Conquer Club

1 Dead in Pakistan Consulate Attack

\\OFF-TOPIC// conversations about everything that has nothing to do with Conquer Club.

Moderator: Community Team

Forum rules
Please read the Community Guidelines before posting.

Re: 1 Dead in Pakistan Consulate Attack

Postby fadedpsychosis on Mon Sep 17, 2012 2:56 pm

thegreekdog wrote:
fadedpsychosis wrote:network accessibility would be my guess...

and as far as the burning thing goes, that's what we did in Iraq... every week anything even vaguely classified we didn't need anymore we took out to a burn pit made of cinder blocks and burned stuff, stirring it with a bit of rebar with a clamp on it (so we wouldn't burn our hands)


Hmm... I would think the US government would have better network accessability tools than a private company. And I have awesome network accessibility.

HAH!! I had CRAP network access at work at my last base, and that was in Ohio... even worse here in Italy, and I don't even want to think about running crypto through a local ISP at an embassy... they'd likely be running it through a satellite shot and those are slow as hell too
John Adams wrote:I have come to the conclusion that one useless man is called a disgrace, that two are called a law firm, and that three or more become a Congress! And by God I have had this Congress!
User avatar
Private fadedpsychosis
 
Posts: 180
Joined: Mon Oct 01, 2007 4:12 pm
Location: global

Re: 1 Dead in Pakistan Consulate Attack

Postby fadedpsychosis on Mon Sep 17, 2012 2:58 pm

just remember the maxim of govt contracts: lowest bidder wins... (excluding bribes and markups and afterward price hikes etc)
John Adams wrote:I have come to the conclusion that one useless man is called a disgrace, that two are called a law firm, and that three or more become a Congress! And by God I have had this Congress!
User avatar
Private fadedpsychosis
 
Posts: 180
Joined: Mon Oct 01, 2007 4:12 pm
Location: global

Re: 1 Dead in Pakistan Consulate Attack

Postby BigBallinStalin on Mon Sep 17, 2012 3:13 pm

fadedpsychosis wrote:just remember the maxim of govt contracts: lowest bidder wins... (excluding bribes and markups and afterward price hikes etc)


Good enough for government work!
User avatar
Major BigBallinStalin
 
Posts: 5151
Joined: Sun Oct 26, 2008 10:23 pm
Location: crying into the dregs of an empty bottle of own-brand scotch on the toilet having a dump in Dagenham

Re: 1 Dead in Pakistan Consulate Attack

Postby fadedpsychosis on Mon Sep 17, 2012 3:28 pm

BigBallinStalin wrote:
fadedpsychosis wrote:just remember the maxim of govt contracts: lowest bidder wins... (excluding bribes and markups and afterward price hikes etc)


Good enough for government work!

exactly!
John Adams wrote:I have come to the conclusion that one useless man is called a disgrace, that two are called a law firm, and that three or more become a Congress! And by God I have had this Congress!
User avatar
Private fadedpsychosis
 
Posts: 180
Joined: Mon Oct 01, 2007 4:12 pm
Location: global

Re: 1 Dead in Pakistan Consulate Attack

Postby Woodruff on Mon Sep 17, 2012 5:40 pm

thegreekdog wrote:
Woodruff wrote:
thegreekdog wrote:
GreecePwns wrote:Speaking of Iran, remember during around GOP primary debate time the "threat" of Iranian ground invasion of Israel?

I'm still laughing at that one.


That wasn't even the worst of it in the Republican primary "debates."

Sorry to take this back a few pages, but... seriously, why in the hell would the US store sensitive data on computers in embassies in potentially hostile foreign countries?


Because the security personnel and diplomats need it. I can think of a few reasons why the diplomats would need it, and MANY reasons why the security personnel would.


Okay, I understand that security personnel and diplomats would need sensitive data. But why must it be stored on a computer? Why could it not be accessed remotely from that computer?


Most likely because you don't always have access to the network, even the high-classified military networks.

thegreekdog wrote:I work for a firm where all data is stored remotely. If someone manages to get into my computer, they would have no access to any sensitive data because it is not stored on my computer.


