Re: Facebook Users can now Appeal Freedom of Speech... to Facebook [2x down again]
On 9/19/19 2:24 AM, grarpamp wrote: > https://arstechnica.com/tech-policy/2019/09/facebook-plans-launch-of-its-own-supreme-court-for-handling-takedown-appeals/ > https://fbnewsroomus.files.wordpress.com/2019/09/letter-from-mark-zuckerberg-on-oversight-board-charter.pdf > https://fbnewsroomus.files.wordpress.com/2019/09/oversight_board_charter.pdf > > Notice how the "users" column in Ars article has only one > "right" and function "granted" to them by FB...: "beg and plead" > > Just like how you can "petition" your "government" or some > supposedly "independant" branch of its tax paid slaves therein, > for a "redress of grievances", such as say... taxation, > or police brutality, or zoning, or ... anything, > even right to freedom from their arbitrary rule over you. It appears to me that The Facebook recently modified its content censorship policy for 'hate speech' and 'offensive speech.' Formerly, someone who wanted to shut another user the fuck up would report their posts as TOS violations, and someone - probably a contractor with very limited English literacy - would glance at the reported post and click a 'ban button.' First offense, three days locked out of posting. Second offense within a given window of time, seven days locked out. Third offense within a given window, indefinite suspension and/or account termination. But as of a week or 10 days ago, the 'ban button' seems to produce a different result: A new error message replaces the reported post, which I would guess still looks normal to the user who made the post. I have reasonable confidence that the new error message indicates a censored post, because so far the users whose posts I have seen replaced by the error message have a consistent history of posting stuff that skates right up to the edge of Facebook TOS violation; so far I have not seen an exception. Simple explanation: Users banned from posting largely abandon The Facebook during their bans, and so generate little or no ad revenue or (direct) surveillance data in those time frames. Presenting false error messages permits a lower threshold of censorship, without increasing controversy over censorship itself or reducing The Facebook's per-user revenues. So far I can only speculate. But now that I have posted this, I should remember to ASK the original posters about the content of "error message posts." Oddly enough, these posts often have one or two visible replies (not referencing the error message) which would enable affected users to identify the posts in question - once informed that their posted content /has/ silently vanished. signature.asc Description: OpenPGP digital signature
Re: Jim Bell says: "I got stuck in prison for 13 years and Pamela Anderson didn't visit me ONCE!!!"
On 9/7/19 3:02 PM, Punk wrote: > On Sat, 07 Sep 2019 08:20:26 -0700 > Razer wrote: > >> Because libertarians don't meet her ethical or erotic standards > > isn't assange a libertarian? That "is" business presents lots of pitfalls, especially when applied to humans. Assange certainly represents himself as anti-authoritarian, and his actions speak way louder than his words on that front. But our Libertarians present as crypto-fascists, given that implementing their utopian visions would only remove the few restraints on our present rulers, shifting the balance of power in society even further in their direction. Note that by "rulers" I mean folks like the 500 billionaires who presently own 1/2 the capital assets in the United States, population 360 million or so. "It takes about 3/4 million peasants to support one dominant billionaire." Not shocked yet? Check out this simple graph of U.S. income distribution, scaled relative to familiar physical objects: http://lcurve.org Assange does pay attention to political power in a process oriented perspective. See his "The non linear effects of leaks on unjust systems of governance" ( https://cryptome.org/0002/ja-conspiracies.pdf ). So I doubt he could identify with the "Rand Fan" version of Libertarianism. That leaves Anarchism. Some anarchists do call themselves Libertarian, to avoid personal blowback from the demonization of anarchists - one of the few propaganda lines /all/ repressive States agree on - but somehow that don't sound like our Mendax. He does seem to favor the rights of local communities over those of absentee landlords, which strikes me as an anti-Libertarian position. Like the Marxists before them, Libertarians present their proposed changes as a bridge to Utopian anarchy. But a familiar model involving Lucy, Charlie Brown and a football seems to fit both cases... :o/ signature.asc Description: OpenPGP digital signature
Re: This is BS
On 9/7/19 3:43 PM, Ryan Carboni wrote: > So, Mr. Bond, you’ve been found in a place you’re not wanted. Does > anyone know you’re here? Let me guess: This post was in reply to one from a person (or chatterbot?) I killfiled years ago? :o) signature.asc Description: OpenPGP digital signature
Re: The cultural turn in intelligence studies
On 8/21/19 11:56 PM, Razer wrote: [...] > You'll note the one recurring theme throughout the whole series. There was NO > ONE #6 could trust. Ever. On reading Steve's details I've seen slightly > different show creation narratives but one thing I know... McGoohan was > DRIVEN to do this. He was willing to fund it out of his own pocket if > necessary. Whatever that 'argument with the chief' was about in the last > episode (all you hear is thunder) was in some way, irl, connected to his > drive to get the prisoner on the air. During production of the Danger Man series, McGoohan demanded and got a lot of creative control. Drake's failure to adhere to prevailing stereotypes was largely McGoohan's doing, as was the general trend toward realism in Danger Man scripts, relative to other popular spy fiction. McGoohan avoided personal publicity and his private life was anything but an open book; but what he did say when he spoke as himself indicated anarchist or at least libertarian leanings. As a consummate professional McGoohan no doubt did his homework, learning as much as he could about how real intelligence services do their business. He obviously did not like what he saw. I view The Prisoner in part as a report on what MeGoohan learned about the spy business and its role in society, and in part as anti-recruiting propaganda targeting that industry. My take-away from The Prisoner? Cooperate with any intelligence service and: 1) You will not know who your real employers are. 2) You will not know your employers real intentions. 3) Your contributions will always and only do harm. 4) They will dispose of you when your usefulness to them ends. The above may not apply so much to people from the "best families" who serve managerial roles (back during WWII the initials 'OSS' were sometimes said to stand for 'Oh So Social'), but rank and file intelligence officers and agents (i.e. intelligence professionals and witting or witless dupes under their direction) present as cheap, expendable supply items. Why did the closing credits of Fallout, the last Prisoner episode, indicate that Number Six was played by The Prisoner? Maybe just that the series was a difficult and demanding project, and McGoohan felt like celebrating getting it done and over with. :o) signature.asc Description: OpenPGP digital signature
