Autonomous Next Generation Leaks
Continuing... https://lists.cpunks.org/pipermail/cypherpunks/2019-June/075229.html
shut the fuck up
Unacceptable... this complicit architechting of immorality... preserving the thieving means, murderous lives, and lying facades of those pouring hostile architecture from articulated tentacles of concrete pumpers, the structures of secret and dishonest malactors, the puppetmasters safehouses, topped with feedhorns for amplifying their own wet dreams.
Tell what you know unfettered revelation, "dumping" and failing to abide the rules of rigging.
Much better... this weathering acid rain against the lime. Distributed anonymous tech offers additional options. Dump all, for all to see, and for none to takedown or filter. No redaction, but to preserve self for more action or escape. No gatekept interpreters, no contracted terms, no filtered pump and dumps, no clawbacks permitted. An unfound autonomous mole, if tis your delight, yet always prepared ahead for instant escape, a last deadman script ensuring redundant release of the Family Jewels liberated from their concrete and copper Presidios lit at night by sparkly fiber optic trees. The delivery girl, janitor, Lady of the Night, secretary, maintenance crew, executive director, computer nerd, brilliant analyst, or researcher... all can be equally effective in such operations. Perhaps data even distributed by speech in Central or Gorky Park, or the sprinkling of many Gigabytes on many USB's around the next cryptocurrency meetup, a distributed filestore retrieval hash sent via shitexpress.com message field to the haters for lols, whatever is interesting, leaving behind a whirlwind in the dust of your coattails. Take time, be safe from capture, survive... if that is of import. Is the point of leaking not impact toward whatever change may come... don't hold back, cut deep and let the cards fall. https://www.counterpunch.org/2019/05/31/edward-who-the-snowden-affair-ends-w... Edward Who? The Snowden Affair Ends with a Whimper By Bill Blunden On May 31, 2019 “Do not send to those who tout secure drops, Tor, crypto-comms – these are traceable, diagrammable via basic net transmission tech.” –Cryptome It’s been more than six years since Edward Snowden went public. After all the breathless headlines, Hollywood movies, book deals, Pulitzer prizes, and glossy primetime biopics. What, pray tell, has come of it? For the average American – bupkis. In fact, mass surveillance is actually growing by leaps and bounds. Such that those who wish to salvage the remnants of their individual privacy will be forced to make some tough choices in the years ahead. Ed Snowden, holed up in Russia, has faded into history. At the forefront of the Snowden disclosures, the news outlet known as The Intercept has officially shuttered its archives. They made their moulah and moved on. And what of the considerable streak of confidential sources who’ve been thrown in the pokey? The editors aren’t talking much about how that happened. In fact they seem more interested in selling people email servers in a box. Hey, is this web page supposed to be an advertisement or an article? In the era of social media it can be hard to tell the difference. History offers a glimpse behind the curtain. During the early days of the Cold War it was common practice for the political leaders in the Soviet Union to purge the KGB every so often. Because over time Russian spymasters accrued enough political dirt and power that they threatened to take over. With the ascendance of Vladimir Putin one might argue that the rebranded KGB finally succeeded. In a similar manner, American intelligence escaped the Snowden revelations largely unscathed. That, dear reader, ought to tell you something. Sure there was lots of grandstanding and feigned outrage. Sure CEOs made bold statements of renunciation (ahem, after being caught in bed with spies). Keeping the kayfabe alive, as Jesse Ventura might say. Rest assured, claims Apple CEO Tim Cook, your iPhone would never ever spy on you. Yeah, and the relationship between Silicon Valley and government spies is completely adversarial, they can’t stand each other. Just like the blood feud Andre the Giant and Hulk Hogan back in the late 1980s. Uh-huh, just like that. A total farce which the media enables because that’s what they’re paid to do. But ultimately what matters is concrete institutional change. And there’s been zero of that, as in nada. Because genuine privacy threatens advertising revenue, quarterly returns, and spy power. And the elites want to keep the money train chugging along. Perhaps it no surprise then that the legislative response to Snowden was so watered down that one former spy chief publicly lampooned it. Let’s hear three cheers for state capture. You can almost hear Otis Pike weeping in his grave. Most advocates prefer to end their op-eds on a hopeful note. But sometimes hope is just a lightweight form of denial. The kind of “hope” that keeps Silicon Valley in business. Though it’s painful to concede, the spies at Fort Meade hit the nail on the head: we’re mostly zombies who pay for our own surveillance. Please go back and re-read the previous sentence. Short of a massive political upheaval things aren’t going to change. Which means that, for the immediate future, the really big changes will have to take place on a personal level. And so we arrive at the “tough choices” mentioned at the beginning. Members of the establishment often whine about discussing tradecraft because they believe that doing so might aid and abet terrorists. But the truth is that the channel of useful information is actually flowing in the opposite direction. From wanted fugitives to the public. The kernel of an approach can be found out in the field. Where poor security is fatal. Hunted by the world’s most formidable military, the head of ISIS is still alive thanks to solid operations security, also known as OPSEC. Abu Bakr al-Baghdadi is definitely a leader who appreciates OPSEC. According to the New York Times, “he eschews all electronic devices, which could identify his location, and probably communicates through a series of couriers.” The key to staying vertical, then, is the process surrounding the couriers. How they’re compartmented, screened, and arranged to create a resilient communication network. No doubt al-Baghdadi is aware that a flawed courier scheme was a significant factor in the downfall of Osama bin Laden. Edward Snowden likes to promote strong cryptography. Leaving people with the notion that staying under the radar is a matter of leveraging a technical quick fix. But recent history shows that trusting your life to an allegedly secure communication platform is an act of faith. And not an advisable one, especially when state sponsored operators enter the picture. Achieving higher levels of security requires a disciplined process which is anything but a quick fix and which often entails giving up technology. Even cartel bosses learn this lesson: security technology fails. Both my design and by accident. Spies win either way.
On 6/2/19 7:51 PM, grarpamp wrote: [...]
It’s been more than six years since Edward Snowden went public. After all the breathless headlines, Hollywood movies, book deals, Pulitzer prizes, and glossy primetime biopics. What, pray tell, has come of it? For the average American – bupkis. In fact, mass surveillance is actually growing by leaps and bounds. Such that those who wish to salvage the remnants of their individual privacy will be forced to make some tough choices in the years ahead.
Every public conflict and controversy set in motion by the Snowden Affair arrived at the same conclusion: A decisive win for the U.S. intelligence community. Examples: Per precedents set, the NSA may now 'hack into' computers used by Congressional staff members at will, and lie to Congress under oath, with no consequences other than getting whatever results they want. Our No Such Agency could not have gotten better results if they handed Snowden exactly what they wanted published, and assured he gave everything he had to agents under their own direct control. Thanks to Global Research, I get to say I told you so, just days after the Snowden Affair jumped into the headlines: https://www.globalresearch.ca/nsa-deception-operation-questions-surround-lea...
The kernel of an approach can be found out in the field. Where poor security is fatal. Hunted by the world’s most formidable military, the head of ISIS is still alive thanks to solid operations security, also known as OPSEC. Abu Bakr al-Baghdadi is definitely a leader who appreciates OPSEC. According to the New York Times, “he eschews all electronic devices, which could identify his location, and probably communicates through a series of couriers.” The key to staying vertical, then, is the process surrounding the couriers. How they’re compartmented, screened, and arranged to create a resilient communication network. No doubt al-Baghdadi is aware that a flawed courier scheme was a significant factor in the downfall of Osama bin Laden.
Ah, good old fashioned ... should we call it "disinformation" or Big Lie propaganda? I guess that depends the context and audience. ISIS, the mercenary army formerly known as Al Qaida, was founded by Zbigniew Brzezinski during the Carter Administration as a deniable channel to funnel arms and intelligence to anyone interested in kicking Soviet ass in Afghanistan. In an amazing series of coincidences, the actions of Al Qaida by any name have always directly advanced the agendas of U.S. Security State oligarchs and their radical fringe right wing extremist DemoPublican political partners. Abu Bakr al-Baghdadi, if any such person exists, will continue to work hand in glove with U.S. three letter agencies as long as he lives, because reasons: Whatever inducements prompted him to join up, and a desire to stay alive. As for our Mr. Bin Ladin, the fog of war makes it difficult to say with certainty that he died of complications secondary to kidney failure in the mountains of eastern Afghanistan during the winter of 2001-2; if not, he most likely remains alive. The guy Seal Team Six murdered shortly before getting murdered themselves had "wrong place, wrong time" problems.
Edward Snowden likes to promote strong cryptography. Leaving people with the notion that staying under the radar is a matter of leveraging a technical quick fix. But recent history shows that trusting your life to an allegedly secure communication platform is an act of faith. And not an advisable one, especially when state sponsored operators enter the picture. Achieving higher levels of security requires a disciplined process which is anything but a quick fix and which often entails giving up technology. Even cartel bosses learn this lesson: security technology fails. Both my design and by accident. Spies win either way.
Quite so: Cryptographic tools and manipulated network comms have potential uses in the context of larger and much more time/energy intensive operational security a.k.a. 'tradecraft' strategies. But never as a substitute for deception and misdirection, physical security techniques, etc. First time amateur 'operatives' may stand a chance of getting away with leaking high value confidential documents and information - if nothing connects them, more than hundreds of other people, with that information; if they come up with clever strategies to disassociate themselves from that information's escape into the wild (ideally, an obvious target of opportunity the leak will get blamed on); drop everything at one go with no advance warning to anyone living or dead; then go on with their lives exactly as if they know nothing about what happened.
On Sun, 2 Jun 2019 19:51:12 -0400 grarpamp <grarpamp@gmail.com> wrote:
Distributed anonymous tech offers additional options.
what systems are you talking about, exactly? The only 'distributed anonymous' thing I'm aware of is freenet, a system which was specifically designed to handle distribution of information in 'oppressive regimes' As far as I know there's no other project like freenet. And I'm not saying freenet works. if you're going to use google-NSA to come up with a bunch of links please don't. Or better, review them first and then post something which isn't complete vaporware.
participants (3)
-
grarpamp
-
Punk
-
Steve Kinney