Actually, that's not accurate at all. There is no such thing as a secure computer as long as it is connected to a network. Actually, there is no such thing as a secure computer unless it has no power. Otherwise, it is inherently insecure and all that can be done is to make it as secure as you can. I guess what I'm saying is...if you could access the data over your network from your computer, so could I (given time).

thegreekdog wrote:Looking back, I don't think I worded my question correctly. I was not asking why sensitive data has to be available. I was trying to ask why sensitive data had to be stored on the hard drive of a computer (rather than remotely accessed).


Computers do have the advantage of higher encryption capabilities (making the "given time" reference above less of a makeable position). So really, computers are probably more secure than hardcopies in a safe, for instance. And like you mentioned, accessing it over a network (with appropriate security protocols) would be more secure than having it stored locally.

The other aspect though is RAM. Information can be pulled from RAM too, so just because it hasn't been on your hard drive doesn't necessarily mean it can't be accessed on your computer.
...I prefer a man who will burn the flag and then wrap himself in the Constitution to a man who will burn the Constitution and then wrap himself in the flag.
User avatar
Corporal 1st Class Woodruff
 
Posts: 5093
Joined: Sat Jan 05, 2008 9:15 am

Re: 1 Dead in Pakistan Consulate Attack

Postby Phatscotty on Mon Sep 17, 2012 5:42 pm

Producer Of Anti-Islam Film Was Fed Snitch
L.A. man began cooperating after 2009 fraud bust

In remarks stressing that the U.S. government had ā€œabsolutely nothing to do withā€ the anti-Islam film that has touched off violence in the Middle East, Secretary of State Hillary Clinton yesterday sought to quash Arab concerns that the ā€œdisgusting and reprehensibleā€ movie was somehow produced or condoned by American officials.

However, Clinton’s attempt to distance the U.S. from ā€œInnocence of Muslimsā€--and, by extension, its felonious producer--may be complicated by the revelation that Nakoula Basseley Nakoula became a government informant after his 2009 arrest for bank fraud.


http://www.thesmokinggun.com/documents/ ... ion-756920
User avatar
Major Phatscotty
 
Posts: 3714
Joined: Mon Dec 10, 2007 5:50 pm

Re: 1 Dead in Pakistan Consulate Attack

Postby Woodruff on Mon Sep 17, 2012 5:43 pm

thegreekdog wrote:
fadedpsychosis wrote:network accessibility would be my guess...

and as far as the burning thing goes, that's what we did in Iraq... every week anything even vaguely classified we didn't need anymore we took out to a burn pit made of cinder blocks and burned stuff, stirring it with a bit of rebar with a clamp on it (so we wouldn't burn our hands)


Hmm... I would think the US government would have better network accessability tools than a private company. And I have awesome network accessibility.


Satellite access is notoriously painful and slow.
...I prefer a man who will burn the flag and then wrap himself in the Constitution to a man who will burn the Constitution and then wrap himself in the flag.
User avatar
Corporal 1st Class Woodruff
 
Posts: 5093
Joined: Sat Jan 05, 2008 9:15 am

Re: 1 Dead in Pakistan Consulate Attack

Postby thegreekdog on Mon Sep 17, 2012 7:36 pm

fadedpsychosis wrote:
thegreekdog wrote:
fadedpsychosis wrote:network accessibility would be my guess...

and as far as the burning thing goes, that's what we did in Iraq... every week anything even vaguely classified we didn't need anymore we took out to a burn pit made of cinder blocks and burned stuff, stirring it with a bit of rebar with a clamp on it (so we wouldn't burn our hands)


Hmm... I would think the US government would have better network accessability tools than a private company. And I have awesome network accessibility.

HAH!! I had CRAP network access at work at my last base, and that was in Ohio... even worse here in Italy, and I don't even want to think about running crypto through a local ISP at an embassy... they'd likely be running it through a satellite shot and those are slow as hell too


Really? That does not make me feel good at all.

Woodruff wrote:Actually, that's not accurate at all. There is no such thing as a secure computer as long as it is connected to a network. Actually, there is no such thing as a secure computer unless it has no power. Otherwise, it is inherently insecure and all that can be done is to make it as secure as you can. I guess what I'm saying is...if you could access the data over your network from your computer, so could I (given time).


Fair. But could the owner of the network kick off access from that particular computer? For example, if the computer in the embassy in Libya was stolen, couldn't the US State Department remove access to their network? Or is that network access inherent in the computer?

