Assange Journalism

Steve Kinney admin at pilobilus.net
Mon Nov 26 14:48:22 PST 2018



On 11/26/18 3:06 PM, juan wrote:
> On Mon, 26 Nov 2018 00:01:39 -0500
> Steve Kinney <admin at pilobilus.net> wrote:


>> how about the hatchet job his partner in crime,
>> Laura Poitras, did on both IO Error and Mendax in her Risk film?  Random
>> spiteful bitch, or faithful CIA asset?  Either way, fat USIC paycheck
>> and/or mega-cred in toxic pseudo-feminist circles accomplished.  
> 
> 	pseudo-feminist? Not at all. They all are true feminists and they all are feminazis. Those two words are synonymous. 
> 

The "feminazis" you refer to do exist; they originated in the New Left,
a USIC political warfare project intended to displace and discredit
Pacifist and Liberal voices in broadcast media during the Vietnam War.
The folks who started the "feminazi" bullshit were from that same crew.

The project was successful, and after the war the New Left never went
away.  They kept working their professional networks and press contacts,
and re-emerged as the Progressives in the late 70s - early 80s.  They
now own and operate the DNC, and through that org, most of the
Democratic Party.

Real feminists also exist.  They typically associate with anarchists and
their ilk, and one finds plenty of them in Occupy-related activist orgs.
 Check Emma Goldman, Lucy Parsons and Simone de Beauvoir for background
on "real" feminism.

>>
>> How was Snowden's choice of Greenwald assured, and was his life in
>> danger up to the moment he chose the right non-journalist to pass his
>> docs off to? 
> 
> 	he gave copies to different journos apart from greenwald I believe? 

If so, neither he nor anyone else has ever said so.  The Snowden Saga,
if at all factual, leaves no room for that to have happened.

>> How long did it take him to realize he had been played -
>> or has he even figured that out yet?  
> 	
> 	played how? snowden constantly parrots that journos have the divine right to filter whatever information reaches the serfs.


Played how?  Spotted early by the fairly massive Insider Threat programs
at NSA, initiated in response to Chelsea Manning's work.  They may have
fed him specific documents, kept away from others, transferred him from
job to job as necessary to facilitate that process.  He may have also
been monitored and/or manipulated through his girlfriend, who has joined
him in exile - which makes little sense, unless she had something to
hide, and/or run from, here in the U.S.

I figure Snowden for too dumb to 'leak correctly,' but too smart not to
play along once he became an object of property physically passed around
between ruling class factions.

>> A funny thing happened to the allegedly thousands of documents Ed handed
>> to Glenn for publication:  After promising Snowden he would release all
>> the docs within ten days of breaking the first big story, 
> 
> 
> 	did he promise that? That doesn't sound realistic given the fact that snowden supports censorship-by-journo. 

So at least one article published within days of the Prism release said.
 Over the next week the reported number of documents given to Greenwald
rose very fast, as Greenwald's story changed.  I kept very close track
of available information during that time frame; this article I wrote
back then be of some historical interest:

http://www.globalresearch.ca/nsa-deception-operation-questions-surround-leaked-prism-documents-authenticity


"By his own account, Snowden often discussed perceived Agency wrongdoing
with his co-workers, which suggests that he should have been profiled
and flagged as a potential leaker by the NSA’s internal surveillance
process."

> 	Regardless, I believe/would assume that snowden gave the docs to different redundant  parties because 'trusting' a single guy like greenwald is pretty stupid, and snowden is anything but stupid. 
> 

To date, no "missing" Snowden docs have turned up anywhere.  Considering
their cash value to any reporter who has an "exclusive" on any of them,
that seems very unlikely if any did exist.

>  
>> All I know for sure about the Snoweden Affair is that once the dust
>> settled, the U.S. intelligence community got everything it wanted: 
> 
> 	yeah. Not sure if snowden contributed to that or it's just that his leak was useless in the grand scheme of things. 

Anything but useless:  Whether or not Snowden was in on the game, the
Snowden Affair accomplished important IC objectives, solidifying their
power as an autocratic branch of government answerable to no one but
themselves.


>> 1)  Use an extraordinary physical security protocol to upload an
>> encrypted archive of your docs to the I2P torrent network.  Clues:  You
>> need a "clean" laptop from a flea market, a home made high gain antenna,
>> and a conveniently located open WiFi hot spot.  Don't forget to scramble
>> your MAC address before plugging in the antenna.  Include one or more
>> "medium value" docs in the clear, to assure interest in your uploaded
>> archive.  In your description of the torrent, promise the key will be
>> published under the same user name within a given time frame.
>>
>> 2)  A few days later, use the same security protocol, from a location at
>> least hundreds of miles away from your first upload site, to post the
>> key (a pass phrase, see diceware.com) on the same torrent tracker site
>> in I2P space.
> 
> 
> 	Not sure what the point of publishing the key later is, especially if you first published some stuff in the clear? When you publish stuff in the clear you are marking yourself as a target? 
> 
> 	The two steps process is to avoid getting caught while uploading the bulk of the data? 

Mostly to create extra interest in the archive's contents:  Woo, big
mystery!

The leaker can passively observe activity on the tracker(s) and in
related forums, and release the key when it appears that the docs have
spread too far to hunt down and eradicate.  In a case where the content
of the archive would constitute a "national emergency" in the eyes of
our intelligence services, best to avoid starting that firestorm until
they are in at least dozens of hands, scattered around the world, to
light that fire.

Anyone clever enough to do any of the above, will find ways to improve
on it:  For instance nested encrypted archives, where peeling each layer
open yields more valuable documents than the layer before.  What new
wonders will the next key reveal?!

One could even SELL the last key for a healthy chunk of BTC, although
(nyah ha) maybe that last zip.gpg archive only has PDFs of some old MAD
Magazines, as a gesture of contempt for anyone willing to pay big money
for an "exclusive."  It may be possible to sell /several/ copies of the
same key to competing bidders.  Nobody in a position to pay would be in
a big hurry to tell the world they got chumped.

:o)






-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: OpenPGP digital signature
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20181126/5f11073a/attachment-0002.sig>


More information about the cypherpunks mailing list