home-schooled. They were taught that Anne Hamilton-Byrne was their biological mother, and knew the other adults in the group as 'aunties' and 'uncles'. They were subjected to a discipline that included frequent corporal punishment and starvation diets.

The children were frequently dosed with the psychiatric drugs Anatensol, Diazepam, Haloperidol, Largactil, Mogadon, Serepax, Stelazine, Tegretol or Tofranil. On reaching adolescence they were compelled to undergo an initiation involving LSD: while under the influence of the drug the child would be left in a dark room, alone, apart from visits by Hamilton-Byrne or one of the psychiatrists from the group.

Text book CIA is it not?

In 1987, after turning 16, Assange began hacking under the name "Mendax" (derived from a phrase of Horace: "splendide mendax", or "nobly untruthful"). He and two other hackers joined to form a group which they named the International Subversives.

Dreyfus writes in Underground:
Mendax left home at seventeen because he had received a tip-off about an impending raid. Mendax wiped his disks, burnt his print-outs and left. A week later, the Victorian CIB turned up and searched his room, but found nothing.

Wikipedia reports that:
The Australian Federal Police raided his Melbourne home in 1991. He was reported to have accessed computers belonging to an Australian university, the Canadian telecommunications company Nortel, the USAF 7th Command Group in the Pentagon and other organisations.
In 1992, he pleaded guilty to 24 charges of hacking and was released on bond for good conduct after being fined AU$2100.
In 1993, Assange was involved in starting one of the first public internet service providers in Australia, Suburbia Public Access Network. Starting in 1994, he lived in Melbourne as a programmer and a developer of free software.
In 1995, he wrote Strobe, the first free and open source port scanner. He contributed several patches to the PostgreSQL project in 1996.
Starting around 1997, he co-invented the Rubberhose deniable encryption system, a cryptographic concept made into a software package for Linux designed to provide plausible deniability against rubber-hose cryptanalysis.
Other free software that he has authored or co-authored includes the Usenet caching software NNTPCache and Surfraw, a command-line interface for web-based search engines.

In the book Underground however, Dreyfus tells the story that Mendax faced 31 charges in 1995 and was sentenced with a recorded conviction on all counts, a reparation payment of $2100 to ANU and a three-year good behaviour bond, the bond ordered was $5000.

The following is also written by Dreyfus:
In 1992 Mendax and Trax (fellow hacker) teamed up with a wealthy Italian real-estate investor, purchased La Trobe University’s mainframe computer (ironically, a machine they had been accused of hacking) and started a computer security company. The company eventually dissolved when the investor disappeared following actions by his creditors.
After a public confrontation in 1993 with Victorian Premier Jeff Kennett, Mendax and two others formed a civil rights organisation to fight corruption and lack of accountability in a Victorian government department. As part of this ongoing effort, Mendax acted as a conduit for leaked documents and became involved in a number of court cases against the department during 1993-94. Eventually, he gave evidence in camera to a state parliamentary committee examining the issues, and his organisation later facilitated the appearance of more than 40 witnesses at an investigation by the Auditor-General.
Mendax has provided information or assistance to law-enforcement bodies, but not against hackers. He said, ‘I couldn’t ethically justify that. But as for others, such as people who prey on children or corporate spies, I am not concerned about using my skills there.’
NorTel and a number of other organisations he was accused of hacking use his cryptography software - a fact he finds rather ironic.

Julian Assange was no clueless hacker back in the day. He had capabilities which gave him access to a lot of sensitive information. Someone less fortunate, with the same capabilities, knowledge and experience, may find themselves with an ultimatum from authorities; work for them or suffer the consequences of their wrath.

Insight of his talent and knowledge is gained reading the following excerpts from Chapter 8 - The International Subversives, in “Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier” http://www.underground-book.net/download.php3
Prime Suspect rang Mendax, offering an adventure. He had discovered a strange system called NMELH1 (pronounced N-Melly-H-1) and it was time to go exploring. He read off the dial-up numbers, found in a list of modem phone numbers on another hacked system.

Mendax looked at the scrap of paper in his hand, thinking about the name of the computer system.

The `N' stood for Northern Telecom, a Canadian company with annual sales of $8 billion. NorTel, as the company was known, sold thousands of highly sophisticated switches and other telephone exchange equipment to some of the world’s largest phone companies. The `Melly' undoubtedly referred to the fact that the system was in Melbourne.

