Re: Autonomous Next Generation Leaks
Quite helpful suggestions. Probably should give up use of "leak" due to it becoming a marketing term, It now exaggerates, over-emphasizes content, "coutures," vaunts the predictable and traceable process from source to outlet. Public library could work, just deposit material in a place to be found, discovered, almost accidentally, belatedly, maybe never, or right away, rather than greedily hyped to the max by media monsters which twist the content to favor the commercial industry (including the promo-addled gov, NGO, op-ed, essay, speech, SM, mail lists, et al). Searching for and possibly sharing (or not) material on your own, at your own pace, at your own method, in a widely varying terrain, without spoon feeding by computer, print, TED, influencer, headliner, hustlers and promoters is far better because it limits external, highly-biased management of understanding and subsequent action. Marketing has fucked consumers (marketing term) online and offline, not just with illusory privacy and security, but by excluding and demeaning "unimportant" information. It deliberately distorts, okay, lies and thereby encourages consumers to do the same as normality. It may take an effort to overcome what "education" has instilled in its consumers about significance, obedience, careerism, language, technology, finance, arts, the works. Leaks scream, most often incoherently, and induce screaming and babbling in response. Silence is worth practicing, avoid being noticed, angered, goaded, offended and responsive behavior documented. Trust and truth these days are cheap desperate houswifey brands. So too democracy. At 07:51 PM 6/2/2019, you wrote:
Continuing... https://lists.cpunks.org/pipermail/cypherpunks/2019-June/075229.html
shut the fuck up
Unacceptable... this complicit architechting of immorality... preserving the thieving means, murderous lives, and lying facades of those pouring hostile architecture from articulated tentacles of concrete pumpers, the structures of secret and dishonest malactors, the puppetmasters safehouses, topped with feedhorns for amplifying their own wet dreams.
Tell what you know unfettered revelation, "dumping" and failing to abide the rules of rigging.
Much better... this weathering acid rain against the lime. Distributed anonymous tech offers additional options. Dump all, for all to see, and for none to takedown or filter. No redaction, but to preserve self for more action or escape. No gatekept interpreters, no contracted terms, no filtered pump and dumps, no clawbacks permitted. An unfound autonomous mole, if tis your delight, yet always prepared ahead for instant escape, a last deadman script ensuring redundant release of the Family Jewels liberated from their concrete and copper Presidios lit at night by sparkly fiber optic trees. The delivery girl, janitor, Lady of the Night, secretary, maintenance crew, executive director, computer nerd, brilliant analyst, or researcher... all can be equally effective in such operations. Perhaps data even distributed by speech in Central or Gorky Park, or the sprinkling of many Gigabytes on many USB's around the next cryptocurrency meetup, a distributed filestore retrieval hash sent via shitexpress.com message field to the haters for lols, whatever is interesting, leaving behind a whirlwind in the dust of your coattails. Take time, be safe from capture, survive... if that is of import. Is the point of leaking not impact toward whatever change may come... don't hold back, cut deep and let the cards fall.
https://www.counterpunch.org/2019/05/31/edward-who-the-snowden-affair-ends-w... Edward Who? The Snowden Affair Ends with a Whimper By Bill Blunden On May 31, 2019
âDo not send to those who tout secure drops, Tor, crypto-comms these are traceable, diagrammable via basic net transmission tech.â
Cryptome Itâs been more than six years since Edward Snowden went public. After all the breathless headlines, Hollywood movies, book deals, Pulitzer prizes, and glossy primetime biopics. What, pray tell, has come of it? For the average American bupkis. In fact, mass surveillance is actually growing by leaps and bounds. Such that those who wish to salvage the remnants of their individual privacy will be forced to make some tough choices in the years ahead.
Ed Snowden, holed up in Russia, has faded into history. At the forefront of the Snowden disclosures, the news outlet known as The Intercept has officially shuttered its archives. They made their moulah and moved on. And what of the considerable streak of confidential sources whoâve been thrown in the pokey? The editors arenât talking much about how that happened. In fact they seem more interested in selling people email servers in a box. Hey, is this web page supposed to be an advertisement or an article? In the era of social media it can be hard to tell the difference.
History offers a glimpse behind the curtain. During the early days of the Cold War it was common practice for the political leaders in the Soviet Union to purge the KGB every so often. Because over time Russian spymasters accrued enough political dirt and power that they threatened to take over. With the ascendance of Vladimir Putin one might argue that the rebranded KGB finally succeeded.