Re: The cultural turn in intelligence studies
after only two episodes were produced, for reasons that remain unclear. McGoohan and Danger Man script editor George Markstein already had a new project in mind: The Prisoner. To avoid licensing issues - and promote the mystique of the new series - McGoohan and the production staff for The Prisoner always pointedly denied that Number 6 was John Drake. But if our Number 6 was anyone else, Drake must have had a twin with identical attitudes, personality and occupational experience. Why did Drake resign from M6, and why was this question the constant theme of attempts by his captors to break him down? If I told you I would have to kill you. We are advised that "questions are a burden to others, answers a prison for oneself." Many viewers were disappointed by The Prisoner's two-part series conclusion, Once Upon A Time and Fall Out: Even compared to the other Prisoner episodes they are rather bizarre. Those who know what the word "allegory" means won't be disappointed, if they are in a mood for a story told in a series of events that point toward psychological, political and perhaps even autobiographical paths to the solution of Drake's enigma. At the end of the final episode, the closing credits show that Number 6 was played by "The Prisoner" rather than Patrick McGoohan. I have my own suspicions about this final touch of quirky humor, but "a still tongue makes a happy life." Both The Prisoner and Danger Man are available as commercial DVD sets and, of course, via covert channels on the usual networks. Be seeing you! A note from your Citizen's Advice Bureau: Unsolved mysteries in The Prisoner include the correct sequence of the episodes: They were produced out of order for logistical reasons, and delays in production interrupted the series' original broadcast run. The first episode and the final two are obviously in their right places, but the rest? Detailed analysis of the content of the episodes themselves provides some clues, and this order from a project published by Six Of One is very satisfactory: 01 - Arrival 02 - Dance Of The Dead 03 - Free For All 04 - The Chimes Of Big Ben 05 - Checkmate 06 - The General 07 - A B & C 08 - The Schizoid Man 09 - Many Happy Returns 10 - Living In Harmony 11 - A Change Of Mind 12 - Hammer Into Anvil 13 - Do Not Forsake Me Oh My Darling 14 - It's Your Funeral 15 - The Girl Who Was Death 16 - Once Upon A Time 17 - Fallout - Series Finale Prior acquaintance with John Drake enables us to view The Prisoner in its native context. These episodes of Danger Man provide a well rounded introduction to the fictional man behind the famous number: Episode 52 - That's Two Of Us Sorry: Drake investigates a theft of nuclear research secrets that leads him into morally hazardous human terrain. Episode 54 - Whatever Happened to George Foster: Drake catches a respected NGO doing dirty politics in Latin America, leading to a personal war against Establishment adversaries at home. Episode 57 - The Ubiquitous Mr. Lovegrove: Foreshadowing the surrealism of The Prisoner, Drake battles a hostile spy ring's recruitment front while slightly out of his mind. Episode 58 - It's Up To The Lady: A realistic spy story about retrieving a defector by using his wife for leverage, with a too-realistic twist. Episode 70 - The English Lady Takes Lodgers: Sometimes a spy yarn is only a spy yarn, and sometimes Drake's occupation permits him to play the perfect knight. Episode 74, To Our Best Friend: McGoohan directs this episode which pits Drake against his employers from beginning to end. Episode 84 - The Not-So-Jolly Roger: A conventional period spy story in a most unconventional period setting: Filmed on location at Pirate Radio 390, Red Sands Fort. (c) Steve Kinney 2014, published under under Creative Commons By-SA-NC License
Re: Area 51: 1M to Storm Area 51 in Massive Naruto Run to See Them Aliens
On 7/13/19 12:14 PM, grarpamp wrote: > https://edition.cnn.com/2019/07/11/us/alien-march-facebook-event-trnd/index.html > https://www.facebook.com/events/448435052621047/ > > Storm Area 51, They Can't Stop All of Us > > Friday, 20 September 2019 from 03:00-06:00 PDT > Area 51 > Amargosa Valley, Nevada 20908 > 662K going · 614K interested > We will all meet up at the Area 51 Alien Center tourist attraction and > coordinate our entry. If we naruto run, we can move faster than their > bullets. Lets see them aliens. As a wargamer this amuses me to no end. General Jack D. Ripper's troops at "the battle of" Burpleson AFB come to mind. But today's Generals have both the training and the inclination for Corporate thought, and they have to see this silliness as a major expense: Start with direct costs of crowd control preparations, add indirect costs including administrative and operational overhead secondary to "chaos outside the base." CI people will view the turmoil caused by the tinfoil turnout as a source of targets of opportunity for opposition espionage assets to exploit. So at least the Storm Area 51 thing will annoy the hell out of Uncle Sam's boys & girls, and cost the public a medium sized fortune; that's worth doing for its own sake. I do see a bit more here than a comedy version of civil disobedience. Big Brother gets a lovely field exercise in crowd control - a chance to use all that cop equipment that's just been piling up in armories, parking lots, warehouses... and a chance to redefine rules of engagement. The near-uniform fanatical loyalty of the crowd to that Trump person presents some potentially amusing optics: Faithful MAGA Patriots arrested and transported en masse! In real life I expect Nevada National Guard to meet the crowd, if any, outside the base fence with lots of borrowed prison busses lined up and ready for transportees. The inherent unpredictability of network mediated crowd surges would mandate over-preparation on the defender's side - swarms move faster than requisition orders. The invading force, if any, will contain a critical mass of individuals who think 4G network signals permanently injure and even kill people. We know that, because many of them sit for hours daily with their mobile phones out, typing rants and getting into arguments about the deadly dangers of cell phone signals. I think this presents as the invading forces' Achilles heel. On the Federal side of the fence, I would look into deploying microwave fences and crowd control weapons (or pretending to truck them in, if already built into the landscape). Considering the physical terrain and the need to avoid adverse publicity by causing grave physical harm to wily invaders, I don't see how General Ripper & Co. could say no to this, once informed that the option stands open. Hell, just SAY you are doing it, roll out a few big ominous looking parabolic antennas, and let mass hysteria do the rest. :o) signature.asc Description: OpenPGP digital signature