Mendax had spent hours experimenting with commands inside the computers which controlled telephone exchanges. Unlike making a mistake inside a single computer, mis-guessing a command inside a telephone exchange in downtown Sydney or Melbourne could take down a whole prefix - 10000 or more phone lines -and cause instant havoc.

This was exactly what the International Subversives didn't want to do. The three IS hackers - Mendax, Prime Suspect and Trax - had seen what happened to the visible members of the computer underground in England and in Australia.

But, Mendax thought, what if you could learn about how to manipulate a million-dollar telephone exchange by reading the manufacturer's technical documentation? How high was the chance that those documents, which weren't available to the public, were stored inside NorTel's computer network?

Better still, what if he could find NorTel's original source code - the software designed to control specific telephone switches, such as the DMS-100 model. That code might be sitting on a computer hooked into the worldwide NorTel network. A hacker with access could insert his own backdoor - a hidden security flaw - before the company sent out software to its customers.

With a good technical understanding of how NorTel's equipment worked, combined with a backdoor installed in every piece of software shipped with a particular product, you could have control over every new NorTel DMS telephone switch installed from Boston to Bahrain.

Using a program called Sycophant written by Mendax, the IS hackers had been conducting massive attacks on the US military.

They divided up Sycophant on eight attack machines, often choosing university systems at places like the Australian National University or the University of Texas. They pointed the eight machines at the targets and fired. Within six hours, the eight machines had assaulted thousands of computers. The hackers sometimes reaped 100000 accounts each night.

Using Sycophant, they essentially forced a cluster of Unix machines in a computer network to attack the entire Internet en masse.

And that was just the start of what they were into. They had been in so many sites they often couldn't remember if they had actually hacked a particular computer. The places they could recall read like a Who's Who of the American military-industrial complex.

  • The US Airforce 7th Command Group Headquarters in the Pentagon.
  • Stanford Research Institute in California.
  • Naval Surface Warfare Center in Virginia.
  • Lockheed Martin's Tactical Aircraft Systems Air Force Plant in Texas.
  • Unisys Corporation in Blue Bell, Pennsylvania.
  • Goddard Space Flight Center, NASA.
  • Motorola Inc. in Illinois.
  • TRW Inc. in Redondo Beach, California.
  • Alcoa in Pittsburgh.
  • Panasonic Corp in New Jersey.
  • US Naval Undersea Warfare Engineering Station.
  • Siemens-Nixdorf Information Systems in Massachusetts.
  • Securities Industry Automation Corp in New York.
  • Lawrence Livermore National Laboratory in California.
  • Bell Communications Research, New Jersey.
  • Xerox Palo Alto Research Center, California.

In the spring of 1991, Prime Suspect and Mendax began a race to get root on the US Department of Defense's Network Information Center (NIC) computer - potentially the most important computer on the Internet.

As both hackers chatted amiably on-line one night, on a Melbourne University computer, Prime Suspect worked quietly in another screen to penetrate ns.nic.ddn.mil, a US Department of Defense system closely linked to NIC. He believed the sister system and NIC might `trust' each other - a trust he could exploit to get into NIC. And NIC did everything.

NIC assigned domain names - the `.com' or `.net' at the end of an email address - for the entire Internet. NIC also controlled the US military's own internal defence data network, known as MILNET.

NIC also published the communication protocol standards for all of the Internet. Called RFCs (Request for Comments), these technical specifications allowed one computer on the Internet to talk to another.

Perhaps most importantly, NIC controlled the reverse look-up service on the Internet. Whenever someone connects to another site across the Internet, he or she typically types in the site name - say, ariel.unimelb.edu.au at the University of Melbourne. The computer then translates the alphabetical name into a numerical address - the IP address - in this case 128.250.20.3. All the computers on the Internet need this IP address to relay the packets of data onto the final destination computer. NIC decided how Internet computers would translate the alphabetical name into an IP address, and vice versa.

If you controlled NIC, you had phenomenal power on the Internet. You could, for example, simply make Australia disappear. Or you could turn it into Brazil. By pointing all Internet addresses ending in `.au' - the designation for sites in Australia - to Brazil, you could cut Australia's part of the Internet off from the rest of the world and send all Australian Internet traffic to Brazil. In fact, by changing the delegation of all the domain names, you could virtually stop the flow of information between all the countries on the Internet.