In a similar manner, American intelligence escaped the Snowden revelations largely unscathed. That, dear reader, ought to tell you something. Sure there was lots of grandstanding and feigned outrage. Sure CEOs made bold statements of renunciation (ahem, after being caught in bed with spies). Keeping the kayfabe alive, as Jesse Ventura might say. Rest assured, claims Apple CEO Tim Cook, your iPhone would never ever spy on you. Yeah, and the relationship between Silicon Valley and government spies is completely adversarial, they canât stand each other. Just like the blood feud Andre the Giant and Hulk Hogan back in the late 1980s. Uh-huh, just like that. A total farce which the media enables because thatâs what theyâre paid to do.
But ultimately what matters is concrete institutional change. And thereâs been zero of that, as in nada. Because genuine privacy threatens advertising revenue, quarterly returns, and spy power. And the elites want to keep the money train chugging along. Perhaps it no surprise then that the legislative response to Snowden was so watered down that one former spy chief publicly lampooned it. Letâs hear three cheers for state capture.
You can almost hear Otis Pike weeping in his grave.
Most advocates prefer to end their op-eds on a hopeful note. But sometimes hope is just a lightweight form of denial. The kind of âhopeâ that keeps Silicon Valley in business. Though itâs painful to concede, the spies at Fort Meade hit the nail on the head: weâre mostly zombies who pay for our own surveillance. Please go back and re-read the previous sentence. Short of a massive political upheaval things arenât going to change. Which means that, for the immediate future, the really big changes will have to take place on a personal level.
And so we arrive at the âtough choicesâ mentioned at the beginning. Members of the establishment often whine about discussing tradecraft because they believe that doing so might aid and abet terrorists. But the truth is that the channel of useful information is actually flowing in the opposite direction. From wanted fugitives to the public.
The kernel of an approach can be found out in the field. Where poor security is fatal. Hunted by the worldâs most formidable military, the head of ISIS is still alive thanks to solid operations security, also known as OPSEC. Abu Bakr al-Baghdadi is definitely a leader who appreciates OPSEC. According to the New York Times, âhe eschews all electronic devices, which could identify his location, and probably communicates through a series of couriers.â The key to staying vertical, then, is the process surrounding the couriers. How theyâre compartmented, screened, and arranged to create a resilient communication network. No doubt al-Baghdadi is aware that a flawed courier scheme was a significant factor in the downfall of Osama bin Laden.
Edward Snowden likes to promote strong cryptography. Leaving people with the notion that staying under the radar is a matter of leveraging a technical quick fix. But recent history shows that trusting your life to an allegedly secure communication platform is an act of faith. And not an advisable one, especially when state sponsored operators enter the picture. Achieving higher levels of security requires a disciplined process which is anything but a quick fix and which often entails giving up technology. Even cartel bosses learn this lesson: security technology fails. Both my design and by accident. Spies win either way.
On 6/3/19, John Young <jya@pipeline.com> wrote:
Probably should give up use of "leak" due to it becoming a marketing
"Leak" mostly sounds bad word, like time to call the plumber, fix the broken, squeeze off that rebel against authority. Needs to go through a rebranding into something sunshine, desireable, honourable, aspirational, protected, trusted.
Public library could work, just deposit material in a place to be found, discovered, almost accidentally, belatedly, maybe never, or right away
Library is fitting, a horde of reference material awaiting beside the Brittanicas, or that one copy of the Cryptonomicon, or Bitcoin for Dummies. Though if your point is to ensure it eventually hits the public news channels, or gets piped into verbatim digital distribution, there must be a highly redundant number of copies distributed... since many finders of it, including librarians, will either keep it beyond time of relavance, destroy it in fear, or give it to authorities... thus nullifying all your efforts.
rather than greedily hyped to the max mail lists, et al
Searching for and possibly sharing material on your own, at your own pace, at your own method, in a widely varying terrain it limits external, highly-biased management of understanding and subsequent action.
DarkOverlord had a little run in the digital realm, probably tripped up and got caught grandstanding like many others.
Marketing has fucked consumers (marketing term) encourages consumers to do the same as normality. It may take an effort to overcome what "education" has instilled in its consumers about
TV weaponized programming, yet curiously researchable for developing optimum delivery of your own. If direct appeal would fail, subvert and lead them, from the inside out.
Leaks scream, most often incoherently, and induce screaming and babbling in response. Silence is worth practicing, avoid being noticed, Trust and truth
Indeed, the only voice should be the data itself. Let it scream forth.
participants (2)
-
grarpamp
-
John Young