Re: Facebook Users can now Appeal Freedom of Speech... to Facebook [2x down again]

2019-09-19 Thread Steve Kinney


On 9/19/19 2:24 AM, grarpamp wrote:
> https://arstechnica.com/tech-policy/2019/09/facebook-plans-launch-of-its-own-supreme-court-for-handling-takedown-appeals/
> https://fbnewsroomus.files.wordpress.com/2019/09/letter-from-mark-zuckerberg-on-oversight-board-charter.pdf
> https://fbnewsroomus.files.wordpress.com/2019/09/oversight_board_charter.pdf
> 
> Notice how the "users" column in Ars article has only one
> "right" and function "granted" to them by FB...: "beg and plead"
> 
> Just like how you can "petition" your "government" or some
> supposedly "independant" branch of its tax paid slaves therein,
> for a "redress of grievances", such as say... taxation,
> or police brutality, or zoning, or ... anything,
> even right to freedom from their arbitrary rule over you.

It appears to me that The Facebook recently modified its content
censorship policy for 'hate speech' and 'offensive speech.'

Formerly, someone who wanted to shut another user the fuck up would
report their posts as TOS violations, and someone - probably a
contractor with very limited English literacy - would glance at the
reported post and click a 'ban button.'  First offense, three days
locked out of posting.  Second offense within a given window of time,
seven days locked out.  Third offense within a given window, indefinite
suspension and/or account termination.

But as of a week or 10 days ago, the 'ban button' seems to produce a
different result:  A new error message replaces the reported post, which
I would guess still looks normal to the user who made the post.  I have
reasonable confidence that the new error message indicates a censored
post, because so far the users whose posts I have seen replaced by the
error message have a consistent history of posting stuff that skates
right up to the edge of Facebook TOS violation; so far I have not seen
an exception.

Simple explanation:  Users banned from posting largely abandon The
Facebook during their bans, and so generate little or no ad revenue or
(direct) surveillance data in those time frames.  Presenting false error
messages permits a lower threshold of censorship, without increasing
controversy over censorship itself or reducing The Facebook's per-user
revenues.

So far I can only speculate.  But now that I have posted this, I should
remember to ASK the original posters about the content of "error message
posts." Oddly enough, these posts often have one or two visible replies
(not referencing the error message) which would enable affected users to
identify the posts in question - once informed that their posted content
/has/ silently vanished.








signature.asc
Description: OpenPGP digital signature


Re: Jim Bell says: "I got stuck in prison for 13 years and Pamela Anderson didn't visit me ONCE!!!"

2019-09-09 Thread Steve Kinney


On 9/7/19 3:02 PM, Punk wrote:
> On Sat, 07 Sep 2019 08:20:26 -0700
> Razer  wrote:
> 
>> Because libertarians don't meet her ethical or erotic standards
> 
>   isn't assange a libertarian? 

That "is" business presents lots of pitfalls, especially when applied to
humans.  Assange certainly represents himself as anti-authoritarian, and
his actions speak way louder than his words on that front.

But our Libertarians present as crypto-fascists, given that implementing
their utopian visions would only remove the few restraints on our
present rulers, shifting the balance of power in society even further in
their direction.  Note that by "rulers" I mean folks like the 500
billionaires who presently own 1/2 the capital assets in the United
States, population 360 million or so.  "It takes about 3/4 million
peasants to support one dominant billionaire."  Not shocked yet?  Check
out this simple graph of U.S. income distribution, scaled relative to
familiar physical objects:

http://lcurve.org

Assange does pay attention to political power in a process oriented
perspective.  See his "The non linear effects of leaks on unjust systems
of governance" ( https://cryptome.org/0002/ja-conspiracies.pdf ).  So I
doubt he could identify with the "Rand Fan" version of Libertarianism.
That leaves Anarchism.

Some anarchists do call themselves Libertarian, to avoid personal
blowback from the demonization of anarchists - one of the few propaganda
lines /all/ repressive States agree on - but somehow that don't sound
like our Mendax.  He does seem to favor the rights of local communities
over those of absentee landlords, which strikes me as an
anti-Libertarian position.

Like the Marxists before them, Libertarians present their proposed
changes as a bridge to Utopian anarchy.  But a familiar model involving
Lucy, Charlie Brown and a football seems to fit both cases...

:o/







signature.asc
Description: OpenPGP digital signature


Re: This is BS

2019-09-09 Thread Steve Kinney


On 9/7/19 3:43 PM, Ryan Carboni wrote:
> So, Mr. Bond, you’ve been found in a place you’re not wanted. Does
> anyone know you’re here? 

Let me guess:  This post was in reply to one from a person (or
chatterbot?) I killfiled years ago?

:o)





signature.asc
Description: OpenPGP digital signature


Re: The cultural turn in intelligence studies

2019-08-22 Thread Steve Kinney


On 8/21/19 11:56 PM, Razer wrote:

[...]

> You'll note the one recurring theme throughout the whole series. There was NO 
> ONE #6 could trust. Ever. On reading Steve's details I've seen slightly 
> different show creation narratives but one thing I know... McGoohan was 
> DRIVEN to do this. He was willing to fund it out of his own pocket if 
> necessary. Whatever that 'argument with the chief' was about in the last 
> episode (all you hear is thunder) was in some way, irl, connected to his 
> drive to get the prisoner on the air.

During production of the Danger Man series, McGoohan demanded and got a
lot of creative control.  Drake's failure to adhere to prevailing
stereotypes was largely McGoohan's doing, as was the general trend
toward realism in Danger Man scripts, relative to other popular spy
fiction.

McGoohan avoided personal publicity and his private life was anything
but an open book; but what he did say when he spoke as himself indicated
anarchist or at least libertarian leanings. As a consummate professional
McGoohan no doubt did his homework, learning as much as he could about
how real intelligence services do their business.  He obviously did not
like what he saw.

I view The Prisoner in part as a report on what MeGoohan learned about
the spy business and its role in society, and in part as anti-recruiting
propaganda targeting that industry.  My take-away from The Prisoner?
Cooperate with any intelligence service and:

1)  You will not know who your real employers are.

2)  You will not know your employers real intentions.

3)  Your contributions will always and only do harm.

4)  They will dispose of you when your usefulness to them ends.

The above may not apply so much to people from the "best families" who
serve managerial roles (back during WWII the initials 'OSS' were
sometimes said to stand for 'Oh So Social'), but rank and file
intelligence officers and agents (i.e. intelligence professionals and
witting or witless dupes under their direction) present as cheap,
expendable supply items.

Why did the closing credits of Fallout, the last Prisoner episode,
indicate that Number Six was played by The Prisoner?  Maybe just that
the series was a difficult and demanding project, and McGoohan felt like
celebrating getting it done and over with.

:o)







signature.asc
Description: OpenPGP digital signature


Re: The cultural turn in intelligence studies

2019-08-20 Thread Steve Kinney
after only two episodes were produced, for reasons that remain unclear.
 McGoohan and Danger Man script editor George Markstein already had a
new project in mind: The Prisoner.

To avoid licensing issues - and promote the mystique of the new series -
McGoohan and the production staff for The Prisoner always pointedly
denied that Number 6 was John Drake.  But if our Number 6 was anyone
else, Drake must have had a twin with identical attitudes, personality
and occupational experience.  Why did Drake resign from M6, and why was
this question the constant theme of attempts by his captors to break him
down?  If I told you I would have to kill you.  We are advised that
"questions are a burden to others, answers a prison for oneself."

Many viewers were disappointed by The Prisoner's two-part series
conclusion, Once Upon A Time and Fall Out:  Even compared to the other
Prisoner episodes they are rather bizarre.  Those who know what the word
"allegory" means won't be disappointed, if they are in a mood for a
story told in a series of events that point toward psychological,
political and perhaps even autobiographical paths to the solution of
Drake's enigma.  At the end of the final episode, the closing credits
show that Number 6 was played by "The Prisoner" rather than Patrick
McGoohan.  I have my own suspicions about this final touch of quirky
humor, but "a still tongue makes a happy life."

Both The Prisoner and Danger Man are available as commercial DVD sets
and, of course, via covert channels on the usual networks.

Be seeing you!

A note from your Citizen's Advice Bureau:

Unsolved mysteries in The Prisoner include the correct sequence of the
episodes:  They were produced out of order for logistical reasons, and
delays in production interrupted the series' original broadcast run.
The first episode and the final two are obviously in their right places,
but the rest?  Detailed analysis of the content of the episodes
themselves provides some clues, and this order from a project published
by Six Of One is very satisfactory:

01 - Arrival
02 - Dance Of The Dead
03 - Free For All
04 - The Chimes Of Big Ben
05 - Checkmate
06 - The General
07 - A B & C
08 - The Schizoid Man
09 - Many Happy Returns
10 - Living In Harmony
11 - A Change Of Mind
12 - Hammer Into Anvil
13 - Do Not Forsake Me Oh My Darling
14 - It's Your Funeral
15 - The Girl Who Was Death
16 - Once Upon A Time
17 - Fallout - Series Finale

Prior acquaintance with John Drake enables us to view The Prisoner in
its native context.  These episodes of Danger Man provide a well rounded
introduction to the fictional man behind the famous number:

Episode 52 - That's Two Of Us Sorry:  Drake investigates a theft of
nuclear research secrets that leads him into morally hazardous human
terrain.

Episode 54 - Whatever Happened to George Foster:  Drake catches a
respected NGO doing dirty politics in Latin America, leading to a
personal war against Establishment adversaries at home.

Episode 57 - The Ubiquitous Mr. Lovegrove:  Foreshadowing the surrealism
of The Prisoner, Drake battles a hostile spy ring's recruitment front
while slightly out of his mind.

Episode 58 - It's Up To The Lady:  A realistic spy story about
retrieving a defector by using his wife for leverage, with a
too-realistic twist.

Episode 70 - The English Lady Takes Lodgers:  Sometimes a spy yarn is
only a spy yarn, and sometimes Drake's occupation permits him to play
the perfect knight.

Episode 74, To Our Best Friend:  McGoohan directs this episode which
pits Drake against his employers from beginning to end.

Episode 84 - The Not-So-Jolly Roger:  A conventional period spy story in
a most unconventional period setting:  Filmed on location at Pirate
Radio 390, Red Sands Fort.



(c) Steve Kinney 2014, published under under Creative Commons By-SA-NC
License


Re: Area 51: 1M to Storm Area 51 in Massive Naruto Run to See Them Aliens

2019-07-14 Thread Steve Kinney


On 7/13/19 12:14 PM, grarpamp wrote:
> https://edition.cnn.com/2019/07/11/us/alien-march-facebook-event-trnd/index.html
> https://www.facebook.com/events/448435052621047/
> 
> Storm Area 51, They Can't Stop All of Us
>   
> Friday, 20 September 2019 from 03:00-06:00 PDT
> Area 51
> Amargosa Valley, Nevada 20908
> 662K going · 614K interested
> We will all meet up at the Area 51 Alien Center tourist attraction and
> coordinate our entry. If we naruto run, we can move faster than their
> bullets. Lets see them aliens.

As a wargamer this amuses me to no end.  General Jack D. Ripper's troops
at "the battle of" Burpleson AFB come to mind.  But today's Generals
have both the training and the inclination for Corporate thought, and
they have to see this silliness as a major expense:  Start with direct
costs of crowd control preparations, add indirect costs including
administrative and operational overhead secondary to "chaos outside the
base."  CI people will view the turmoil caused by the tinfoil turnout as
a source of targets of opportunity for opposition espionage assets to
exploit.

So at least the Storm Area 51 thing will annoy the hell out of Uncle
Sam's boys & girls, and cost the public a medium sized fortune; that's
worth doing for its own sake.

I do see a bit more here than a comedy version of civil disobedience.
Big Brother gets a lovely field exercise in crowd control - a chance to
use all that cop equipment that's just been piling up in armories,
parking lots, warehouses... and a chance to redefine rules of
engagement.  The near-uniform fanatical loyalty of the crowd to that
Trump person presents some potentially amusing optics:  Faithful MAGA
Patriots arrested and transported en masse!

In real life I expect Nevada National Guard to meet the crowd, if any,
outside the base fence with lots of borrowed prison busses lined up and
ready for transportees.  The inherent unpredictability of network
mediated crowd surges would mandate over-preparation on the defender's
side - swarms move faster than requisition orders.

The invading force, if any, will contain a critical mass of individuals
who think 4G network signals permanently injure and even kill people.
We know that, because many of them sit for hours daily with their mobile
phones out, typing rants and getting into arguments about the deadly
dangers of cell phone signals. I think this presents as the invading
forces' Achilles heel.

On the Federal side of the fence, I would look into deploying microwave
fences and crowd control weapons (or pretending to truck them in, if
already built into the landscape).  Considering the physical terrain and
the need to avoid adverse publicity by causing grave physical harm to
wily invaders, I don't see how General Ripper & Co. could say no to
this, once informed that the option stands open.  Hell, just SAY you are
doing it, roll out a few big ominous looking parabolic antennas, and let
mass hysteria do the rest.

:o)














signature.asc
Description: OpenPGP digital signature


Re: Trump accused of obstruction of justice (was: Re: What does it mean to participate in society? )

2019-07-05 Thread Steve Kinney


On 7/5/19 3:18 AM, jim bell wrote:

[...]

> She was obviously guilty of violation of the Federal Records Act, which
> required her to arrange to have the contents of her private server
> backed up, essentially continuously, with the government, to the
> National Archives.   She did not do that.  She also had her staff delete
> 33,000 emails:  Her justification is that those were "personal".  That
> was a lie, too.

"Socialized" people interpret their experience of the material world in
the context of an acquired "world view" which guides or, in most
instances, controls their perception and interpretation of material
conditions and events, and governs their responses to same.  To
"participate in society" necessarily includes compliance with dominant
propaganda narratives, at least to the extent of knowing them and
adjusting one's behavior to take their existence into account.

Example:  Our propagandists made an enormous Political Issue of Mrs.
Clinton's private e-mail server:  Both "because" it existed, and
"because" of bulk deletion of content potentially including criminal
evidence. But concurrently, our propagandists briefly and quietly
reported the bare bones facts of Mrs. Clinton's separate felony offenses
involving deliberate violations of the National Security Act, then fell
silent on that subject.

Mrs. Clinton reportedly removed classification markings from controlled
documents and forwarded them to people not cleared to receive them.  She
also instructed her staff to do likewise, a separate and even more
serious felony offense.  Mrs. Clinton's status as an attorney, and the
fact that she did sign a Classified Information Nondisclosure Agreement,
removes any doubt regarding her criminal intent and should qualify her
for enhanced sentencing:

https://www.archives.gov/files/isoo/security-forms/sf312.pdf

"I hereby acknowledge that I have received a security indoctrination
concerning the nature and protection of classified information,
including the procedures to be followed in ascertaining whether other
persons to whom I contemplate disclosing this information have
been approved for access to it, and that I understand these procedures."

The simple, unambiguous nature of these e-mail related crimes accounts
for the (relative) silence of our propagandists on that topic:  No
defense or evasion based on accusations of partisan bias can 'make them
didn't happen'.  Mrs. Clinton can not pretend she "did not know" her
actions were felonies.  The refusal of Federal law enforcement to bring
charges demonstrates that Mrs. Clinton enjoys de facto immunity from the
legal system that governs lesser mortals.  As this bluntly contradicts
the foundational myth of "equal justice under law", under the rug it goes.

How lucky for Mrs. Clinton that the FBI simply "forgot" to impound her
computers and image their hard drives in the course of a criminal
investigation based on the content of those hard drives.  Even if she
had been charged, procedural stalling based on this circumstance would
assure that she died of old age before the disposition of her charges.

In context with the above, the Trump Regime's failure to bring
obstruction of justice charges against the Obama Regime's fixers in the
FBI indicates Trump's commitment to support "class privilege" and, most
likely, fear of retaliatory violations of his own class privilege should
he get "out of line" with anything but his mouth.













signature.asc
Description: OpenPGP digital signature


Re: Social media services support account spoofing

2019-06-30 Thread Steve Kinney


On 6/18/19 12:32 PM, Ryan Carboni wrote:
> Social media services support account spoofing, this simplifies the
> creation of government sockpuppets. Government sockpuppets can also
> assume the history of other accounts (this is a simple series of mysql
> commands, any codebase can accomplish this by copying entries and
> assigning them to a new ID), 
> 
> This is a substantial concern to privacy rights.

Replying to whole thread's content to date...

Privacy rights:  What's that?  Certainly one has no such thing with
regard to use of "social media" providers.  Their Terms of Service
always say, in moderately opaque language, that users have no 'rights'
of any kind, only privileges where/as granted by the provider and
revocable at any time for any or no reason.

Instances of fraud, identity theft, etc. performed by, or aided and
abetted by the provider may be actionable.  But lots of luck in the
spending contest that results should one take it to Court.

> I am being harassed when I attempt to form new friends over the
> internet. The US government has effectively controlled my entire life,
> and I condemn it entirely. 

Pardon my language - I do not MEAN to be sarcastic - but somebody needs
to "get a life."  Face to face IRL human contact, evolving into analog
trust relationships based on experience over time.  Long distance
relationships mediated by technology controlled by third parties can
provide significant advantages, but real value lives in the real world.

> I see no use for the DOJ Inspector General if
> this conduct is so widespread that in my particular case it is
> considered to be permissible.

As an agency of the U.S. Federal Government, the DoJ exists for one
purpose only:  To enforce the 'legal rights' of absentee landlords and
maintain an environment favorable to commerce.  The State has no
agencies or departments dedicated to protecting the 'rights' of
individuals, except where/as this occurs as an incidental by-product of
the above described mission - and in these instances, "money talks and
bullshit walks."

> I think all social media websites that failed to engage in proper
> oversight of this "investigation" should have computer issues.

Beware the Tar Baby Principle, a.k.a. "you are attached to what you
attack."  If harassment by State and/or Corporate actors prompts you to
expend all your energy fighting back against invulnerable enemies, they
win.  Is all.  End of story, end of game.

Is there somewhere else where applying your time, attention and energy
could achieve more valuable results?  Compared to wasting all of the
above, by definition YES.








signature.asc
Description: OpenPGP digital signature


Re: The US government lacks legitimacy and credibility

2019-06-27 Thread Steve Kinney


On 6/26/19 6:04 PM, Ryan Carboni wrote:
> No doubt as I post this, someone reading it will think "I know this, I
> took a class on it"
> 
> The US government is illegitimate, uncredible, and irrelevant. 

Um, well...

"Legitimate" means, in accordance with your master's wishes.  Note the
root word "leige", which means "lord."  By definition, obedience to the
State "is legitimate" while disobedience "is illegitimate."  I always
cringe a little when I hear anarchists and other anti-authoritarian
types use the word "legitimate" as if that was legitimate.  :D

Uncredible, meaning can not be trusted to convey accurate information:
That fits.  States maintain control over their subjects by any means
necessary, including deception at every scale from simple lies to
elaborate hoaxes psychological warfare.

Irrelevant?  One must ask, in what context can we call a network of
institutions with the power to steal, kidnap and murder at will - and
defend these prerogatives from competitors - within a given geographic
boundary irrelevant?  Academic writers broadly accept the above
description as a definition of State sovereignty.

As George Orwell pointed out, language shapes thoughts, beliefs and
behavior.  As a contemporary example, these are the synonyms of
"activist" per Merriam-Webster:

addict, bigot, bug, crank, crazy, demon, devotee, enthusiast, extremist,
fiend, fool, freak, maniac, militant, monomaniac, nut, radical,
ultraist, visionary, zealot

Not listed as synonyms for "activist":

advocate, champion, engaged, leader, motivated, populist, pro-active,
self-starter

Are these really synonyms for "activist"?  Advocate as in one who
advocates for a cause or position, Engaged as in one who actively takes
part, Champion as in one who fights for a cause, Leader as in one who
takes the lead, Motivated as in up on your feet and down to the street,
Populist as in by and for the people, Pro-Active as in not waiting for
others to act, Self-starter as in taking personal initiative.

http://www.thesaurus.com/browse/activist

Sticks and stones can break my bones, but words can murder millions.

:o/









signature.asc
Description: OpenPGP digital signature


Re: Autonomous Next Generation Leaks

2019-06-03 Thread Steve Kinney




On 6/2/19 7:51 PM, grarpamp wrote:

[...]

> It’s been more than six years since Edward Snowden went public. After
> all the breathless headlines, Hollywood movies, book deals, Pulitzer
> prizes, and glossy primetime biopics. What, pray tell, has come of it?
> For the average American – bupkis. In fact, mass surveillance is
> actually growing by leaps and bounds. Such that those who wish to
> salvage the remnants of their individual privacy will be forced to
> make some tough choices in the years ahead.

Every public conflict and controversy set in motion by the Snowden
Affair arrived at the same conclusion:  A decisive win for the U.S.
intelligence community.  Examples:  Per precedents set, the NSA may now
'hack into' computers used by Congressional staff members at will, and
lie to Congress under oath, with no consequences other than getting
whatever results they want.

Our No Such Agency could not have gotten better results if they handed
Snowden exactly what they wanted published, and assured he gave
everything he had to agents under their own direct control.

Thanks to Global Research, I get to say I told you so, just days after
the Snowden Affair jumped into the headlines:

https://www.globalresearch.ca/nsa-deception-operation-questions-surround-leaked-prism-documents-authenticity/5338673


> The kernel of an approach can be found out in the field. Where poor
> security is fatal. Hunted by the world’s most formidable military, the
> head of ISIS is still alive thanks to solid operations security, also
> known as OPSEC. Abu Bakr al-Baghdadi is definitely a leader who
> appreciates OPSEC. According to the New York Times, “he eschews all
> electronic devices, which could identify his location, and probably
> communicates through a series of couriers.” The key to staying
> vertical, then, is the process surrounding the couriers. How they’re
> compartmented, screened, and arranged to create a resilient
> communication network. No doubt al-Baghdadi is aware that a flawed
> courier scheme was a significant factor in the downfall of Osama bin
> Laden.

Ah, good old fashioned ... should we call it "disinformation" or Big Lie
propaganda?  I guess that depends the context and audience.

ISIS, the mercenary army formerly known as Al Qaida, was founded by
Zbigniew Brzezinski during the Carter Administration as a deniable
channel to funnel arms and intelligence to anyone interested in kicking
Soviet ass in Afghanistan.  In an amazing series of coincidences, the
actions of Al Qaida by any name have always directly advanced the
agendas of U.S. Security State oligarchs and their radical fringe right
wing extremist DemoPublican political partners.

Abu Bakr al-Baghdadi, if any such person exists, will continue to work
hand in glove with U.S. three letter agencies as long as he lives,
because reasons:  Whatever inducements prompted him to join up, and a
desire to stay alive.  As for our Mr. Bin Ladin, the fog of war makes it
difficult to say with certainty that he died of complications secondary
to kidney failure in the mountains of eastern Afghanistan during the
winter of 2001-2; if not, he most likely remains alive.  The guy Seal
Team Six murdered shortly before getting murdered themselves had "wrong
place, wrong time" problems.

> Edward Snowden likes to promote strong cryptography. Leaving people
> with the notion that staying under the radar is a matter of leveraging
> a technical quick fix. But recent history shows that trusting your
> life to an allegedly secure communication platform is an act of faith.
> And not an advisable one, especially when state sponsored operators
> enter the picture. Achieving higher levels of security requires a
> disciplined process which is anything but a quick fix and which often
> entails giving up technology. Even cartel bosses learn this lesson:
> security technology fails. Both my design and by accident. Spies win
> either way.

Quite so:  Cryptographic tools and manipulated network comms have
potential uses in the context of larger and much more time/energy
intensive operational security a.k.a. 'tradecraft' strategies.  But
never as a substitute for deception and misdirection, physical security
techniques, etc.

First time amateur 'operatives' may stand a chance of getting away with
leaking high value confidential documents and information - if nothing
connects them, more than hundreds of other people, with that
information; if they come up with clever strategies to disassociate
themselves from that information's escape into the wild (ideally, an
obvious target of opportunity the leak will get blamed on); drop
everything at one go with no advance warning to anyone living or dead;
then go on with their lives exactly as if they know nothing about what
happened.







signature.asc
Description: OpenPGP digital signature


Re: Fundamentals of Anglophonic Common Law

2019-05-24 Thread Steve Kinney


On 5/23/19 6:47 PM, Ryan Carboni wrote:
> To clarify, the worst injury that could occur if a prosecutor pursues a
> weak case is having a worse percentage win rate when he decides to talk
> up private practice.
> 
> The idea that a prosecutor's self-gain overrides other considerations is
> heretical, but in terms of cause and effect, an unrelated party can be
> faulted for a prosecutor's timidity, and for the prosecutor's notion
> that they are representing the victims to whom they've so utterly lied to.

Heresy?  The word "Satan" means "accuser," and in the mythology he
functions as God's Prosecuting Attorney.  In real life I would prefer a
legal system based entirely on the 'tort' concept - let the injured
party bring suit, or in instances where that can not happen - i.e.
murder - let an ad hoc committee from the community do so.

Devising an anarchist legal system that does not immediately devolve to
heavily biased popularity contests and/or lynch mobs who may regret
their actions soon after, presents some pretty challenges.  I have not
tried but it sounds like a fun project.