Controlling NIC offered other benefits as well. Control NIC, and you owned a virtual pass-key into any computer on the Internet which ‘trusted' another’. And most machines trust at least one other system.

When Prime Suspect managed to get inside NIC's sister system, he told Mendax and gave him access to the computer. Each hacker then began his own attack on NIC. When Mendax finally got root on NIC, the power was intoxicating. Prime Suspect got root at the same time but using a different method. They were both in.

Inside NIC, Mendax began by inserting a backdoor - a method of getting back into the computer at a later date in case an admin repaired the security flaws the hackers had used to get into the machine. From now on, if he telnetted into the system's Data Defense Network (DDN) information server and typed `login 0' he would have instant, invisible root access to NIC.

That step completed, he looked around for interesting things to read. One file held what appeared to be a list of satellite and microwave dish coordinates - longitude, latitudes, transponder frequencies. Such coordinates might in theory allow someone to build a complete map of communications devices which were used to move the DOD's computer data around the world.

Mendax also penetrated MILNET's Security Coordination Center, which collected reports on every possible security incident on a MILNET computer. Those computers - largely TOPS-20s made by DEC - contained good automatic security programs. Any number of out-of-the-ordinary events would trigger an automatic security report. Someone logging into a machine for too long. A large number of failed login attempts, suggesting password guessing. Two people logging into the same account at the same time. Alarm bells would go off and the local computer would immediately send a security violation report to the MILNET security centre, where it would be added to the `hot list'.

Mendax flipped through page after page of MILNET's security reports on his screen. Most looked like nothing - MILNET users accidentally stumbling over a security tripwire - but one notice from a US military site in Germany stood out. It was not computer generated. This was from a real human being. The system admin reported that someone had been repeatedly trying to break into his or her machine, and had eventually managed to get in. The admin was trying, without much luck, to trace back the intruder's connection to its point of origin. Oddly, it appeared to originate in another MILNET system.

Riffling through other files, Mendax found mail confirming that the attack had indeed come from inside MILNET. His eyes grew wide as he read on. US military hackers had broken into MILNET systems, using them for target practice, and no-one had bothered to tell the system admin at the target site.

Mendax couldn't believe it. The US military was hacking its own computers. This discovery led to another, more disturbing, thought. If the US military was hacking its own computers for practice, what was it doing to other countries' computers?

In early October 1991, Mendax rang Trax and gave him the dial-up and account details for NMELH1.

Trax wasn't much of a hacker, but Mendax admired his phreaking talents. Trax was the father of phreaking in Australia and Trax's Toolbox, his guide to the art of phreaking, was legendary. Mendax thought Trax might find some interesting detailed information inside the NorTel network on how to control telephone switches.

Trax invented multi-frequency code phreaking. By sending special tones - generated by his computer program - down the phone line, he could control certain functions in the telephone exchange.

Many hackers had learned how to make free phone calls by charging the cost to someone else or to calling cards, but Trax discovered how to make phone calls which weren't charged to anyone.

The calls weren't just free; they were untraceable. Trax wrote 48 pages on his discovery and called it The Australian Phreakers Manual Volumes 1-7. But as he added more and more to the manual, he became worried what would happen if he released it in the underground, so he decided he would only show it to the other two International Subversive hackers.

He went on to publish The Advanced Phreaker's Manual 2, a second edition of the manual, in The International Subversive, the underground magazine edited by Mendax:

An electronic magazine, The International Subversive had a simple editorial policy. You could only have a copy of the magazine if you wrote an `article'. The policy was a good way of protecting against nappies - sloppy or inexperienced hackers who might accidentally draw police attention.

Trax made his great discovery by accident. He was using a phone sprinter, a simple computer program which automatically dialled a range of phone numbers looking for modems. If he turned the volume up on his modem when his computer dialled what seemed to be a dead or non-existent number, he sometimes heard a soft clicking noise after the disconnection message. The noise sounded like faint heartbeats.

When you make an international phone call from Australia to the US, the call passes from the local telephone exchange to an international gateway exchange within Australia. From there, it travels to an exchange in the US. The CCITT signalling tones were the special tones the two international gateway exchanges used to communicate with each other.

Telecom Australia adapted a later version of this standard, called R2, for use on its own domestic exchanges. Telecom called this new standard MFC, or multi-frequency code.