This is really disturbing to me (clearly).
Image
User avatar
Sergeant 1st Class thegreekdog
 
Posts: 7246
Joined: Thu Jul 17, 2008 6:55 am
Location: Philadelphia

Re: 1 Dead in Pakistan Consulate Attack

Postby Woodruff on Tue Sep 18, 2012 12:27 am

thegreekdog wrote:
Woodruff wrote:Actually, that's not accurate at all. There is no such thing as a secure computer as long as it is connected to a network. Actually, there is no such thing as a secure computer unless it has no power. Otherwise, it is inherently insecure and all that can be done is to make it as secure as you can. I guess what I'm saying is...if you could access the data over your network from your computer, so could I (given time).


Fair. But could the owner of the network kick off access from that particular computer? For example, if the computer in the embassy in Libya was stolen, couldn't the US State Department remove access to their network? Or is that network access inherent in the computer?


Yes and no. Could they remove the access, sure. But as I said, there's no such thing as a secure computer if it can still be connected to the network (which becomes more likely if it has EVER been connected to the network, for someone who knows what to do). Basically, ANY computer can break into a network in the right hands, but a system that has already been a part of a network of that nature is going to be an easier tool to use in doing so, because of the nature of access information that would reside on that computer.
...I prefer a man who will burn the flag and then wrap himself in the Constitution to a man who will burn the Constitution and then wrap himself in the flag.
User avatar
Corporal 1st Class Woodruff
 
Posts: 5093
Joined: Sat Jan 05, 2008 9:15 am

Re: 1 Dead in Pakistan Consulate Attack

Postby fadedpsychosis on Tue Sep 18, 2012 5:28 am

thegreekdog wrote:
Woodruff wrote:Actually, that's not accurate at all. There is no such thing as a secure computer as long as it is connected to a network. Actually, there is no such thing as a secure computer unless it has no power. Otherwise, it is inherently insecure and all that can be done is to make it as secure as you can. I guess what I'm saying is...if you could access the data over your network from your computer, so could I (given time).


Fair. But could the owner of the network kick off access from that particular computer? For example, if the computer in the embassy in Libya was stolen, couldn't the US State Department remove access to their network? Or is that network access inherent in the computer?

This is really disturbing to me (clearly).

it boils down to the way networks.. well work. If the system is on the domain, then yes I can remove its access to the domain, but the domain information is still on the computer itself... IP addresses, domain name, domain controller name and IP, DNS... all of it makes it that much easier to get back into the network. This is all actually part of what my job for the AF is (and I assume that Woodruff used to do the same or a similar job) so trust me when I say I WISH it was that easy. Now there are safeguards you can put into a system, but anyone with enough time and know-how is going to be able to get past those safeguards eventually (same as if you had things in a safe... eventually someone will be able to break in with enough time and the right tools).
John Adams wrote:I have come to the conclusion that one useless man is called a disgrace, that two are called a law firm, and that three or more become a Congress! And by God I have had this Congress!
User avatar
Private fadedpsychosis
 
Posts: 180
Joined: Mon Oct 01, 2007 4:12 pm
Location: global

Re: 1 Dead in Pakistan Consulate Attack

Postby thegreekdog on Tue Sep 18, 2012 7:04 am

fadedpsychosis wrote:
thegreekdog wrote:
Woodruff wrote:Actually, that's not accurate at all. There is no such thing as a secure computer as long as it is connected to a network. Actually, there is no such thing as a secure computer unless it has no power. Otherwise, it is inherently insecure and all that can be done is to make it as secure as you can. I guess what I'm saying is...if you could access the data over your network from your computer, so could I (given time).


Fair. But could the owner of the network kick off access from that particular computer? For example, if the computer in the embassy in Libya was stolen, couldn't the US State Department remove access to their network? Or is that network access inherent in the computer?

This is really disturbing to me (clearly).

it boils down to the way networks.. well work. If the system is on the domain, then yes I can remove its access to the domain, but the domain information is still on the computer itself... IP addresses, domain name, domain controller name and IP, DNS... all of it makes it that much easier to get back into the network. This is all actually part of what my job for the AF is (and I assume that Woodruff used to do the same or a similar job) so trust me when I say I WISH it was that easy. Now there are safeguards you can put into a system, but anyone with enough time and know-how is going to be able to get past those safeguards eventually (same as if you had things in a safe... eventually someone will be able to break in with enough time and the right tools).