:o)







signature.asc
Description: OpenPGP digital signature


Re: Fundamentals of Anglophonic Common Law

2019-05-23 Thread Steve Kinney


On 5/23/19 1:41 AM, Ryan Carboni wrote:

> The government is made of institutions. The press is an institution.

Institution:  A facility where people are locked up for their own good
and the safety of society at large.

Institutionalized:  Confined in an institution, or, a personality
rendered dependent and passive-aggressive by prolonged confinement in an
institution.

> The government makes the law, but it doesn't do so in a commonly
> acknowledged fashion, it does so by prejudicing the result, if the law
> is weak in an area. This is how new laws are passed, this is how old
> laws are reinterpreted.
> 
> Usually the press frames a situation as a moral issue, and either juries
> would see it as such, or legislators would.

The press serves two markets at once:  Their audience and their patrons.
 To acquire and keep audiences, press outlets report "news" as a series
of engaging dramas, in a context that encourages readers to identify
with players in the stories presented.  To acquire and keep patrons
(advertisers or grant writers), press outlets must frame their stories
in a context that supports the utility, desirability and/or practical
necessity of the products, services, etc. offered by their patrons.

The State serves one market:  The wealthy and powerful.  This service
consists  of codifying and enforcing the "rights" of absentee landlords,
providing arbitration processes for settling disputes among their
patrons, and providing armed enforcement services to maintain an
environment favorable to commerce.

The Press and the State answer to the same masters, and they serve
mutually supportive roles.  Where apparent conflicts between the News
Media and the Government do not present as empty posturing, they reflect
policy disputes among a country's rulers.  Press criticisms of the State
do not rise to the level of questioning the "legitimacy" of State
institutions and authority - at most the press presents symbolic and/or
self-defeating models of rebellion.

> Perhaps the average Trump supporter doesn't understand why they support
> Trump, nor does the average Democrat, but one thing is clear, if the
> allegations against Trump are true, they would vote out the entire
> government. There is a certain ridiculousness to it all. The press is
> publishing leaks on tangentially related items to the Trump
> investigation, the Trump investigation seems political motivated because
> they haven't charged anyone with what Republicans would see as valid
> crimes, but even if it was focused Hyperbole like "hack the
> election", "Alfa bank data laundering", if true, would be incredible.
> 
> This seems to be a systematic mishandling and inability to actually
> prosecute competently. If the honest truth was released, people would
> see it for what it is, not even a circus, but a clownshow.

We can call the massive inertia of a collective delusion controlling
hundreds of millions of people from cradle to grave a "clown show" if we
want to pretend that we are above all that.  This Olympian viewpoint,
compliant with indoctrination by State, Media and Academic institutions,
presents as an example of "institutionalization."  But as a matter of
blunt fact, a civilization built on a foundation on murder and
intimidation, hell bent on destroying the planetary ecosystem that makes
its own existence possible presents very few laughs.  Rather the opposite.

The mocking laughter some indulge in seems to indicate internal
pressures that might, if not diverted to fuel a perception of personal
superiority, lead to actually rebellious activities.  That would not do.
 All properly institutionalized individuals know their place in the
status hierarchy and rebel only when and as they are told.  Like any
other animals habituated to their cages these folks may complain loudly,
but pretend they do not even notice open doors and gates - what lies
beyond represents the Unknown or even... horror of horrors... anarchy.

:o/








signature.asc
Description: OpenPGP digital signature


Re: EMP missile

2019-05-17 Thread Steve Kinney


On 5/16/19 6:18 PM, jim bell wrote:
> Air Force has deployed missiles that could fry electronics of Iran 
> https://mol.im/a/7037549 via http://dailym.ai/android
> 


The article as a whole reads like a "defense" contractor's press
release:  Bombastic, overblown, factually inaccurate (i.e. pretends real
hard that facilities can not be hardened against super-duper microwave
beams), and even includes this barb against anyone who would dare
deprive the contractor of Yuge cash payouts:

> Because of sequestration budget cuts, the CHAMP missiles did not become 
> operational under the Obama administration.

Here's a cheap laugh:

> The missile is equipped with an electromagnetic pulse cannon. This uses a 
> super-powerful microwave oven to generate a concentrated beam of energy.

And right in the middle of the article, apropos of nothing, this
non-sequitur appears:

> One of those laboratories, Sandia National Laboratories, has been developing 
> robots the size of insects that could assassinate North Korean leader Kim 
> Jong-un with deadly toxins. 
> 
> These robotic weapons using nanotechnology employed in surgical operations in 
> hospitals are being developed secretly with funding by the Defense Advanced 
> Research Projects Agency. 

Far be it from me to cry "old news!", but I read all about that project,
sitting in the Central Kitsap Jr. High library in 1973:

http://www.isfdb.org/cgi-bin/pl.cgi?57079

What that has to do with using drone-mounted microwave ovens to destroy
all the electronics in shielded bunkers, I have no clue.

:o)





signature.asc
Description: OpenPGP digital signature


Re: OFFTOPIC: physics question

2019-05-13 Thread Steve Kinney


On 5/13/19 2:12 PM, \0xDynamite wrote:
>> On 5/12/19 9:59 PM, \0xDynamite wrote:
>>> Sorry for this little diversion,
>>> If light travels at a. different speed for different colors in order
>>> to account for the rainbow of a prism, how fast is the. speed of light
>>> then?
>>
>> The speed of light is a physical constant.  The frequency (or
>> wavelength) of a photon determines its energy and therefore, to the
>> human eye, its color.
> 
> If light's speed is a physical constant, then light wouldn't separate
> into colors within a prism.

Because light's speed is a physical constant, light separates into
colors when passing through a prism.

The higher the frequency of a photon, the higher its energy.  Since more
energetic photons can not speed up, and less energetic photons can not
slow down, they behave AS IF they had more or less 'mass.'

Higher and lower energy photons deflect slightly more or less when
forced to change direction in a refractive medium, in a way analogous to
heavier and lighter moving objects acted on by, for instance, the wind...

:o)






signature.asc
Description: OpenPGP digital signature


Re: OFFTOPIC: physics question

2019-05-13 Thread Steve Kinney


On 5/12/19 9:59 PM, \0xDynamite wrote:
> Sorry for this little diversion, but it has occurred to me that
> physics has a bit of a logical contradiction and I think highly of the
> group's rational faculties here to help me sort this out.
> 
> If light travels at a. different speed for different colors in order
> to account for the rainbow of a prism, how fast is the. speed of light
> then?  Is there real physics to optics?  How can light know what
> direction to bend after it leaves the lens?

The speed of light is a physical constant.  The frequency (or
wavelength) of a photon determines its energy and therefore, to the
human eye, its color.

Longer answer:

https://www.asu.edu/courses/phs208/patternsbb/PiN/rdg/color/color.shtml

https://en.wikipedia.org/wiki/Photon_energy

Our ability to perceive light, and construct models of what it's
bouncing off in realtime, has presented interesting problems to many
noted scientists over the years.  An illustrative example:

https://vimeo.com/70051022

:o)








signature.asc
Description: OpenPGP digital signature


Re: Former US intel analyst arrested for leaking DroneWar dox

2019-05-12 Thread Steve Kinney


On 5/12/19 12:44 AM, jim bell wrote:
> On Saturday, May 11, 2019, 9:10:31 PM PDT, Steve Kinney
>  wrote:
> 
> 
> On 5/11/19 11:57 PM, Steve Kinney wrote:
> 
>>> If this took place before The Intercept burned Reality Winner, shame on
>>> The Intercept.  If it took place after, shame on the leaker.
> 
> 
>>Postscript:  The Reality Winner incident did come /after/ the
>>publication of docs apparently submitted to The Intercept by Daniel
>>Hale.  So, he had no obvious way to know where NOT to send TS dox.
> 
> 
> 
> Years ago, I recall reading that early on in the history of inkjet
> printers, even 1990, 'features' were built in the printers to detect if
> the printed document "looked like" a US dollar, small yellow dots,
> precisely placed to encode source data, were written over the face of
> the document.
> It seemed to me that removing the yellow cartridge, plus a thorough
> exhausting of the residual material, would improve the security.
> 
> Based on what I heard, it wasn't clear that such security dots, or other
> features, were used for non-currency-counterfeiting applications.   It
> sounds from these recent incidents as if inkjet printers are putting
> identifiable information on virtually any printouts.

Wikipedia has a good article on this:

https://en.wikipedia.org/wiki/Printer_steganography





signature.asc
Description: OpenPGP digital signature


Re: Former US intel analyst arrested for leaking DroneWar dox

2019-05-11 Thread Steve Kinney


On 5/11/19 11:57 PM, Steve Kinney wrote:

> If this took place before The Intercept burned Reality Winner, shame on
> The Intercept.  If it took place after, shame on the leaker.

Postscript:  The Reality Winner incident did come /after/ the
publication of docs apparently submitted to The Intercept by Daniel
Hale.  So, he had no obvious way to know where NOT to send TS dox.





signature.asc
Description: OpenPGP digital signature


Re: Former US intel analyst arrested for leaking DroneWar dox

2019-05-11 Thread Steve Kinney


On 5/11/19 12:16 AM, Razer wrote:
> A former US intel analyst was arrested Thursday under the Espionage Act.
> He allegedly leaked dox about the US Drone War program. Daniel Hale
> faces up to 50 yrs in prison, accused of disclosing 11 top secret/secret
> documents to a reporter.

If this took place before The Intercept burned Reality Winner, shame on
The Intercept.  If it took place after, shame on the leaker.

I saw a story indicating that prior to publishing the material submitted
by Ms. Winner, The Intercept called the Feds to verify that the zip code
on the package matched the facility their source told them it came from.
 Not certain this actually happened - but given what came next I do not
doubt it.

The Intercept published at least one high quality scan of a document
sent by Ms. Winner, with the printer's watermarks intact:  This told
world + Feds the printer's serial number, and time the document was
printed.  When I read about that, I went to The Intercp's site and
downloaded the image in question.  I bumped up the contrast and tweaked
its colors a bit:  Viola, the repeating watermark pattern jumped right out.

Starting on the date The Intecept openly and publicly burned Ms. Winner
- whether through shocking ignorance and negligence, or by design -
anyone who sends them 'dangerous documents' has no one to blame but
themselves the first morning they wake up in a Federal prison.

:o/






signature.asc
Description: OpenPGP digital signature


Re: No one is obligated to participate in the investigation against me

2019-05-09 Thread Steve Kinney


On 5/8/19 3:34 AM, Ryan Carboni wrote:
> It is to my understanding that if I were to ask for technical advice on
> a web forum under a different username, people would be made aware of my
> identity by government investigators monitoring me. Which is not
> ordinarily a problem, but considering I was framed about a decade ago,
> it is.

That sounds like standard police work to me.  When an investigatory
agency receives a directive to take someone down, or individuals in such
agencies develop personal a personal grudge against someone, they shift
gears from passive observation to active harassment.

A very long time ago, I fed a snitch "bad information" on purpose, then
turn him against his buddies in blue.  He was fishing for information
about criminal activities some of my old friends never did, and that
/really/ pissed me off.  It turned out that 'they' already had me listed
for disposal, so my instincts did not mislead me:  I had nothing to lose
by kicking their shins...

According to my source, the principal technique police investigators use
to dispose of inconvenient people consists of interviewing their
employers, any 'friends of the force' they may happen to know.  Their
leading questions paint a picture of the victim as a member of a
terrorist conspiracy, an uncaught serial rapist, or whatever else the
interviewee would most strongly react to.

After learning all they can about the targeted individual from these
interviews, investigators sit back and let the seeds they have planted
do their work.  The victim usually finds him or herself unemployed soon
enough after the employer has "learned the truth."  Keeping the targeted
individual unemployed by poisoning background checks, and/or by
responding promptly with the above mentioned tactics when any new
employer files State documents (sometimes within hours these days,
thanks to Surveillance State infrastructure) follows.

How can a targeted individual turn this off?  In some cases, a criminal
conviction - any criminal conviction - might do the trick:  Mission
accomplished, etc.  In some cases, moving to another State might do the
trick - if the scope of the harassment does not extend past a County or
State agency.  Just maintaining a low profile and allowing time to pass
might reduce the active harassment below the threshold where it matters.

In some instances, explaining the situation to a potential employer in
advance of the approach by a hostile party might - but lots of luck
finding prospects who would not assume you're a paranoid looney.

:o/








signature.asc
Description: OpenPGP digital signature


Re: Happy World Password Day!!! :D

2019-05-02 Thread Steve Kinney


On 5/2/19 10:40 AM, Cecilia Tanaka wrote:
> https://nationaldaycalendar.com/world-password-day-first-thursday-in-may/
> 
> Celebrate the World Password Day changing or upgrading your p455w0rd$,
> dear all.  <3
> 
> Oh, you know, "123456", "password", and "admin" are so old fashioned
> passwords...  ;)

Passwords are so old fashioned - and they present the most easily and
frequently exploited weakness in security systems.  We do have solutions...

Randomly generated pass phrases:

http://diceware.com

Most people will only need three or four pass phrases, including the one
that decrypts / unlocks one's portable database of unique. 'randomly'
generated, impossible to memorize, effectively brute-force-proof
credentials:

https://keepass.info/

Lose your database file, lose access to everything?  Not likely - if you
scatter copies of the database "everywhere", and update the copies when
you add or change any credentials.

Needs a "password education" or better, "password eradication" day.

:o)






signature.asc
Description: OpenPGP digital signature


All that fuss and bother about Mendax

2019-04-21 Thread Steve Kinney
Our comrade Mendax has a way with the ladies, including accomplished
professionals like Argentine Ambassador to the UK (2006-2011) Alicia Castro:

"Then we succeeded that he would be allowed to have a kitten, whose
company he greatly enjoyed, and whose presence at the embassy has
generated one of the most odd and obtuse amongst the complaints raised
by the current president of Ecuador."

http://theindicter.com/my-friend-julian-assange-alicia-castro-ex-ambassador-in-london/


In my opinion, the whole current mess is not fair to James.  Does anyone
know who's looking after him now?

Meanwhile, here's a rare find:  Sensible commentary on the state of play
on the legal front:

http://johnhelmer.net/the-julian-assange-case-now-puts-the-us-on-trial-in-a-british-court-is-there-a-get-out-of-jail-card-for-assange/


For the new kids:  The theory behind the practice of Wikileaks in a
brief and seemingly unfinished essay from Himself, courtesy of JYA:

https://cryptome.org/0002/ja-conspiracies.pdf

Wikileaks was originally presented as a community project, a "Wikipedia
of" leaked documents, vetted and analyzed by a distributed network of
volunteers.  But when the Manning files showed up, Assange hijacked the
project and put it on lockdown, presumably due to security concerns when
presented with what may stand as The Leak Of The Century.

Our Mendax pissed a lot of people off, yrs. truly included - but when
Collateral Murder, War Diaries and Cablegate hit the nables, I forgave
all.  He surely knows the definition of "humility" but to him it must
forever remain an abstract concept.  Considering his impact on public
affairs, I must endorse his tendency to do whatever the fuck he thinks
will work.

:o)










signature.asc
Description: OpenPGP digital signature


My second Facebook thoughtcrime in two weeks!

2019-04-20 Thread Steve Kinney


On 4/20/19 9:39 PM, Punk wrote:
> On Sat, 20 Apr 2019 18:11:53 -0400
> Steve Kinney  wrote:
> 
> 
> me: > >   Then you have rampant censorship at the hands of the asshole 
> users themselves. So the vast majority of groups are heavily censored and 
> just echo chambers. 
>>
> 
>> Yup.  However, those echo chambers do have their potential uses:  One
>> must always preach to the choir, else how will they get on the same page
>> and work together effectively at show time?
> 
> 
>   Even if the group has a legitimate purpose, censorship is unacceptable. 
> But what commonly happens is that censorship allows assholes to be 
> unaccountable and fraudsters to go unchallenged. And unsurprisinly censorship 
> is one the core 'features' of facebook. People LOVE to block and ban their 
> betters because they know they can't never hope to refute them.

Legitimate:  In accordance with the law.  Latin root "leige" meaning
"Lord" or, in practical terms, one's owner.  Probably not a good
baseline for anarchist value judgments.

:o)


>> As an example, The Facebook has enabled me to distribute hundreds of
>> copies of this package of documents to receptive readers:
>>
>> http://web.archive.org/web/20190110192354/http://pilobilus.net/strategic_conflict_docs_intro.html
>>
>>
>> I think that alone makes screwing around with The Facebook a net win.
> 
> 
>   Well, I don't think that's sound and complete accounting. 

Customer satisfaction, on the customer's own chosen terms, provides the
final bottom line.  As long as I continue to consider The Facebook
useful, I will continue to use it.

>>
>>> Then you're running tons of javascript malware, including a keylogger. 
>>> Because of course the whole point of facebook is to automatically spy on 
>>> you with milliseconds resolution. 
>>
>> Javascript?  Optional.  Replace the www in any Facebook address with m,
>> for the legacy mobile version.  I learned this exists when searching for
>> a convenient way to download videos posted directly on The Facebook - in
>> the mobile version, just right-click and save-as.  Since then, mobile
>> has become my default mode.
> 
> 
>   I knew about the 'mobile' mode though it was rather crippled at the 
> time I used it. But if you manage to use facebook without running JS, that's 
> good and congrats. 
> 
>   Also I assumed that by now that mode didn't exist anymore, or it 
> required JS since 'modern' retard phones happen to have a lot of memory and 
> fast multicore processors...for the very purpose of running JS malware. Funny 
> that the NSA hasn't updated m.facebook.com yet...

m.facebook.com would exist to support for legacy systems and software,
and incidentally provide accessibility for visually impaired users.  I
don't expect it to go away any time soon.

>>
>> The "fancy" version of The Facebook requires JS from facebook.com and
>> fbcdn.com ["facebook content distribution network"].  Block Javascript
>> from all other sites while on the facebook.com domain and the thing
>> works faster and better, without 3rd party user tracking.  
> 
> 
>   Yeah well. I don't think there's any 3rd party tracking in facebook. 
> I'd assume facebook.com doesn't serve googletagmanager.com malware.  And in 
> the absurd case that they did, blocking google doesn't solve the problem of 
> running facebook's malware. 

I just loaded up The Facebook and switched off all filters.  On The
Facebook, NoScript indicated that the page had loaded a script from
google.com.

[...]

>> The Facebook's pages load a keylogger?  I would like to hear more about
>> that; so far I have seen no evidence of one.
> 
>   IIRC when you 'tagged' 'friends', the tags were automatically 
> recognized (or there even was autocomplete?) - Thing is, when you typed a 
> message, there was a piece of code looking for 'friends' names. That means 
> that *every time* a key-press event is triggered, some code runs. In other 
> words, a keylogger. Whether the code saves all the key presses and sends them 
> to the NSA I don't know, but it would be trivial for it to do that. 
> 
>   I'm not sure if there was some sort of spell checker as well or other 
> similar feature that required key press events to be processed in real time. 
> I think there was but I can't recall the  details. 
> 
>   Bottom line of course is : once you run malware from something like 
> facebook you can (and should) assume the worst. 

That would be Javascript all right:  A tangled mess that sometimes slows
the browser down to a crawl.  I only /rarely/ shift out of "mobile"
mode.  But a keylogger "log

Re: clockwork statist propaganda was : Re: My second Facebook thoughtcrime in two weeks!

2019-04-20 Thread Steve Kinney


On 4/20/19 9:49 PM, Punk wrote:
> On Sat, 20 Apr 2019 17:43:17 -0500
> "\\0xDynamite"  wrote:
> 

[...]

>> free-riders of the commune who weren't pulling their fair share of
>> work, etc.
> 
>   FREE RIDERS! GASP!!

In any social matrix, everybody contributes something, if only
consistent honesty, reliability and concern for others.  Except those
who can't manage even that - and yeah I seen a few, fortunately just a
few, here and there on my travels.

From that all else follows, with regard to On vs. Off The Bus issues:
The rider's own choice, take it or leave it.

:o)





signature.asc
Description: OpenPGP digital signature


Re: My second Facebook thoughtcrime in two weeks!

2019-04-20 Thread Steve Kinney


On 4/20/19 3:01 PM, Punk wrote:

[...]

>> I got a Facebook account for maybe seven or eight years ago.  Since then
>> I have used it to find and hook up with local activist orgs; get
>> feedback on propaganda materials (handbills, flyers, etc.) in production
>> and distribute the finished products to people who used them IRL; do
>> volunteer intelligence work for activist orgs; picked up a few paying
>> gigs; and I managed to seriously blow about a dozen minds that I know
>> of.  On the whole, The Facebook has served /my/ purposes adequately; the
>> question of whether that's "good" depends who you ask.
> 
> 
>   I too had an account in a previous life and used it to do some of the 
> things you mention. But as time went on the costs of using an NSA weapon 
> designed to attack us outweighted any perceived benefit. 
> 
>   For instance, it should be kinda self-evident that what you see inside 
> facebook and which people you get to 'meet' is (heavily) manipulated. 

No question:  The Facebook presents as a 'computer dating service' of
sorts, profiling users' interests and personalities and pulling users
into echo chambers populated by "their own kind."  To a lesser extent
The Facebook also exposes users to "opposite" personalities and
messages, to encourage conflict and polarization - because that drives
user engagement and, in the long run, promotes our rulers' "divide the
conquered" agenda.

The Facebook primarily works to find users' existing biases and magnify
them; their business model includes "changing minds" with regard to
consumer purchasing preferences and frequency.  In the sphere of
political ideology, The Facebook spots, classifies and reinforces the
users' already established patterns, enhancing their predictable
responses to targeted political propaganda.

>   Then you have rampant censorship at the hands of the asshole users 
> themselves. So the vast majority of groups are heavily censored and just echo 
> chambers. 

Yup.  However, those echo chambers do have their potential uses:  One
must always preach to the choir, else how will they get on the same page
and work together effectively at show time?

As an example, The Facebook has enabled me to distribute hundreds of
copies of this package of documents to receptive readers:

http://web.archive.org/web/20190110192354/http://pilobilus.net/strategic_conflict_docs_intro.html


I think that alone makes screwing around with The Facebook a net win.

>   Then you're running tons of javascript malware, including a keylogger. 
> Because of course the whole point of facebook is to automatically spy on you 
> with milliseconds resolution. 

Javascript?  Optional.  Replace the www in any Facebook address with m,
for the legacy mobile version.  I learned this exists when searching for
a convenient way to download videos posted directly on The Facebook - in
the mobile version, just right-click and save-as.  Since then, mobile
has become my default mode.

The "fancy" version of The Facebook requires JS from facebook.com and
fbcdn.com ["facebook content distribution network"].  Block Javascript
from all other sites while on the facebook.com domain and the thing
works faster and better, without 3rd party user tracking.  NoScript does
the deed quite conveniently.  AdBlock plasters over some of the cracks
that may be left.

Another tracking feature:  Links to posted URLs displayed in The
Facebook do not point to the targets advertised, but to The Facebook
itself, with PHP arguments appended; when clicked on, these links result
in a fast redirect to the target site, with a Facebook tracking code
appended, again as a PHP string.  As far as I know, nobody has made a
browser plugin to automagically sanitize this process; but the real link
does appear in the on-page Facebook link; users can extract the real
link, to kill that component of Facebook user tracking.

The Facebook's pages load a keylogger?  I would like to hear more about
that; so far I have seen no evidence of one.

>   It should also be self-evident that nobody is ever going to be able to 
> use a NSA-govcorp bulletin board to attack NSA-govcorp in any meaningful way. 
> While you managed to inform a dozen people about the real nature of the 
> society they live in, govcorp used facebook to disinform and manipulate 12 
> million people (or some such ratio between benefits and harm caused).

That strikes me as a case of "making the perfect the enemy of the good."
 All the better State sponsored dissident groups do that, both to assert
their acolytes' moral superiority and to discourage anyone from doing
anything that might have unwanted real world political impacts.  As I
said before, "It's a piss poor pitiful anarchist who's too stinkin' good
to use the State's resources against the interests of the State."

I would stack up the long term social and political impact of the dozen
or so minds The Facebook may have helped me ruin forever up against any
12,000 or so Normal 

Re: My second Facebook thoughtcrime in two weeks!

2019-04-19 Thread Steve Kinney


On 4/19/19 1:35 AM, Punk wrote:

>   Well, having a facebook account may be rather a matter of self-hatred =P

As long as I don't get prosecuted for self abuse it's all good.

>   The facebook is like democracy. If it could serve any good purpose, it 
> would be ilegal. 

"It's a piss poor pitiful anarchist who's too stinkin' good to use the
State's resources against the interests of the State." - Me

I got a Facebook account for maybe seven or eight years ago.  Since then
I have used it to find and hook up with local activist orgs; get
feedback on propaganda materials (handbills, flyers, etc.) in production
and distribute the finished products to people who used them IRL; do
volunteer intelligence work for activist orgs; picked up a few paying
gigs; and I managed to seriously blow about a dozen minds that I know
of.  On the whole, The Facebook has served /my/ purposes adequately; the
question of whether that's "good" depends who you ask.

:o)





signature.asc
Description: OpenPGP digital signature


Re: My second Facebook thoughtcrime in two weeks!

2019-04-17 Thread Steve Kinney


On 4/18/19 12:11 AM, Shawn K. Quinn wrote:
> On 4/17/19 22:09, Steve Kinney wrote:
>> Just got locked out of The Facebook for the second time in two weeks,
>> this time thanks to a MegaChurch Xtian bitch I happen to know IRL, who
>> recognized herself "all to clearly" in this post and falsely reported it
>> as a TOS violation:
> 
> It could be the swastikas on the comic book cover, along with the
> repeated use of the term "Nazi", were considered "hate speech". I know
> is a bit of a stretch, and I too disagree with the decision, but I'm
> just saying that is how they think.


I would discount the likelihood of a human decision, given that the FU
notice from Facebook arrived three minutes (maybe less) after I pushed
the 'send' button.  No time for a complaint to come up through a queue
for human attention - but about right for a "certain person" camping on
The Facebook to see my post, fly into a towering rage, and push a few
well worn buttons.  :D

I do plan to create a few "TOS violating" sock puppet accounts, and use
one to test my ability to censor other users' content on demand.

:o)





signature.asc
Description: OpenPGP digital signature


My second Facebook thoughtcrime in two weeks!

2019-04-17 Thread Steve Kinney
Me so proud:

Just got locked out of The Facebook for the second time in two weeks,
this time thanks to a MegaChurch Xtian bitch I happen to know IRL, who
recognized herself "all to clearly" in this post and falsely reported it
as a TOS violation:

http://pilobilus.net/good.little.nazis.html

Don't y'all hate on me 'cause I have an account at The Facebook.  I set
it up when I needed to verify the promotional gimmicks I was building
into a couple of commercial websites - the effectiveness of "share on
Facebook" buttons (home made, non-tracking unless the sucker clicks on
them), positive control of the preview images and text presented, etc.

Once it was there, I started using the Facebook account to pump out
propaganda.  If nothing else, the local activist community noticed and I
got yanked into the scene and 'made use of.'  My kind of fun!

I encourage CPunks readers who also maintain accounts at The Facebook -
no need to confess that sin here - to share the above link.  Since it's
hosted on my website vs. presenting as your very own thoughtcrime, this
should not lead to any sanctions.  I will, of course, make the said link
my own first post once "allowed" to access The Facebook again.

Have you annoyed a polite, respectable Nazi Pig today?

:o)




signature.asc
Description: OpenPGP digital signature


Re: Internet Archive Labeled Terrorist, Political Takedown Pending

2019-04-12 Thread Steve Kinney


On 4/11/19 9:19 PM, grarpamp wrote:

[...]
> http://blog.archive.org/2019/04/10/official-eu-agencies-falsely-report-more-than-550-archive-org-urls-as-terrorist-content/
> 
> We've been trying to explain for the past few months just how
> absolutely insane the new EU Terrorist Content Regulation will be for
> the internet. Among many other bad provisions, the big one is that it
> would require content removal within one hour as long as any
> "competent authority" within the EU sends a notice of content being
> designated as "terrorist" content. The law is set for a vote in the EU
> Parliament just next week. And as if they were attempting to show just
> how absolutely insane the law would be for the internet, multiple
> European agencies (we can debate if they're "competent") decided to
> send over 500 totally bogus takedown demands to the Internet Archive
> last week, claiming it was hosting terrorist propaganda content. [...]
> And just in case you think that maybe the requests are somehow legit,
> they are so obviously bogus that anyone with a browser would know they
> are bogus. Included in the list of takedown demands are a bunch of the
> Archive's "collection pages" including the entire Project Gutenberg
> page of public domain texts, it's collection of over 15 million freely
> downloadable texts, the famed Prelinger Archive of public domain films
> and the Archive's massive Grateful Dead collection. Oh yeah, also a
> page of CSPAN recordings. So much terrorist content!

The Public Domain is an international terrorist organization, engaged in
the vicious theft of tens of billions of dollars worth of intellectual
property that rightfully belongs to any media corporation that salvages
any and all abandoned or derelict Content, i.e. by adding a "brought to
you by" line to the title, a price tag, their rightful copyright notice
and an End User License Agreement.

Public Domain terrorists seek to gut the economies of the Western
Democracies by stealing billions, and over time trillions of dollars
from the corporations responsible for education and public information
supporting Freedom and Democracy throughout the Free World.  We shall
stop The Public Domain by any means necessary, and seek the death
penalty for anyone found to be actively promoting or materially
supporting The Public Domain, and/or "free" public access to publicly
funded research, art and literature.

A public service message from The People In Charge, your faithful and
indispensable protectors, reminding you that You Need Us.





signature.asc
Description: OpenPGP digital signature


Re: AnarchoPunk Update

2019-04-10 Thread Steve Kinney


On 4/10/19 4:03 PM, Punk wrote:
> On Wed, 10 Apr 2019 03:50:18 -0400
> grarpamp  wrote:
> 
> 
>> Dealing with Pedophilia in an Anarchist Society with Yaakov Markel via 
>> Anarchast
>> https://www.youtube.com/watch?v=1NWLFBHrWdU
> 
>   of course, another quite remarkable thing is how this two scumbags 
> parrot to the tee the current psychobabble 'scientific' dogmas about 
> 'therapists', 'trauma' and the like. 
>   
>   so here's a half sane voice to counter these 'libertarians'.
> 
>   https://www.goodreads.com/book/show/7633118-the-trauma-myth
> 
>   " psychologist Susan Clancy reports on years of research and contends 
> that it is not the abuse* itself that causes trauma—but rather the narrative 
> that is later imposed on the abuse experience." 
> 
>   go figure. It's all just...propaganda from monkeys and their puritan, 
> anti-sex (non) 'culture' based on jew-kkkristian (non) 'values'.
> 
>   
> *there of course is no 'abuse' in consensual acts. 

The inherent logical disconnect between anarchy and law enforcement
underlines the irrelevance of /most/ debate about how an anarchist
society should be run.

I prefer what used to be called frontier justice:  When someone makes
enough trouble to motivate enough people to do something about it, they
act:  Maybe a good talking-to; if that fails to curb the behavior in
question, maybe running the offender out of town; if that seems
inadequate to protect the community, maybe killing the bastard.

Frontier justice is not perfect, but it's the best system we have.

Compare the Libertarian belief that incorruptible Courts adjudicating
tort claims, on a level playing field where wealth, power, and political
prejudice provide no advantages, can exist.

:o)





signature.asc
Description: OpenPGP digital signature


Re: Censorship: Linus Torvalds Comes Out Blatant Censor's Advocate, Anti Privacy/Anonymity

2019-04-08 Thread Steve Kinney


On 4/7/19 4:36 PM, Punk wrote:
> On Sun, 7 Apr 2019 00:04:22 -0400
> Steve Kinney  wrote:

[...]

>> A cursory
>> search did not turn up a link to the text; my copy arrived in hard cover
>> via the Science Fiction Book Club.  Interlibrary loan if all else fails...
> 
> 
> 
>   try 
> 
> https://thepiratebay.org/torrent/7780471/Brunner__John

Heh.  Should have checked there first.

:o)




signature.asc
Description: OpenPGP digital signature


Re: Censorship: Linus Torvalds Comes Out Blatant Censor's Advocate, Anti Privacy/Anonymity

2019-04-06 Thread Steve Kinney


On 4/6/19 11:28 PM, John Newman wrote:

[...]

> I need to read True Names (thanks!) - although a cursory search
> didn't find the phrase.

See also The Shockwave Rider by John Brunner, 1975:  The first tale of a
"hacker" (not so named) who wages war against State actors.  A cursory
search did not turn up a link to the text; my copy arrived in hard cover
via the Science Fiction Book Club.  Interlibrary loan if all else fails...

I would nominate our Mr. Brunner as the "most under appreciated" SF
author of his generation:  Uniformly brilliant work IMO; as another
example, people who appreciate CPunk concepts would likely find The
Stone That Never Came Down very inspirational.

:o)








signature.asc
Description: OpenPGP digital signature


Re: Censorship: Linus Torvalds Comes Out Blatant Censor's Advocate, Anti Privacy/Anonymity

2019-04-06 Thread Steve Kinney


On 4/6/19 5:32 AM, grarpamp wrote:
> https://www.linuxjournal.com/content/25-years-later-interview-linus-torvalds
> 
> "Social Media... Add in anonymity, and it's just disgusting. When you
> don't even put your real name on your garbage (or the garbage you
> share or like), it really doesn't help. I'm actually one of those
> people who thinks that anonymity is overrated. Some people confuse
> privacy and anonymity and think they go hand in hand, and that
> protecting privacy means that you need to protect anonymity. I think
> that's wrong. Anonymity is important if you're a whistle-blower, but
> if you cannot prove your identity, your crazy rant on some
> social-media platform shouldn't be visible, and you shouldn't be able
> to share it or like it."
> 

The above sounds like a comparison between The Facebook (makes a token
effort to tie accounts to users' True Names), and 4chan (makes a token
effort to disconnect users from their True Names).  That strikes me as a
forced context creating forced either/or alternatives.  We need a middle
ground between True Names Only and Anonymous FTW.  We already have a
working example of that middle ground:  The i2p network.

i2p users host various resources including websites, torrent trackers,
and community forums on their own hardware, and access the resources
etc. of their choice either anonymously, or pseudonymously via
user-chosen screen names.  i2p users may disclose their True Names at
will, but by default the identity and location of i2p users can not be
determined without State level infrastructure access and surveillance
resources.  An i2p user's actual True Name is his or her i2p router ID,
which by design has no connection with any geographic location or birth
certificate.

Result?  A more intelligent, better behaved version of the Internet,
with prevailing attitudes reminiscent of the public Internet shortly
before AOL popped up and saturation bombed us with weaponized morons,
followed by MegaCorporations looking to manipulate, control and extract
capital from the said morons.  (Younger folks:  Look up "Eternal
September" for the sad true story.)

I can not completely attribute the modest i2p success story to the
prevalence of users known by pseudonyms only.  To access i2p one has to
install and configure software that will not work unless one cam read
and apply howto docs and such; this screens out the less-bright 80% of
potential users right up front.  Size also matters:  The smaller the
network, the more good or bad behavior stands out, and the larger the
benefits of presenting as a good (in the sense of useful) person.  At
present, i2p has about 60k users according to stats.i2p.

But I do not discount the prevalence of stable pseudo-identities as the
primary factor affecting the quality of content and discourse in i2p
space; without this factor, concerns for reputation would have no
impact.  Compared to the great unwashed publick visible on the open
Internet under their own names, i2p participants seem remarkably polite,
intelligent and responsible.  Go figure.

A user's i2p persona can take any form, and may include the content of
websites that live on their creators' own hardware, accessible only via
the i2p router network.  It takes about a day for anyone who knows HTML
to build a website in i2p space; just turn on the server included in the
router package and populate the relevant local directories with content.

Pseudonyms that become visible in i2p space through participation over
time become "persons" in a community, defined by their in-network
behavior, building relationships and reputations based on their
contributions.  The folks who wear those masks mostly take good care of
them, because the trust and cooperation of other users in the community
has value:  When a well respected i2p user asks for something, other
users who have benefited from that user's contributions, advice, example
etc. make a real effort to come through, because that's what humans do.
Smart ones, anyway.

:o)

Postscript:  Above I mentioned True Names, from the Vernor Vinge novella
of that name.  Published in 1981, True Names introduced the term
'cyberspace' and several key concepts relevant to Cypherpunk interests.
 If you ain't seen it, here's a copy somebody else hosted so I don't
have to:  http://www.scotswolf.com/TRUENAMES.pdf
























signature.asc
Description: OpenPGP digital signature


Facebook Censorship? I'm banned right now!

2019-04-06 Thread Steve Kinney


On 4/6/19 12:19 PM, jim bell wrote:> Jim Bell's comment:
>
> If a well-functioning AP-type system were available, Zuckerberg
wouldn't even dream of doing this.
>
> Mark Zuckerburg wants censorship to protect his business model:
https://nypost.com/2019/04/05/mark-zuckerburg-wants-censorship-to-protect-his-business-model/
>

I just got my first three day suspension from The Facebook, for
"Bullying and Harassment."  We all know how the internet interprets
censorship and what it does; here's the offending text:

http://pilobilus.net/My.Thoughtcrime.html

The offending text contains none of the following:  Hate speech,
disparagement of any person or product, incitement to violence,
solicitation of crime, commercial content, personal attacks of any kind,
violent or sexual language of any kind.  It was on-topic in the reply
thread where I posted it.

My thoughtcrime?  I questioned the accuracy of the New Zeland Mosque
shooter's video, without explicitly describing anything in it.  Then I
very briefly speculated on the propaganda intent of the video,
concluding that the two most obvious but seemingly 100% contradictory
objectives would /both/ serve Corporate State interests by "playing both
ends against the middle."

Bullying and harassment?  On second thought, maybe I /did/ break some
Perfect Citizen's brain and send him howling into the night.  If so, go
and do ye likewise.

:o)





signature.asc
Description: OpenPGP digital signature


Re: CNBC: Zuckerberg backs stronger Internet privacy and election laws: 'We need a more active role for governments'

2019-03-31 Thread Steve Kinney


On 3/31/19 1:08 PM, jim bell wrote:
> CNBC: Zuckerberg backs stronger Internet privacy and election laws: 'We need 
> a more active role for governments'.
> https://www.cnbc.com/2019/03/30/mark-zuckerberg-calls-for-tighter-internet-regulations-we-need-a-more-active-role-for-governments.html
> 

So the richest man in the world wants three things:

Stronger internet privacy laws:  Zucking Fuckerberg does not like
competition in the consumer surveillance market.

Stronger election laws:  Less voters - through a process biased to let
typical consumers in, screen everyone else out.

A more active role for governments:  Expand NatSec/LEA surveillance
'partnerships' with service providers, shift the costs of censorship
from the private to the public sector.







signature.asc
Description: OpenPGP digital signature


Re: The Libertarian As Conservative

2019-03-29 Thread Steve Kinney


On 3/28/19 8:12 PM, Punk wrote:
> On Wed, 27 Mar 2019 19:27:34 -0400
> Steve Kinney  wrote:
> 
> 
>>
>> Fake Libertarians seem to play a large part in this dialogue.
>>
>> Would you care to describe the difference between Fake and Real
>> Libertarians, as you apply these terms?
>>
>> Until then we can only guess...
> 
>   I think I gave more than a few hints, but for completness' sake : fake 
> libertarians support, among other things :
> 
>   1) big business
>   2) theocracy
>   3) censorship
>   4) the 'minimal' or 'limited' state
>   5) imperialism - see ayn rand's 'philosophy' of ethnic cleansing
>   6) 'voluntary' slavery - see walter block
>   7) feminazism
>   8) 'social conservatism'
>   9) 'voluntary' authoritarianism
> 
> 
>   That's off the top of my head. There prolly is more stuff I'm 
> forgetting. As to true or actual libertarians, they would oppose all of that. 

So in short, Anarchists can call themselves Real Libertarians, but
nobody else meets the standard.

:o)




signature.asc
Description: OpenPGP digital signature


Re: The Libertarian As Conservative

2019-03-27 Thread Steve Kinney


On 3/27/19 7:16 PM, Punk wrote:
> 
> 
>   let me add one more datapoint. There's a guy called hans hoppe who is a 
> 'leading'  'anarcho' fascist and a 'leading' 'intelectual' at moishe.org, 
> moses.org or mises.org
> 
>   here is, in a sentence, what that clown thinks about 'libertarianism' 
> and conservatism
> 
>   "The relationship between libertarianism and conservatism is one of 
> praxeological compatibility, sociological complementarity, and reciprocal 
> reinforcement."
> 
>   quote comes from a monumental joke of a book called "democracy the god 
> that failed".
> 
>   Of course, every time that asshole says libertarianism he means his own 
> fake version of it...which is indeed quite close to conservatism.

Fake Libertarians seem to play a large part in this dialogue.

Would you care to describe the difference between Fake and Real
Libertarians, as you apply these terms?

Until then we can only guess...

:o)





signature.asc
Description: OpenPGP digital signature


Re: The Libertarian As Conservative

2019-03-27 Thread Steve Kinney


On 3/27/19 2:25 PM, Punk wrote:
> On Tue, 26 Mar 2019 19:06:03 -0400
> Steve Kinney  wrote:
> 
>>
>> Between Libertarian and Conservative I see differences in belief and
>> style, but not in motives and actions. 
> 
>   yes in practice all that 'libertarians' do is wprk and praise google, 
> goldman sachs, facebook and all teh rest of corporate criminals. 
> 
>> I would not describe
>> Libertarians as "Conservatives who do drugs," but maybe as
>> "Conservatives who have no use for fundamentalist religion."  I think
>> that hits the mark squarely.
> 
>   well that's funny because there actually are a lot of 'libertarians' 
> who are fully deranged theocrats - many of them are part of the lew rockwell 
> mafia and the moises.org 'institute'  -   see for reference 
> 
>   
> https://blog.skepticallibertarian.com/2013/04/08/gary-north-the-libertarian-taliban/
> 
>   scum like  rockwell and jeffrey tucker(promoted in this list by 
> grarpamp) are 'anarcho' CATHOLICS (infinite self parody)  - but since they 
> are really 'tolerant' they are accomplices of protestant nutcase north who 
> wants to...stone heretics (no, I'm not making this shit up).
> 
>   So, the views of many 'libertarians' on jew-kkkristian religion are 
> actually straight from the dark ages. There are very very few libertarians 
> who speak against organized religion, also known as organized fraud but the  
> majority of 'libertarians' are actual religious fraudsters or accomplices who 
> 'tolerate' fraud and theocracy. 

I guess it just shows to go ya:  I must hang out with a hip crowd.  I,
too, would have to cite media personalities appearing in propaganda
placements, to name a Libertarian who embraces the Religous Reich agenda.

I am sure such folks must exist, somewhere (and that there is pr0n of
it), but I would view THEM as Libertarian Heretics, who definitely need
to get stoned, preferably on a Sunday morning.  if 250 micrograms
doesn't do it, double the dose.

:o)






signature.asc
Description: OpenPGP digital signature


Re: The Libertarian As Conservative

2019-03-26 Thread Steve Kinney


On 3/26/19 6:22 PM, Punk wrote:
> 
> The Libertarian As Conservative - Bob Black
> 
> https://theanarchistlibrary.org/library/bob-black-the-libertarian-as-conservative
> 
> ---
> 
> I think Black's views are mostly accurate. Vast majority of people who 
> pretend to be 'libertarians' are in reality rabid supporters of industrial 
> fascism. 

An interesting article, but a little long winded and jargon heavy for my
taste.  I like radical propaganda that does not alienate "regular folks"
on contact.

When I see "Libertarian as Conservative" I mentally respond, "So what
else is new?"  If the Libertarian ideology of its leading U.S. advocates
did not share key features with Conservative theory and practice, why
would Republican operatives have taken the trouble to co-opt the
Libertarian Party in a hostile buy-out back in the 1990s?  Today our
Libertarian speakers, authors and pretend-candidates work in tandem with
the Republican Party:  Both do their best to defend billionaires and
their corporations from taxation, fight against unions as a matter of
principle, assert the right of Corporate persons to destroy communities
and natural resources to enhance shareholder value for absentee
landlords, etc.

When I think about the word "Conservative" as more than just an
arbitrary label, I have to ask what the people involved want to
"conserve."  Libertarians I have personally known were interested in
conserving their Middle Class status - real, aspirational or imaginary -
against perceived assaults by lesser economic beings and, paradoxically,
the State tyranny that makes their preferred way of life possible.

Between Libertarian and Conservative I see differences in belief and
style, but not in motives and actions.  I would not describe
Libertarians as "Conservatives who do drugs," but maybe as
"Conservatives who have no use for fundamentalist religion."  I think
that hits the mark squarely.







signature.asc
Description: OpenPGP digital signature


Re: The US government is involved in black magic

2019-03-25 Thread Steve Kinney


On 3/24/19 6:40 PM, Ryan Carboni wrote:
> There has been speculation that there is an occult nexus with the cow
> mutilations of the 80s, which involved bloodless killings of cows with
> seemingly random organs being surgically removed. It is odd that the
> Peggy Hettrick murder case in ‘88 involved surgical removal of some
> sexual organs. The crime scene was such that it is possible for someone
> to mistake the body for a mannequin.
> 
> It is spectacular that the “FBI Behavioral Science Unit” participated in
> something improbable, they thought a high school student with no
> connection to the crime other than being seen in the area briefly was
> involved. 
> 
> It isn’t clear how he could have done it, but no doubt they have all
> learned about the Milgram experiment, only to miss the point. If they
> were ordered to do the indefensible, would they refuse? If their actions
> were questioned, would they defend themselves? Would they defend their
> institution? 

I have got a theory that I have, which is mine, (etc.)...

- Anne Elk, Monty Python's Flying Circus

According to this theory that I have, the cattle mutilation reports
present as highly consistent with germ warfare research in progress.

The MK NAOMI papers tell us that our three letter agencies have release
"weakened strains" of pathogens in U.S. cities, and monitored hospital
admissions to track their spread.  So I see no reason they would
hesitate to do similar research on BW vectors in livestock populations.
 Why?  To develop both attacks and defenses against economic warfare by
means of epidemics affecting commercially valuable animals.

First and foremost, the nature of the wounds and the tissues collected
appear fully consistent with collecting specimens relevant to evaluating
the behavior of an infectious disease in progress:  Organs presenting as
potential sites for entry and/or initial infection by pathogens, and
blood which would indicate the metabolic and immune responses to
infection.

Second, in most reports it seems obvious that the samples were collected
by someone equipped with laser cutting tools:  Clean, straight edged
wounds that did not bleed - not even one drop.  As these procedures
/apparently/ took place at sites without so much as a wall socket,
whoever did it had to carry both the (then) rare and expensive laser
surgery gear /and/ its power source with them.

Third, helicopters.  I have seen reports where witnesses describe
hearing and, rarely, seeing helicopters at the sites where the dead
animals were later found.  "Black helicopters" do exist - 20 years ago I
saw three fly right over my house near downtown Orlando, at treetop
level.  I heard what I thought was a helicopter approaching from maybe a
quarter mile away, looked up, and they were passing directly overhead.
At the time I assumed they were on a training or demonstration flight.
These airplanes first became available at about the time the cattle
mutilation stories started to surface.

4th, no tracks.  The people who found and reported them saw no signs
that any vehicles had been near the animals until the folks who reported
them showed up.  No ranchers in these areas ever reported any signs of
ground-level intruders, as far as I can recall.  So, aircraft seem an
unavoidable part of the picture.

5th, no flying saucers.  I do not recall even one instance where a
mutilation report coincided by time and place with any reports
describing "classic UFO" phenomena, except where and as consistent with
the quiet helicopter model, i.e. stationary or nearly stationary bright
lights seen at or very near ground level.  I seem to recall a couple of
accounts where the lights were pointed at distant observers to obscure
whatever was going on at the sites.

Had the Hettrick murder been associated with a similar project or
program, I would expect to find multiple accounts of similar unsolved
murders - but a cursory search turned up nothing that looked connected.
 In the Hettrick case, a cursory review indicates that investigators
found no reason to doubt that her wounds were made by conventional edged
tools.  Maybe a fan of the Whitechapel killer and/or Ed Gein at work?

In re government involvement in "black magic," see papers associated
with Michael Aquino, and accounts of military PsyOps exploitation of
"superstitious beliefs."

Also check out the Stanford Institute, a CIA think tank in Marin County,
California:  SRI was famous for certifying Israeli stage magician Uri
Geller as an authentic miracle worker, but much more important as the
organization that produced the New Age Bible called A Course In
Miracles.  The Course, as its devotees call it, teaches a complete
circular argument world-view where wishing literally makes all things
so.  Therefore all who suffer for any reason voluntarily brought it on
themselves - by logical extension "social conscience" presents as a
correctable personal weakness.  I have seen devotees of the Course
demonstrate the results of this 

Re: What do you think happened here?

2019-03-25 Thread Steve Kinney


On 3/25/19 7:53 AM, Mirimir wrote:
> On 03/24/2019 01:03 PM, Ryan Carboni wrote:
>> https://mchap.io/that-time-the-city-of-seattle-accidentally-gave-me-32m-emails-for-40-dollars4997.html
>>
>>> Somewhere towards the end of the call, I asked them if it was okay to keep 
>>> the emails. Why not at least ask, right?
>>
>>> Funny enough, in the middle of that question, my internet died and 
>>> interrupted the call for the first time in the six months I lived in that 
>>> house. Odd. It came back ten minutes later, and I dialed back into the 
>>> conference line, but the mood of the call pretty much 180’d. They told me:
>>
>>> 1. All files were to be deleted.
>>
>>> 2. Seattle would hire [Kroll](https://www.kroll.com/en-us/default.aspx) to 
>>> scan my hard drives to prove deletion
>>
>>> 3. Agreeing to #1 and #2 would give me full legal indemnification.
>>
>>> This isn't something I'm even remotely cool with, so we ended the call a 
>>> couple minutes later, and agreed to have our lawyers speak going forward.
>>
>> Sudden DDOS attack after attempt to stall for time?

>> I tried writing an email about this before, but my Linux machine suddenly 
>> froze.
>> Tempting to claim that naive implementations of IP stacks should be used for 
>> home users and authentication servers (with the rest using standard 
>> implementations). Journalists certainly should use a VPN, NAT isn’t a 
>> firewall, but it is pretty close.
>>
>> Sent from ProtonMail Mobile
> 
> FYI: https://news.ycombinator.com/item?id=18257867
> 
> It's a little odd that someone mucking about with ~iffy FOIA requests
> doesn't have a decent firewall, and isn't using at least a VPN.
> 
> But at least he had a lawyer on retainer.
> 
> It's a little hard to imagine that the City of Seattle IT folks would
> try to pwn his computer. Or even have his ISP disconnect him. At least,
> in the time frame of a few minutes.

Even harder to imagine, considering that the City of Seattle's IT folks
would include the ones who accidentally sent tons of /obviously/
sensitive and privileged information out in response to an FOIA request.

I find it more than easy to imagine that the NSA 'noticed' a giant
exfiltration of stored government-related communications crossing the
networks from their proper home to a residential IP, and flagged it for
immediate human attention.  That's kind of their job.  If so, they would
have placed both sender recipient under heel to toe electronic
surveillance, likely including implants in the firmware of relevant
phones and computers.  Collect now, ask questions later.

Given that possibility, I also find it easy to imagine that "people"
listened in on the phone call about the accidental exposure with great
interest - via a toolkit that gave them entire control of the call's
infrastructure from end to end.  When the question of the receiver
keeping all the excess data came up, I can picture somebody pulling the
plug on his connection, vs. breaking into the call and saying "oh no you
don't" or some such, both to prevent things from getting "way worse" and
to buy time for remedial action.

Ten minutes sounds about right for the NSA guise to explain their
presence on the line to the Seattle guise, scare the living shit out of
them, tell them what to say when contact was restored, and turn things
back on.

In this context, a "Linux machine" freezing while the user was writing
an e-mail about this stuff sounds like a shot across the bow, telling
the writer that Big Brother Is In Ur Box Watching U Type.  Maybe not,
but in common experience GNU/Linux rarely freezes except under loads
that exceed the capacity of the hardware.  Maybe the above mentioned
malware malfunctioned when the user's typing kept tripping filters
telling it to start copying keystrokes and phone them home "now instead
of later".

:o)








signature.asc
Description: OpenPGP digital signature


Re: The NSA Has Apparently Stopped the Domestic Surveillance Program Snowden Exposed - Hit & Run : Reason.com

2019-03-05 Thread Steve Kinney


On 3/5/19 6:27 PM, jim bell wrote:
> https://reason.com/blog/2019/03/05/the-nsa-has-apparently-stopped-the-domes
> 


From an article cited in the blog post referenced above:

?When the agency then fed those numbers back to the telecoms to get the
communications logs of all of the people who had been in contact with
its targets, it ended up gathering some data of people unconnected to
the targets. The agency had no authority to collect their information,
nor a practical way to go through its large database and cull those
records it should not have gathered. As a result, it decided to purge
them all and start over."

https://www.nytimes.com/2019/03/04/us/politics/nsa-phone-records-program-shut-down.html

So... if this presents an accurate account of the NSA's statements, the
NSA has very obviously lied.  No "practical way to go through its large
database and cull those records it should not have gathered"?  When in
fact, a single query based on the unique identifiers of "authorized"
collection targets could grind through those records and delete all that
did not include such an identifier in any of the fields.  Granted, that
might have taken weeks to set up and test and days to run against the
'live' data, costing thousands of dollars worth of burn rate:  But that
constitutes FAR less than the proverbial drop in the bucket, relative to
NSA's staff, technology and budget resources.

An operation purging all but "contacts of contacts" would have taken an
order of magnitude longer, and so forth with 3rd hand contacts, etc.
But IF that database was of any potential use at all for targeting
people on enemies' lists for detailed social network profiling (as
intended), by definition a clean-up process falls within the scope of
NSA capacity and budgets.

My guess?  The specific program initially exposed by the Snowden docs
outlived its usefulness, as a next generation program doing the same job
"better, stronger, faster" displaced it.  That new program does not
exist for legislative and legal purposes, because nobody outside
compartments with authorized access to it knows it exists.  Considering
that U.S. public policy embraces mass murder "in The National Interest,"
just recording and saving everything that crosses the network for later
use in retroactive surveillance raises no possible "moral" or "legal"
issues.

Hell, consider what archive.org, a nonprofit, manages to do.  Example:

https://web.archive.org/web/20190130133923/https://www.brookings.edu/research/recording-everything-digital-storage-as-an-enabler-of-authoritarian-governments/











signature.asc
Description: OpenPGP digital signature


Re: Riseup blocks Gmail

2019-02-27 Thread Steve Kinney


On 2/27/19 3:41 AM, grarpamp wrote:
> On 2/27/19, Shawn K. Quinn  wrote:
>> Looks more like Google got blacklisted by one of the lists
> 
> Yeah missed that, thanks.
> 
>> an account that can't email
>> *@gmail.com is much less useful than one that can.
> 
> Gmail needs to die.

I use a GMail account as a junk catcher and for redundant offsite
backups of encrypted files.  So I don't look at it often - and did not
notice when they silently terminated my access a few weeks ago.

Why?  Because I don't use a web browser or Google "app" to access it.  I
use IMAP via Thunderbird.  Google decided they don't like that, probably
because it slashes GMail's surveillance capabilities to the bone while
making numerous other service providers available in one convenient
location.

It only took a few minutes to troubleshoot the problem thanks to teh
interwebs.  One can restore access by solving a fairly easy maze (follow
the path of greatest resistance, per "UX Funnel" page layouts, and click
through multiple scary warnings) to turn on access by "less secure
apps".  In this context less secure would mean not owned by Google,
since the configuration I use presents as the most secure and convenient
way to access GMail - literally by orders of magnitude.

Google just sent me a helpful message begging me to stop what I'm doing
before Very Bad Things happen to me, and turn my computer over to them.
 It's nice to know they care - and as long as I'm getting those, I know
they have not sabotaged the account again.

Speaking of annoyances, am I the only one who finds the word "app"
annoying, and the suggestion that I use "apps" vaguely insulting?  I
guess I identify more with Dilbert than with The Guys In Marketing...

:o/







signature.asc
Description: OpenPGP digital signature


Re: How to achieve 1 meter accuracy with Android Was: Re: Dropgang vulnerabilities

2019-02-24 Thread Steve Kinney


On 2/24/19 2:01 AM, jim bell wrote:
> https://www.gpsworld.com/how-to-achieve-1-meter-accuracy-in-android/
> 
> [partial quote begins]
> 
> Recent changes in hardware and standards make one-meter accuracy
> possible, in some cases as soon as this year. The transcript of a talk
> given to Android developers earlier this year, this article gives a
> short overview of location in smartphones, introduces Wi-Fi round-trip
> time technology and standards, and then explains the Wi-Fi application
> programming interfaces.
> 
> /By Frank van Diggelen, Roy Want and Wei Wang, Android Location, Google/

That's very relevant indeed - one-meter accuracy would remove the need
to put any kind of 'flag' on top of a dead drop container.  Without
retroreflectors or etc. marking packages, broad searches of likely drop
areas would not produce results worth paying for.  Also buyers would
have no need for a means of finding inconspicuous retroreflectors - just
a 'really good' mobile phone.

Still not "the perfect crime", but a much improved one.

:o)





signature.asc
Description: OpenPGP digital signature


Re: Scientific perfection and Scientific debates

2019-02-19 Thread Steve Kinney


On 2/19/19 7:49 PM, Punk wrote:
> 
>   This is quite remarkable, IBM (an american corporation and thus morally 
> perfect - see ayn  rand philosophy) created an Artificial Intelligence 
> Debater and the Artificial Intelligence Debater scientifically proved that 
> 
> 
>   "children who do not attend high quality preschool are far more likely 
> to commit violent crimes"
> 
>   (no I am not making that shit up - that's a literal quote)
> 
>   https://www.youtube.com/watch?v=m3u-1yttrVw 

I did not attend /any/ preschool, instead I sat home watching cop shows,
spy dramas and Perry Mason on TV.  I have never been arrested or charged
for any of my violent crimes.

Worked for me.

:o)







signature.asc
Description: OpenPGP digital signature


Re: Vermont legislator proposing a law that bans code instructions on how to create firearms

2019-02-14 Thread Steve Kinney


On 2/12/19 5:02 AM, grarpamp wrote:
>> a fair judge
> 
> This seems rare... as in many democracies
> and other forms, the judge is appointed at
> leisure of executive, paid through executive
> tax enforcement, etc. Some have legislative
> oversight. Yet where is a design where the people
> (criminal / rights courts), or at least the parties
> to most cases heard (civil courts), are the
> majority executive actors / payers,
> and not just some fabled ultimate backstop?
> 

Once in a blue Moon, an honest Judge.

https://torrentfreak.com/angry-judge-tears-prenda-copyright-trolls-apart-130312/


:o)




signature.asc
Description: OpenPGP digital signature


Re: Apollo 11, Govt Drone Shaming, Censors, Bio Hacking, Energy

2019-01-28 Thread Steve Kinney


On 1/28/19 2:36 AM, Shawn K. Quinn wrote:
> On 1/28/19 00:59, Steve Kinney wrote:
>> I was recently noticed that Google has delisted this page, hosted at my
>> vanity website, due to a (bogus) allegation of copyright violation:
>>
>> http://pilobilus.net/strategic_conflict_docs_intro.html
>>
>> Imagine how crestfallen, heartborken, etc. I am:  Nobody searches for
>> "nonviolent conflict documents" but I can toss the link out in the path
>> of hundreds, at least, of potentially interested parties via Social
>> Media and etc.  And now, here in CPunk land.
> 
> Why http when you can torrent...

Because I don't want to limit the audience to the 1% or so who use bit
torrent (according to some stats I just looked up).  Also because I
occasionally add files to the archive, and hosting it on a web server
(plus updating the copy at archive.org) assures that everybody who
downloads it gets the latest version.

Mind you, distributing the collection as a torrent makes sense - if
enough people "adopt" the thing to keep it seeded, that provides a
distributed archival copy, hard to scrub out of the networks.

> magnet:?xt=urn:btih:fcdacd77a5249c9d0db6767aea777a2fe56df441=Strategic%5FNonviolent%5FConflict=udp%3A%2F%2F9.rarbg.to%3A2710%2Fannounce=udp%3A%2F%2Ftracker.vanitycore.co%3A6969=udp%3A%2F%2Ftracker.coppersurfer.tk%3A6969=udp%3A%2F%2Fexplodie.org%3A6969=udp%3A%2F%2Ftracker.pirateparty.gr%3A6969%2Fannounce=udp%3A%2F%2Ftracker.cyberia.is%3A6969%2Fannounce

Yay!

Speaking of torrents, here's a bit of fun:  Punishment Park (Peter
Watkins, 1971), a pseudo-documentary where a British film crew follows a
U.S. political tribunal.  The by-definition guilty suspects can choose
their sentence:  A long prison term, or a three day hike in Punishment
Park.  Watkins cast real radicals and real pigs in as many roles as
possible, and it shows:  A couple of them do "lose their shit" on
camera.  In a 'meta' sense the film really does present as a
documentary.  Five stars, etc.

magnet:?xt=urn:btih:ddf539b77fe77902e9dbb2d9ec09209e888f2d69=Punishment+Park+%28Peter+Watkins%2C+1971%29+Masters+of+Cinema=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969=udp%3A%2F%2Fzer0day.ch%3A1337=udp%3A%2F%2Fopen.demonii.com%3A1337=udp%3A%2F%2Ftracker.coppersurfer.tk%3A6969=udp%3A%2F%2Fexodus.desync.com%3A6969


:o)





signature.asc
Description: OpenPGP digital signature


Re: Apollo 11, Govt Drone Shaming, Censors, Bio Hacking, Energy

2019-01-27 Thread Steve Kinney


On 1/27/19 8:16 PM, grarpamp wrote:

> YouTube said today that it is retooling its algorithm in order to
> prevent promoting conspiracies and false information, reflecting a
> growing willingness to quell misinformation.
> These often serve up unsavory content: conspiracy theories about
> mass-shooting events being staged
> (https://www.liveleak.com/view?i=fe2_1519717074), that the moon
> landing never happened (https://www.youtube.com/watch?v=QhxTwcslfCY),
> that the Earth is flat (https://www.youtube.com/watch?v=eKlIroTxxVM).
> YouTube promises you'll see less of those kinds of videos.

I was recently noticed that Google has delisted this page, hosted at my
vanity website, due to a (bogus) allegation of copyright violation:

http://pilobilus.net/strategic_conflict_docs_intro.html

Imagine how crestfallen, heartborken, etc. I am:  Nobody searches for
"nonviolent conflict documents" but I can toss the link out in the path
of hundreds, at least, of potentially interested parties via Social
Media and etc.  And now, here in CPunk land.

Appy Polly Loggies for the delay, O My Brothers...

Having read the document in question (Antifa: The Anti-Fascist Handbook
by Mark Bray), I have no worries:  The author presents as a partisan
advocate of anti-fascism, more interested in getting the word out than
making money off /every/ instance where a mark lays eyes on his
deathless prose.

The said doc presents a remarkably well informed history of Fascist
movements and their opponents, IMO a landmark in academic/practical
presentations of political history relevant to current events.

Get it, read it.  The price is right.  And the rest of the docs in the
archive may present a title or two you wanna see as well.

:o)





signature.asc
Description: OpenPGP digital signature


Re: [Cryptography] Happy birthday, NIA!

2019-01-27 Thread Steve Kinney


On 1/27/19 9:14 PM, grarpamp wrote:
> On 1/21/19, Dave Horsfall  wrote:
>> The predecessor of the CIA, the National Intelligence Agency was created by
>> President Truman on this day in 1946; it merged with its operational arm,
>> the CIG (Central Intelligence Group) to become another TLA, the CIA, in 1947,
>> located at Foggy Bottom.
> 
> Why are you celebrating singing cheer praise and thanks
> songs and giving happy gifts for a bunch of top secret lying
> human experimenting torturing murderers since inception...

"You got to love your enemies, because hate makes you misunderestimate
them." - George W. Bush

I would not doubt that he learned a more grammatically correct version
of that saying at his daddy's knee, what with Poppy's history as
Director of Central Intelligence.  It's very much "spook think," and
immensely valuable to the likes of us as well.

In re the CIA, a few years ago I ran across a copy of The Secret Team by
Col. L. Fletcher Prouty:  He went directly from OSS work to a senior
briefer position at CIA, and he did not like what he saw.  The Secret
Team presents as the /only/ significant history and analysis of the
CIA's structure and function.  I would even say that nobody understands
that gang's methods, and the scope and distribution of their power, who
does not know their Prouty:

https://archive.org/details/pdfy-JnCrjsoqI22z8p9i

Speaking of spook think, The Psychology of Intelligence Analysis by
Richards J. Hauer, a textbook for the guise and gals who do real
intelligence work (as opposed to various forms of terrorism, wet work,
etc.), presents as required reading for radicals IMO.  Emotionally
loaded perceptions of "enemy" actors lead to gross errors in estimating
their intentions, capabilities and likely actions.

Our Mr. Hauer definitely earned his pay while pounding out this textbook
at taxpayer expense, and to their credit the CIA makes it available to
the public.  But this link from JYA should reduce the paranoia factor
for those interested in learning how "competent spies" really do their
thing.

http://cryptome.org/2013/01/aaron-swartz/Psychology-of-Intelligence-Analysis.pdf


Go and do ye likewise:  When Satan himself tells the truth, that does
not magically convert it to a lie.

:o)




> https://en.wikipedia.org/wiki/Human_rights_violations_by_the_CIA
> https://en.wikipedia.org/wiki/Extraordinary_rendition
> https://en.wikipedia.org/wiki/Enhanced_interrogation_techniques
> https://en.wikipedia.org/wiki/Targeted_killing
> https://en.wikipedia.org/wiki/Project_MKUltra
> https://en.wikipedia.org/wiki/Project_ARTICHOKE
> https://en.wikipedia.org/wiki/Project_MKOFTEN
> https://en.wikipedia.org/wiki/Unethical_human_experimentation_in_the_United_States
> https://en.wikipedia.org/wiki/CIA_activities_in_the_United_States
> https://en.wikipedia.org/wiki/Sidney_Gottlieb
> https://en.wikipedia.org/wiki/Frank_Olson
> https://en.wikipedia.org/wiki/Harold_Blauer
> https://en.wikipedia.org/wiki/Blue_sky_memo
> https://en.wikipedia.org/wiki/Bush_Six
> https://en.wikipedia.org/wiki/Gina_Haspel#Torture_and_destruction_of_evidence_controversy
> https://en.wikipedia.org/wiki/United_States_v._Khalid_Sheikh_Mohammed#Torture_and_the_role_of_Gina_Haspel
> https://en.wikipedia.org/wiki/Abu_Omar_case
> https://en.wikipedia.org/wiki/List_of_CIA_controversies
> https://en.wikipedia.org/wiki/Senate_Intelligence_Committee_report_on_CIA_torture
> https://en.wikipedia.org/wiki/U.S._Army_and_CIA_interrogation_manuals
> https://en.wikipedia.org/wiki/United_States_and_state-sponsored_terrorism
> https://en.wikipedia.org/wiki/United_States_and_state_terrorism
> https://en.wikipedia.org/wiki/Family_Jewels_(Central_Intelligence_Agency)
> 



signature.asc
Description: OpenPGP digital signature


APNewsBreak: Undercover agents target cybersecurity watchdog

2019-01-26 Thread Steve Kinney

APNewsBreak: Undercover agents target cybersecurity watchdog

> NEW YORK (AP) — The researchers who reported that Israeli software was used 
> to spy on Washington Post journalist Jamal Khashoggi’s inner circle before 
> his gruesome death are being targeted in turn by international undercover 
> operatives, The Associated Press has found.
> 
> Twice in the past two months, men masquerading as socially conscious 
> investors have lured members of the Citizen Lab internet watchdog group to 
> meetings at luxury hotels to quiz them for hours about their work exposing 
> Israeli surveillance and the details of their personal lives. In both cases, 
> the researchers believe they were secretly recorded.

[...]

https://www.apnews.com/9f31fa2aa72946c694555a5074fc9f42

I was happy to see that Israeli malware vendor NSO has "zero competence"
in the field of human intelligence, and that their efforts to penetrate
Citizen Labs harmed no one's interests but their own.  The academic
security researchers from Citizen Lab spotted NSO's wannabe intelligence
officers as hostiles at once, which comes as no surprise:  "Security is
security" in any context.  The Citizen Lab guise demonstrated a real
understanding of their subject matter by taking effective steps to steal
the initiative early, with (apparently) decisive results.

https://citizenlab.ca/

:o)





signature.asc
Description: OpenPGP digital signature


Re: Dropgang vulnerabilities

2019-01-22 Thread Steve Kinney


On 1/13/19 10:43 PM, Mirimir wrote:
> Dropgangs, or the future of dark markets

Here's some ideas about structural vulnerabilities in the Dropgang
protocol, as described at https://opaque.link/post/dropgang/

Dead drop reuse:

To achieve acceptable security each dead drop may be used once only,
because hostile buyers could place 'their' dead drops under video
surveillance  and record every courier and customer visit to the drop
following their own transaction.

Couriers delivering to dead drops can not determine if their supplier
sends them to previously used dead drops, unless they service only dead
drops they set up and document themselves.  Couriers should transmit the
locations of drops they have developed only when presented with an order
to fill, to assure that their distributor can not send other couriers
and customers to use them first.  The added surveillance exposure of
making two visits to the same site - setup and delivery - presents less
exposure than trusting that the anonymous seller will never send a
courier to a previously used dead drop.

Sales layer incentives for reusing dead drops include faster service
during episodes of high demand for their products, and reducing the
payment demands (time & labor = money) of their pool of delivery agents
by reducing the need to develop new dead drops.  Compared to single-use
dead drops, reusing dead drops would enable distributors to reduce the
cost of compensating agents to select and document new dead drops by up
to 1/n the number of delivery agents employed, without disclosing to any
delivery agent that the distributor does reuse dead drops.  Absent an
active and aggressive adversary, reusing dead drops would present few
risks, so distributors may "get away with it" long enough to establish,
in their own minds, that reuse is safe enough, and "either way I am not
personally at risk."

In the context of potential reuse of dead drops by unwitting delivery
agents, isolation of the Sales layer from the Distribution layer via
cryptography and mix networking tends to create potential hazards rather
than removing them:  Exposing delivery agents to drop-dead risks may
cost sales agents some employees but has no other immediate
repercussions as no evidence implicates them in exposing service agents
to hostile actors.  Over time a sales layer actor who burns delivery
agents may run into trouble secondary to "cooperating witnesses"
assisting investigators working their way up the chain of product
custody; faith in the security of the protocol could easily lead some
bad faith actors to dismiss that possibility.

I noted that the article linked above endorses reuse of dead drops as
acceptable, by saying that "An ideal dead drop is however used exactly
once. Only then can the risks of using it be reduced to pure bad luck."
 I would hesitate to make purchases via the Dropgang protocol, because
customers have no way of assuring that hostile buyers did not visit the
same dead drops first - and some Dropgang advocates do not seem to
understand the severity of the risks associated with dead drop reuse in
the Dropgang context.

Dead drop profiling:

I believe the ability of hostile actors to in effect purchase dead drop
locations, and delivery timing information, presents as an Achilles heel
of the Dropgang protocol even with single use dead drops:  Controlled
buys would enable State or other well funded actors to map and profile
dead drop sites, reducing scope of counter-Dropgang surveillance from
"everywhere people can go" to target areas.

The more random-ish and widely dispersed the dead drop sites, the higher
the overhead in developing and servicing new drop sites due to travel
time, orientation to unfamiliar terrain, etc.  In most instances dead
drops will concentrate in the most convenient terrain for delivery
agents and customers.

As geographic clusters of dead drops appear in data from controlled
buys, more effective surveillance of those areas would follow.  This
observation suggests a security advantage when fewer, higher value
transactions are handled, reducing the number of data points available
to hostile buyers, and justifying more travel and effort to service
drops.  Bulk purchasers may also tolerate longer latency between orders
and pickups than end use consumers.  Higher latency reduces exposure to
timing attacks and retroactive surveillance.

Timing attacks:

Controlled purchases in conjunction with surveillance of suspected
delivery agents (distribution layer) enable timing attacks, as buyers
would know that the agent who filled their orders did so between the
times the orders were placed and picked up.  Surveillance State
adversaries could correlate controlled buys with the movements of
individuals in a pool of suspects.  Also, creating spikes in demand
through multiple controlled purchases could prompt increased activity by
delivery agents during time frames of an attacker's choice.  Conducting
intensive surveillance of likely drop areas 

Re: Apple Talks Shit About Privacy at CES

2019-01-07 Thread Steve Kinney


On 1/6/19 3:56 PM, grarpamp wrote:
> https://www.engadget.com/2019/01/05/apple-ces-2019-privacy-advertising/
> https://www.engadget.com/2016/02/18/fbi-apple-iphone-explainer/
> https://www.android.com/security-center/
> https://source.android.com/security
> https://apple.com/privacy
> 
> "What happens on your iPhone, stays on your iPhone."

> That privacy priority came
> into clear focus three years ago when Apple refused to assist the FBI
> in unlocking an iPhone that belonged to a suspected terrorist in San
> Bernardino, CA. 

I would describe that episode as a publicity stunt cooked up by the FBI
and DoD contractor Apple.  If I recall correctly, Apple claimed it
"could not" unlock the device in question; but after public attention
started to die down, a 3rd party forensics shop did unlock it.

Meanwhile, back in the network security world, Declan Mccullagh reported:

https://www.cnet.com/news/apple-deluged-by-police-demands-to-decrypt-iphones/


"ATF says no law enforcement agency could unlock a defendant's iPhone,
but Apple can 'bypass the security software' if it chooses. Apple has
created a police waiting list because of high demand."

:o)









signature.asc
Description: OpenPGP digital signature


Re: How Feminism, aka worthless feminazi scum is funded

2019-01-06 Thread Steve Kinney


On 1/6/19 5:54 PM, Punk wrote:

>   feminazi scum (aka feminists) got a 200 millions loan from the 
> americunt government. 
> 
>   Notice how feminist scum in a banana republic is 'financed' by the 
> supreme scum of the planet, the americunt government. Though of course, the 
> loan will be repaid with money stolen from argie taxpayers. So americunt scum 
> will actually get back their 'capital' PLUS usury. 
> 
> 
>   
> https://www.iadb.org/es/noticias/el-bid-acompana-medidas-para-impulsar-la-igualdad-de-genero-en-argentina

Funny thing:  All the feminists I have known had a primarily anarchist
orientation.  I guess it depends on who you run around with - and/or
whether one's information comes from personal contacts or mass media
propaganda sources.  If that seems "wrong" look up Emma Goldman, Lucy
Parsons and Simone De Beauvoir.

Feminazis seem to have originated in the New Left.  Presenting a
caricature of reactionary Marxism, the New Left rose to prominence in
the 1960s, displacing and discrediting Liberal and Pacifist voices in
U.S. media during the Vietnam War.  I suspect these folks had US State
sponsors:  The FBI's funding and direction of terrorist cells in the
U.S. at that time (per evidence in Court cases acquitting "dupes")
indicates vigorous political warfare against home grown U.S. dissidents.
 Failure to field a media personality propaganda front demonizing
dissidents would make no sense at all.

Following a make-over in the late 70s & early 80s, the New Left and its
new recruits call themselves Progressives.  Working as freelance
profiteers under the sponsorship of folks like Our Mrs. Clinton and her
network, our Progressives continue to use every means at their disposal
- now a respectable arsenal of propaganda assets, astroturf fronts,
friendly elected officials, etc. - to discredit and suppress grass roots
Liberal and Pacifist political activism, not to mention anti-Fascist
organizers and anything resembling anarchism.

:o/





signature.asc
Description: OpenPGP digital signature


Re: Privacy -focused Proton Mail is Full of Niggers and jews

2019-01-04 Thread Steve Kinney


On 1/4/19 2:26 PM, Winter-chan wrote:
> Pic related.
> 

"Your e-mail or phone number will not be linked to the account created.
 It is only used during the sign-up process.  A hash will be saved to
prevent abuse of ProtonMail systems."

If true, so much the better.

If false, any throw-away e-mail service - accessed via "anonymized"
means - produces the same result as if the above was true.

I guess that makes Niggers and Jews smarter than ... well, certain people.

:o)




signature.asc
Description: OpenPGP digital signature


Re: Where is Coderman?

2019-01-01 Thread Steve Kinney


On 12/31/18 4:30 PM, Where is Coderman? wrote:

> A while back Coderman posted about FBI disruption strategies. Did
> Coderman get disrupted? Or is Coderman dead?
> 
> “FBI disruption strategies - extra-judicial life destruction
> 
> '''
> Disruption strategy involves “a range of tools including arrests,
> interviews, or source-directed operations to effectively disrupt
> subject’s activities.”

Speaking of which, regional so-called Bureaus of Investigation and even
Town Clowns also use 'disruption strategies' to reduce or eliminate the
effectiveness of political activists and other annoyances.

Step one, two gents in conservative suits visit your employer, flash
impressive ID cards, and obtain consent for a "confidential" interview.
 Then they start asking questions:  How well to you know The Subject,
have you seen any indications of X, Y or Z?  They won't accuse you of
anything, but their leading questions say that you are involved in dope
dealing, terrorism, child trafficking, or whatever else they judge will
frighten and/or anger your employer the most.

Kiss that job goodbye.

Your next employer visits the State labor department website to complete
an unemployment compensation form, and on the same day their phone
rings:  Your SSN tripped a filter, and an e-mail arrived at your local
Fusion Center. A watch officer grabs the script indicated, picks up the
phone and asks for an appointment to interview your new employer, again
on a "confidential" basis.  Needless to say, the new hire intake process
ends there and then with weak or no excuses made.

How does a person get on an enemies list like the one described?  Well,
bluntly refusing to inform on your friends will do it - especially if
you "turn" the asset who made the recruiting pitch, and/or feed him or
her intelligence designed to waste as much of the opposition's money and
resources as possible.  For instance if you "have reason to believe"
that certain people hanging around local activist orgs are Federal
informants, persuading informants working for your Town Clowns that they
are high level drug dealers might provide some harmless amusement.

:o)






signature.asc
Description: OpenPGP digital signature


Re: Global Elections 2020: John McAfee - Open Call For Do'ers

2018-12-30 Thread Steve Kinney


On 12/30/18 10:04 PM, grarpamp wrote:
> https://loggiaonfire.com/magazine/10_things_anyone_can_do_to_help_mcafee_2020_1545155711.html
> https://www.facebook.com/mcafeelp
> 
> https://www.lp.org/membership/
> 
> 
> 10 Things Anyone Can Do To Help McAfee 2020
> Rob Loggia Dec 18, 2018
> 
> It is better to be a flamboyant failure than any kind of benign success.
> Malcom McLaren
> 
> As we prepare to enter 2019, Team McAfee 2020 has been working behind
> the scenes to launch a campaign for President of the United States
> such as the nation has never seen before. Public enthusiasm for this
> campaign is already very much in evidence, with offers to help rolling
> in every day. We are working to get the infrastructure in place to
> handle the efficient and successful leveraging of this mass of
> humanity, but there is no need to wait to get to work.

As U.S. Greens are to the Democratic Party, U.S. Libertarians are to the
Republican party:  Both orgs present as sucker traps, keeping activist
minded Liberals and Conservatives away from their local Democratic and
Republican Party HQs, where their input and influence is Not Wanted.

:o/







signature.asc
Description: OpenPGP digital signature


Re: USA colleges rejuvenating: Appeals Court: Colleges Must Censor, Block Online Services If They Offend Someone - [PEACE]

2018-12-24 Thread Steve Kinney


On 12/24/18 10:21 AM, Razer wrote:
> 
> 
> On December 22, 2018 11:19:41 AM PST, Steve Kinney  
> wrote:
>>
>>
>> On 12/22/18 4:02 AM, jim bell wrote:
>>> On Saturday, December 22, 2018, 12:35:59 AM PST, Zenaan Harkness
>>>  wrote:
>>>
>>>
>>>> Snowflakes rejoice 
>>
>>
>>> Naturally, the "people with fascist tendencies" probably called
>>> themselves "anti-fascists".
>>>
>>> A comment I read recently:   'Fascists' are classified into two
>> groups: 
>>> 'Fascists' and 'Anti-Fascists'.
>>
>> Dr. Lawrence Britt studied the fascist regimes of Hitler (Germany),
>> Mussolini (Italy), Franco (Spain), Suharto (Indonesia), and Pinochet
>> (Chile), Dr. Britt found they all had 14 elements in common. He calls
>> these the identifying characteristics of fascism.

[...]

> Reads alot like Eco.
> 
> "Fascism" isn't the ONLY word being orwellianly redefined. "Nationalism" has 
> been touted in the media as a fascist trait when in reality parts of that 
> trait, such as traditionalism and patriotism are used as TOOLS by fascists. 
> Nationalism isn't fascism... It isn't even an ideology.
> 
> Other, less notable words are being redefined even as I type. Frinstance, 
> 
> "considering" https://twitter.com/gymrathippie/status/1076925546922049536?s=19

No surprise there, pulling a battalion strength force out of a country
the size of Syria presents as less than a drop in a bucket.  The whole
U.S. mission in Syria consists of destabilizing the country to prevent
construction of gas and oil pipelines.  With plenty of "friendlies"
already in-country, all it takes is money, guns, and phoned-in tactical
intelligence and movement orders.

> "Envoy" https://twitter.com/gymrathippie/status/1076900114482876416?s=1

"Envoy" typically refers to a diplomatic representative; it sort of
makes sense to me that the U.S. would send an envoy to ISIS, given that
the Obama/Trump Administration offered the said mercenary force a chunk
of Syria as a country of their very own, provided they could take and
hold it.

> That one is exceptionally hilarious.
> 
> And this phrase 
> https://twitter.com/gymrathippie/status/1076896714018050048?s=19
> 
> Rr

Applying the term "populist" to the billionaire funded, propaganda
driven Trump Fan Club presents a bizarre non-sequitur.  "Populism" has
always indicated an exercise in direct democracy, historically
associated with liberal, pacifist and environmentalist causes.

The Synonyms of "Activist" per Merriam-Webster:

http://www.thesaurus.com/browse/activist

addict, bigot, bug, crank, crazy, demon, devotee, enthusiast, extremist,
fiend, fool, freak, maniac, militant, monomaniac, nut, radical,
ultraist, visionary, zealot

Not listed  as synonyms for "Activist":

advocate, champion, engaged, leader, motivated, populist, pro-active,
self-starter

Do the missing terms qualify as synonyms for "activist"?  Advocate as in
one who advocates for a cause or position, Engaged as in one who
actively takes part, Champion as in one who fights for a cause, Leader
as in one who takes the lead, Motivated as in up on your feet and down
to the street, Populist as in for the people, Pro-Active as in not
waiting for others to act, Self-starter as in taking personal initiative.

I guess it all depends on what one's definition of "is" is.

:o/





signature.asc
Description: OpenPGP digital signature


Re: USA colleges rejuvenating: Appeals Court: Colleges Must Censor, Block Online Services If They Offend Someone - [PEACE]

2018-12-22 Thread Steve Kinney


On 12/22/18 4:02 AM, jim bell wrote:
> On Saturday, December 22, 2018, 12:35:59 AM PST, Zenaan Harkness
>  wrote:
> 
> 
>>Snowflakes rejoice 


> Naturally, the "people with fascist tendencies" probably called
> themselves "anti-fascists".
> 
> A comment I read recently:   'Fascists' are classified into two groups: 
> 'Fascists' and 'Anti-Fascists'.

Dr. Lawrence Britt studied the fascist regimes of Hitler (Germany),
Mussolini (Italy), Franco (Spain), Suharto (Indonesia), and Pinochet
(Chile), Dr. Britt found they all had 14 elements in common. He calls
these the identifying characteristics of fascism.

1.  Powerful and Continuing Nationalism
2.  Disdain for the Recognition of Human Rights
3.  Identification of Enemies/Scapegoats as a Unifying Cause
4.  Supremacy of the Military
5.  Rampant Sexism
6.  Controlled Mass Media
7.  Obsession with National Security
8.  Religion and Government are Intertwined
9.  Corporate Power is Protected
10. Labor Power is Suppressed
11. Disdain for Intellectuals and the Arts
12. Obsession with Crime and Punishment
13. Rampant Cronyism and Corruption
14. Fraudulent Elections

https://ratical.org/ratville/CAH/fasci14chars.html

When clashes between Fascist and anti-Fascist groups in the U.S. finally
made the evening news in 2017, our mainstream Liberal and Conservative
propaganda shops found something to heartily agree on:  Anti-Fascist
activists "are the real Nazis," worse than actual Fascists.  Our MAGA /
SJW crowd - the fear driven, propaganda controlled right and left hands
of our ruling oligarchy - jumped right on board with that.  This unity
among ignorant loud-mouthed political consumers tells us something about
the motives and agendas of the folks who pull their strings - our ruling
oligarchy likes Fascism just fine.

Economic hard times have historically enabled Fascist political
movements to take power.  Our American Fascists and anti-Fascists have
this much in common:  They see conditions favorable to overt Fascism
coming up fast here and now.  U.S. NeoNazi and allied organizations have
grown rapidly over the last few years, as has the incidence of "random
acts" of ultra-violence against their chosen scapegoats.  Anti-Fascist
activism has increased in response, obstructing and disrupting
Fascist-oriented political publicity and recruiting activities.

If nothing else, the next few years will present us with lots of
opportunities to sort out self proclaimed rebels into those who equate
Freedom with their own personal and community power over others, and
those who equate Freedom with personal and community self determination
for all.  The former specialize in impersonating the latter, backed by
generations of crypto-Fascist propaganda and supplied with daily talking
points by political warfare professionals.  But anyone who understands
this fundamental difference between Fascist and anti-Fascist motivations
will not have a hard time telling the difference.






signature.asc
Description: OpenPGP digital signature


Re: how to use mobile phone GPS without a SIM card?

2018-12-21 Thread Steve Kinney


On 12/21/18 1:21 PM, juan wrote:
> On Fri, 21 Dec 2018 18:06:36 +1100
> Zenaan Harkness  wrote:
> 
> 
>>
>>
>> Any ideas why GPS would require a SIM card?
> 
>   it's because amont the millions of lines of malware known as "androido" 
> there's one that says : if (no_sim()) disable_gps();

Makes sense to me.  Why should a phone's real owner permit its user to
access GPS location data without reporting same back to the owner?  That
free ride would amount to theft of service.

Letting GPS work with the radio off would be as silly as designing a
mobile phone's case to permit quick, easy battery removal and
replacement - the phone's owner decides when "off means off," not the
user.




signature.asc
Description: OpenPGP digital signature


Re: Facebook non-secrecy.

2018-12-19 Thread Steve Kinney


On 12/19/18 4:40 AM, jim bell wrote:
> Facebook reportedly gave tech giants access to users’ private messages: 
> https://nypost.com/2018/12/18/facebook-reportedly-gave-tech-giants-access-to-users-private-messages/

The Facebook gives access to more than just tech giants.  Try "any
paying customer, first come first served, value added service included."

Last year, I sent a resume to a friend via Facebook Messenger.  A couple
of hours later, the contact e-mail address given in the resume started
receiving spam from industrial supply and fabrication shops in China,
advertising services directly related to work I did over a decade ago.

So The Facebook read the PDF document, interpreted its content, matched
it against current client orders and sold it to (at least) one of their
actual customers in real time.

I did not think of that as especially harmful - one writes a resume with
the expectation that it will get passed around, and I only had to delete
20-some UCE messages over the span of a week or ten days.

From day one I have considered The Facebook a hotline to hostile
parties, and any expectation of privacy there a naive user error.  I
count any harm that comes of exposing one's "personal information and
communications" to The Facebook as self inflicted.






signature.asc
Description: OpenPGP digital signature


Re: Assange Journalism

2018-12-08 Thread Steve Kinney


On 12/8/18 3:41 PM, juan wrote:
> On Sat, 8 Dec 2018 13:44:22 -0500
> Steve Kinney  wrote:

>> Greenwald distributed the PRISM documents to several press outlets, at
>> least one of which edited them before release per side by side
>> comparison of published versions.  (Or, more than one version was
>> distributed by Greenwald for whatever reason.)
>>
>> So it seems likely that Snowden got his information about how and where
>> the documents were forwarded to news outlets from Greenwald himself.
> 
>   I didn't see evidence for that. 

Because Snowden's tale includes how he failed to find a journalist, any
journalist, who was interested in his materials /and/ capable of
communicating via an encrypted channel.  So he had to settle for film
maker Poitras, and attorney & partisan political talking head Greenwald
- just because Poitras was willing/able to use TOR and/or GPG.

Before delivering docs to Greenwald, nobody in the news biz would talk
to Snowden, at least not on his terms.  After, he had no opportunity to
do any more handoffs.

Snowden's tale of how "journalists" should decide what to release
strikes me as a cover story, explaining away his failure to send the
docs to Wikileaks and have done with them, vs. throwing away his entire
life, more or less, via contrived-looking cloak and dagger bullshit.

:o/






signature.asc
Description: OpenPGP digital signature


Re: Scientific American: Is the U.S. Lagging in the Quest for Quantum Computing?

2018-12-06 Thread Steve Kinney


On 12/6/18 12:55 PM, jim bell wrote:
> Scientific American: Is the U.S. Lagging in the Quest for Quantum Computing?.
> https://www.scientificamerican.com/article/is-the-u-s-lagging-in-the-quest-for-quantum-computing/

I would find it hard to believe that the U.S. "lags" any other country
in its quest for quantum computer technology, given that the NSA can
make an ironclad case demanding blank checks for QC R:  Whoever gets
there first, preferably in secret, will make giant strides toward world
domination.  In addition to breaking PKI ciphers, QC would probably
enable breakthroughs in modeling complex systems, reducing many physical
problems presently requiring massively parallel, massively iterated
digital computation to de facto analog computations yielding nearly
instant answers.

"World domination" through QC would not include the ability to read all
of everyone's message traffic.  To date I have not heard anything
indicating that QC will break modern symmetric ciphers, but I have
information from unpublished sources indicating that the U.S. (therefore
probably others as well) still uses one time pads, and/or large single
use symmetric ciphers keys, for its most sensitive military
communications.  Scaling the activities in question up to cover all
sensitive State communications presents no technical challenges, only
financial ones.  Naturally, private individuals will be out in the cold
except for a handful of crypto geeks talking among themselves.








signature.asc
Description: OpenPGP digital signature


Re: snowden and the billionaire monkeys on our back

2018-12-05 Thread Steve Kinney


On 12/5/18 3:20 PM, John Newman wrote:
> 
> Long interview with guy who just wrote a book about faux-philanthropic
> leaders of the new gilded age (or something ;) 
> 
> https://www.truthdig.com/articles/silicon-billionaires-are-the-lethal-monkey-on-the-back-of-the-american-public/
> 
> 
> Interesting part where he described Snowden talking to a bunch of
> these people, this "clash of ideals"  - 

> [... snip ...] 

> It was a very interesting vision, and as he started describing, well,
> the way I’m going to do that is I’m going to build all these tools that
> would allow dissidents to actually operate more freely. A communication
> tool so you can message without getting caught, a Facebook “like” tool
> so you can socially network without losing your privacy, some kind of
> tokenized identity so you can make clear to different websites that
> you’re the same person without revealing which person you are–various
> things. Snowden was describing the creation of all these things because
> he wanted to live in a world in which dissent of the kind that he made
> is possible, in which it’s possible to go up against power and not be
> interrupted in that quest; that’s his motivation, his goal. 


> And it’s like they couldn’t process him; they couldn’t process his set
> of motivations. And so Chris Sacca says, wow, you sound like you’re
> designing a lot of tools that, they sound like apps, or startup–do you
> want to build a startup? I mean, there’s a lot of people here who would
> like to be your investor. Snowden just looked at him, puzzled, like–what
> are you talking about? I’m talking about freedom and heresy and truth,
> and being a dissident, and how a society corrects itself from manifest
> injustices through allowing people who have an uncomfortable truth to
> tell it. And you’re talking about startups? And it was just this
> wonderful collision between someone who believes in real changes, and
> these people who kind of believe in the pseudo-change that lines their
> own pockets."

Um, that's not what it reads like to me.  I see Snowden saying he wants
to accomplish all these wonderful things that enable political dissent
and freedom via network technology.  Then he refuses to have anything to
do with implementing that vision, going so far as to pretend that he
does not understand that building and distributing software and
infrastructure is HOW to achieve goals like the ones he mentioned.  It
sounds like he chose to literally "play dumb" when presented with a room
full of people who wanted a shot at implementing his ideas (vs.
memorized talking points) in real life.

The more I look at Snowden, the less sense he makes:  Both in terms of
what he says (see above), and in terms of a biography and current public
presentation that more or less defy explanation.

To date, the only Snowden scenario that makes sense to me portrays him
as a spokesmodel:  In effect a sock puppet passed from hand to hand.
Did he have anything at all to do with "borrowing" certain documents and
handing them off to Glen Greenwald?  I have no opinion on that.  The
documents Greenwald released triggered a massive controversy over a
small set of political / legal issues that all ended with decisive wins
for the U.S. intelligence community.  In my view whether that means
Snowden failed or succeeded remains an open question.

Pending additional information, I would more likely trust a guy named
"Mendax" than him.

:o/






signature.asc
Description: OpenPGP digital signature


Re: The Forgotten Story of the Julian Assange of the 1970s

2018-11-30 Thread Steve Kinney


On 11/29/18 12:48 AM, jim bell wrote:
> https://www.politico.com/magazine/story/2018/11/28/assange-wikileaks-prosecute-agee-covert-action-cia-222693
> 
> 
> Philip Agee.

Good one.  :o)

I do approve of Phil Agee - I literally shook his hand and thanked him
for his service - but he was not a Nice Man.  What he saw the U.S. doing
in Latin America - sponsoring and directing State terror campaigns
against opponents of U.S. backed totalitarian governments - pushed Agee
over to the Commie side.  He believed that the USSR and its allies
presented the only hope for relief from the U.S. reign of terror in
various countries south of the U.S. border.  Apparently it was the
systematic use of torture and murder to make examples of political
activists that really got to him.

Where widespread concerns about setting precedents negating First
Amendment press protections kept Agee from being prosecuted, Assange
already has "secret" U.S. criminal charges.  The charges against Assange
probably assert that he "conspired" with Russian Federation intelligence
agencies to harm the U.S. National Interest.

This tells us a lot about the evolution of U.S. public policy in the
years between:  Agee personally collected and published very damaging
classified information; Assange has only published materials provided by
others.  Agee committed criminal offenses under U.S. law; Assange is an
Australian under no legal obligation to obey any U.S. chain of command's
orders.  By the late 1980s Agee was free to travel and speak in the
United States.  If Assange sets foot outside the Ecuadorian embassy, a
joint US/British team already in place will snatch him and ship him to
the United States for a show trial.

What defensive strategies will Assange use going forward?  That's hard
to guess.  But I would suggest that anyone who approves of Wikileaks'
work, and happens to have access to damaging information related to the
individuals who would be personally involved in prosecuting Assange, can
contribute by collecting as much of that information as possible and
sending it along to Wikileaks.
























signature.asc
Description: OpenPGP digital signature


Re: Assange Journalism

2018-11-30 Thread Steve Kinney
Supplementary Insider Threat dox, hosted by JYA:

http://cryptome.org/2014/05/insider-threat-warfare.htm

Intimately related, from Julian Assange -
also hosted by JYA:

https://cryptome.org/0002/ja-conspiracies.pdf

Insider access and exfiltration is the true "universal decryption key."

Even benchtop Quantum Computing, anticipated here in 1992...

https://www.youtube.com/watch?v=F5bAa6gFvLs

... will not crack large one time pads.  OTPs are still used for
materials considered "worth the trouble" of really locking down.

The more things change, the more they don't.

"Let a thousand flowers bloom."
- Mao Tse Tung

:o)







Re: Assange Journalism

2018-11-29 Thread Steve Kinney


On 11/28/18 11:40 PM, juan wrote:
> On Wed, 28 Nov 2018 19:37:59 -0500
> Steve Kinney  wrote:

>> If we ask what specific domestic surveillance activities had already
>> caused the most controversy, and had the biggest potential for blowback
>> if exposed to full public view, "the first two Snowden releases"
>> provides a pretty good answer:  Bulk surveillance of U.S. telephone and
>> Internet traffic.

[...]

>> Programs that large will eventually become public knowledge. 
> 
>   more like, they had been public knowledge for years...

Not at all.  Spook Watchers and political dissidents knew about them,
through bits and pieces of hard data and well informed speculation.  The
broader general public had moderately paranoid suspicions, but it was
all conveniently deniable until The Snowden Affair.

Ed himself modeled the desired public reaction perfectly, almost as if
coached in advance:  "Grave concern" with just a slight touch of
outrage, in a context assuming that "the government should" obey the law.

>> During and after the initial releases from the Snowden Saga, the
>> intelligence community won nearly every battle over who can break what
>> laws, when, etc. without consequences.  
> 
>   yes, but that's not "because of snowden" is it? I mean, not meaning to 
> sound like a broken record but the US is a fascist cesspool and has always 
> been. "COINTELPRO"
>   
>   the 'intelligence community' which is obviously just an arm of the 
> United Rogue States gets to do whatever they want because that's what being 
> the state means - unrestrained power. 
> 
> 
>> The Snowden Affair removed many
>> potential liabilities by establishing that "we are allowed to do this,
>> that and the other thing."
> 
> 
>   I don't see the causal link there. There were the leaks, and then the 
> govt kept doing whatever the fuck they want. The events may be 'correlated' 
> but that can be all. 

Precedents set and settled by the Snowden Affair:

- Bulk surveillance of 'private' U.S. communication is legal

- Breaking into the computers of Congressional staff during an
investigation of IC criminal conduct is not prosecuted

- Lying under oath during Congressional hearings is not prosecuted.

... all in the name of National Security.


>> Available biographical information, and his extraordinary access to
>> numerous "sensitive compartments", indicates his job was most likely
>> senior IT administrator and troubleshooter at facilities handling
>> classified communications and databases.
> 
> 
>   That's a possibility. Snowden on the other hand says he was a 'senior 
> analyst' or something like that. 

Could be.  Doesn't matter much though...

>> Then again, available biographical information indicates that the guy
>> with the "pencil neck geek" physique volunteered for and was accepted
>> for training for Special Forces while before he completed Basic Training
>> - which does not happen.  He then supposedly received a medical
>> discharge after breaking both legs in a training accident, which again
>> does not happen except where the such injuries qualify as disabling.
> 
>   I remembered only one broken leg =P  - Regardless, I don't think the 
> story is too implausible. And if it's made up, I'm not sure for what purpose? 

Not so much implausible as impossible:  Violations of policy and
procedure, because recruit Snowden was so special... why?

>> That's why I call Snowden an International Man Of Mystery rather than
>> any other title:  Not only is he a living legend, what we can see of
>> that life looks like a "legend" in the sense of an intelligence
>> officer's fake back story related to a particular assignment.
> 
>   But that means snowden is still 'assigned'? 

Unless his legend really is true, which seems very unlikely to me,
probably so.


>> Why did Snowden pick attorney and political commentator Glenn Greenwald
>> to hand his documents off to, instead of a journalist? 
> 
>   greenawald IS a journo =P 

He's an attorney by trade, Progressive political policy advocate by
vocation.  As far as I know, he has never been employed by any news
organization, and has never gathered information in the field or written
a published report.  My one item published at Global Research makes me
more of a "journalist" than him, LOL.

>> Why not contact
>> John Young, Sibel Edmonds, an old timer like Daniel Ellsberg - 
> 
>   not sure if choosing greenwald was particularly bad (at least without 
> hindsight). Then again, snowden could and should have simply dumped 
> everything so...
> 
> 
> 
>> or 

Re: Assange Journalism

2018-11-28 Thread Steve Kinney


On 11/26/18 10:27 PM, juan wrote:
> On Mon, 26 Nov 2018 17:48:22 -0500


>   Anyway, yes, what you describe is materially possible, so I should have 
> asked "played, why?". What would the 'leaders' of the NSA gain by having 
> snowden leak some stuff they previously selected/curated? Obviously they 
> would not allow the leak of anything 'really top secret'. And coincidentally 
> snowden's stuff simply confirmed what people with half a brain suspected. 
> Massive surveillance. Wait, not even suspected but knew about it before 
> snowden (like ATT fiber taps)
> 
>   One scenario I can think off the top of my head is that they allowed 
> snowden to get hold of some not-really-secret stuff to justify 'tighter 
> security' inside the NSA? 
> 
>   But as a bigger political game, I'm not sure what their motives could 
> be. But more below.

If we ask what specific domestic surveillance activities had already
caused the most controversy, and had the biggest potential for blowback
if exposed to full public view, "the first two Snowden releases"
provides a pretty good answer:  Bulk surveillance of U.S. telephone and
Internet traffic.

Programs that large will eventually become public knowledge.  Picking
how and when that happens, and preparing responses for the press,
Congress and the Courts in advance, presents significant advantages.
This permits developing and implementing strategies for influencing
specific individuals who would play key roles in determining the outcome
in publicity, political and legal dimensions (reporters and editors,
Senators and DemoPublican Party officials, Fedeeral Prosecutors and
Judges).

During and after the initial releases from the Snowden Saga, the
intelligence community won nearly every battle over who can break what
laws, when, etc. without consequences.  The Snowden Affair removed many
potential liabilities by establishing that "we are allowed to do this,
that and the other thing."

>> I figure Snowden far too dumb to 'leak correctly,' but too smart not to
>> play along once he became an object of property physically passed around
>> between ruling class factions.
> 
>   Hmm. Snoden doesn't strike me as dumb. At least not so dumb that he was 
> unable to publish stuff anonymously if he wanted. Especially considering that 
> his job description was pretty much to track 'enemies of the state'. 

Available biographical information, and his extraordinary access to
numerous "sensitive compartments", indicates his job was most likely
senior IT administrator and troubleshooter at facilities handling
classified communications and databases.

Then again, available biographical information indicates that the guy
with the "pencil neck geek" physique volunteered for and was accepted
for training for Special Forces while before he completed Basic Training
- which does not happen.  He then supposedly received a medical
discharge after breaking both legs in a training accident, which again
does not happen except where the such injuries qualify as disabling.

That's why I call Snowden an International Man Of Mystery rather than
any other title:  Not only is he a living legend, what we can see of
that life looks like a "legend" in the sense of an intelligence
officer's fake back story related to a particular assignment.

Why did Snowden pick attorney and political commentator Glenn Greenwald
to hand his documents off to, instead of a journalist?  Why not contact
John Young, Sibel Edmonds, an old timer like Daniel Ellsberg - or ANYONE
with applicable knowledge and experience?  Did he fail to look into the
history of leaks like the one he was considering, and available venues
for same - or was he directed to specific people spotted, recruited and
handled by the same employer who spotted, developed and handled him?

I doubt that we will never know.


>> "By his own account, Snowden often discussed perceived Agency wrongdoing
>> with his co-workers, which suggests that he should have been profiled
>> and flagged as a potential leaker by the NSA’s internal surveillance
>> process."
> 
> 
>   Maybe...not? I assume that people working in such criminal 
> organizations are a 'tight knit' mafia. They don't really suspect each other. 
> They are all american heroes fulliling their divine role : making the world 
> safe for goldman sachs and raytheon. 

Snowden said:

“When you see everything, you see them on a more frequent basis and you
recognize that some of these things are actually abuses, and when you
talk about them in a place like this, were this is the normal state of
business, people tend not to take them very seriously and move on from
them. But over time that awareness of wrongdoing sort of builds up and
you feel compelled to talk about it, and the more you talk about it, the
more you’re ignored, the more you’re told it’s not a problem...”

>   You say they have 'insider threat' programs but who knows how they 
> actually run them. Although in 1984 world it seemed as 

Re: Assange Journalism

2018-11-26 Thread Steve Kinney


On 11/26/18 3:06 PM, juan wrote:
> On Mon, 26 Nov 2018 00:01:39 -0500
> Steve Kinney  wrote:


>> how about the hatchet job his partner in crime,
>> Laura Poitras, did on both IO Error and Mendax in her Risk film?  Random
>> spiteful bitch, or faithful CIA asset?  Either way, fat USIC paycheck
>> and/or mega-cred in toxic pseudo-feminist circles accomplished.  
> 
>   pseudo-feminist? Not at all. They all are true feminists and they all 
> are feminazis. Those two words are synonymous. 
> 

The "feminazis" you refer to do exist; they originated in the New Left,
a USIC political warfare project intended to displace and discredit
Pacifist and Liberal voices in broadcast media during the Vietnam War.
The folks who started the "feminazi" bullshit were from that same crew.

The project was successful, and after the war the New Left never went
away.  They kept working their professional networks and press contacts,
and re-emerged as the Progressives in the late 70s - early 80s.  They
now own and operate the DNC, and through that org, most of the
Democratic Party.

Real feminists also exist.  They typically associate with anarchists and
their ilk, and one finds plenty of them in Occupy-related activist orgs.
 Check Emma Goldman, Lucy Parsons and Simone de Beauvoir for background
on "real" feminism.

>>
>> How was Snowden's choice of Greenwald assured, and was his life in
>> danger up to the moment he chose the right non-journalist to pass his
>> docs off to? 
> 
>   he gave copies to different journos apart from greenwald I believe? 

If so, neither he nor anyone else has ever said so.  The Snowden Saga,
if at all factual, leaves no room for that to have happened.

>> How long did it take him to realize he had been played -
>> or has he even figured that out yet?  
>   
>   played how? snowden constantly parrots that journos have the divine 
> right to filter whatever information reaches the serfs.


Played how?  Spotted early by the fairly massive Insider Threat programs
at NSA, initiated in response to Chelsea Manning's work.  They may have
fed him specific documents, kept away from others, transferred him from
job to job as necessary to facilitate that process.  He may have also
been monitored and/or manipulated through his girlfriend, who has joined
him in exile - which makes little sense, unless she had something to
hide, and/or run from, here in the U.S.

I figure Snowden for too dumb to 'leak correctly,' but too smart not to
play along once he became an object of property physically passed around
between ruling class factions.

>> A funny thing happened to the allegedly thousands of documents Ed handed
>> to Glenn for publication:  After promising Snowden he would release all
>> the docs within ten days of breaking the first big story, 
> 
> 
>   did he promise that? That doesn't sound realistic given the fact that 
> snowden supports censorship-by-journo. 

So at least one article published within days of the Prism release said.
 Over the next week the reported number of documents given to Greenwald
rose very fast, as Greenwald's story changed.  I kept very close track
of available information during that time frame; this article I wrote
back then be of some historical interest:

http://www.globalresearch.ca/nsa-deception-operation-questions-surround-leaked-prism-documents-authenticity


"By his own account, Snowden often discussed perceived Agency wrongdoing
with his co-workers, which suggests that he should have been profiled
and flagged as a potential leaker by the NSA’s internal surveillance
process."

>   Regardless, I believe/would assume that snowden gave the docs to 
> different redundant  parties because 'trusting' a single guy like greenwald 
> is pretty stupid, and snowden is anything but stupid. 
> 

To date, no "missing" Snowden docs have turned up anywhere.  Considering
their cash value to any reporter who has an "exclusive" on any of them,
that seems very unlikely if any did exist.

>  
>> All I know for sure about the Snoweden Affair is that once the dust
>> settled, the U.S. intelligence community got everything it wanted: 
> 
>   yeah. Not sure if snowden contributed to that or it's just that his 
> leak was useless in the grand scheme of things. 

Anything but useless:  Whether or not Snowden was in on the game, the
Snowden Affair accomplished important IC objectives, solidifying their
power as an autocratic branch of government answerable to no one but
themselves.


>> 1)  Use an extraordinary physical security protocol to upload an
>> encrypted archive of your docs to the I2P torrent network.  Clues:  You
>> need a "clean" laptop from a flea market, a home made high gain antenna,
>> and a conveniently loc

Re: Assange Journalism

2018-11-25 Thread Steve Kinney


On 11/24/18 2:06 PM, John Young wrote:
> Matt Taibbi reports on Assange in Rolling Stone in a one of the more
> salient grasps of what journalism has missed about WikiLeaks feeding its
> maw.
> 
> https://www.rollingstone.com/politics/politics-news/taibbi-julian-assange-case-wikileaks-758883/

Very impressive article - Matt Taibbi has clearly been paying
professional attention to the leakage bizniz.  I would guess he did some
in depth research based on the question of how he should proceed if
offered "red hot" classified docs.  Or maybe, after being handed same -
in which case he decided to steer clear.

I only spotted one error:  He attributed the disclosure of NSA tapping
Merkel's phones to Snowden, but that was another actor - likely employed
at NSA in Germany, and a damn sight better at hide and sneak than good
ole Ed.

> A noteworthy observation is how all the risk is taken by leakers not by
> publishers and journalists -- nor by WikiLeaks and Assange.
> 
> Nearly every major leak to WikiLeaks (and the media) has led to the
> leaker being hammered while the publishers are awarded prizes, as with
> WikiLeaks.

No duh, as they say.

I'm about two nines confident that Greenwald's Intercept deliberately
burned Reality Winner.  Can incompetence alone account for Intercept
employees contacting the affected organization to 'fact check' the
article in advance of publication by giving away their source's
location, then publishing both the serial number of the printer she
used, and the date/time she printed the documents?  (I pulled the
watermarks off an image I downloaded from The Intercept shortly after
the story broke, using a freeware image editing program.)

Speaking of Greenwald, how about the hatchet job his partner in crime,
Laura Poitras, did on both IO Error and Mendax in her Risk film?  Random
spiteful bitch, or faithful CIA asset?  Either way, fat USIC paycheck
and/or mega-cred in toxic pseudo-feminist circles accomplished.  At
least it's a classier way to attention-whore than punching an alt-Reich
asshole.

We can't leave out Ed Snowden, international man of mystery.  How early
was he spotted, and to what extent was he manipulated to assure that
specific documents would be among those he handed off to a press
contact?  Hell, DID the published docs come from him?  Given the number
he claims to have handed off, Ed himself would not be likely to know for
sure.

How was Snowden's choice of Greenwald assured, and was his life in
danger up to the moment he chose the right non-journalist to pass his
docs off to?  How long did it take him to realize he had been played -
or has he even figured that out yet?  To date his public presentation in
exile remains consistent with making the best of that particular bad
situation.

A funny thing happened to the allegedly thousands of documents Ed handed
to Glenn for publication:  After promising Snowden he would release all
the docs within ten days of breaking the first big story, Glenn sold
them all to the highest bidder, Pierre Omidyar.  If Greenwald's claims
about how many docs there were are to be believed, over 99% were either
destroyed, or locked up securely for blackmail use by his new employer.

All I know for sure about the Snoweden Affair is that once the dust
settled, the U.S. intelligence community got everything it wanted:  Not
just authorization to continue illegal domestic surveillance programs,
but a clear precedent that U.S. intelligence officials are allowed to
tell lies under oath in Congressional hearings, with no consequences
other than high-fives back at the office later.  "Almost as if" the USIC
had lots of advance warning and got to pick the specific battles
themselves, with specific purposes in mind.

A suggested leaker's protocol:  Pardon my language but "fuck
journalists."  They need have no role until /after/ all your red hot
docs are in the public domain.

1)  Use an extraordinary physical security protocol to upload an
encrypted archive of your docs to the I2P torrent network.  Clues:  You
need a "clean" laptop from a flea market, a home made high gain antenna,
and a conveniently located open WiFi hot spot.  Don't forget to scramble
your MAC address before plugging in the antenna.  Include one or more
"medium value" docs in the clear, to assure interest in your uploaded
archive.  In your description of the torrent, promise the key will be
published under the same user name within a given time frame.

2)  A few days later, use the same security protocol, from a location at
least hundreds of miles away from your first upload site, to post the
key (a pass phrase, see diceware.com) on the same torrent tracker site
in I2P space.

3)  Destroy everything used in the above process, and resume your
"normal" life.  Mission accomplished, you got the docs into more than
enough hands to assure public release at /minimal/ personal risk.

Better alternatives to this protocol are solicited...

And remember, on the day you brag about your success 

Re: BBC News: NovaSAR: UK radar satellite returns first images

2018-11-24 Thread Steve Kinney


On 11/24/18 1:51 PM, juan wrote:
> On Sat, 24 Nov 2018 18:00:23 + (UTC)
> jim bell  wrote:
> 
>> NovaSAR:. First all-UK SAR (synthetic aperture radar) satellite sends back 
>> images.


[...]
>   I guess that kind of news is rather important for cypherpunks because 
> of the "know your enemy" principle. 

vs. "Know your terrain," which includes many new (to human experience)
overlays generated by sensors and communications networks.

On the other hand, other than being a really cool ham radio project (I
would describe it as almost literally that) what's the new radar
satellite actually used for?

https://directory.eoportal.org/web/eoportal/satellite-missions/n/novasar-s

quote:

NovaSAR-S provides medium resolution (6-30 m) imagery ideal for
applications in the following fields:

- flood monitoring

- agricultural crop assessment

- forest monitoring (temperate and rain forest)

- land use mapping

- disaster management

- maritime applications (e.g. ship detection, oil spill monitoring,
maritime safety, and security of defence applications).

/quote

In terms of this gadget's potential for military and State Security
purposes, that's almost laughable:  A flyswatter vs. laser guided
artillery rounds comparison fits the case of comparing NovaSAR-S to
military sensor packages.

NovaSAR-S makes primitive but useful LandSat functions available to
organizations working on shoestring budgets.  NovaSAR-S shift the
balance of power in the electronic warfare terrain toward some
"underdog" players, by eroding intelligence (Earth imaging) monopolies
presently held by the world's most powerful organizations.

:o)





signature.asc
Description: OpenPGP digital signature


Re: of elephants and men, and scumbags

2018-11-20 Thread Steve Kinney


On 11/20/18 10:41 PM, juan wrote:

>> http://pilobilus.net/Political.Oritnetation.Grid.png
> 
> 
>   I don't think the 2d graph adds much. The assumption that 'economic' 
> freedom and 'personal' freedom are different things is obviously flawed. 
> Also, the assumption that 'conservatives' favor 'eonomic' freedom whereas 
> 'modern' 'liberals' favor 'personal' freedom is flawed as well. In practice 
> both 'conservatives' and 'liberal' are...fascists =) 

Not economic vs. personal freedom, but rather, economic (commerce) vs.
coercive (political) agency:  Concentration of capital and firepower in
more or less hands.

>   Nolan came up with his chart because libertarianism doesn't fit the 
> mainstream left/right classification, BUT the notion that mainstream left and 
> right are half libertarian is complete bullshit, wishful thinking and 
> dishonest pandering. In practice, both liberals and conservatives pay some 
> *lip service* to 'personal' or 'eonomic' freedom while fully supporting 
> fascism. 

I was under the impression that Nolan came up with that chart in an
effort to persuade people dissatisfied with the Left/Right spectrum that
they "belong in" the Libertarian Party.

I can't fault his motives:  Before the hostile takeover that converted
the Libertarian Party to a Radical Conservative a.k.a. Coprporatist org
back in the late 1990s, the Party had a lot to offer - I was a fan and
booster.  Today, I can not distinguish Libertarian Party advocates and
its (rare) candidates for political office from "socially tolerant"
Republicans.  The Libtards do talk a slightly different game, but I
could not care less about that:  Performance is my bottom line.

>   Anyway, we can simply have a line (or segment I guess) with anarchists 
> on one end and authoritarians on the other end. And then we can classify the 
> whole library accordingly. 

That's the X axis on the graph...

>   As to the placement of left and right in your graph, seems to me that 
> both left and right should be at the top since both are authoritarian. And 
> none of them favor free enterprise either...

I put the Right near the Anarchist end of the scale, because "Private
power" vs. "State power" indicates one central State authority vs.
numerous competitive State-chartered Corporate entities:  Think Soviet
Union vs. United States, toward the end of the Cold War era.

Thanks to several generations of full saturation Big Lie propaganda,
many people believe that Corporate Capitalism "is" Free Enterprise.  But
in real life the two present as natural enemies:  When an independent
sole prop or partnership starts cutting into a major corporation's
market by bringing a superior product to market at a competitive price,
our Corporate Capitalists use their massive financial reserves to
destroy the independent enterprise:  Dump lookalike products on the
market at a loss, regulate their competitors out of business with the
help of friendly, well bribed State agencies, or etc.  This perspective
comes from first hand observation, as a participant in high functioning
small businesses stomped flat as soon as they became competitive by
bringing superior products at completive prices to market.

:o)













signature.asc
Description: OpenPGP digital signature


of elephants and men, and scumbags

2018-11-20 Thread Steve Kinney


On 11/20/18 4:31 PM, jim bell wrote:
> On Tuesday, November 20, 2018, 12:08:58 PM PST, Razer 
> wrote:
> 
>>There IS a "Left" and there IS a "Right"...
> 
> Yes, and the origin of that meme was the outcome of the French
> revolution in 1789 onwards.  "The right", of that location and era, sat
> in the legislature on the "right", and "The Left", of that location and
> era, sat in the legislature on the "left".
> 
> Simple for post-revolutionary France.  But applying that to other
> nations and at different times can be difficult.  And, being only
> one-dimensional, it's quite inadequate and highly misleading.  

In modern usage, the one dimensional Left/Right scale only measures how
stupid, immoral, evil, etc. others are relative to oneself, as a
function of the distance between them and oneself on the scale.  At
least, I have not seen it applied for any other purposes than
demonization or self congratulation.  The complexity of the rhetoric
varies in proportion to the speaker's intelligence and vocabulary.

Oddly enough, in this context the Left/Right scale works the same no
matter which end of that scale gets which label.  That feature enables
people to have endless fun "proving" that whichever end the the scale
they ain't on represents "the REAL Nazis."  The larger the distance
between a given Self and Other, the worse and therefore more "Nazi" the
Other.  One works backward from there to prove the conclusion.

A couple of years ago I made graph similar to the Nolan chart but much
simpler and more concrete, as its axes represent the distribution of
political power in State and Private sectors among larger vs. smaller
numbers of individuals.

The X axis represents distribution of Private power into fewer hands
(Capitalism) or more hands (Free Enterprise).  The Y axis represents
distribution of State power into fewer hands (Authoritarian) or more
hands (Anarchist).  I do not label the quadrants, leaving that as an
exercise.  Examining various "ideologies" in the context of this graph
provides a bit of potentially educational fun.  Which quadrant would you
rather live in, and why?

In this example I place the Right and Left on the graph:

http://pilobilus.net/Political.Oritnetation.Grid.png

My assignment of "Left" and "Right" to specific coordinates does not
refer to abstract ideological constructs, but rather represents my
observation of the aggregate behavior and practical objectives of people
who strongly self-identify with Right and Left brand labels in the
United States at present.

I like this kind of model because I prefer an ecological approach to
political studies:  I view popular political ideologies as emotionally
loaded verbal formulas used to manipulate people's cognitive processes
and responses to commands, for the speaker's benefit at the audience's
expense.  Conversely, I think of "political reality" as the dynamic
evolution of human power relationships in a changing material
environment over time.  (Lately I have been very gratified to see a
discipline called Biophysical Economics on the rise in academia; I would
describe it as "economics in a world where the laws of physics exist.")

In political rhetoric, Fascism can mean whatever anyone with Fascist
leanings needs it to mean, to pin the label on someone else.  But
academic historians do provide some useful guidelines for the rest of
us.  Dr. Lawrence Britt has examined the fascist regimes of Hitler
(Germany), Mussolini (Italy), Franco (Spain), Suharto (Indonesia) and
several Latin American regimes.

Britt found 14 defining characteristics common to each:

1. Powerful and Continuing Nationalism - Fascist regimes tend to make
constant use of patriotic mottos, slogans, symbols, songs, and other
paraphernalia. Flags are seen everywhere, as are flag symbols on
clothing and in public displays.

2. Disdain for the Recognition of Human Rights - Because of fear of
enemies and the need for security, the people in fascist regimes are
persuaded that human rights can be ignored in certain cases because of
"need." The people tend to look the other way or even approve of
torture, summary executions, assassinations, long incarcerations of
prisoners, etc.

3. Identification of Enemies/Scapegoats as a Unifying Cause - The people
are rallied into a unifying patriotic frenzy over the need to eliminate
a perceived common threat or foe: racial, ethnic or religious
minorities; liberals; communists; socialists, terrorists, etc.

4. Supremacy of the Military - Even when there are widespread domestic
problems, the military is given a disproportionate amount of government
funding, and the domestic agenda is neglected. Soldiers and military
service are glamorized.

5. Rampant Sexism - The governments of fascist nations tend to be almost
exclusively male-dominated. Under fascist regimes, traditional gender
roles are made more rigid. Divorce, abortion and homosexuality are
suppressed and the state is represented as the ultimate guardian of the
family institution.

Re: of elephants and men, and scumbags

2018-11-19 Thread Steve Kinney


On 11/19/18 6:02 PM, juan wrote:

>> On the brighter side, now Xenan will have lots of company over there in
>> my CPunks Spam folder.  I'm sure they will get along just fine, out of
>> sight and out of mind.
> 
>   I open Zen's messages to see if they include a dailystormer link. I 
> can't believe he puts one or more links to the ds in every message, but he 
> does.
> 
>   And maybe I should expand my "uh oh" comment a bit. James used to be a 
> leftist and now he's a rightist. He was a partisan and he is a partisan. He 
> was a 'progressive' social engineer and now he's a conservative social 
> engineer, left and right being two sides of the same coin.

Ah, the Progressives!  I first got to know them back when they were
called the New Left:  Think "Hanoi" Jane Fonda & co.  Over the years my
on-contact categorical rejection of the New Left's message evolved into
a personal theory that they were, wittingly or otherwise, fielded by a
Federal domestic political warfare activity.  Their mission:  Displace
and discredit Pacifists and Liberals who were getting way too much
influence during the Vietnam War.  As always in mass media, nothing
attracts attention like violence, even if it's only violent and
deliberately offensive rhetoric; the plan, if plan it was, worked very
nicely.

In this same time frame, COINTELPRO was A Thing and the FBI went so far
as to provide training, money, arms and explosives to Militant Leftists,
creating "shocking headlines" in an effort to equate anti-war and other
Liberal / ComSymp sentiments with violent extremism in the public mind.
 In light of the FBI arranging for people to actually bomb banks and
such, it would be absurd to imagine that they did not also field double
agents, witting or witless, to present a stereotyped "made to be hated"
pro-Commie, anti-American "Leftist" message to the Folks At Home.

A funny thing happened after the Vietnam War:  The New Left still had
its press contacts and professional networks, and kept right on going.
After a few years of dormancy, Hanoi Jane married a conventional
politician and got a faux Liberal makeover.  At about that time I
started running into people in real life who presented as political
activists and talked about "political correctness" as if they had some
moral right to dictate what Liberals and Radicals could and could not
think, say and do.  My initial reaction was "fuck y'all." Subsequent
experience has proved my instinctive anarchist response correct.

The Progressives worked industriously through the Reagan years, and
managed to take over key roles in the Democratic Party.  They elected
one of their own - The Clintons - to the Presidency.  Did the old New
Left do that on their own, or with assistance from our Security
Services?  I have no hard data on that, but need I mention the
relationship established when the CIA obtained full support from
Governor Clinton for the Iran/Contra cocaine trafficking business, and
the infamous Clinton Body Count from that era?  Since before that day to
the present, Progressive political actors have worked hand in glove with
radical fringe Right Wing extremist elements of our "Deep State."

The Clintons' zero-tolerance policy toward folks like the Patriot
Movement (who remembers Ruby Ridge?), and the mass murder they carried
out in Wayco, Texas do not impress me as evidence of an anti-Right
agenda.  I see a commitment to Corporate interests who dictate a zero
tolerance policy toward any kind of wildcat political organizing, not
under the firm control of well entrenched, uber-wealthy factions in the
U.S. political/economic ecology.

Today our peasants outnumber our dominant aristocrats by about 3/4
million to one, and that can't be a comfortable position for a de facto
criminal elite to find itself in.  Populism presents an existential
threat to the world as they know it - a world where less than
1/100,000th of the population literally makes all the decisions
affecting our species as a whole.  So it can't be allowed, is all.

Anyone who doubts the identity vs. "close relationship" of the
Progressive establishment with the Far Right needs only look into the
relationship between Henry Kissinger and Hillary Clinton:  They present
themselves in public as best buddies, and Hillary calls him her mentor.
 Her own track record for mass murder has yet to rise to Kissinger
status - Honduras, Libya and Syria notwithstanding - but put her in the
Oval Office and watch the fun!

In light of the above model, the whole Left vs. Right paradigm in modern
U.S. politics presents as a Big Lie.  The only differences I see between
the Parties of our duoploy are rhetorical, and a bias toward
prioritizing service to financial services and communications
shareholder value (Democrats) vs. Petrochemicals and Military
Contracting industries' shareholder value (Republican).

America's real silent majority, our classic Liberals, have no voice in
national policy under a system that locks out candidates for 

Re: of elephants and men, and scumbags

2018-11-19 Thread Steve Kinney


On 11/18/18 12:17 AM, juan wrote:
> On Sun, 18 Nov 2018 14:34:11 +1000
> jam...@echeque.com wrote:
> 
> 
>> I ceased to be a leftist when
> 
>   uh oh...

On the brighter side, now Xenan will have lots of company over there in
my CPunks Spam folder.  I'm sure they will get along just fine, out of
sight and out of mind.

:o)







signature.asc
Description: OpenPGP digital signature


Re: of elephants and men

2018-11-14 Thread Steve Kinney


On 11/14/18 11:03 PM, Alfie John wrote:
> Hey Zenaan,
> 
> Are your posts always off topic to Cypherpunks? Maybe other people disagree 
> with me, but I somehow feel your purpose here is to make users unsubscribe 樂

Aw shucks.  Zenaan didn't make me unsubscribe.  He did make me create a
spam filter rule, and all his posts and replies land in their very own
folder - just in case the "stopped clock twice daily" effect produces
any real surprises.

Years later, still waiting

:o)





signature.asc
Description: OpenPGP digital signature


Nigerian 404: Google not found, Internet wobbly

2018-11-13 Thread Steve Kinney


Nigerian 404:  Google not found.
https://www.theregister.co.uk/2018/11/14/nigerian_telco_bgp/

Reported day one of same.
https://www.theregister.co.uk/2018/11/13/google_russia_routing/

If the network's rockin', don't come knockin'
https://www.engadget.com/2017/11/07/comcast-internet-outage-level-3-route-leak/

I been seeing brief, intermittent outages that play hell with serious
data transmission all over my neighborhood for three days now, and user
comments seem to indicate that condition occurs all over the map.  Don't
even tell me a worm armed with the NSA's login credential (reversed from
the hard coded hash) is jumping around between Cisco routers...

O sunshine take me now away from here,
I'm a needle on a spiral in a groove
The turntable spins as the last waltz begins,
and the weatherman say's someting's on the move...

https://www.youtube.com/watch?v=o2rOWVWJmWU

Then again, it's probably nothing.

:o)




signature.asc
Description: OpenPGP digital signature


Re: 1. Freedom Makes People Smarter - homeschooling

2018-11-02 Thread Steve Kinney


On 11/2/18 4:48 PM, Steve Kinney wrote:

> 
> Recommended reading, any and everything by this guy:
> 
> https://en.wikipedia.org/wiki/John_Taylor_Gatto

Postscript:  Here's a complete copy of Against School, Gatto's most
influential essay.

http://www.wesjones.com/gatto1.htm



signature.asc
Description: OpenPGP digital signature


Re: 1. Freedom Makes People Smarter - homeschooling

2018-11-02 Thread Steve Kinney


On 11/1/18 5:17 PM, juan wrote:
> On Thu, 1 Nov 2018 22:42:17 +1100
> Zenaan Harkness  wrote:
> 
>> Stating the obvious dept, using for those stucked in the oblivious
>> dept.
> 
>> 6 Reasons to Start Homeschooling ASAP
>> https://www.zerohedge.com/news/2018-10-31/6-reasons-start-homeschooling-asap
>>
> 
>   yeah you can teach the children about the virtues of trump and putin 
> and how amazing white supremacists are. Even more important, you can mentally 
> rape them with your christiano fascist propaganda from the craddle. 
> 

vs. point out to them where the curriculum veers off into popular
misconceptions and/or propaganda messaging, and provide access to
supplemental information where and as indicated.

"Brick and mortar" school teaches three lessons of great importance:

1)  Show up on time every day whether you want to or not.

2)  Do your assigned tasks as directed whether you want to or not.

3)  The people in charge always have all the final answers.

Any other lessons learned present as added value for the economic and
political actors who will exploit obedience trained public school
inmates for the rest of their lives.

The process of sorting future winners and losers includes giving higher
quality instruction to the more obedient kids, while treating the less
obedient as stupid and providing them with a "for losers" curriculum.
More recently, drugging noncompliant students has joined the mix of
strategies for shaping and limiting the social and political impact of
"disruptive" personalities in tomorrow's crop of adults.

"But what about socialization?"  What indeed - see above for the kind of
socialization public schools provide.  It took 40 years to build a
climate of fear sufficient to support literally outlawing normal,
organic socialization, i.e. letting your kids run around with the
neighbor kids.  As a result, public school and broadcast media get the
final say as formative social influences on the peer relationships of
tomorrow's adult consumers - except where parents remove public school
from the mix and work to replace it with "real world" social development
opportunities.

Recommended reading, any and everything by this guy:

https://en.wikipedia.org/wiki/John_Taylor_Gatto

:o)










signature.asc
Description: OpenPGP digital signature


Re: End of the Deep State

2018-11-01 Thread Steve Kinney


On 11/1/18 11:05 AM, Ryan Carboni wrote:
> In the coming months, the deep state will end. They will not be capable
> of an eye wink argument for their misdeeds.

Ignorant, easily led Trump supporters believe he opposes the Deep State.
 Intelligent, well paid Trump supporters understand that his whole job,
and by extension theirs, is to give the Deep State exactly what it wants
at all times.  To understand this one must understand the difference
between what propagandists working the alt-Right crowd mean when they
say "Deep State," and what academics who study political systems mean
when they say "Deep State."  The closer one looks, the smaller the
similarity becomes - until it disappears completely.

In contemporary propaganda, the term Deep State refers to an hereditary
Conspiracy of evil individuals, well known to true believers who take
every Conspiracy Theory with any paranoid and/or racist content as rock
solid fact.  Their version of the Deep State works tirelessly to destroy
everything white working class conservative Christians consider right,
good and holy.  For full details of this version of the Deep State,
enter 'illuminati new world order' in any search engine.

In political science, the term Deep State refers to the army of career
civil servants, appointed officials, and private contractors who conduct
the government's actual business.  Collectively, they have many shared
interests and agendas; and without their advice, consent and
cooperation, elected officials can not get anything done.  This gives
the government as a whole huge inertia, a tendency to "keep doing what
it has always done" regardless of popular demand for change, or
unwelcome policy directives from elected officials.

Below:  Four essays introducing and explaining various aspects of the
real Deep State.  Or in other words, the original Deep State concept our
alt-Right propagandists borrowed their new, improved name for the
Illuminati / New World Order Conspiracy from.



"There is the visible government situated around the Mall in Washington,
and then there is another, more shadowy, more indefinable government
that is not explained in Civics 101 or observable to tourists at the
White House or the Capitol. The former is traditional Washington
partisan politics: the tip of the iceberg that a public watching C-SPAN
sees daily and which is theoretically controllable via elections. The
subsurface part of the iceberg I shall call the Deep State, which
operates according to its own compass heading regardless of who is
formally in power."

https://billmoyers.com/2014/02/21/anatomy-of-the-deep-state/



"The Deep State is not just the military intelligence community, but
also consists of transnational corporations, big business and Big Oil,
Wall Street, Silicon Valley, and think tanks. Groups and institutions in
this structure form various coalitions that can compete, but tend to
seek agreement on certain fundamental policies that benefit their mutual
positions of power."

https://medium.com/insurge-intelligence/republican-insider-trump-is-creating-deep-state-2-0-but-it-might-crash-the-economy-exclusive-704522e6761a



“Trump’s not Sir Galahad against the evil Deep State. Of course, they
completely ignore the fact that, one, he’s a product of it – that whole
New York high finance world is one adjunct of the Deep State. Second,
Trump showed it to us with his cabinet picks for the economy. And third,
he is advocating a 10 percent increase in military spending. How could
this guy be opposed to the Deep State?”

https://medium.com/insurge-intelligence/republican-insider-trump-is-creating-deep-state-2-0-but-it-might-crash-the-economy-exclusive-704522e6761a



"The United States has, in short, moved beyond a mere imperial
presidency to a bifurcated system — a structure of double government —
in which even the President now exercises little substantive control
over the overall direction of U.S. national security policy. Whereas
Britain’s dual institutions evolved towards a concealed republic,
America’s have evolved in the opposite direction, toward greater
centralization, less accountability, and emergent autocracy."

Full text: https://tinyurl.com/thedeepstate





signature.asc
Description: OpenPGP digital signature


Re: The Assassination Of Donald Trump

2018-10-26 Thread Steve Kinney


On 10/25/18 9:25 PM, CANNON wrote:
> On 10/24/2018 08:37 AM, Steven Schear wrote:
>> https://www.zerohedge.com/news/2018-10-23/cj-hopkins-assassination-donald-trump


> And I am sick of all these low intelligent people trying to compare Trump to 
> Hitler.

Trump is not fit to shine Hitler's boots.

Hitler was a combat wounded veteran who lived in poverty and worked
tirelessly to develop and promote his political vision; he took big
risks and spent time in jail in the process. Hitler was a fanatical
extremist, virulently xenophobic, and once his physician started giving
him cocaine and amphetamine in his vitamin shots he became full blown
paranoid psychotic.

Compare Trump: A poor little rich kid, ass deep in old school organized
crime, he has managed to piss away 2/3 of his inheritance just proving
himself to the public as a Big Success Story. Hitler was many ugly,
dangerous things, but never an ignorant, narcissistic buffoon fronting
for a radical faction of oligarchs intent on looting the remains of his
country's national economy.

> I am sick of them saying that Trump and Trump supporters are "nazis" or "kkk".
> 
> Such is utter ridiculousness and lacks any logic.

A list of common features of fascism, from historian John Hawkins:

1. Totalitarian
2. Extreme nationalism
3. Top down revolution or movement
4. Destructive divisionism such as racism and class warfare
5. Extreme anti-communism, anti socialism and anti-liberal views
6. Extreme exploitation
7. Opportunistic ideology lacking in consistency as a means to grab power
8. Unbridled Corporatism
9. Reactionary
10. The use of violence and terror to attain and maintain power
11. Cult-like figurehead
12. The expounding of mysticism or religious beliefs

Our Mr. Trump, his administration and its backers don't fire on all of
the above cylinders, but I see close correlations in Trump
administration rhetoric, policy and performance on items 2, 3, 4, 5, 6,
8, 9 and 11.  Eight out of twelve ain't a bad start.  On item 12, Trump
himself does not pose as Christian but a majority of his loyal followers
do.  Items 1 and 10 would apply, but the inertia of U.S. political
institutions greatly slows the Trump crew's progress on establishing a
Totalitarian State controlled by State terrorism - further progress on
those fronts will require a large scale economic collapse, which we
might call a work in progress.

> If you want to talk about Hitler, and nazis. Nazi was short for "National 
> SOCIALIST" in German.
> 
> Socialism is an ideology of the left.

"Nazi" derives from NSDAP, itself an acronym for words that translate as
Nationalist Socialist Democratic Worker's Party.

Why "socialist"?  Because at the time the Party's name was coined,
Socialism was very popular in Germany - the German people didn't have
it, but they wanted it.  What they got was iron rule by a consortium of
industrialists, bankers and political ideologues, who rose to power with
the support of "ultra conservative" U.S. industrial, financial and
military power brokers including even the Dulles Brothers.  Union
busting, and literally rounding up and slaughtering Communists and
Socialists do not sound much like the actions of a Left Wing government
to me.

> And as for antifa, ANTIFA is by definition a fascist group. They are against 
> free speech, and against other constitutional rights. They suppress
> free speech and attack those whom would disagree with them. And they attack 
> and taunt pro-2nd amendment rallies. They vandalize, 
> taunt, and attack anyone they disagree with. The opposition to liberty, and 
> the suppression of  those that stand for liberty, 
> through terrorism and violence is in itself fascism. How can anyone whom is 
> against free speech, 2nd amendment, and lacks tolerance NOT be considered 
> fascists?

Antifa stands against efforts to organize and grow a U.S. populist
movement devoted to White Supremacy under iron Corporate rule.  Again,
compare the organizations under the Unite The Right banner with the list
of common features of fascism presented above:  They score higher than
the Trump Administration itself, because they do not have to adapt to
the constraints of attacking an established government from within its
own structure.

Comparing today's U.S. Antifa activists to the list of common features
of fascism above, I see correlations with items... um, item 9 only.  By
definition, any social or political movement that names and defines
itself as anti-something qualifies as "reactionary."

> This world has come to lunacy.  

Our Reublican and Democratic Parties, and their financial sponsors,
share a uniform commitment to continued exponential growth of heavy
industry, as well as the ongoing transfer money and power from whole
populations to the hands of their financial and industrial masters.
They may not "mean to" destroy the world as we know it, but they will do
so because "Me first, and if that's a problem it's somebody else's
problem."




signature.asc

Re: on freedom - Re: [WAR] - Re: (53) Gaddafi's Prophecy, 2011 - "Europe will turn black" - YouTube

2018-10-24 Thread Steve Kinney


On 10/24/18 1:49 PM, juan wrote:
> On Wed, 24 Oct 2018 15:09:12 +1100
> Zenaan Harkness  wrote:
> 
> 
>>
>> In the case of Australia, we were an industrious, fair minded
>> Christian nation 
> 
>   LMAO! are you out of your fucking mind, or just a retarded troll\

Back in the 1970s on a flight crossing the Pacific, we landed in
Australia to refuel.  Passengers were allowed out to 'stretch their
legs' but black passengers were advised it would be better for them not
to leave the plane.

I had a teacher whose son was a college basketball player.  He was in
Australia with his team for an match, and he was arrested for robbing a
bank:  They just grabbed him off the street and charged him.  Within a
week the Aussie cops caught the guy who actually did it - positiviely
identified by videotape and witnesses, there was no resemblance at all
other than dark skin.  Several months and several lawyers later, it was
finally possible to get the "wrong guy" released and returned.

One would expect a nation whose "white" population descended from
chronic petty offenders dumped like trash on the far side of the world
to know better, but apparently not.  Lots of Aussies still seem to need
someone "lower" than themselves to look down on and abuse, so I suppose
gollywogs provided their only option...

:o/





signature.asc
Description: OpenPGP digital signature


Re: Yet another reason to call him #$%& Re: yet another reason...

2018-10-23 Thread Steve Kinney


On 10/21/18 6:46 PM, juan wrote:
> On Sat, 20 Oct 2018 15:12:22 -0400
> Steve Kinney  wrote:
> 
> 
>> The high volume of torrent traffic over i2p, 
> 
> 
>   I wasn't aware that i2p is mainly used for torrents? 

I don't recall the statistics but I would guess that torrents account
for at least 95% of the traffic on that network.  Maybe more like
99-point-something percent.

>   Last time I checked their eepsites(or whatever they are called) I 
> didn't find anythign interesting or 'criminal'. In other words, nobody seems 
> to be using i2p to host anything of value. And I saw more than a few sites 
> that looked that like russian honeypots. 

A website on the i2p network (eepsite) can host any files the user puts
in the site's /docroot directory.  That would include subdirectories
with their own index pages, not publicly advertised and available only
to "confidential" correspondents who know the names of the subdirectory
and index pages in question.  That's not quite a "digital dead drop" but
comes close.

I used to run a moderately popular eepsite and seeded lotsa torrents.
"Who" I was and what I may have distributed aside from publicly
advertised content is for me to know and others to guess.  Let's just
say I did it as an exercise and for amusement purposes only.  Last time
I checked, some of the stuff I seeded out was still bouncing around in
there years later.  :o)

>> and the lng duration of
>> typical downloads (25kbps counts as 'decent speed' in there), greatly
>> complicate matters for anyone doing traffic analysis, compared to the
>> hit-and-run pattern of TOR usage that typically lights up an entry and
>> exit router for just a few minutes per user session, during which easily
>> fingerprinted clusters of packets, all of them "of interest" to
>> potential adversaries, flow thick and fast.
> 
> 
>   Which is exactly the reason why  torscum should be promoting the use of 
> their network for filesharing...if they were honestly interested in 
> protecting userswhich of course they are not. 

The Tor Project's position on torrent traffic never made sense to me.
More users and more traffic add up to more security.  If casual users
see a bit more lag, so what?  In every instance where security vs. end
user arises convenience arises, TOR chooses convenience.

I was also very disappointed when the TOR Browser distribution dropped
support for router configuration; now they have done away with the last
scrap of that. "The Tor circuit display has been relocated and improved!
Click the Site Identity button (located on the left side of the URL bar)
to see the new circuit display" is a lie; there's no such button in the
update I just installed (ver 8.03), which presents the quoted text on
its 'update completed' page, but nothing related in any menu accessible
to the user.

The browser's configuration menu does present "new identity" and "new
circuit for this site" buttons; that's all, folks!  The "Donate Now"
link on the TOR welcome page does work though.

>> than they would consider acceptable if they knew about
>> them.  The reluctance of intelligence services to reveal their
>> capabilities by acting on what they know too often provides the best
>> protection most users can get...
> 
> 
>   ...but that didn't work too well for ulbricht and a few others like 
> him...

I would say it worked exactly as expected for Ulbricht and a few others
like him:  Always expect a faulty cost/benefit estimate produces net
loss results.

:o/





signature.asc
Description: OpenPGP digital signature


Re: Yet another reason to call him #$%& Re: yet another reason...

2018-10-20 Thread Steve Kinney


On 10/19/18 5:58 PM, Shawn K. Quinn wrote:

> Of course, #$%& has no clue how BitTorrent works. It's nearly pointless
> to route just the tracker callbacks through Tor, and routing the actual
> data over Tor would overload the network. I don't blame them for making
> it easy to block BitTorrent traffic; there are other filesharing tools
> which are a better fit if anonymity is a priority (Freenet, GNUNet, etc).

TOR schmore.  I would describe i2p as an anonymizing torrent
distribution network, with some other comms (in-network websites,
e-mail, etc.) piggybacking on the infrastructure that file sharing
traffic keeps up and running.

https://geti2p.net/en/

The Garlic Routing protocol used by i2p looks at least as secure as
Onion Routing - and IMO more so, because of both the protocol's
architecture, and the dynamics of real world traffic flow where a small
number of "dangerous" packets mix into a huge number of movies, TV
shows, record albums etc. in transit.  Extra paranoid users can
configure i2p to use longer chains, further complicating things for
adversaries.  By default all i2p nodes relay third party traffic, and at
present no (advertised) gateways connect i2p to the 'regular' Internet.

The high volume of torrent traffic over i2p, and the lng duration of
typical downloads (25kbps counts as 'decent speed' in there), greatly
complicate matters for anyone doing traffic analysis, compared to the
hit-and-run pattern of TOR usage that typically lights up an entry and
exit router for just a few minutes per user session, during which easily
fingerprinted clusters of packets, all of them "of interest" to
potential adversaries, flow thick and fast.

The most reliable anonymity against State level adversaries uses TOR for
hit-and-run network access via a high gain antenna and open router, or
any dodge that physically decouples the user from the physical router's
IP address.  i2p can't do that very well, because it takes 20 minutes or
more to integrate into the network and start moving packets.  So
double-nought spies and their ilk can get that much mileage out of TOR.

So far I have not come up with a way to prevent what I call a Hydra
attack against /any/ distributed anonymizing overlay network:  An
adversary who owns and operates a majority of the relay nodes via
geographically dispersed proxies run from a single cloud server
literally "can't be beat" except by physically concealing one's identity
from the physical Internet router used.

Users who expect mere software to defeat network surveillance by top
tier actors have started out with false assumptions and end up taking
far greater risks than they would consider acceptable if they knew about
them.  The reluctance of intelligence services to reveal their
capabilities by acting on what they know too often provides the best
protection most users can get...

:o/














signature.asc
Description: OpenPGP digital signature


Re: Police told to avoid looking at iphone x

2018-10-14 Thread Steve Kinney


On 10/14/2018 03:33 AM, jim bell wrote:
> https://www.engadget.com/2018/10/13/police-told-to-avoid-looking-at-iphone-x/
> 
> "Police have yet to completely wrap their heads around modern iPhones like 
> the X and XS, and that's clearer than ever thanks to a leak.Motherboard has 
> obtained a presentation slide from forensics company Elcomsoft telling law 
> enforcement to avoid looking at iPhones with Face ID. If they gaze at it too 
> many times (five), the company said, they risk being locked out 

So a small piece of tape or comparable makes the thing safe to handle
freely, and a mugshot or brief video clip unlocks it?

Yet again, security vs. convenience produces the usual winner.

:o/





signature.asc
Description: OpenPGP digital signature


Re: Media Write Protection / Crypto Devices / BadUSB - #OpenFabs #OpenHW

2018-10-13 Thread Steve Kinney


On 10/13/2018 08:42 AM, Mirimir wrote:

>> There is never "no" disk, just a matter of which ones
>> are plugged into the box, physically, or remotely.
> 
> OK, I should have said "unless there _is_ no disk, as there _can be_ in
> Tails". I've run Tails (and my own LiveCDs) on diskless machines. And
> yes, using USB for live systems is iffy. But write-once CDs are pretty
> safe, I think. No?

Well heck, CDs are cheap.  Write once, use once, melt once.  If your
trust in the Live CD vendor and the "trusted" device used to burn your
stack of Live OS CDs is well founded, and the device booted into has no
drive (or a power switch on the drive - a very trivial hack even with a
laptop), the only things left to worry about are undocumented debugging
modules on the CPU, and maybe undocumented BIOS or video chip features.

If your activities present a target important enough to justify use of
TS/SCI techniques against you, your activities are probably important
enough to justify purchasing obsolete laptops in bulk and destroying
each after one use.  "Fingerprint MY hardware will ya, you bastards?
HA!  Take that!"  Just sayin'.

Everything depends largely on one's threat model.  Who are your
potential adversaries, what are their potential resources, and what's
their cost/benefit ratio for doing what it takes to crack your system?
Educated guesses here establish parameters for reasonable defensive
measures also based on cost/benefit factors.  Spoiler:  For most of the
users most of the time, precautions beyond using a Live OS on a stick
don't make much sense.

Always consider that the cost of using information obtained via a
previously unsuspected attack vector includes a risk of exposing that
vector's existence.  Parallel construction covers a multitude of sins
but not all of them, all of the time.

:o)






signature.asc
Description: OpenPGP digital signature


Re: After Mysterious Closure, Solar Observatory In New Mexico Reopens

2018-09-26 Thread Steve Kinney


On 09/18/2018 03:52 PM, Razer wrote:
> 
> 
> After Mysterious Closure, Solar Observatory In New Mexico Reopens : NPR
> 
> Laurel Wamsley
> 
> A solar observatory in New Mexico reopened Monday after being closed by
> authorities for 10 days — which spawned national interest and
> speculation into the cause of its evacuation.

[ schnipp ]

> "We cannot wait to get back to work to show everyone the world class
> research we do every day at the telescope," McAteer said.
> 
> NPR's Emily Sullivan contributed to this report.
> 
> https://www.npr.org/2018/09/17/648804508/after-mysterious-closure-solar-observatory-in-new-mexico-reopens
>  

My venture into Conspiracy Theory re this event, from another forum:

NSO has a couple of unique instruments:

https://www.nso.edu/telescopes/#more

"The NSO Integrated Synoptic Program (NISP) provides long-term synoptic
observations of the Sun’s photosphere, chromosphere, and magnetic field.
NISP operates a suite of instruments from the Global Oscillation Network
Group (GONG) which is located at six sites around the world, resulting
in 24/7 observations of the Sun. NISP also operates the Synoptic Optical
Long-term Investigations of the Sun (SOLIS) program, which is located at
Big Bear Observatory in California.

"The National Science Foundation‘s Daniel K. Inouye Solar Telescope
(DKIST) which is being built and operated by NSO, will be a 4-m off-axis
solar telescope with a suite of cutting-edge first light instruments.
Focused on better understanding the behaviors of the solar magnetic
field, from the photosphere to the corona, DKIST will revolutionize our
understanding of the Sun and it’s dynamic behavior. Using a technique
called spectropolarimetery, pioneered by the NSO and the world’s leading
solar scientists, we will indirectly measure magnetic fields in the
corona for the first time.

Some of these instruments may have been "of interest" to the military
reconnaissance and/or signals intelligence community.

Also note the closure of the nearest Post Office. Was a package sent by
or received at NSO that could cause this much ruckus? Depends what it
might have been: A chemical or biological weapon could produce the
response seen, but why mail it to or from NSO?  I rule out chemical or
biological payload for two reasons: First, why target the Observatory?
Second, early press reports did not describe use of protective clothing
by the Feds seen on site, or the presence of any medical or Public
Health teams.

What else could someone have mailed out that would bring a Federal
Shroud of Secrecy and Cone of Silence down on NRO?

My guess: A "spectropolarimetery" or other unique sensor and/or its
complete engineering docs might have gone missing. If the Feds asked the
Geeks what it does, then relayed their answer to NRO for an opinion, the
sensor might have got retroactively classified Top Secret due to its
potential ability to unmask some U.S. stealth technology, or other
wierdshit liek that.

I think that accounts for all observations to date, better than anything
I have seen so far. If the above scenario did happen, it's a
clusterfuck: Any such sensor would leave a massive paper trail through
the Solar Astronomy and Astronomical Metrics worlds, no hope in hell of
scooping up enough of that data to prevent "hostiles" from
reconstructing the sensor from open source clues.

:o)





signature.asc
Description: OpenPGP digital signature


Re: root "login" xterm to increase security?

2018-09-20 Thread Steve Kinney


0On 09/16/2018 11:15 PM, grarpamp wrote:
> Any search will bring basic stuff like
> 
> https://insecure.org/sploits/xsecurekeyboard_fequent_query.html
> https://www.techrepublic.com/blog/linux-and-open-source/three-features-you-may-not-know-xterm-has/
> http://tutorials.section6.net/home/basics-of-securing-x11
> https://www.reddit.com/r/openbsd/comments/83adcn/does_openbsd_x11_not_have_security_problems/
> 
> Whether xorg, wayland, xenocara, drivers, ttys, init, login, getty,
> etc are receiving any level of scrutiny, audits, fuzzing, code
> scans, etc. The ancient and obscure it is, the less people look,
> and all the above are exactly that.
> Even mashing kbd on a FreeBSD can throw console into
> unrecoverable must kill state.
> And people talk how trust X?

I take it as self evident that physical access can defeat any computer
security strategy.  One can limit what a naive and/or unprepared party
can do with/to a computer they get their grubby fingers on, but a
competent and properly equipped adversary - not so much.

If the machine is off when the hostile party arrives, at least the data
on an encrypted hard drive is safe.  Until the next time an authorized
user switches the machine on and mounts the file system, under the
watchful eye of a hardware keylogger or flashed BIOS.

:o)





signature.asc
Description: OpenPGP digital signature


Re: Alice and Bob

2018-09-11 Thread Steve Kinney
View the Source, Luke

On 09/10/2018 08:06 PM, Steven Schear wrote:
> Alice is sending her message to Bob
> Protecting that transmission is crypto's job
> Without the help out of our good friend Trent
> It's hard to get that secret message sent
> 
> Work tries to deposit a check of your salary
> But with no crypto it'll be changed by Mallory
> You think no one will see what it is, you believe?
> But you should never forget, there's always an Eve
> 
> 
> [Hook]
> Cause I'm encrypting shit like every single day
> Sending data across the network in a safe way
> Protecting messages to make my pay
> If you hack me you're guilty under the DMCA
> 
> 
> DES is wrong if you listen to NIST
> Double DES ain't no better that got dissed
> Twofish for AES that was Schneier's wish
> Like a shot from the key Rijndael made a swish
> 
> But Blowfish is still the fastest in the land
> And Bruce's uses his fame to make a few grand
> Use ECB and I'll crack your ciphertext
> Try CFB mode to keep everyone perplexed
> 
> [Repeat hook]
> 
> Random numbers ain't easy to produce
> Do it wrong, and your key I'll deduce
> RSA: the only public cipher in the game
> Created it helped give Rivest his fame
> 
> If we could factor large composites in poly time
> We'd have enough money to not have to rhyme
> Digesting messages with a hashing function
> Using SHA-1'ers so I won't cause disfunction
> 
> [Repeat hook]
> 
> Password confirmed
> Standby



signature.asc
Description: OpenPGP digital signature


Re: latest false flag attack?

2018-09-10 Thread Steve Kinney


On 09/10/2018 05:50 AM, jam...@echeque.com wrote:
> On 10/09/2018 10:50, Steve Kinney wrote:
>> Everyone Knows that most of the nominal hijackers were Saudi nationals.
>> But in real life, most of them remain John Does:  Because the real
>> people whose identities were stolen by the hijackers turned up alive,
> 
> Liar.

A very famous Jew supposedly said it is not what goes into your mouth
that makes you unclean, but what comes out of your mouth.  Your last
couple of posts seem to reflect an effort to prove yourself vicious,
ignorant, and either delusional or looking to excuse and promote genocide.

Did you know:  Genetic testing shows no discernible difference between
ethnic Jews and Muslims native to Palestine.  Before Jewish refugees led
by Zionist trash were dumped in Palestine by countries who didn't want
them any more than the Nazis did, the Muslims, Jews and Christians in
Palestine just got along.  The invaders from the north were also
egalitarians of a sort, and fucked over the local Jews as badly as
anyone else in the process of stealing "their" land, given to them by
the Allied nations after WWII.

Observant Jews are some of my favorite people.  Not one of them is a
Zionist, and most actively condemn Zionism.

:o)




signature.asc
Description: OpenPGP digital signature


Re: latest false flag attack?

2018-09-09 Thread Steve Kinney


On 09/09/2018 09:22 PM, Mirimir wrote:

> Someone did, for sure. It could have been Israel and/or Saudi Arabia
> also. I suspect that they're all connected, in some clusterfuck way.
> 

Permission to speak freely?

Fuck that.  As even Dim (the dimmest of us all) would say, "I don't need
no permission from the likes of you."

The architects of the 911 Event did a great job, and I doubt we will
ever be able to prove a God damned thing about who done it.  Big clue:
If you ever beat Donald Rumsfeld at a game he cares about, you can
consider yourself Something Special.  He's that good.

Israel's greasy fingerprints are present in the form of a fairly massive
espionage operation that was quietly rolled up and kicked out of the
U.S. earlier that same year.  Press reports were scarce but indicated
that EOD and radio operator were the predominant MOS of the guise in
question - skills applicable to the Event in question.  Then there were
the famous "Dancing Israelis" who had cleaned out their offices at WTC
days before the Event; they ran a moving company, and their rented box
trucks tested positive for explosive residues per initial FBI report.
After they were shipped back home, one of them mentioned on an Israeli
talk show that they were Mossad, probably the only significant "leak" in
the whole operation.  Around 3000 casualties at a center of
international banking and not one Israeli citizen lost?  What are the
odds?!

Everyone Knows that most of the nominal hijackers were Saudi nationals.
But in real life, most of them remain John Does:  Because the real
people whose identities were stolen by the hijackers turned up alive,
well, and thoroughly pissed off after they were named as dead hijackers.
 A minor flaw in the plan... presenting no indicators of who actually
did the thing, other than that Saudi intel and their American friends
were well positioned to do the identity theft thing against Saudi
nationals.  Lest we forget, the propaganda aspects of the plan hinged on
blaming Osama Bin Ladin (RIP, kidney failure, winter 2001-2 in a
nameless cave in eastern Afghanistan*), famously a Saudi national.  So
Saudis they were - according to the Official Narrative.

That Hellfire missile a Predator drone fired before crashing into the
Pentagon scored a direct hit on an auditor's office.  (I bet a nickel
somebody put a corner reflector in the window just to make God damned
deadly certain the right one got hit.)  That comes closes to "proof"
that senior military officials were ass deep in the plot:  Who else
would have the will and clout to risk exposing the whole operation as a
hoax (no airliner debris at the site, imaginary plane's engines didn't
even break windows, people with relevant experience reported hearing a
missile and smelling cordite) to cover their own asses?  The folks
working in that office were trying to track down some billions of
missing public dollars, and the investigation died with their documents
and data.

* I suspect Bin Ladin's grave was finally found and positively
identified by friendlies in early 2011, giving the Obama Administration
a green light to stage the "killing Osama" hoax without risk of
subsequent exposure.  Soon after a somewhat less-famous helicopter
accident cleaned up after, killing the folks who were in a position to
say what really happened in Abbottabad that day, and be believed.

I <3 history.  It's everything that ever happened!  And thanks to the
Future Shock phenomenon x teh interwebz, I have watched SO much of it
happen...

:o/











signature.asc
Description: OpenPGP digital signature


Re: latest false flag attack?

2018-09-08 Thread Steve Kinney


On 09/07/2018 06:57 PM, juan wrote:
> 
> 
> 
>   it's been a while since the US military nazis, the wall street bankers, 
> other amerikan humanitarians and US empire vassal states have carried their 
> last false flag attack? A new one is overdue? 
> 
>   Is there any betting on it? =)

No point in betting on the United States staging another gas attack in
Syria and blaming the Syrian government.  On the one hand, nobody who
knows this has already happened several times will bet against it.  On
the other hand, nobody who denies that this ever happened will pay off
when it does, because they will "know" it didn't.





signature.asc
Description: OpenPGP digital signature


Re: Internet fights back, Providers Sellout, 3D Gunbooks For Sale

2018-09-06 Thread Steve Kinney


On 08/29/2018 03:29 PM, Razer wrote:
> 
> Grarpamp: "lol"
> 
> Here ya go laughing boy, the intertubz fights back. My blurb for
> #OccupySiliconValley #S17
> 
> "This #S17 #OccupySiliconValley. It isn't 'geeks who love computers'
> anymore. It's the new American Oligarchy... "The 1%"... the enemy. The
> Pentagon wrote a contract to store ALL DoD data, including classified
> info, that only #Bezos Amazon AWS 'cloud' and a couple of other
> operations could fulfill. Amazon=Pentagon, all the way back to Bezos
> statements years ago saying he'd co-operate with the CIA, b/c CIA."
> 
> Tactical Briefing: http://abillionpeople.org/occupysiliconvalley.html

Meh.  Sounds like a conventional offsite backup strategy to me.  It does
seem to indicate high confidence in the cryptographic tools used to
prevent stored data from being read by hostiles, with unusually strong
forward security (resistance to cryptanalysis for, say, 50+ years).

This contract would also indicate high confidence in methods used to
prevent useful source attribution and traffic analysis of files being
written into and read out of the archival servers in question,
presumably by parties including the vendor providing the service.

I'd like to see the protocols involved.  If they're that good, they
should be published because doing so will enhance The National Interest
at no cost to The National Security.

He said.  With malice aforethought.

:o)







signature.asc
Description: OpenPGP digital signature


Re: [PEACE] Juice Media - Australia's Northern Territory fracking, is SAFE [MINISTRY]

2018-09-05 Thread Steve Kinney


On 08/31/2018 07:15 PM, jam...@echeque.com wrote:
> 
>>> Fracking is safe everywhere - because if it had anywhere ever caused the
>>> slightest harm, you guys would have better poster girls.
> 
> On 31/08/2018 19:08, Zenaan Harkness wrote:
>> Gas coming out of people's water taps, earthquakes, leaching into
>> water.
> 
> Gas only comes out of people's taps when those taps are fed from deep
> wells, and gas has always come out of people's taps in those areas.
> 
> And the gas that interests frackers does not harm your drinking water,
> only volcanic gases harm your drinking water, which never happens in
> areas being fracked, because frackers do not want volcanic gases.

You should include the phrase "without irony" somewhere in these posts,
to underscore you ironic intent.





signature.asc
Description: OpenPGP digital signature


Re: I am a criminal

2018-08-30 Thread Steve Kinney


On 08/30/2018 07:14 PM, juan wrote:
> On Thu, 30 Aug 2018 19:04:29 -0400
> Steve Kinney  wrote:
> 
> 
>> High strength, heat tolerant materials are unnecessary unless your
>> design calls for accelerating and steering a payload that can reliably
>> knock down an aircraft, and actually hitting targets with it.  
> 
> 
>   and how do you know? Are you some sort of 'military engineer' despite 
> your 'quaker pacifism' and compassion for the pigs ? 

I study military history, especially focused on 20th and 21st century
wars.  I pay attention to military and aerospace technology for many
reasons:  The time to "lay down that sword and shield, and study war no
more" is when we arrive at that riverside.  On the journey from here to
there, we must study the FUCK out of war to become its masters, not its
victims.

On the technical side, I have worked in electronics manufacturing and in
machine shops.  I have run a range projects from designing and building
UL Certified life safety equipment to production design and management,
and designed and implemented ISO 9000 quality programs.  I have some
/faint/ clue about how stuff works - including military hardware, thanks
in part to direct exposure and in part to reading "aerospace defense
industry" trade magazines for a looong time- one likes to keep current
on what scams are in progress, or looking for sponsorship.

There is no such thing as Quaker Pacifism, although Friends do have a
well earned reputation of opposition to war.  I helped my Monthly
Meeting organize draft counselor training back in 2001 when it looked
for a bit like it might be useful.  (Spoiler:  Any determined individual
can legally opt out of the draft under existing U.S. public policy and
legal precedents.  Religious conviction is not a requirement, although
it does qualify.)

As for "compassion for the pigs," that phrase kind of says it all.  Hate
is a Loser Script.  Presenting hate as "revolutionary" promotes the
failure of revolutionary goals and actions.  So how long you been
working PsyOps as an unwitting agent for the Other Side?

:o)













signature.asc
Description: OpenPGP digital signature


Re: I am a criminal

2018-08-30 Thread Steve Kinney


On 08/30/2018 11:31 AM, Steven Schear wrote:
> You don't appear to have any experience with amateur rocketry. Although
> perchlorate based grains can be tricky, zinc-sulphur propellants can be
> used safely. (My friends and I flew 24-inch ZnS rockets to altitudes
> approaching 10k feet and Mach 1.8 while in HS.

Groovy, but a 24 inch rocket casing does not even come close to a
practical weapon in portability, accuracy or knock-down power.  How much
of it was taken up by fuel, vs. payload and avionics?  Did it have a
steering mechanism with capabilities beyond "keep the rocket vertical"?

> Titanium and other exotic metals are unnecessary today. Composites can
> easily do the trick. As for actuators, with the right designs, amateur
> aircraft servos can suffice although I have seen pneumatic ones used also.

High strength, heat tolerant materials are unnecessary unless your
design calls for accelerating and steering a payload that can reliably
knock down an aircraft, and actually hitting targets with it.  Past a
cut-off point, efficiency and extra cleverness can not substitute for
brute force and total ignorance.  In the case at hand, existing
munitions indicate that all of the above are necessary for success.

> I haven't tested nor seen others evaluate the efficacy of smartphone
> motion sensors for combat situations but there are discrete COTS
> components whose specs fall within the needed ranges.

Discrete COTS components fail spec in this case, because per the stated
design they they will be plugged into a "smart phone."  By definition
that phone is live opposition hardware radio, unless the antennas and/or
radio chip are removed.  That done, it's still running the opposition's
software of choice unless thoroughly cleaned.  By the time you're done
modding the hardware and software, it's cheaper and far easier to use a
Raspberri Pi or similar device.  That's what they're for.

> Warheads are generally scaled up shotgun shells. Flachets, ideally from
> tungsten but cast steel will do, are better than metal shot.

Warheads are generally high explosive shaped charges.  Some deliver a
single penetrator slug, white-hot and ultrasonic; others deliver shot in
a narrow cone, horizontal band, or radially as in a bounding mine
application.  Anti-aircraft shot varies in shape and composition,
typically a mix of polyhedrons and bowties, uranium of course.

The cleverest warheads can deliver a selection of projectile patterns,
by altering the timing of multiple primers in the driving charge.  Your
plane killer won't need anything that fancy.  But it will need to haul a
load of heavy metal and top end high explosives to within spitting
distance of the target aircraft, figuratively speaking, and fire that
warhead right on time.

> As for safety even commercial military arms fail. I certainly wouldn't
> want to test even the later protyped. ISIS forces seem to have created
> some excellent munitions using rather rudimentary materials but clever
> engineering. No reason to think those living in a developed country with
> access to common materials and a good garage foundry and machine shop
> can't do better.

The only thing that calls to mind is the cheap knock-offs of WWII
stovepipe artillery rockets that were carried in by ISIS to stage a
"Syrian Government Chemical Weapons Attack" way back in the early days
of the war.  The op was fail.  Other than that, ISIS & Co. appears to
get the best our international gray market arms dealsers can offer,
courtesy of your local CIA and its sister agencies, plus buddies overseas.

It's a long, hard, complicated road from lighting a big skyrocket to
shooting down airplanes, especially under the watchful eyes of State
Security as per a civil uprising scenario.  Your cell could get a lot
more bang for the buck by preparing to attack infrastructure targets
affecting industrial facilities, with "kill nobody" among the top
strategic objectives.  There, extra efficiency and superior cleverness
do pay off compared to brute force and total ignorance.

Killing people to improve the world presents as the ultimate Loser
Script.  To rebel as one is told, is not to rebel at all.

:o)








signature.asc
Description: OpenPGP digital signature


Re: I am a criminal

2018-08-30 Thread Steve Kinney


On 08/30/2018 03:15 PM, juan wrote:
> On Thu, 30 Aug 2018 10:13:51 -0400
> Steve Kinney  wrote:
> 
> 
>> Solve all of the above problems and proceed:  You will discover that
>> killing scapegoats 
> 
>   you are confused about the nature of pigs and the military

Our respondent was talking about killing political offenders, not their
servants.

>> does not repair systemic disorders hard wired into
>> the fabric of daily 
> 
>   right but it can help. Plus there's this little thing called justice. 

A.K.A. revenge.

Revenge is a losing strategy, alienating potential supporters and
assuring that the opposition will "fight to the last man" even in
hopeless situations.  So revenge is a core component of the Rebel As You
Are Told package provided to would-be rebels by their rulers.

Killing in self defense only, and offering a path to rehabilitation for
defectors from the Other Side, are winning strategies.






signature.asc
Description: OpenPGP digital signature


Re: I am a criminal

2018-08-30 Thread Steve Kinney


On 08/30/2018 12:44 AM, Steven Schear wrote:

> Not directly and certainly not the metal combustion chamber or nozzel.
> Probably not the parts exposed to high aerodynamic forces either but
> these are easily made using common and inexpensive metal shop
> fabrication means.

Common and inexpensive means of fabricating titanium alloy parts,
aerospace guidance systems and servomechanisms, high energy propellants
and explosives, etc.  And integrating them into one system that does not
blow up when the "fire" button is pressed, killing the users.

If you want to play with backpack portable anti-aircraft weapons, you
have three options:  Buy them, steal them, or promise Uncle Sam you will
shoot down the planes of his choice while wearing someone else's uniform.

Let's imagine that you have managed to get hold of, for instance, a
couple of crates of real live stinger missiles, with manuals etc., all
airworthy and ready to go:  Start using them to off pigs.  What happens?
 A state of emergency, martial law, a coast to coast and international
manhunt using every surveillance database and collection method known to
man.  Forensics teams will find exactly where in the supply chain you
got your missiles, and investigators will work forward from there and
backward from the scene of the crime until they meet in the middle:  You
and your team.

Would the public rise up?  A lot of them would, to help find you:  John
and Jane Q. Public generally don't approve of politically motivated
murder, unless it's been explained in advance by trusted media outlets
on the basis of some overriding "necessity", sugar coated, and the
gruesome details hidden from them.  Your project would get the full
demonization treatment and "propaganda works."

Solve all of the above problems and proceed:  You will discover that
killing scapegoats does not repair systemic disorders hard wired into
the fabric of daily life and business as usual in a country with
hundreds of millions of citizens.

:o/






> On Aug 29, 2018 9:13 PM, "Steve Kinney"  <mailto:ad...@pilobilus.net>> wrote:
> 
> 
> 
> On 08/29/2018 10:07 PM, Steven Schear wrote:
> > Stingers seem to be the deciding element for the Soviets in their
> > withdrawal from Afghanistan.
> >
> > Wasn't it Isaac Asimov that used gene-targeted assassination as the
> > major plot element in one of his stories?
> 
> Isn't it you who seems to believe that 3D printers can make guided
> missiles?
> 
> From there to "ragtag rebel hipsters" making biological weapons to wipe
> out scapegoat families ain't a long stretch, as both both reflect an
> infantile fantasy life with no significant grounding in material
> reality.
> 
> Why not 3D print a few kilos of heroin to fund your rebellion?  Or if
> that's not your bag, why not 3D print diamonds?  Or gold?
> 
> :o)
> 
> 
> 
> 



signature.asc
Description: OpenPGP digital signature


Re: I am a criminal

2018-08-29 Thread Steve Kinney


On 08/29/2018 10:07 PM, Steven Schear wrote:
> Stingers seem to be the deciding element for the Soviets in their
> withdrawal from Afghanistan.
> 
> Wasn't it Isaac Asimov that used gene-targeted assassination as the
> major plot element in one of his stories?

Isn't it you who seems to believe that 3D printers can make guided
missiles?

From there to "ragtag rebel hipsters" making biological weapons to wipe
out scapegoat families ain't a long stretch, as both both reflect an
infantile fantasy life with no significant grounding in material reality.

Why not 3D print a few kilos of heroin to fund your rebellion?  Or if
that's not your bag, why not 3D print diamonds?  Or gold?

:o)





signature.asc
Description: OpenPGP digital signature


Re: I am a criminal

2018-08-29 Thread Steve Kinney


On 08/29/2018 06:05 PM, Steven Schear wrote:

> No popular insurrection against a modern military has occurred mainly
> due to the lack of easy and affordable access of smart weapons. 

Define "smart weapon."

> broad
> interpretation of DD's right to publish its 3D plans might soon lead to
> practical TOW, Stinger and other smart weapons that could neutralize
> commonly deployed advanced military tech.

Pardon my language, but your ignorance on this subject matter appears to
be absolute.  The sentence above presents as meaningless and
embarrassing noise, to an audience that understands the technology you
are talking about.  The CPunks list has more than enough engineers and
technicians to assure "no sale" for your ignorant bullshit.

:o)







signature.asc
Description: OpenPGP digital signature


Re: I am a criminal

2018-08-29 Thread Steve Kinney


On 08/29/2018 03:38 PM, Razer wrote:

> I wasn't really suggesting using guns to overthow the government. You
> might like this explanation of why.
> 
> Randazza at the libertarian legalwonkblog popehat:

[...]

> We managed to preserve our right to keep military grade rifles and
> machine guns, so we all muster down on the Town Common with our guns. We
> tried voting. We tried protesting. This is a reasonable time to start
> with the armed insurrection stuff.
> 
> So, you, me, all our neighbors, hell our entire city builds a perimeter
> around it. We fill sandbags, we all have ammunition, we all have food,
> water, supplies, and most importantly, we are all unified and in
> complete solidarity.
> 
> And we stand there, resisting whatever it is the government was going to
> do to us.
> 
> And then they fly over with one jet, dropping one FAE bomb, and roll in
> with three tanks, and in about 12 hours, our "resistance" is reduced to
> a few smoking holes. The Tree of Liberty will get its manure all right,
> but it will be the manure that you shat out as you ran for cover, as
> long range artillery rains down on our town, as we get carpet bombed
> from 35,000 feet, and as the sky goes black with drones and cruise missiles.
> 
> We're screwed.

As a critique of Right Wing militia fantasies, the above stands up well.

But as a statement about armed insurrection in general, it presents a
straw man argument:  Nobody will stage an armed insurrection against a
21st century government by using 18th century colonial strategy and
tactics; anyone who tries it will certainly lose, early and badly.

The strategic objectives of modern insurrections rarely include
replacing the whole government, and winning tactical options rarely
include defeating the national armed forces in head to head conflict;
that requires mass defection and non-compliance by the opposing force.

Instead, an insurrection seeks "redress of grievances" i.e. radical
changes in State policy and procedures.  Bringing commerce to a halt via
boycotts, civil disobedience, sabotage, etc. reliably produces maximum
results at minimum risk.  "Economic terrorism" ranks at or near first
place in formal assessments of threats to State and Corporate power today.

The State exists to provide a stable environment for commerce and to
enforce the rights, so called, of absentee landlords.  It has no other
purpose.  When the State fails in these missions and can not restore
business as usual by force, the State's owner/operators come to the
bargaining table prepared to make concessions.  In the United States,
the Labor Movement and Civil Rights Movement achieved significant
objectives working within this model of domestic political warfare.

Competent insurrectionists do not kill people except in self defense;
murdering one's opponents only makes it difficult or impossible for the
survivors to come to the bargaining table mentioned above.  "Off The
Pig" was a heavily promoted slogan in the 60s and 70s when the FBI was
running "Communist" revolutionary cells in the United States - guess who
promoted it, and why?

Our rulers and their faithful servants make every reasonable effort to
provide the public with pre-failed models of rebellion, and to deny the
public access to information about practical populist politics.  "Rebel
As You Are Told" ranks second behind "Divide The Conquered" among the
most necessary, persistent and well funded themes in State and Corporate
propaganda today.  Anyone who wants to see input from public at large
have any impact of State policy and Corporate behavior faces a long
uphill climb.  Any chance of success must start with basic political
education.  An example of such:

http://pilobilus.net/strategic_conflict_docs_intro.html

:o)






signature.asc
Description: OpenPGP digital signature


Re: I am a criminal

2018-08-28 Thread Steve Kinney


On 08/28/2018 11:05 PM, CANNON wrote:

> We live in an era where almost half of the states in the USA are
(attempting to) censor the free flow
> of information. It is sad...

Granted, but what has changed?  All I see in the case at hand is empty
symbolic posturing by typically sleazy politicians:  Low hanging fruit
with no possible real world impact, therefore no potential blowback.

In the immortal words of Clara Peller, "Where's the beef?"

:o)










signature.asc
Description: OpenPGP digital signature


  1   2   3   4   >