Passionate about his new calling, Trax went trashing in Telecom garbage bins, where he found an MFC register list - an invaluable piece of his puzzle. Using the list, along with pieces of overseas phreaking files and a great deal of painstaking hands-on effort, Trax slowly learned the language of the Australian telephone exchanges. Then he taught the language to his computer.

Trax tried calling one of the `heartbeat' phone numbers again. He began playing his special, computer-generated tones through an amplifier. In simple terms, he was able to fool other exchanges into thinking he was his local Telecom exchange. More accurately, Trax had made his exchange drop him into the outgoing signalling trunk that had been used to route to the disconnected phone number.

Trax could now call out – anywhere - as if he was calling from a point halfway between his own phone and the disconnected number. If he called a modem at Melbourne University, for instance, and the line was being traced, his home phone number would not show up on the trace records. No-one would be charged for the call because Trax's calls were ghosts in the phone system.

Trax continued to refine his ability to manipulate both the telephone and the exchange. He took his own telephone apart, piece by piece, countless times, fiddling with the parts until he understood exactly how it worked. Within months, he was able to do far more than just make free phone calls. He could, for instance, make a line trace think that he had come from a specific telephone number.

He and Mendax joked that if they called a ‘hot' site they would use Trax's technique to send the line trace - and the bill - back to one very special number. The one belonging to the AFP's Computer Crime Unit in Melbourne.

Mendax logged into the NMELH1 system by using the account Prime Suspect had given him, and immediately looked around to see who else was on-line. Prime Suspect and about nine other people, only three of whom were actually doing something at their terminal.

Prime Suspect and Mendax raced to get root on the system. Mendax poked around and realised the root directory, which contained the password file, was effectively world writable.

This was good news, and with some quick manipulation he would be able to insert something into the root directory. On a more secure system, unprivileged users would not be able to do that. Mendax could also copy things from the directory on this site, and change the names of subdirectories within the main root directory. All these permissions were important, for they would enable him to create a Trojan.

The Trojan is a favoured approach with most computer hackers. The hacker simply tricks a computer system or a user into thinking that a slightly altered file or directory--the Trojan--is the legitimate one. The Trojan directory, however, contains false information to fool the computer into doing something the hacker wants. Alternatively, the Trojan might simply trick a legitimate user into giving away valuable information, such as his user name and password.

Mendax made a new directory and copied the contents of the legitimate ETC directory - where the password files were stored - into it. The passwords were encrypted, so there wasn’t much sense trying to look at one since the hacker wouldn’t be able to read it. Instead, he selected a random legitimate user - call him Joe - and deleted his password. With no password, Mendax would be able to login as Joe without any problems.

However, Joe was just an average user. He didn’t have root, which is what Mendax wanted. But like every other user on the system, Joe had a user identity number. Mendax changed Joe’s user id to ‘0’ - the magic number. A user with ‘0’ as his id had root. Joe had just acquired power usually only given to system administrators.

The problem now was to replace the original ETC directory with the Trojan one. Mendax did not have the privileges to delete the legitimate ETC directory, but he could change the name of a directory.

So he changed the name of the ETC directory to something the computer system would not recognise. Without access to its list of users, the computer could not perform most of its functions. People would not be able to log in, see who else was on the system or send electronic mail. Mendax had to work very quickly. Within a matter of minutes, someone would notice the system had serious problems.

Mendax renamed his Trojan directory ETC. The system instantly read the fake directory, including Joe’s now non-existent password, and elevated status as a super-user. Mendax logged in again, this time as Joe.

There were still a few footprints to be cleaned up. The next time Joe logged in, he would wonder why the computer didn’t ask for his password. And he might be surprised to discover he had been transformed into a super-user. So Mendax used his super-user status to delete the Trojan ETC file and return the original one to its proper place. He also erased records showing he had ever logged in as Joe.

To make sure he could login with super-user privileges in future, Mendax installed a special program which would automatically grant him root access. He hid the program in the bowels of the system and, just to be safe, created a special feature so that it could only be activated with a secret keystroke.

The NorTel network was firewalled, which meant that there was virtually no access from the outside world. Mendax reckoned that this made it more vulnerable to hackers who managed to get in through dial-ups. It appeared that security on the NorTel network was relatively relaxed since it was virtually impossible to break in through the Internet. By sneaking in the backdoor, the hackers found themselves able to raid all sorts of NorTel sites, from St Kilda Road in Melbourne to the corporation’s headquarters in Toronto.