Clearly you're the person to talk to (and Woodruff) and sorry for all the questions.

Is the US government making any effort to further securitize the data it makes available to embassies?
Is anyone in the US government concerned about the data in embassies? From an outsider's point of view, it does not seem they are much concerned.
Does the need for sensitive information in the Libyan embassy outweigh the need to keep that sensitive information secret?
Image
User avatar
Sergeant 1st Class thegreekdog
 
Posts: 7246
Joined: Thu Jul 17, 2008 6:55 am
Location: Philadelphia

Re: 1 Dead in Pakistan Consulate Attack

Postby fadedpsychosis on Tue Sep 18, 2012 8:11 am

thegreekdog wrote:
fadedpsychosis wrote:
thegreekdog wrote:
Woodruff wrote:Actually, that's not accurate at all. There is no such thing as a secure computer as long as it is connected to a network. Actually, there is no such thing as a secure computer unless it has no power. Otherwise, it is inherently insecure and all that can be done is to make it as secure as you can. I guess what I'm saying is...if you could access the data over your network from your computer, so could I (given time).


Fair. But could the owner of the network kick off access from that particular computer? For example, if the computer in the embassy in Libya was stolen, couldn't the US State Department remove access to their network? Or is that network access inherent in the computer?

This is really disturbing to me (clearly).

it boils down to the way networks.. well work. If the system is on the domain, then yes I can remove its access to the domain, but the domain information is still on the computer itself... IP addresses, domain name, domain controller name and IP, DNS... all of it makes it that much easier to get back into the network. This is all actually part of what my job for the AF is (and I assume that Woodruff used to do the same or a similar job) so trust me when I say I WISH it was that easy. Now there are safeguards you can put into a system, but anyone with enough time and know-how is going to be able to get past those safeguards eventually (same as if you had things in a safe... eventually someone will be able to break in with enough time and the right tools).


Clearly you're the person to talk to (and Woodruff) and sorry for all the questions.

Is the US government making any effort to further securitize the data it makes available to embassies?
Is anyone in the US government concerned about the data in embassies? From an outsider's point of view, it does not seem they are much concerned.
Does the need for sensitive information in the Libyan embassy outweigh the need to keep that sensitive information secret?

keep in mind, the information on these computers was never meant to leave those computers save for other official use. They're there for the use of the ambassadors (who usually need a certain level of information as they are essentially acting in stead of our govt. with regards to the country they're in) and for the use of other personnel that are working to ensure our country's best interests in the area. Embassies are also one of the focal points of national security in the country they're in... say for instance I loose my passport or it gets stolen while I'm here: if I were a civilian, I'd report that to the embassy (being military I have a different report chain that I think involves the embassy anyway). As I said, there are safeguards on the material, but honestly it was never meant to get out of our control.
John Adams wrote:I have come to the conclusion that one useless man is called a disgrace, that two are called a law firm, and that three or more become a Congress! And by God I have had this Congress!
User avatar
Private fadedpsychosis
 
Posts: 180
Joined: Mon Oct 01, 2007 4:12 pm
Location: global

Re: 1 Dead in Pakistan Consulate Attack

Postby thegreekdog on Tue Sep 18, 2012 8:13 am

fadedpsychosis wrote:
thegreekdog wrote:
fadedpsychosis wrote:
thegreekdog wrote:
Woodruff wrote:Actually, that's not accurate at all. There is no such thing as a secure computer as long as it is connected to a network. Actually, there is no such thing as a secure computer unless it has no power. Otherwise, it is inherently insecure and all that can be done is to make it as secure as you can. I guess what I'm saying is...if you could access the data over your network from your computer, so could I (given time).


Fair. But could the owner of the network kick off access from that particular computer? For example, if the computer in the embassy in Libya was stolen, couldn't the US State Department remove access to their network? Or is that network access inherent in the computer?

