The GCHQ Cryptome slide could be a mockup/disinfo
For the latest version: http://that1archive.neocities.org/subfolder1/gchq-cryptome-slide.html A few days ago, a new Snowden slide <https://theintercept.com/2015/09/25/gchq-radio-porn-spies-track-web-users-online-identities/> was released that appeared to show that the GCHQ was monitoring Cryptome in near-real-time by examining the browsing data of one of the websites' visitors. John and Deborah of Cryptome later verified that the information in their slides matched their logs, seemingly verifying the legitimacy of the slide itself and the information presented about KARMA POLICE. However, after examining the slide and all the information available, I realized that it was possible to create the slide (or one like it) with accurate data without any of the sources cited/assumed/alleged. To demonstrate this, I put together some comparable information. To respect the privacy of visitors to Cryptome, the end of each IP address is redacted and I've provided only a little information about several users instead of focusing on one user to provide detailed information about. A few notes before getting into the data: 1. I didn't receive this information from anyone in law enforcement or the intelligence, nor stolen through malicious hacking, social engineering, or electronic intrusion. Neither is it the result of surveillance directed against Cryptome or its users, or of any other illegal action. It was compiled from my legitimate archives. 2. I have confirmed that the information was available to others by locating pre-existing sources online. 3. This is not meant to accuse any one of forging a document, simply pointing out that it can't necessarily be verified by confirming the information with Cryptome's server logs. 4. If the slide *is* a mockup, it could be an internal mockup produced by GCHQ, a deliberate piece of disinformation from within or without GCHQ, a document altered by Snowden, his friends/"friends" in Russia, or anyone else in the chain of custody. Given that Snowden didn't review all of the documents he handed over, he might not recognize if one had been altered, embellished, forged, or taken out of context prior to publication. Or it could be genuine - proving that something could be a fake isn't quite the same as proving it's a fake. 5. If the document was forged, the only group I have reason to suspect are the chekist security agencies who have access to both the documents and to Snowden. 6. This was the result of a few rushed hours of work in a single afternoon, and thus may contain minor mistakes. 7. The times should be Eastern/US, but this is an unverified assumption. 8. These comments are unrelated to my debunking <https://cpunks.org/pipermail/cypherpunks/2015-October/009565.html> of the MITM attack against Cryptome which was seemingly implied <https://cryptome.org/2015/09/gchq-illegal-spying-us.htm> by this slide. Visitor IP correlated with page, time and date *IP: *212.48.158.* *Date: *2010-02-10 *Time: *23:06:15 *URL: *http://cryptome.org/cartome/foucault.htm Note that I manually translated the time and date from a time code, so it may be slightly incorrect. The original timestamp was 20100210230615. Twelve Days of Cryptomas In case I mistranslated the timestamp or anyone thinks that it was a fluke, here are twelve time and dates along with the redacted IP address that visited Cryptome at that time. These time and dates were originally rendered in a human readable format, so there is no danger that I mistranslated them. - December 25 2009 16:22 - 74.208.77.* - December 26 2009 18:19 - 65.98.224.* - December 27 2009 22:23 - 208.80.193.* - December 28 2009 21:51 - 69.113.197.* - December 29 2009 18:28 - 76.92.164.* - December 30 2009 03:30 - 88.80.205.* - December 31 2009 23:59 - 210.107.62.* - January 01 2010 00:13 - 71.56.6.* - January 02 2010 14:14 - 91.98.9.* - January 03 2010 01:23 - 88.87.4.* - January 04 2010 23:22 - 79.224.172.* - January 05 2010 06:16 - 65.55.110.*Internet search strings used to find Cryptome Finally, a semi-obscure phrase from the that was put into a search engine - complete with the original typo. "architectural engineering in miidle east" - it may appear in the logs as "architectural+engineering+in+miidle+east" Conclusion All of this information should be readily verifiable by John and Deborah at Cryptome, demonstrating that each of the pieces of the slide could have been created without the benefit of a surveillance program or large budget. In other words, the guilty knowledge implied by the accuracy of the slide can imply things other than being guilt of surveillance.