They found a YP, or yellow pages, database linked to 400 of the computer sites. These 400 sites were dependent on this YP database for their password files. Mendax managed to get root on the YP database, which gave him instant control over 400 computer systems.

One system was home to a senior NorTel computer security administrator and Mendax promptly headed off to check out his mailbox. The contents made him laugh.

A letter from the Australian office said that Australia’s Telecom wanted access to CORWAN, NorTel’s corporate wide area network. Access would involve linking CORWAN and a small Telecom network. This seemed reasonable enough since Telecom did business with NorTel and staff were communicating all the time.

The Canadian security admin had written back turning down the request because there were too many hackers in the Telecom network.

Too many hackers in Telecom? Now that was funny. Here was a hacker reading the sensitive mail of NorTel’s computer security expert who reckoned Telecom’s network was too exposed. In fact, Mendax had penetrated Telecom’s systems from NorTel’s CORWAN, not the other way round.

Perhaps to prove the point, Mendax decided to crack passwords to the NorTel system. He collected 1003 password files from the NorTel sites, pulled up his password cracking program, THC, and started hunting around the network for some spare computers to do the job for him. He located a collection of 40 Sun computers, probably housed in Canada, and set up his program on them.

THC ran very fast on those Sun4s. The program used a 60000 word dictionary borrowed from someone in the US army who had done a thesis on cryptography and password cracking. It also relied on ‘a particularly nice fast-crypt algorithm’ being developed by a Queensland academic, Eric Young. The THC program worked about 30 times faster than it would have done using the standard algorithm.

Using all 40 computers, Mendax was throwing as many as 40000 guesses per second against the password lists. A couple of the Suns went down under the strain, but most held their place in the onslaught. The secret passwords began dropping like flies. In just a few hours, Mendax had cracked 5000 passwords, some 100 of which were to root accounts. He now had access to thousands of NorTel computers across the globe.

There were some very nice prizes to be had from these systems. Gain control over a large company’s computer systems and you virtually controlled the company itself. It was as though you could walk through every security barrier unchecked, beginning with the front door. Want each employee’s security codes for the office’s front door? There it was - on-line.

How about access to the company’s payroll records? You could see how much money each person earns. Better still, you might like to make yourself an employee and pay yourself a tidy once-off bonus through electronic funds transfer.

Although the NorTel network was firewalled, there was one link to the Internet. The link was through a system called BNRGATE, Bell-Northern Research’s gateway to the Internet. Bell-Northern is NorTel’s R&D subsidiary.

Mendax began hunting around for a doorway. System administrators sometimes sent passwords through email. Normally this would be a major security risk, but the NorTel system was firewalled from the Internet, so the admins thought they had no real reason to be concerned about hackers.

In the NorTel network, a mail spool, where email was stored, was often shared between as many as twenty computer systems. This structure offered considerable advantages for Mendax. All he needed to do was break into the mail spool and run a keyword search through its contents. Tell the computer to search for word combinations such as ‘BNRGATE’ and ‘password’, or to look for the name of the system admin for BNRGATE, and likely as not it would deliver tender morsels of information such as new passwords.

Mendax used a password he found through this method to get into BNRGATE and look around. It appeared to Mendax that the NorTel network admins allowed most users to FTP something from the Internet, but prevented them from taking the copied file back to their NorTel computer site.

However, a small number of accounts on BNRGATE had fewer restrictions. Mendax broke into one of these accounts and went out to the Internet.

People from the Internet were barred from entering the NorTel network through BNRGATE. However, people inside NorTel could go out to the Internet via telnet.

To a hacker, the NorTel network was like a medieval castle and the BNRGATE firewall was an impossible battlement. It was a particular delight for Mendax to telnet out from behind this firewall into the Internet. It was as if he was walking out from the castle, past the guards and well-defended turrets, over the drawbridge and the moat, into the town below.

The castle also offered the perfect protection for further hacking activities. Who could chase him? Even if someone managed to follow him through the convoluted routing system he might set up to pass through a half dozen computer systems, the pursuer would never get past the battlements. Mendax could just disappear behind the firewall. He could be any one of 60000 NorTel employees on any one of 11000 computer systems.

The flat structure of the NorTel network created a good challenge since the only way to find out what was in a particular site, and its importance, was to invade the site itself. The IS hackers spent hours most nights roving through the vast system. The next morning one of them might call another to share tales of the latest exploits or a good laugh about a particularly funny piece of pilfered email.

