Wednesday, December 8, 2010

The Espionage Lark

Lately, the talk of the country has been the escapades
of a young hacker from Australia, one Julian Assange,
and his creation WikiLeaks. With this web site, this
punk has made public approximately 250,000 classi-
fied documents about U.S. military operations and
related items, as well as information exchanged
between diplomats (including U.S. diplomats).
This caper is reported to be the largest leak of
top secret information held by our government
in our country's history.

The exposed classified information will very likely
put our military people, Afgahn military personnel,
Afghani human rights activists, informants, spies,
and innocent civilians in peril. Among the documents
Assange posted were those with technical details
about an Army device designed to prevent roadside
bombs from exploding and even the social security
numbers of many of our soldiers.

Assange became a computer hacker while in his
early teens, having taught himself the finer points
of this dubious activity through reading many books
on computer science and mathematics. He had a
rather unusual childhood, which molded him into
what he is today; Assange's mother and he moved
37 times (!) before he turned 14, all part of a nasty
custody battle with Assange's stepfather. The hacker's
mother had him home-schooled most of that time,
stating her worries "that formal education would
inculcate an unhealthy respect for authority" in her
pride and joy. Supposedly, this explains Assange's
anarchistic tendencies.

While a teen Assange started a group of hackers
called International Subversives. He later wrote
"Conspiracy of Governance", an online publication
which was regarded as a pseudo-intellectual diatribe.
After many hacking capers, Assange went big-time
with hacking into U.S. government files to lay bare
military and diplomatic secrets vital to our country's
war effort. President Obama, his administration, and
Congress have yet to come up with an effective
response to Assange's malicious mischief-making.

In order to successfully prosecute the espionage
troublemaker, U.S. prosecutors must prove three
things, based on the Espionage Act of 1917:

1) That Assange had unauthorized possession of
information related to national security.

2) That the information could bring harm to the U.S.
and/or aid an enemy.

3) That Assange had willfully kept the information
after a demand for its return.

Accounts of Assange and his espionage escapades
show the larcenous lad to be simply contemptuous
of ruling institutions, regarding them as being invari-
ably corrupt and everything that they say just lies.
But the actual and potential damage from his
supposed childish lark is much more than something
akin to egging the school principal's car or placing
false reports of suspicious activity to the police;
not only are many lives placed at increased risk
but communication between diplomats, between
military personnel (especially at command level),
even between heads of state, is compromised.
Furthermore, journalists will find it more difficult
to write articles on specific revelations for public
consumption, i.e. What missile technology did North
Korea give to Iran? How would we and our allies
wage the war in Afghanistan if we had to tighten
our security to the point where communication
would be encumbered by fear of advanced means of
snooping?

Julian Assange is a war criminal and should be arrested
and tried as such. A haphazard upbringing should not be
an excuse for not meting out appropriate punishment
to an egregious transgressor now of majority age.
Especially a transgressor who has so little respect for
authority that he desires to stick his finger in its eye,
without regard to whomever else might be injured.

Your faithful Peasant has posted a link for you, my
treasured readers, to help you to gain more insight
into the mindset and resultant activity of this cyber-
smarty-pants. Click below to watch a video of
Julian Assange talking about the enemies of his
enterprise.


MEM




Enhanced by Zemanta

No comments:

Post a Comment