Re: Trump accused of obstruction of justice (was: Re: What does it mean to participate in society? )
On 7/5/19 3:18 AM, jim bell wrote: [...] > She was obviously guilty of violation of the Federal Records Act, which > required her to arrange to have the contents of her private server > backed up, essentially continuously, with the government, to the > National Archives. She did not do that. She also had her staff delete > 33,000 emails: Her justification is that those were "personal". That > was a lie, too. "Socialized" people interpret their experience of the material world in the context of an acquired "world view" which guides or, in most instances, controls their perception and interpretation of material conditions and events, and governs their responses to same. To "participate in society" necessarily includes compliance with dominant propaganda narratives, at least to the extent of knowing them and adjusting one's behavior to take their existence into account. Example: Our propagandists made an enormous Political Issue of Mrs. Clinton's private e-mail server: Both "because" it existed, and "because" of bulk deletion of content potentially including criminal evidence. But concurrently, our propagandists briefly and quietly reported the bare bones facts of Mrs. Clinton's separate felony offenses involving deliberate violations of the National Security Act, then fell silent on that subject. Mrs. Clinton reportedly removed classification markings from controlled documents and forwarded them to people not cleared to receive them. She also instructed her staff to do likewise, a separate and even more serious felony offense. Mrs. Clinton's status as an attorney, and the fact that she did sign a Classified Information Nondisclosure Agreement, removes any doubt regarding her criminal intent and should qualify her for enhanced sentencing: https://www.archives.gov/files/isoo/security-forms/sf312.pdf "I hereby acknowledge that I have received a security indoctrination concerning the nature and protection of classified information, including the procedures to be followed in ascertaining whether other persons to whom I contemplate disclosing this information have been approved for access to it, and that I understand these procedures." The simple, unambiguous nature of these e-mail related crimes accounts for the (relative) silence of our propagandists on that topic: No defense or evasion based on accusations of partisan bias can 'make them didn't happen'. Mrs. Clinton can not pretend she "did not know" her actions were felonies. The refusal of Federal law enforcement to bring charges demonstrates that Mrs. Clinton enjoys de facto immunity from the legal system that governs lesser mortals. As this bluntly contradicts the foundational myth of "equal justice under law", under the rug it goes. How lucky for Mrs. Clinton that the FBI simply "forgot" to impound her computers and image their hard drives in the course of a criminal investigation based on the content of those hard drives. Even if she had been charged, procedural stalling based on this circumstance would assure that she died of old age before the disposition of her charges. In context with the above, the Trump Regime's failure to bring obstruction of justice charges against the Obama Regime's fixers in the FBI indicates Trump's commitment to support "class privilege" and, most likely, fear of retaliatory violations of his own class privilege should he get "out of line" with anything but his mouth. signature.asc Description: OpenPGP digital signature
Re: Social media services support account spoofing
On 6/18/19 12:32 PM, Ryan Carboni wrote: > Social media services support account spoofing, this simplifies the > creation of government sockpuppets. Government sockpuppets can also > assume the history of other accounts (this is a simple series of mysql > commands, any codebase can accomplish this by copying entries and > assigning them to a new ID), > > This is a substantial concern to privacy rights. Replying to whole thread's content to date... Privacy rights: What's that? Certainly one has no such thing with regard to use of "social media" providers. Their Terms of Service always say, in moderately opaque language, that users have no 'rights' of any kind, only privileges where/as granted by the provider and revocable at any time for any or no reason. Instances of fraud, identity theft, etc. performed by, or aided and abetted by the provider may be actionable. But lots of luck in the spending contest that results should one take it to Court. > I am being harassed when I attempt to form new friends over the > internet. The US government has effectively controlled my entire life, > and I condemn it entirely. Pardon my language - I do not MEAN to be sarcastic - but somebody needs to "get a life." Face to face IRL human contact, evolving into analog trust relationships based on experience over time. Long distance relationships mediated by technology controlled by third parties can provide significant advantages, but real value lives in the real world. > I see no use for the DOJ Inspector General if > this conduct is so widespread that in my particular case it is > considered to be permissible. As an agency of the U.S. Federal Government, the DoJ exists for one purpose only: To enforce the 'legal rights' of absentee landlords and maintain an environment favorable to commerce. The State has no agencies or departments dedicated to protecting the 'rights' of individuals, except where/as this occurs as an incidental by-product of the above described mission - and in these instances, "money talks and bullshit walks." > I think all social media websites that failed to engage in proper > oversight of this "investigation" should have computer issues. Beware the Tar Baby Principle, a.k.a. "you are attached to what you attack." If harassment by State and/or Corporate actors prompts you to expend all your energy fighting back against invulnerable enemies, they win. Is all. End of story, end of game. Is there somewhere else where applying your time, attention and energy could achieve more valuable results? Compared to wasting all of the above, by definition YES. signature.asc Description: OpenPGP digital signature