This is really disturbing to me (clearly).

it boils down to the way networks.. well work. If the system is on the domain, then yes I can remove its access to the domain, but the domain information is still on the computer itself... IP addresses, domain name, domain controller name and IP, DNS... all of it makes it that much easier to get back into the network. This is all actually part of what my job for the AF is (and I assume that Woodruff used to do the same or a similar job) so trust me when I say I WISH it was that easy. Now there are safeguards you can put into a system, but anyone with enough time and know-how is going to be able to get past those safeguards eventually (same as if you had things in a safe... eventually someone will be able to break in with enough time and the right tools).


Clearly you're the person to talk to (and Woodruff) and sorry for all the questions.

Is the US government making any effort to further securitize the data it makes available to embassies?
Is anyone in the US government concerned about the data in embassies? From an outsider's point of view, it does not seem they are much concerned.
Does the need for sensitive information in the Libyan embassy outweigh the need to keep that sensitive information secret?

keep in mind, the information on these computers was never meant to leave those computers save for other official use. They're there for the use of the ambassadors (who usually need a certain level of information as they are essentially acting in stead of our govt. with regards to the country they're in) and for the use of other personnel that are working to ensure our country's best interests in the area. Embassies are also one of the focal points of national security in the country they're in... say for instance I loose my passport or it gets stolen while I'm here: if I were a civilian, I'd report that to the embassy (being military I have a different report chain that I think involves the embassy anyway). As I said, there are safeguards on the material, but honestly it was never meant to get out of our control.


Okay, that makes sense. But when the embassy is within a country that has a rather large group that has some animosity towards the U.S., wouldn't security measures by tighter? I'm not concerned with highly sensitive information being on a computer in the UK or Canada. But I would be more concerned with highly sensitive information being on a computer in Pakistan or Libya. I guess the answer is that we cannot account for all eventualities. It still doesn't make me feel good.
Image
User avatar
Sergeant 1st Class thegreekdog
 
Posts: 7246
Joined: Thu Jul 17, 2008 6:55 am
Location: Philadelphia

Re: 1 Dead in Pakistan Consulate Attack

Postby fadedpsychosis on Tue Sep 18, 2012 8:25 am

thegreekdog wrote:
fadedpsychosis wrote:
thegreekdog wrote:
fadedpsychosis wrote:
thegreekdog wrote:
Woodruff wrote:Actually, that's not accurate at all. There is no such thing as a secure computer as long as it is connected to a network. Actually, there is no such thing as a secure computer unless it has no power. Otherwise, it is inherently insecure and all that can be done is to make it as secure as you can. I guess what I'm saying is...if you could access the data over your network from your computer, so could I (given time).


Fair. But could the owner of the network kick off access from that particular computer? For example, if the computer in the embassy in Libya was stolen, couldn't the US State Department remove access to their network? Or is that network access inherent in the computer?

This is really disturbing to me (clearly).

it boils down to the way networks.. well work. If the system is on the domain, then yes I can remove its access to the domain, but the domain information is still on the computer itself... IP addresses, domain name, domain controller name and IP, DNS... all of it makes it that much easier to get back into the network. This is all actually part of what my job for the AF is (and I assume that Woodruff used to do the same or a similar job) so trust me when I say I WISH it was that easy. Now there are safeguards you can put into a system, but anyone with enough time and know-how is going to be able to get past those safeguards eventually (same as if you had things in a safe... eventually someone will be able to break in with enough time and the right tools).


Clearly you're the person to talk to (and Woodruff) and sorry for all the questions.

Is the US government making any effort to further securitize the data it makes available to embassies?
Is anyone in the US government concerned about the data in embassies? From an outsider's point of view, it does not seem they are much concerned.
Does the need for sensitive information in the Libyan embassy outweigh the need to keep that sensitive information secret?

keep in mind, the information on these computers was never meant to leave those computers save for other official use. They're there for the use of the ambassadors (who usually need a certain level of information as they are essentially acting in stead of our govt. with regards to the country they're in) and for the use of other personnel that are working to ensure our country's best interests in the area. Embassies are also one of the focal points of national security in the country they're in... say for instance I loose my passport or it gets stolen while I'm here: if I were a civilian, I'd report that to the embassy (being military I have a different report chain that I think involves the embassy anyway). As I said, there are safeguards on the material, but honestly it was never meant to get out of our control.


