Posted on 01/02/2012 10:28:48 AM PST by smoothsailing
I agree absolutely about Frank.
But Puckett is another matter.
If Puckett had just left the court and disappeared then I wouldn’t have a word to say about him. But when he starts giving press conferences and says true justice wasn’t possible because Marines were given immunity in exchange for testimony, I have a major problem.
He attempted to cast a shadow of doubt on every previous exoneration. And that is so unnecessary, so uncalled for, it pisses me off no end.
So it all comes back to trying to understand the man and his character.
It was pretty easy to do.
I simply copy-and-pasted Puckett's own email and changed a few words here and there.
Wow. That's for sure.
This, and volunteering to defend Bradley Manning tells me more than I need to know about Faraj...
Did Faraj "volunteer" to "defend" Frank Wuterich?
I hadn’t read the Gawker /Israeli tracking, generally avoid logging on sites like that...now I wonder long how he’s been practicing this unfortunate pass time.
I picture you writing that while sitting in a bar, reviewing the steps that lead to that “Boyene” tattoo.
LOL....best laugh I’ve had all day!
I still got it! Jump back, kiss myself!
>> as much as Frank being able to be with his family tonight..and tomorrow, and for now on.
We’ve seen the zealotry and endless resources thrown at prosecuting the Haditha Marines. I don’t fault SSgt Wuterich for the decision to wrap up this witch hunt. But I tell ya’, this unexpected powder keg is raising a lot of questions about the process.
This is getting really weird. Defense team psy-ops?
For those that had a problem with it, I guess Chessani’s team, TMLC, is looking pretty good right now...
Could be, and why not! Puckett & Faraj are Marines, we should expect them to fight back.
I second that!
"We feel bad for our clients," he said. However, those who hacked the firm "don't appear to be posting or calling attention to" the stolen emails.
Girl, he read your mind...
Given the firm's track record of defending soldiers against the U.S. government that Anonymous frequently criticizes, the firm seems like a strange target for the group, he points out.
"If you have a problem with injustice, how about hacking the prosecutors?" Puckett jokes, adding: "We've been trying to laugh so we won't cry about all this."
This hack was just not all that sophisticated. So either (as I speculated) it was dumped on Anonymous or (as they claim) it wasn't them.
Haha! OWNED!
Never had a problem w/ TMLC.
They showed righteous indignation from the very beginning and did a great job, IMO.
If Puckett and Faraj ain’t sweating it (and it sure sounds that way), I’m just going to relax and enjoy it all.
See you round, kiddo!
This is one of the comnments from below the story:
Feb 7, 2012 9:30 AM CST
First of all, there isnt any equipment that can crack a password with a brute force method method, that; rapidly tries out all possible combinations of google email passwords. That type of method was rendered virtually impossible many years ago by the use captchas, meaning that after 5-10 incorrect password attempts, the user will be presented with a test, such as a distorted word, that they are required to read and retype correctly before proceeding. Automatic computer programs can not read the captacha, so if a correct answer is typed, the user is assumed to be human. With each subsequent guess, a new captcha is generated, that must be answered correctly, for the very purpose of making it impossible to use an automatic program that rapidly tries out all possible combinations.
Second, there is no such thing as a hacking collective named Anonymous. The is a name that is just being used by, oh, just about any and every basement dwelling script kiddie on the planet, most of who couldnt hack their way out of a paper bag without being handed a sharp stick and a 20 page tutorial.
Third, if all that was hacked (and I use that word loosely) were passwords to email accounts, most likely the perps. used either a password stealer program or just went phishing. Both methods rely primarily on the use of social engineering, meaning that they just tricked some dumb sap(s) into opening a spoofed email and downloading an infected attachment, or into inputting their username and password into a faked (phished) websitesite.
A companys security system is only as strong as its most gullible employee
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.