protocol for high-profile dissenters to leak without being deaded/murdered/killed/eliminated/shot/heart-attacked etc

Marina Brown catskillmarina at gmail.com
Sun Jul 23 11:07:50 PDT 2017


On 07/23/2017 08:55 AM, John Young wrote:
> Keep in mind any prominent leak site/dark net is thoroughly compromised,
> wittingly or unwittingly upstream, downstream, inside, outside. Not a few
> were, continue to be, established and run for that purpose, the rest
> evolved
> by publicity and notoriety into perfect nodes for capturing leakers,
> discovering
> networks (Tor a prime example), sending contaminated loads to recipients
> eager to receive material for which sources can be denied, or simply
> disclosed
> to officials through consultation, vetting, ass-covering after
> laundering through
> amateurishly secure drop boxes
> 
> Reality Winner is merely one among many others gulled into believing
> what should be by now unbelievable due to insertion of loggers along
> transmission paths from suppressed leakers to highly advertised,
> incessantly bragging, outlets who never admit to being de facto
> honey pots.
> 
> Outlets all too readily check with officials authenticity of material to
> protect
> themselves from being duped, burned, tricked by a range of parties out to
> disrupt the ancient practice of deception by "unauthorized" disclosure.
> Above all they aim to protect their financial stability, assured by
> government
> regulation, from attack.
> 
> The bind leaks/secrets suffer from is converting from unknown by the
> public to known by the public. Far too much leaked is tampered with
> in the inevitably failure-proned process. Far too much leaked is based
> on blind faith in the inevitable insecurity of transfer from source to
> outlet.
> 
> WikiLeaks has become the global leader in deception about leaks
> and the vulnerability leak sites and news outlets pose to leakers.
> Privileges of journalists in avoiding culpabililty is the fly in the
> ointment.
> As WikiLeaks reinvented itself as a journalistic operation to protect
> itself, it adopted the practices of government-bestowed-and-protected
> organizations, and in the process accepted self-serving corruption as
> inherent, indeed, essential, to survival.
> 
> No need to have a formal relationship with authorities to betray and
> harm leakers, merely operate a highly publicized, promoted, bragging
> of security and transparency, albeit secret about itself, leak site,
> a watering hole in the desert for thirsty prey to seek.
> 
> Not too soon to forego the nightmare of secure leak outlets.
> 
> 
> 
>> - Make sure that AT LEAST ONE of the people you leak to
>>   simultaneously, know how to get your leak to Wikileaks and the dark
>>   net, so that your leak persists in the case that you are
>>   posth-leakishly murdered!
> 
> 
> 

Correct me if i am wrong, but my understanding is that Reality Winner
essentially exposed her own activities by contacting the intercept using
a NSA controlled and monitored network. She was one of a very few who
printed out the document and then mailed a document with a barium meal
to the intercept. The intercept verified the doc to the gov and they
tracked Winner with the barium meal.

I don't think the gov even needed to compromise networks or sites to
catch her.

-- Marina

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20170723/f103944c/attachment-0002.sig>


More information about the cypherpunks mailing list