Re: The US government lacks legitimacy and credibility
On 6/26/19 6:04 PM, Ryan Carboni wrote: > No doubt as I post this, someone reading it will think "I know this, I > took a class on it" > > The US government is illegitimate, uncredible, and irrelevant. Um, well... "Legitimate" means, in accordance with your master's wishes. Note the root word "leige", which means "lord." By definition, obedience to the State "is legitimate" while disobedience "is illegitimate." I always cringe a little when I hear anarchists and other anti-authoritarian types use the word "legitimate" as if that was legitimate. :D Uncredible, meaning can not be trusted to convey accurate information: That fits. States maintain control over their subjects by any means necessary, including deception at every scale from simple lies to elaborate hoaxes psychological warfare. Irrelevant? One must ask, in what context can we call a network of institutions with the power to steal, kidnap and murder at will - and defend these prerogatives from competitors - within a given geographic boundary irrelevant? Academic writers broadly accept the above description as a definition of State sovereignty. As George Orwell pointed out, language shapes thoughts, beliefs and behavior. As a contemporary example, these are the synonyms of "activist" per Merriam-Webster: addict, bigot, bug, crank, crazy, demon, devotee, enthusiast, extremist, fiend, fool, freak, maniac, militant, monomaniac, nut, radical, ultraist, visionary, zealot Not listed as synonyms for "activist": advocate, champion, engaged, leader, motivated, populist, pro-active, self-starter Are these really synonyms for "activist"? Advocate as in one who advocates for a cause or position, Engaged as in one who actively takes part, Champion as in one who fights for a cause, Leader as in one who takes the lead, Motivated as in up on your feet and down to the street, Populist as in by and for the people, Pro-Active as in not waiting for others to act, Self-starter as in taking personal initiative. http://www.thesaurus.com/browse/activist Sticks and stones can break my bones, but words can murder millions. :o/ signature.asc Description: OpenPGP digital signature
Re: Autonomous Next Generation Leaks
On 6/2/19 7:51 PM, grarpamp wrote: [...] > It’s been more than six years since Edward Snowden went public. After > all the breathless headlines, Hollywood movies, book deals, Pulitzer > prizes, and glossy primetime biopics. What, pray tell, has come of it? > For the average American – bupkis. In fact, mass surveillance is > actually growing by leaps and bounds. Such that those who wish to > salvage the remnants of their individual privacy will be forced to > make some tough choices in the years ahead. Every public conflict and controversy set in motion by the Snowden Affair arrived at the same conclusion: A decisive win for the U.S. intelligence community. Examples: Per precedents set, the NSA may now 'hack into' computers used by Congressional staff members at will, and lie to Congress under oath, with no consequences other than getting whatever results they want. Our No Such Agency could not have gotten better results if they handed Snowden exactly what they wanted published, and assured he gave everything he had to agents under their own direct control. Thanks to Global Research, I get to say I told you so, just days after the Snowden Affair jumped into the headlines: https://www.globalresearch.ca/nsa-deception-operation-questions-surround-leaked-prism-documents-authenticity/5338673 > The kernel of an approach can be found out in the field. Where poor > security is fatal. Hunted by the world’s most formidable military, the > head of ISIS is still alive thanks to solid operations security, also > known as OPSEC. Abu Bakr al-Baghdadi is definitely a leader who > appreciates OPSEC. According to the New York Times, “he eschews all > electronic devices, which could identify his location, and probably > communicates through a series of couriers.” The key to staying > vertical, then, is the process surrounding the couriers. How they’re > compartmented, screened, and arranged to create a resilient > communication network. No doubt al-Baghdadi is aware that a flawed > courier scheme was a significant factor in the downfall of Osama bin > Laden. Ah, good old fashioned ... should we call it "disinformation" or Big Lie propaganda? I guess that depends the context and audience. ISIS, the mercenary army formerly known as Al Qaida, was founded by Zbigniew Brzezinski during the Carter Administration as a deniable channel to funnel arms and intelligence to anyone interested in kicking Soviet ass in Afghanistan. In an amazing series of coincidences, the actions of Al Qaida by any name have always directly advanced the agendas of U.S. Security State oligarchs and their radical fringe right wing extremist DemoPublican political partners. Abu Bakr al-Baghdadi, if any such person exists, will continue to work hand in glove with U.S. three letter agencies as long as he lives, because reasons: Whatever inducements prompted him to join up, and a desire to stay alive. As for our Mr. Bin Ladin, the fog of war makes it difficult to say with certainty that he died of complications secondary to kidney failure in the mountains of eastern Afghanistan during the winter of 2001-2; if not, he most likely remains alive. The guy Seal Team Six murdered shortly before getting murdered themselves had "wrong place, wrong time" problems. > Edward Snowden likes to promote strong cryptography. Leaving people > with the notion that staying under the radar is a matter of leveraging > a technical quick fix. But recent history shows that trusting your > life to an allegedly secure communication platform is an act of faith. > And not an advisable one, especially when state sponsored operators > enter the picture. Achieving higher levels of security requires a > disciplined process which is anything but a quick fix and which often > entails giving up technology. Even cartel bosses learn this lesson: > security technology fails. Both my design and by accident. Spies win > either way. Quite so: Cryptographic tools and manipulated network comms have potential uses in the context of larger and much more time/energy intensive operational security a.k.a. 'tradecraft' strategies. But never as a substitute for deception and misdirection, physical security techniques, etc. First time amateur 'operatives' may stand a chance of getting away with leaking high value confidential documents and information - if nothing connects them, more than hundreds of other people, with that information; if they come up with clever strategies to disassociate themselves from that information's escape into the wild (ideally, an obvious target of opportunity the leak will get blamed on); drop everything at one go with no advance warning to anyone living or dead; then go on with their lives exactly as if they know nothing about what happened. signature.asc Description: OpenPGP digital signature