Views: 2020

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

Comment by Nota Khan on September 21, 2011 at 5:29am

"there is not a single 'unknown' to be had"

That is the key isn't it? Nothing that could be called a "leak" in WikiLeaks....

Comment by XhackedbyNSA on January 24, 2011 at 12:28am

The book is interesting, and the real details are interesting as well.

There are so many different theories and conjectures regarding Julian Assange and his motivations that it is hard to keep up with them all.

SO FAR, in this latest release of 'cables', there is not a single 'unknown' to be had (at least that I have seen), that was already not at least discussed, if not substantiated by other sources. Of course, I am only human, and do not have Mr. Assange's 'superpowers'.

Thanks for the post. This is indeed food for thought.

Comment by bill green on January 23, 2011 at 7:17pm
i Agree, odd that his accusers are CIA and what an interesting thought regarding him also being the same bird flocking together that is , hmmmmm   search search search digg digg digg

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

Doc Vega, Chris of the family Masters, cheeki kea and 3 more were featured

 

Latest Activity

cheeki kea commented on Parrhesia's photo
Thumbnail

Join The IRSS

"Yes I hear the IRS are advertising for new recruits according to American internet…"
5 minutes ago
tjdavis posted photos
43 minutes ago
cheeki kea commented on cheeki kea's photo
Thumbnail

Cancelled. ~ But not for long.

"Now look what you've done Stuff-up fuck-up. ~May your national demise be our wondrous Rise.…"
56 minutes ago
cheeki kea commented on Less Prone's blog post The Malone Institute presents: World Economic Forum Project
"Yes they are all traitors, clowns or whores but collectively they know themselves as Puppets…"
1 hour ago
MAC replied to MAC's discussion Putin's Chilling Message to the West at the 10th Moscow Conference on International Security
"Putin the right man in the right place at the right time, stomping the nwo asshat country's…"
3 hours ago
cheeki kea posted a photo
3 hours ago
MAC posted a discussion
3 hours ago
cheeki kea commented on Less Prone's blog post The provocation is getting worse: Finland and Estonia are planning to set up a missile system to block Russia's Baltic fleet
"Finland shouldn't tie bows with Sweden and others if the provocative move brings disharmony to…"
3 hours ago
steve commented on tjdavis's photo
Thumbnail

every minute

"Ol trumpy bear is a damn good salesman/circus barker if nothing else. He could sell ice to eskimos…"
4 hours ago
steve commented on Less Prone's blog post The provocation is getting worse: Finland and Estonia are planning to set up a missile system to block Russia's Baltic fleet
"These cowardly prix think the distraction of war will save their scrawny necks come just desserts…"
4 hours ago
steve commented on Less Prone's blog post The Malone Institute presents: World Economic Forum Project
"Yes this list should be public knowledge, you call these traitors clowns I call em whores bought…"
4 hours ago
Less Prone posted a blog post
4 hours ago
Less Prone commented on Less Prone's blog post The Malone Institute presents: World Economic Forum Project
"Thanks for bringing this up, Steve. The world is a big circus with bought out political clowns…"
4 hours ago
Less Prone's blog post was featured
4 hours ago
tjdavis posted blog posts
4 hours ago
steve commented on tjdavis's photo
Thumbnail

gone to market

"Hey all Check this out then tell me it ain't all scripted. trumpy bear appointed this…"
6 hours ago
steve commented on Doc Vega's blog post This is What Happens When You Abandon Your Allies in Afghanistan
"When I was a schoolboy back in oh 67 0r 68 we had drills to dive under the desk in case them evil…"
8 hours ago
Parrhesia commented on Doc Vega's blog post This is What Happens When You Abandon Your Allies in Afghanistan
"Steve- I've already been outed as a KGB Agent.  That's why I find it offensive when…"
8 hours ago
steve commented on Doc Vega's blog post This is What Happens When You Abandon Your Allies in Afghanistan
"Hey Parr, or in the delusional mind of our weepy poet Hey Alter or invented ego or supporter or…"
9 hours ago
steve commented on Doc Vega's blog post This is What Happens When You Abandon Your Allies in Afghanistan
"dockedy how a "word can be incendiary" is as silly as dry water but let me splain to your…"
9 hours ago

© 2022   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted