protocol for high-profile dissenters to leak without being deaded/murdered/killed/eliminated/shot/heart-attacked etc
"Dum, ways to die, so many dum ways to die." https://www.youtube.com/watch?v=IJNR2EpS0jw and the latest version 2: https://www.youtube.com/watch?v=gXZhVyYS87A So, former Haitian government official, ready to expose Clinton corruption, found dead: http://theduran.com/former-haitian-government-official-ready-to-expose-clint... http://www.youtube.com/watch?v=2EqdA5FFpqM Yes, Hitlery Clinton's Haitian pedo network was going to be exposed, and the key leaker, of course, "mysteriously" dies. Who could possibly have predicted this? I mean, it's not like the DNC murdered Seth Rich and a dozen Clinton security guards over the years, right? There are some bloody dum people out there folks, and they need our help - at the very least, evidently, some firetrucking basic firetrucking training on HOW THE HELL TO LEAK! This is pissing me off - I mean at least Seth got his leak out before he was post-leakishly murdered, but Klaus Eberwein? Seriously spoke about his intention to leak, before actually leaking? WHAT THE FIRETRUCK IS WRONG WITH PEOPLE?!?!?!?!@##!@$!@#$!@#??!!!! That is just absolutely IN-FIRETRUCKING-INSANE !!! So, fellow cypherpunkers - this is our stock in trade! AND it's our DUTY OF CARE to our fellow humans, to spread the word on BASIC LEAKING PROTOCOL. A very rough draft of possible steps to take: - NEVER talk about your leak/whistleblowing, BEFORE doing it! - Leak your leak to MULTIPLE people simultaneously if possible - either publicly, and or by anonymous post (of documents, CDs, DVDs etc). - Plant a brief tell-all in an unlikely to be read book at the back corner of a public library, and TELL A TRUSTED PERSON that "if I die, go read this book, but not before". - Quietly get up to speed with some op-sec - ask a grandchild to teach you, go to a local computer user group meeting, etc - the basics are not so hard, so LEARN THEM YOURSELF! - Do a trial run of leaking with something newsworthy but RELATIVELY INNOCUOUS. Please add, suggest "hell no!"s etc. Seriously, we are in the middle of a war, and many folks need our help and actual assistance.
On Tue, Jul 18, 2017 at 11:11:54AM +1000, Zenaan Harkness wrote:
A very rough draft of possible steps to take:
- NEVER talk about your leak/whistleblowing, BEFORE doing it!
- Leak your leak to MULTIPLE people simultaneously if possible - either publicly, and or by anonymous post (of documents, CDs, DVDs etc).
- Plant a brief tell-all in an unlikely to be read book at the back corner of a public library, and TELL A TRUSTED PERSON that "if I die, go read this book, but not before".
- Quietly get up to speed with some op-sec - ask a grandchild to teach you, go to a local computer user group meeting, etc - the basics are not so hard, so LEARN THEM YOURSELF!
- Do a trial run of leaking with something newsworthy but RELATIVELY INNOCUOUS.
Please add, suggest "hell no!"s etc.
OK, here's a specific solution for this sad case of Klaus Eberwein who was murdered before being able to give his testimony: - If you're going to give testimony, first publicly release your affidavit, as follows: 1) write down all your testimony, including all dates and times etc 2) add all your evidence exhibits/ attachments 3) put the word AFFIDAVIT in big bold letters at the top of the first page, 4) After the heading, add the sentence: I, NAME, of ADDRESS, say/swear/affirm that the following is true and correct to the best of my knowledge: 5) After all your points/events and exhibit references, add the following sentence: "And I say these things in the knowledge that a person saying false things may be liable to the penalties for perjury." 6) At the end, add your signature, and get a Justice of the Peace to witness your signature (at the time you sign the document). Make many copies of this affidavit, plus all exhibits, and give, post, send, email around the place. The point is: if you're going to go public by exposing a pedofile network, your life is likely in danger and so you might as well really go public first, before giving testimony, before talking to a lawyer/lyer, before talking publicly about ANYTHING except that you FIRST put out your legally sound affidavit, PUBLICLY. A lawyer (and nay sayers) will often say "don't do that, you might jeopardize the court case" - all the more reason to get your affidavit public before even the hint of any court case. Whatever you thought you were going to say/affirm from the witness box, is essentially public after you've so said/affirmed/sworn, so you might as well MAKE IT PUBLIC before you are murdered for your stand for truth. ALSO, know that your phones are most likely all tapped in real time, if you have any legally significant knowledge of satanic child kidnapping networks, so to state the bleedingly obvious, if you contact a JP to get your signature witnessed, DON'T BLOODY TALK ABOUT WHAT IT IS YOU'RE GETTING WITNESSED ON THE PHONE - just invent something innocuous like "I need a power of attorney witnessed" or "can you witness a letter to the bank?" or something... Please spread the word! Activist whistleblowers, especially those with their phones tapped, need your support, and remember, SOME people who have attained public office, have actually done so with good intention - and without support and knowledge of how to stay alive in the face of their healthy intentions, their good intention will not manifest before they are murdered. Good luck,
On Tue, Jul 18, 2017 at 12:52:06PM +1000, Zenaan Harkness wrote:
On Tue, Jul 18, 2017 at 11:11:54AM +1000, Zenaan Harkness wrote:
A very rough draft of possible steps to take:
- NEVER talk about your leak/whistleblowing, BEFORE doing it!
- Leak your leak to MULTIPLE people simultaneously if possible - either publicly, and or by anonymous post (of documents, CDs, DVDs etc).
- Make sure that AT LEAST ONE of the people you leak to simultaneously, know how to get your leak to Wikileaks and the dark net, so that your leak persists in the case that you are posth-leakishly murdered!
- Plant a brief tell-all in an unlikely to be read book at the back corner of a public library, and TELL A TRUSTED PERSON that "if I die, go read this book, but not before".
- Quietly get up to speed with some op-sec - ask a grandchild to teach you, go to a local computer user group meeting, etc - the basics are not so hard, so LEARN THEM YOURSELF!
- Do a trial run of leaking with something newsworthy but RELATIVELY INNOCUOUS.
Please add, suggest "hell no!"s etc.
OK, here's a specific solution for this sad case of Klaus Eberwein who was murdered before being able to give his testimony:
- If you're going to give testimony, first publicly release your affidavit, as follows:
1) write down all your testimony, including all dates and times etc
2) add all your evidence exhibits/ attachments
3) put the word AFFIDAVIT in big bold letters at the top of the first page,
4) After the heading, add the sentence: I, NAME, of ADDRESS, say/swear/affirm that the following is true and correct to the best of my knowledge:
5) After all your points/events and exhibit references, add the following sentence: "And I say these things in the knowledge that a person saying false things may be liable to the penalties for perjury."
6) At the end, add your signature, and get a Justice of the Peace to witness your signature (at the time you sign the document).
Make many copies of this affidavit, plus all exhibits, and give, post, send, email around the place.
The point is: if you're going to go public by exposing a pedofile network, your life is likely in danger and so you might as well really go public first, before giving testimony, before talking to a lawyer/lyer, before talking publicly about ANYTHING except that you FIRST put out your legally sound affidavit, PUBLICLY.
A lawyer (and nay sayers) will often say "don't do that, you might jeopardize the court case" - all the more reason to get your affidavit public before even the hint of any court case.
Whatever you thought you were going to say/affirm from the witness box, is essentially public after you've so said/affirmed/sworn, so you might as well MAKE IT PUBLIC before you are murdered for your stand for truth.
ALSO, know that your phones are most likely all tapped in real time, if you have any legally significant knowledge of satanic child kidnapping networks, so to state the bleedingly obvious, if you contact a JP to get your signature witnessed, DON'T BLOODY TALK ABOUT WHAT IT IS YOU'RE GETTING WITNESSED ON THE PHONE - just invent something innocuous like "I need a power of attorney witnessed" or "can you witness a letter to the bank?" or something...
Please spread the word! Activist whistleblowers, especially those with their phones tapped, need your support, and remember, SOME people who have attained public office, have actually done so with good intention - and without support and knowledge of how to stay alive in the face of their healthy intentions, their good intention will not manifest before they are murdered.
Good luck,
Keep in mind any prominent leak site/dark net is thoroughly compromised, wittingly or unwittingly upstream, downstream, inside, outside. Not a few were, continue to be, established and run for that purpose, the rest evolved by publicity and notoriety into perfect nodes for capturing leakers, discovering networks (Tor a prime example), sending contaminated loads to recipients eager to receive material for which sources can be denied, or simply disclosed to officials through consultation, vetting, ass-covering after laundering through amateurishly secure drop boxes Reality Winner is merely one among many others gulled into believing what should be by now unbelievable due to insertion of loggers along transmission paths from suppressed leakers to highly advertised, incessantly bragging, outlets who never admit to being de facto honey pots. Outlets all too readily check with officials authenticity of material to protect themselves from being duped, burned, tricked by a range of parties out to disrupt the ancient practice of deception by "unauthorized" disclosure. Above all they aim to protect their financial stability, assured by government regulation, from attack. The bind leaks/secrets suffer from is converting from unknown by the public to known by the public. Far too much leaked is tampered with in the inevitably failure-proned process. Far too much leaked is based on blind faith in the inevitable insecurity of transfer from source to outlet. WikiLeaks has become the global leader in deception about leaks and the vulnerability leak sites and news outlets pose to leakers. Privileges of journalists in avoiding culpabililty is the fly in the ointment. As WikiLeaks reinvented itself as a journalistic operation to protect itself, it adopted the practices of government-bestowed-and-protected organizations, and in the process accepted self-serving corruption as inherent, indeed, essential, to survival. No need to have a formal relationship with authorities to betray and harm leakers, merely operate a highly publicized, promoted, bragging of security and transparency, albeit secret about itself, leak site, a watering hole in the desert for thirsty prey to seek. Not too soon to forego the nightmare of secure leak outlets.
- Make sure that AT LEAST ONE of the people you leak to simultaneously, know how to get your leak to Wikileaks and the dark net, so that your leak persists in the case that you are posth-leakishly murdered!
On 07/23/2017 08:55 AM, John Young wrote:
Keep in mind any prominent leak site/dark net is thoroughly compromised, wittingly or unwittingly upstream, downstream, inside, outside. Not a few were, continue to be, established and run for that purpose, the rest evolved by publicity and notoriety into perfect nodes for capturing leakers, discovering networks (Tor a prime example), sending contaminated loads to recipients eager to receive material for which sources can be denied, or simply disclosed to officials through consultation, vetting, ass-covering after laundering through amateurishly secure drop boxes
Reality Winner is merely one among many others gulled into believing what should be by now unbelievable due to insertion of loggers along transmission paths from suppressed leakers to highly advertised, incessantly bragging, outlets who never admit to being de facto honey pots.
Outlets all too readily check with officials authenticity of material to protect themselves from being duped, burned, tricked by a range of parties out to disrupt the ancient practice of deception by "unauthorized" disclosure. Above all they aim to protect their financial stability, assured by government regulation, from attack.
The bind leaks/secrets suffer from is converting from unknown by the public to known by the public. Far too much leaked is tampered with in the inevitably failure-proned process. Far too much leaked is based on blind faith in the inevitable insecurity of transfer from source to outlet.
WikiLeaks has become the global leader in deception about leaks and the vulnerability leak sites and news outlets pose to leakers. Privileges of journalists in avoiding culpabililty is the fly in the ointment. As WikiLeaks reinvented itself as a journalistic operation to protect itself, it adopted the practices of government-bestowed-and-protected organizations, and in the process accepted self-serving corruption as inherent, indeed, essential, to survival.
No need to have a formal relationship with authorities to betray and harm leakers, merely operate a highly publicized, promoted, bragging of security and transparency, albeit secret about itself, leak site, a watering hole in the desert for thirsty prey to seek.
Not too soon to forego the nightmare of secure leak outlets.
- Make sure that AT LEAST ONE of the people you leak to simultaneously, know how to get your leak to Wikileaks and the dark net, so that your leak persists in the case that you are posth-leakishly murdered!
Correct me if i am wrong, but my understanding is that Reality Winner essentially exposed her own activities by contacting the intercept using a NSA controlled and monitored network. She was one of a very few who printed out the document and then mailed a document with a barium meal to the intercept. The intercept verified the doc to the gov and they tracked Winner with the barium meal. I don't think the gov even needed to compromise networks or sites to catch her. -- Marina
On 07/23/2017 11:07 AM, Marina Brown wrote:
I don't think the gov even needed to compromise networks or sites to catch her.
I agree with that. I thought the government figured her out due to a steganographic watermark in the dox along with the short list of people who had accessed them, but I wasn't following carefully. Rr
On 07/23/2017 08:55 AM, John Young wrote:
Keep in mind any prominent leak site/dark net is thoroughly compromised, wittingly or unwittingly upstream, downstream, inside, outside. Not a few were, continue to be, established and run for that purpose, the rest evolved by publicity and notoriety into perfect nodes for capturing leakers, discovering networks (Tor a prime example), sending contaminated loads to recipients eager to receive material for which sources can be denied, or simply disclosed to officials through consultation, vetting, ass-covering after laundering through amateurishly secure drop boxes
Reality Winner is merely one among many others gulled into believing what should be by now unbelievable due to insertion of loggers along transmission paths from suppressed leakers to highly advertised, incessantly bragging, outlets who never admit to being de facto honey pots.
Outlets all too readily check with officials authenticity of material to protect themselves from being duped, burned, tricked by a range of parties out to disrupt the ancient practice of deception by "unauthorized" disclosure. Above all they aim to protect their financial stability, assured by government regulation, from attack.
The bind leaks/secrets suffer from is converting from unknown by the public to known by the public. Far too much leaked is tampered with in the inevitably failure-proned process. Far too much leaked is based on blind faith in the inevitable insecurity of transfer from source to outlet.
WikiLeaks has become the global leader in deception about leaks and the vulnerability leak sites and news outlets pose to leakers. Privileges of journalists in avoiding culpabililty is the fly in the ointment. As WikiLeaks reinvented itself as a journalistic operation to protect itself, it adopted the practices of government-bestowed-and-protected organizations, and in the process accepted self-serving corruption as inherent, indeed, essential, to survival.
No need to have a formal relationship with authorities to betray and harm leakers, merely operate a highly publicized, promoted, bragging of security and transparency, albeit secret about itself, leak site, a watering hole in the desert for thirsty prey to seek.
Not too soon to forego the nightmare of secure leak outlets.
- Make sure that AT LEAST ONE of the people you leak to simultaneously, know how to get your leak to Wikileaks and the dark net, so that your leak persists in the case that you are posth-leakishly murdered!
Correct me if i am wrong, but my understanding is that Reality Winner essentially exposed her own activities by contacting the intercept using a NSA controlled and monitored network. She was one of a very few who printed out the document and then mailed a document with a barium meal to the intercept. The intercept verified the doc to the gov and they tracked Winner with the barium meal.
I don't think the gov even needed to compromise networks or sites to catch her.
-- Marina
On 07/23/2017 02:13 PM, Razer wrote:
On 07/23/2017 11:07 AM, Marina Brown wrote:
I don't think the gov even needed to compromise networks or sites to catch her.
I agree with that. I thought the government figured her out due to a steganographic watermark in the dox along with the short list of people who had accessed them, but I wasn't following carefully.
Rr
Yes, that. First, Reality Winner outed herself by printing documents destined for leaking at the very office where she found them, unaware that digital printers watermark documents with a time stamp, the machine's serial number, etc. Then, The Intercept outed Reality Winner by publishing images including the said watermarks. Technically ignorant source > incompetent or malicious publisher > bad outcome. The Reality Winner affair reinforces my estimate that The Intercept was capitalized and promoted to fill the role of a controlled opposition propaganda outlet: A well funded shop whose claim to fame is publishing leaked documents has NO excuse for failing to sanitize watermarked documents before public release. Staff at the Intercept do not just hand off submitted docs to all comers - they select pages to publish, redact whatever bits of them they deem unfit for public consumption, and write articles telling their readers what they want them to believe. If one believes a word Glenn Greenwald says, The Intercept has denied the public access to something like 90% of the documents Ed Snowden handed off. The most important leaks attributed to Snowden by mainstream journalists apparently originated in Germany; they were handed to Spiegel for publication, not "Intercepted" by Greenwald's outfit. When I looked into the background of the Reality Winner story, it seemed that she was an unlikely candidate for State Security employment. Her apparently routine clearance and job placement made the most sense in the context of an entrapment exercise. The practical realities of the Information Age present problems to Secret Keepers that they can partly solve by creating their own leakers and high profile market outlets to publish "leaked" documents. This enables them to counter-balance the destructive impact of leaks by promoting their own faux-dissident narratives, and sweeping up many incautious would-be leakers and their documents. If State sponsored black propaganda outlets publishing "leaked" documents do not already exist, it will be necessary to create them: By definition this shall be done in plain sight of the whole world - that's what "propaganda" means. The Intercept has locked down leaked documents and outed leakers in plain sight. On the covert side, we have no idea how many people who have contacted The Intercept in an effort to hand off dangerous documents are presently detained at CIA black sites. Maybe none at all. :o/
On Sun, 23 Jul 2017 15:25:15 -0400 Steve Kinney <admin@pilobilus.net> wrote:
On 07/23/2017 02:13 PM, Razer wrote:
On 07/23/2017 11:07 AM, Marina Brown wrote:
I don't think the gov even needed to compromise networks or sites to catch her.
I agree with that. I thought the government figured her out due to a steganographic watermark in the dox along with the short list of people who had accessed them, but I wasn't following carefully.
Rr
Yes, that. First, Reality Winner outed herself by printing documents destined for leaking at the very office where she found them, unaware that digital printers watermark documents with a time stamp, the machine's serial number, etc. Then, The Intercept outed Reality Winner by publishing images including the said watermarks.
Technically ignorant source > incompetent or malicious publisher > bad outcome.
The Reality Winner affair reinforces my estimate that The Intercept was capitalized and promoted to fill the role of a controlled opposition propaganda outlet:
The intercept is a mildly entertaining joke. What I find most entertaining about it is how greenwald once in a while publishes a decent article denouncing 'fake news' while his employees publish a ton of fake news per week (current topic : soviet invation of the Free America). It's mildly entertaining, and completely crazy of course. Yes, the intercept is nothing but a propaganda outlet pwned by the paypal-ebay-US govt corporation. Or perhaps more accurately the intercept is a 'liberal' outlet, carrying something like 80% of left wing, fascist american propaganda and sometimes publishing stuff that deserves to be called liberal in the orinal sense of the word : defending personal rights against the govt.
A well funded shop whose claim to fame is publishing leaked documents has NO excuse for failing to sanitize watermarked documents before public release.
Staff at the Intercept do not just hand off submitted docs to all comers - they select pages to publish, redact whatever bits of them they deem unfit for public consumption, and write articles telling their readers what they want them to believe. If one believes a word Glenn Greenwald says, The Intercept has denied the public access to something like 90% of the documents Ed Snowden handed off.
The most important leaks attributed to Snowden by mainstream journalists apparently originated in Germany; they were handed to Spiegel for publication, not "Intercepted" by Greenwald's outfit.
When I looked into the background of the Reality Winner story, it seemed that she was an unlikely candidate for State Security employment. Her apparently routine clearance and job placement made the most sense in the context of an entrapment exercise.
The practical realities of the Information Age present problems to Secret Keepers that they can partly solve by creating their own leakers and high profile market outlets to publish "leaked" documents.
This enables them to counter-balance the destructive impact of leaks by promoting their own faux-dissident narratives, and sweeping up many incautious would-be leakers and their documents.
If State sponsored black propaganda outlets publishing "leaked" documents do not already exist, it will be necessary to create them: By definition this shall be done in plain sight of the whole world - that's what "propaganda" means.
The Intercept has locked down leaked documents and outed leakers in plain sight. On the covert side, we have no idea how many people who have contacted The Intercept in an effort to hand off dangerous documents are presently detained at CIA black sites. Maybe none at all.
:o/
participants (6)
-
John Young
-
juan
-
Marina Brown
-
Razer
-
Steve Kinney
-
Zenaan Harkness