Re: Fundamentals of Anglophonic Common Law
On 5/23/19 6:47 PM, Ryan Carboni wrote: > To clarify, the worst injury that could occur if a prosecutor pursues a > weak case is having a worse percentage win rate when he decides to talk > up private practice. > > The idea that a prosecutor's self-gain overrides other considerations is > heretical, but in terms of cause and effect, an unrelated party can be > faulted for a prosecutor's timidity, and for the prosecutor's notion > that they are representing the victims to whom they've so utterly lied to. Heresy? The word "Satan" means "accuser," and in the mythology he functions as God's Prosecuting Attorney. In real life I would prefer a legal system based entirely on the 'tort' concept - let the injured party bring suit, or in instances where that can not happen - i.e. murder - let an ad hoc committee from the community do so. Devising an anarchist legal system that does not immediately devolve to heavily biased popularity contests and/or lynch mobs who may regret their actions soon after, presents some pretty challenges. I have not tried but it sounds like a fun project. :o) signature.asc Description: OpenPGP digital signature
Re: Fundamentals of Anglophonic Common Law
On 5/23/19 1:41 AM, Ryan Carboni wrote: > The government is made of institutions. The press is an institution. Institution: A facility where people are locked up for their own good and the safety of society at large. Institutionalized: Confined in an institution, or, a personality rendered dependent and passive-aggressive by prolonged confinement in an institution. > The government makes the law, but it doesn't do so in a commonly > acknowledged fashion, it does so by prejudicing the result, if the law > is weak in an area. This is how new laws are passed, this is how old > laws are reinterpreted. > > Usually the press frames a situation as a moral issue, and either juries > would see it as such, or legislators would. The press serves two markets at once: Their audience and their patrons. To acquire and keep audiences, press outlets report "news" as a series of engaging dramas, in a context that encourages readers to identify with players in the stories presented. To acquire and keep patrons (advertisers or grant writers), press outlets must frame their stories in a context that supports the utility, desirability and/or practical necessity of the products, services, etc. offered by their patrons. The State serves one market: The wealthy and powerful. This service consists of codifying and enforcing the "rights" of absentee landlords, providing arbitration processes for settling disputes among their patrons, and providing armed enforcement services to maintain an environment favorable to commerce. The Press and the State answer to the same masters, and they serve mutually supportive roles. Where apparent conflicts between the News Media and the Government do not present as empty posturing, they reflect policy disputes among a country's rulers. Press criticisms of the State do not rise to the level of questioning the "legitimacy" of State institutions and authority - at most the press presents symbolic and/or self-defeating models of rebellion. > Perhaps the average Trump supporter doesn't understand why they support > Trump, nor does the average Democrat, but one thing is clear, if the > allegations against Trump are true, they would vote out the entire > government. There is a certain ridiculousness to it all. The press is > publishing leaks on tangentially related items to the Trump > investigation, the Trump investigation seems political motivated because > they haven't charged anyone with what Republicans would see as valid > crimes, but even if it was focused Hyperbole like "hack the > election", "Alfa bank data laundering", if true, would be incredible. > > This seems to be a systematic mishandling and inability to actually > prosecute competently. If the honest truth was released, people would > see it for what it is, not even a circus, but a clownshow. We can call the massive inertia of a collective delusion controlling hundreds of millions of people from cradle to grave a "clown show" if we want to pretend that we are above all that. This Olympian viewpoint, compliant with indoctrination by State, Media and Academic institutions, presents as an example of "institutionalization." But as a matter of blunt fact, a civilization built on a foundation on murder and intimidation, hell bent on destroying the planetary ecosystem that makes its own existence possible presents very few laughs. Rather the opposite. The mocking laughter some indulge in seems to indicate internal pressures that might, if not diverted to fuel a perception of personal superiority, lead to actually rebellious activities. That would not do. All properly institutionalized individuals know their place in the status hierarchy and rebel only when and as they are told. Like any other animals habituated to their cages these folks may complain loudly, but pretend they do not even notice open doors and gates - what lies beyond represents the Unknown or even... horror of horrors... anarchy. :o/ signature.asc Description: OpenPGP digital signature
Re: EMP missile
On 5/16/19 6:18 PM, jim bell wrote: > Air Force has deployed missiles that could fry electronics of Iran > https://mol.im/a/7037549 via http://dailym.ai/android > The article as a whole reads like a "defense" contractor's press release: Bombastic, overblown, factually inaccurate (i.e. pretends real hard that facilities can not be hardened against super-duper microwave beams), and even includes this barb against anyone who would dare deprive the contractor of Yuge cash payouts: > Because of sequestration budget cuts, the CHAMP missiles did not become > operational under the Obama administration. Here's a cheap laugh: > The missile is equipped with an electromagnetic pulse cannon. This uses a > super-powerful microwave oven to generate a concentrated beam of energy. And right in the middle of the article, apropos of nothing, this non-sequitur appears: > One of those laboratories, Sandia National Laboratories, has been developing > robots the size of insects that could assassinate North Korean leader Kim > Jong-un with deadly toxins. > > These robotic weapons using nanotechnology employed in surgical operations in > hospitals are being developed secretly with funding by the Defense Advanced > Research Projects Agency. Far be it from me to cry "old news!", but I read all about that project, sitting in the Central Kitsap Jr. High library in 1973: http://www.isfdb.org/cgi-bin/pl.cgi?57079 What that has to do with using drone-mounted microwave ovens to destroy all the electronics in shielded bunkers, I have no clue. :o) signature.asc Description: OpenPGP digital signature
Re: OFFTOPIC: physics question
On 5/13/19 2:12 PM, \0xDynamite wrote: >> On 5/12/19 9:59 PM, \0xDynamite wrote: >>> Sorry for this little diversion, >>> If light travels at a. different speed for different colors in order >>> to account for the rainbow of a prism, how fast is the. speed of light >>> then? >> >> The speed of light is a physical constant. The frequency (or >> wavelength) of a photon determines its energy and therefore, to the >> human eye, its color. > > If light's speed is a physical constant, then light wouldn't separate > into colors within a prism. Because light's speed is a physical constant, light separates into colors when passing through a prism. The higher the frequency of a photon, the higher its energy. Since more energetic photons can not speed up, and less energetic photons can not slow down, they behave AS IF they had more or less 'mass.' Higher and lower energy photons deflect slightly more or less when forced to change direction in a refractive medium, in a way analogous to heavier and lighter moving objects acted on by, for instance, the wind... :o) signature.asc Description: OpenPGP digital signature
Re: OFFTOPIC: physics question
On 5/12/19 9:59 PM, \0xDynamite wrote: > Sorry for this little diversion, but it has occurred to me that > physics has a bit of a logical contradiction and I think highly of the > group's rational faculties here to help me sort this out. > > If light travels at a. different speed for different colors in order > to account for the rainbow of a prism, how fast is the. speed of light > then? Is there real physics to optics? How can light know what > direction to bend after it leaves the lens? The speed of light is a physical constant. The frequency (or wavelength) of a photon determines its energy and therefore, to the human eye, its color. Longer answer: https://www.asu.edu/courses/phs208/patternsbb/PiN/rdg/color/color.shtml https://en.wikipedia.org/wiki/Photon_energy Our ability to perceive light, and construct models of what it's bouncing off in realtime, has presented interesting problems to many noted scientists over the years. An illustrative example: https://vimeo.com/70051022 :o) signature.asc Description: OpenPGP digital signature
Re: Former US intel analyst arrested for leaking DroneWar dox
On 5/12/19 12:44 AM, jim bell wrote: > On Saturday, May 11, 2019, 9:10:31 PM PDT, Steve Kinney > wrote: > > > On 5/11/19 11:57 PM, Steve Kinney wrote: > >>> If this took place before The Intercept burned Reality Winner, shame on >>> The Intercept. If it took place after, shame on the leaker. > > >>Postscript: The Reality Winner incident did come /after/ the >>publication of docs apparently submitted to The Intercept by Daniel >>Hale. So, he had no obvious way to know where NOT to send TS dox. > > > > Years ago, I recall reading that early on in the history of inkjet > printers, even 1990, 'features' were built in the printers to detect if > the printed document "looked like" a US dollar, small yellow dots, > precisely placed to encode source data, were written over the face of > the document. > It seemed to me that removing the yellow cartridge, plus a thorough > exhausting of the residual material, would improve the security. > > Based on what I heard, it wasn't clear that such security dots, or other > features, were used for non-currency-counterfeiting applications. It > sounds from these recent incidents as if inkjet printers are putting > identifiable information on virtually any printouts. Wikipedia has a good article on this: https://en.wikipedia.org/wiki/Printer_steganography signature.asc Description: OpenPGP digital signature
Re: Former US intel analyst arrested for leaking DroneWar dox
On 5/11/19 11:57 PM, Steve Kinney wrote: > If this took place before The Intercept burned Reality Winner, shame on > The Intercept. If it took place after, shame on the leaker. Postscript: The Reality Winner incident did come /after/ the publication of docs apparently submitted to The Intercept by Daniel Hale. So, he had no obvious way to know where NOT to send TS dox. signature.asc Description: OpenPGP digital signature
Re: Former US intel analyst arrested for leaking DroneWar dox
On 5/11/19 12:16 AM, Razer wrote: > A former US intel analyst was arrested Thursday under the Espionage Act. > He allegedly leaked dox about the US Drone War program. Daniel Hale > faces up to 50 yrs in prison, accused of disclosing 11 top secret/secret > documents to a reporter. If this took place before The Intercept burned Reality Winner, shame on The Intercept. If it took place after, shame on the leaker. I saw a story indicating that prior to publishing the material submitted by Ms. Winner, The Intercept called the Feds to verify that the zip code on the package matched the facility their source told them it came from. Not certain this actually happened - but given what came next I do not doubt it. The Intercept published at least one high quality scan of a document sent by Ms. Winner, with the printer's watermarks intact: This told world + Feds the printer's serial number, and time the document was printed. When I read about that, I went to The Intercp's site and downloaded the image in question. I bumped up the contrast and tweaked its colors a bit: Viola, the repeating watermark pattern jumped right out. Starting on the date The Intecept openly and publicly burned Ms. Winner - whether through shocking ignorance and negligence, or by design - anyone who sends them 'dangerous documents' has no one to blame but themselves the first morning they wake up in a Federal prison. :o/ signature.asc Description: OpenPGP digital signature
Re: No one is obligated to participate in the investigation against me
On 5/8/19 3:34 AM, Ryan Carboni wrote: > It is to my understanding that if I were to ask for technical advice on > a web forum under a different username, people would be made aware of my > identity by government investigators monitoring me. Which is not > ordinarily a problem, but considering I was framed about a decade ago, > it is. That sounds like standard police work to me. When an investigatory agency receives a directive to take someone down, or individuals in such agencies develop personal a personal grudge against someone, they shift gears from passive observation to active harassment. A very long time ago, I fed a snitch "bad information" on purpose, then turn him against his buddies in blue. He was fishing for information about criminal activities some of my old friends never did, and that /really/ pissed me off. It turned out that 'they' already had me listed for disposal, so my instincts did not mislead me: I had nothing to lose by kicking their shins... According to my source, the principal technique police investigators use to dispose of inconvenient people consists of interviewing their employers, any 'friends of the force' they may happen to know. Their leading questions paint a picture of the victim as a member of a terrorist conspiracy, an uncaught serial rapist, or whatever else the interviewee would most strongly react to. After learning all they can about the targeted individual from these interviews, investigators sit back and let the seeds they have planted do their work. The victim usually finds him or herself unemployed soon enough after the employer has "learned the truth." Keeping the targeted individual unemployed by poisoning background checks, and/or by responding promptly with the above mentioned tactics when any new employer files State documents (sometimes within hours these days, thanks to Surveillance State infrastructure) follows. How can a targeted individual turn this off? In some cases, a criminal conviction - any criminal conviction - might do the trick: Mission accomplished, etc. In some cases, moving to another State might do the trick - if the scope of the harassment does not extend past a County or State agency. Just maintaining a low profile and allowing time to pass might reduce the active harassment below the threshold where it matters. In some instances, explaining the situation to a potential employer in advance of the approach by a hostile party might - but lots of luck finding prospects who would not assume you're a paranoid looney. :o/ signature.asc Description: OpenPGP digital signature
Re: Happy World Password Day!!! :D
On 5/2/19 10:40 AM, Cecilia Tanaka wrote: > https://nationaldaycalendar.com/world-password-day-first-thursday-in-may/ > > Celebrate the World Password Day changing or upgrading your p455w0rd$, > dear all. <3 > > Oh, you know, "123456", "password", and "admin" are so old fashioned > passwords... ;) Passwords are so old fashioned - and they present the most easily and frequently exploited weakness in security systems. We do have solutions... Randomly generated pass phrases: http://diceware.com Most people will only need three or four pass phrases, including the one that decrypts / unlocks one's portable database of unique. 'randomly' generated, impossible to memorize, effectively brute-force-proof credentials: https://keepass.info/ Lose your database file, lose access to everything? Not likely - if you scatter copies of the database "everywhere", and update the copies when you add or change any credentials. Needs a "password education" or better, "password eradication" day. :o) signature.asc Description: OpenPGP digital signature
All that fuss and bother about Mendax
Our comrade Mendax has a way with the ladies, including accomplished professionals like Argentine Ambassador to the UK (2006-2011) Alicia Castro: "Then we succeeded that he would be allowed to have a kitten, whose company he greatly enjoyed, and whose presence at the embassy has generated one of the most odd and obtuse amongst the complaints raised by the current president of Ecuador." http://theindicter.com/my-friend-julian-assange-alicia-castro-ex-ambassador-in-london/ In my opinion, the whole current mess is not fair to James. Does anyone know who's looking after him now? Meanwhile, here's a rare find: Sensible commentary on the state of play on the legal front: http://johnhelmer.net/the-julian-assange-case-now-puts-the-us-on-trial-in-a-british-court-is-there-a-get-out-of-jail-card-for-assange/ For the new kids: The theory behind the practice of Wikileaks in a brief and seemingly unfinished essay from Himself, courtesy of JYA: https://cryptome.org/0002/ja-conspiracies.pdf Wikileaks was originally presented as a community project, a "Wikipedia of" leaked documents, vetted and analyzed by a distributed network of volunteers. But when the Manning files showed up, Assange hijacked the project and put it on lockdown, presumably due to security concerns when presented with what may stand as The Leak Of The Century. Our Mendax pissed a lot of people off, yrs. truly included - but when Collateral Murder, War Diaries and Cablegate hit the nables, I forgave all. He surely knows the definition of "humility" but to him it must forever remain an abstract concept. Considering his impact on public affairs, I must endorse his tendency to do whatever the fuck he thinks will work. :o) signature.asc Description: OpenPGP digital signature
My second Facebook thoughtcrime in two weeks!
On 4/20/19 9:39 PM, Punk wrote: > On Sat, 20 Apr 2019 18:11:53 -0400 > Steve Kinney wrote: > > > me: > > Then you have rampant censorship at the hands of the asshole > users themselves. So the vast majority of groups are heavily censored and > just echo chambers. >> > >> Yup. However, those echo chambers do have their potential uses: One >> must always preach to the choir, else how will they get on the same page >> and work together effectively at show time? > > > Even if the group has a legitimate purpose, censorship is unacceptable. > But what commonly happens is that censorship allows assholes to be > unaccountable and fraudsters to go unchallenged. And unsurprisinly censorship > is one the core 'features' of facebook. People LOVE to block and ban their > betters because they know they can't never hope to refute them. Legitimate: In accordance with the law. Latin root "leige" meaning "Lord" or, in practical terms, one's owner. Probably not a good baseline for anarchist value judgments. :o) >> As an example, The Facebook has enabled me to distribute hundreds of >> copies of this package of documents to receptive readers: >> >> http://web.archive.org/web/20190110192354/http://pilobilus.net/strategic_conflict_docs_intro.html >> >> >> I think that alone makes screwing around with The Facebook a net win. > > > Well, I don't think that's sound and complete accounting. Customer satisfaction, on the customer's own chosen terms, provides the final bottom line. As long as I continue to consider The Facebook useful, I will continue to use it. >> >>> Then you're running tons of javascript malware, including a keylogger. >>> Because of course the whole point of facebook is to automatically spy on >>> you with milliseconds resolution. >> >> Javascript? Optional. Replace the www in any Facebook address with m, >> for the legacy mobile version. I learned this exists when searching for >> a convenient way to download videos posted directly on The Facebook - in >> the mobile version, just right-click and save-as. Since then, mobile >> has become my default mode. > > > I knew about the 'mobile' mode though it was rather crippled at the > time I used it. But if you manage to use facebook