On Fri, Oct 02, 2015 at 10:23:12PM -0400, Michael Best wrote:
A few days ago, a new Snowden slide <https://theintercept.com/2015/09/25/gchq-radio-porn-spies-track-web-users-online-identities/> was released that appeared to show that the GCHQ was monitoring Cryptome in
Dude, are you calling Snowden liar? And did you found out that allegedly cryptome shipped their web logs on usbs to buyers AFTER you called Snowden liar?
I found the logs on the USB before I posted about the GCHQ slide, that's how I found the info. I verified that the data was also in coderman's torrent from over a year ago. John rebuffed my initial inquiry and refused to verify that the IPs I provided visited Cryptome at the times listed, and then accused me of faking the data. So I released it for others to look at themselves. As far as calling Snowden a liar, as I said in note #4 of the GCHQ post... If the slide is a mockup, it could be an internal mockup produced by GCHQ,
a deliberate piece of disinformation from within or without GCHQ, a document altered by Snowden, his friends/"friends" in Russia, or anyone else in the chain of custody. *Given that Snowden didn't review all of the documents he handed over, he might not recognize if one had been altered, embellished, forged, or taken out of context prior to publication.* Or it could be genuine - proving that something could be a fake isn't quite the same as proving it's a fake.
Italics added. On Thu, Oct 8, 2015 at 11:37 AM, Georgi Guninski <guninski@guninski.com> wrote:
On Fri, Oct 02, 2015 at 10:23:12PM -0400, Michael Best wrote:
A few days ago, a new Snowden slide < https://theintercept.com/2015/09/25/gchq-radio-porn-spies-track-web-users-on...
was released that appeared to show that the GCHQ was monitoring Cryptome in
Dude, are you calling Snowden liar?
And did you found out that allegedly cryptome shipped their web logs on usbs to buyers AFTER you called Snowden liar?
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On Thu, 8 Oct 2015 12:19:03 -0400 Steve Kinney <admin@pilobilus.net> wrote:
I think we have arrived at a "feeding the trolls" state here...
Or every COINTELPRO programme on the planet in one big, sloppy group hug, with the sensible beings standing on the sidelines watching and chuckling to themselves while their code compiles. - -- The Doctor [412/724/301/703/415] [ZS] PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ "Hell hath no fury like a LISP fan scorned." --Aaron Swartz -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJWFq4sAAoJED1np1pUQ8RkqPQP/RtGjFgmBTGeeHGbOQ662jL5 DZgPvbj4pB0JsblL3CbKwsB1RM2MtAVMgxEt1c0QMvAxSpHWbvj1zQQK790GjVfn tlDSySGDDBUdTeypPx1nn0p+/z+LdL14+6Skx59C7Jwdp0/CE0ocj+M/2j39OSXs suR94MUI4tSc/OHO7ynLzO66WBbED8UZrQX0tzc6viRpPc0DxcdV8wLKD/loDXnS HmUzZnJR860tcUqHAASa9PDjTYtRT3jiCzqlYW3Un/oRe6UDlqbNp1AyrulLFRX9 WWjRWBA0OlPsHaJsJ8d6S5mQLb4B+tk9ZNamCcJX97Wb/hCTcNVDfC6RJL7Nxgsm M29J7kHTc1l4A3EKvKEl/arZpPjskh17WjKnUoBw4mh0m3cphesISP6EdFvMl8Jt fCAGQA0S1rS+tYuXyMuwp0o3LvlBA+Vgqr1et+XHQy4w70uVOzzJi1JmlBkiw7Pr wudPbevZchQP0YRK1duFf2dZFo12w6ox8uzlto2LyqA2c9t+1bas3Hg9ijevc67S BhmUxwehUAIx14Unl2f+lLxMHlC8zPGokc7z3CmjZJaMBGRAnudtGvsgHoSKUfh6 /seE5s54mIgfmZtnymUj0N8iZ1sBT5e1H/M6Puya4RRssZZLNqx07u+PsWvvV6Mv ILoVbDSO/KsK43R4Evu5 =jy0O -----END PGP SIGNATURE-----
participants (4)
-
Georgi Guninski
-
Michael Best
-
Steve Kinney
-
The Doctor