Okay, that makes sense. But when the embassy is within a country that has a rather large group that has some animosity towards the U.S., wouldn't security measures by tighter? I'm not concerned with highly sensitive information being on a computer in the UK or Canada. But I would be more concerned with highly sensitive information being on a computer in Pakistan or Libya. I guess the answer is that we cannot account for all eventualities. It still doesn't make me feel good.

believe me, I agree with you, I'm not happy about the situation either... but do keep in mind, which is going to need the intel more, the guy in the UK, or the guy who's in harms way? there WAS much higher security measures in Libya, but obviously it wasn't enough
John Adams wrote:I have come to the conclusion that one useless man is called a disgrace, that two are called a law firm, and that three or more become a Congress! And by God I have had this Congress!
User avatar
Private fadedpsychosis
 
Posts: 180
Joined: Mon Oct 01, 2007 4:12 pm
Location: global

Postby 2dimes on Tue Sep 18, 2012 10:57 am

maxfaraday wrote:
2dimes wrote:This is making me think about taking my stars and stripes trousers out of my pre-packed Europian weekend getaway bag.


Yeah I wouldn't do that if I were you.
Everyone's gonna laugh at you and you'll want to kill yourself.

What? Everyone's going to laugh if I don't have them next trip across the pond? Why?
User avatar
Corporal 2dimes
 
Posts: 13098
Joined: Wed May 31, 2006 1:08 pm
Location: Pepperoni Hug Spot.

Re: 1 Dead in Pakistan Consulate Attack

Postby Phatscotty on Tue Sep 18, 2012 7:09 pm

User avatar
Major Phatscotty
 
Posts: 3714
Joined: Mon Dec 10, 2007 5:50 pm

Re: 1 Dead in Pakistan Consulate Attack

Postby fadedpsychosis on Wed Sep 19, 2012 6:40 am

Phatscotty wrote:

not even going to bother... reality checks from Fox tend to bounce
John Adams wrote:I have come to the conclusion that one useless man is called a disgrace, that two are called a law firm, and that three or more become a Congress! And by God I have had this Congress!
User avatar
Private fadedpsychosis
 
Posts: 180
Joined: Mon Oct 01, 2007 4:12 pm
Location: global

Re: 1 Dead in Pakistan Consulate Attack

Postby GreecePwns on Thu Sep 20, 2012 8:03 am

Actually, this guy is very good. I suggest you do check it out.
Chariot of Fire wrote:As for GreecePwns.....yeah, what? A massive debt. Get a job you slacker.

Viceroy wrote:[The Biblical creation story] was written in a time when there was no way to confirm this fact and is in fact a statement of the facts.
User avatar
Corporal GreecePwns
 
Posts: 2656
Joined: Tue Feb 20, 2007 7:19 pm
Location: Lawn Guy Lint

Re: 1 Dead in Pakistan Consulate Attack

Postby thegreekdog on Thu Sep 20, 2012 8:11 am

GreecePwns wrote:Actually, this guy is very good. I suggest you do check it out.


So, in brief (for tl;dw):

- US, France arm (directly or indirectly) Libyan rebels.
- Libyan rebels include "terrorists" (i.e. those people that want the US and France out of the affairs of Libya);
- Libyan rebels including "terrorists" use the weapons received from the US and France to make the attack on the embassy.
Image
User avatar
Sergeant 1st Class thegreekdog
 
Posts: 7246
Joined: Thu Jul 17, 2008 6:55 am
Location: Philadelphia

Re: 1 Dead in Pakistan Consulate Attack

Postby BigBallinStalin on Thu Sep 20, 2012 8:21 am

thegreekdog wrote:
GreecePwns wrote:Actually, this guy is very good. I suggest you do check it out.


So, in brief (for tl;dw):

- US, France arm (directly or indirectly) Libyan rebels.
- Libyan rebels include "terrorists" (i.e. those people that want the US and France out of the affairs of Libya);
- Libyan rebels including "terrorists" use the weapons received from the US and France to make the attack on the embassy.


Whoa, surprise, surprise.


I haven't seen any good evidence for the last claim though. For me, it's been an assumption or a Big Maybe.
User avatar
Major BigBallinStalin
 
Posts: 5151
Joined: Sun Oct 26, 2008 10:23 pm
Location: crying into the dregs of an empty bottle of own-brand scotch on the toilet having a dump in Dagenham

Re: 1 Dead in Pakistan Consulate Attack

Postby fadedpsychosis on Thu Sep 20, 2012 9:36 am

BigBallinStalin wrote:
thegreekdog wrote:
GreecePwns wrote:Actually, this guy is very good. I suggest you do check it out.


So, in brief (for tl;dw):

- US, France arm (directly or indirectly) Libyan rebels.
- Libyan rebels include "terrorists" (i.e. those people that want the US and France out of the affairs of Libya);
- Libyan rebels including "terrorists" use the weapons received from the US and France to make the attack on the embassy.


Whoa, surprise, surprise.


I haven't seen any good evidence for the last claim though. For me, it's been an assumption or a Big Maybe.

if true it'd be the exact same thing that happened in Afghanistan...
John Adams wrote:I have come to the conclusion that one useless man is called a disgrace, that two are called a law firm, and that three or more become a Congress! And by God I have had this Congress!
User avatar
Private fadedpsychosis
 
Posts: 180
Joined: Mon Oct 01, 2007 4:12 pm
Location: global

Re: 1 Dead in Pakistan Consulate Attack

Postby BigBallinStalin on Thu Sep 20, 2012 9:17 pm

Blowback, baby!

I LOVE IT.

Same thing happened in Iraq 1999, but hey, they only killed a few of our troops with equipment we sold them to use against the Iranians.

Hey, and I'm not sure, but some portion of all that equipment which we've given to all the various substate organizations in Iraq, Afghanistan, and Libya for the past 12 years has gone to terrorist/anti-US insurgent organizations.

What percent could that be?
Are the proper intelligence agencies willing to conduct such research? (is it even possible?) Or would such research lead to damning themselves for their own negligence?
User avatar
Major BigBallinStalin
 
Posts: 5151
Joined: Sun Oct 26, 2008 10:23 pm
Location: crying into the dregs of an empty bottle of own-brand scotch on the toilet having a dump in Dagenham

Postby 2dimes on Thu Sep 20, 2012 9:30 pm

A couple of decades ago no one would dare attack a US embassy. I suspect they know you're broke and have got all soft.
User avatar
Corporal 2dimes
 
Posts: 13098
Joined: Wed May 31, 2006 1:08 pm
Location: Pepperoni Hug Spot.

Re:

Postby BigBallinStalin on Thu Sep 20, 2012 9:51 pm

2dimes wrote:A couple of decades ago no one would dare attack a US embassy. I suspect they know you're broke and have got all soft.


I agree in the case of Afghanistan.


Unfriendly fire has resulted in 51 deaths of ISAF personnel over roughly 6 years, but this was enough to restrict all joint-operations between ISAF and Afghan soldiers. Only at the battalion level and under special permissions can such operations take place.

51 dead, and the resistance movement has undermined the effectiveness of joint-operations, NATO training of Afghan forces, and US/NATO consulate activities within Afghanistan. In turn, this increases their chances of gaining a stronger hold on Afghanistan after the ISAF essentially evacuates in 2014.

It's amazing. Not only that but I'd imagine the trust between Afghan and non-Afghan soldiers has significantly decreased, which negatively affects coordination of all activities between the two groups.

Throw in the "Muhammad is a jerk" youtube video, mix it with some effective marketing by the substate organizations, and you've got a very low-cost means of undermining the goals of one's enemies.


Then, as the US, spend trillions on invading and occupying two countries, bomb another one, and hey! somehow the US is financially and militarily constrained. Let's spend some more money on antagonizing the Chinese too, while subsidizing the national security of Japan and South Korea. Makes sense, amirite?
User avatar
Major BigBallinStalin
 
Posts: 5151
Joined: Sun Oct 26, 2008 10:23 pm
Location: crying into the dregs of an empty bottle of own-brand scotch on the toilet having a dump in Dagenham

Postby 2dimes on Thu Sep 20, 2012 10:00 pm

Well I just mean presuming there is not some covert activities going on I'm not aware of. Even Carter would have sent guys into Lybia if an embassy was attacked. That used to be a pretty serious thing. They were secure just because everyone knew it would be like shaking a hornets nest.
User avatar
Corporal 2dimes
 
Posts: 13098
Joined: Wed May 31, 2006 1:08 pm
Location: Pepperoni Hug Spot.

PreviousNext

Return to Acceptable Content

Who is online

Users browsing this forum: No registered users