without running JS, that's > good and congrats. > > Also I assumed that by now that mode didn't exist anymore, or it > required JS since 'modern' retard phones happen to have a lot of memory and > fast multicore processors...for the very purpose of running JS malware. Funny > that the NSA hasn't updated m.facebook.com yet... m.facebook.com would exist to support for legacy systems and software, and incidentally provide accessibility for visually impaired users. I don't expect it to go away any time soon. >> >> The "fancy" version of The Facebook requires JS from facebook.com and >> fbcdn.com ["facebook content distribution network"]. Block Javascript >> from all other sites while on the facebook.com domain and the thing >> works faster and better, without 3rd party user tracking. > > > Yeah well. I don't think there's any 3rd party tracking in facebook. > I'd assume facebook.com doesn't serve googletagmanager.com malware. And in > the absurd case that they did, blocking google doesn't solve the problem of > running facebook's malware. I just loaded up The Facebook and switched off all filters. On The Facebook, NoScript indicated that the page had loaded a script from google.com. [...] >> The Facebook's pages load a keylogger? I would like to hear more about >> that; so far I have seen no evidence of one. > > IIRC when you 'tagged' 'friends', the tags were automatically > recognized (or there even was autocomplete?) - Thing is, when you typed a > message, there was a piece of code looking for 'friends' names. That means > that *every time* a key-press event is triggered, some code runs. In other > words, a keylogger. Whether the code saves all the key presses and sends them > to the NSA I don't know, but it would be trivial for it to do that. > > I'm not sure if there was some sort of spell checker as well or other > similar feature that required key press events to be processed in real time. > I think there was but I can't recall the details. > > Bottom line of course is : once you run malware from something like > facebook you can (and should) assume the worst. That would be Javascript all right: A tangled mess that sometimes slows the browser down to a crawl. I only /rarely/ shift out of "mobile" mode. But a keylogger "log
Re: clockwork statist propaganda was : Re: My second Facebook thoughtcrime in two weeks!
On 4/20/19 9:49 PM, Punk wrote: > On Sat, 20 Apr 2019 17:43:17 -0500 > "\\0xDynamite" wrote: > [...] >> free-riders of the commune who weren't pulling their fair share of >> work, etc. > > FREE RIDERS! GASP!! In any social matrix, everybody contributes something, if only consistent honesty, reliability and concern for others. Except those who can't manage even that - and yeah I seen a few, fortunately just a few, here and there on my travels. From that all else follows, with regard to On vs. Off The Bus issues: The rider's own choice, take it or leave it. :o) signature.asc Description: OpenPGP digital signature
Re: My second Facebook thoughtcrime in two weeks!
On 4/20/19 3:01 PM, Punk wrote: [...] >> I got a Facebook account for maybe seven or eight years ago. Since then >> I have used it to find and hook up with local activist orgs; get >> feedback on propaganda materials (handbills, flyers, etc.) in production >> and distribute the finished products to people who used them IRL; do >> volunteer intelligence work for activist orgs; picked up a few paying >> gigs; and I managed to seriously blow about a dozen minds that I know >> of. On the whole, The Facebook has served /my/ purposes adequately; the >> question of whether that's "good" depends who you ask. > > > I too had an account in a previous life and used it to do some of the > things you mention. But as time went on the costs of using an NSA weapon > designed to attack us outweighted any perceived benefit. > > For instance, it should be kinda self-evident that what you see inside > facebook and which people you get to 'meet' is (heavily) manipulated. No question: The Facebook presents as a 'computer dating service' of sorts, profiling users' interests and personalities and pulling users into echo chambers populated by "their own kind." To a lesser extent The Facebook also exposes users to "opposite" personalities and messages, to encourage conflict and polarization - because that drives user engagement and, in the long run, promotes our rulers' "divide the conquered" agenda. The Facebook primarily works to find users' existing biases and magnify them; their business model includes "changing minds" with regard to consumer purchasing preferences and frequency. In the sphere of political ideology, The Facebook spots, classifies and reinforces the users' already established patterns, enhancing their predictable responses to targeted political propaganda. > Then you have rampant censorship at the hands of the asshole users > themselves. So the vast majority of groups are heavily censored and just echo > chambers. Yup. However, those echo chambers do have their potential uses: One must always preach to the choir, else how will they get on the same page and work together effectively at show time? As an example, The Facebook has enabled me to distribute hundreds of copies of this package of documents to receptive readers: http://web.archive.org/web/20190110192354/http://pilobilus.net/strategic_conflict_docs_intro.html I think that alone makes screwing around with The Facebook a net win. > Then you're running tons of javascript malware, including a keylogger. > Because of course the whole point of facebook is to automatically spy on you > with milliseconds resolution. Javascript? Optional. Replace the www in any Facebook address with m, for the legacy mobile version. I learned this exists when searching for a convenient way to download videos posted directly on The Facebook - in the mobile version, just right-click and save-as. Since then, mobile has become my default mode. The "fancy" version of The Facebook requires JS from facebook.com and fbcdn.com ["facebook content distribution network"]. Block Javascript from all other sites while on the facebook.com domain and the thing works faster and better, without 3rd party user tracking. NoScript does the deed quite conveniently. AdBlock plasters over some of the cracks that may be left. Another tracking feature: Links to posted URLs displayed in The Facebook do not point to the targets advertised, but to The Facebook itself, with PHP arguments appended; when clicked on, these links result in a fast redirect to the target site, with a Facebook tracking code appended, again as a PHP string. As far as I know, nobody has made a browser plugin to automagically sanitize this process; but the real link does appear in the on-page Facebook link; users can extract the real link, to kill that component of Facebook user tracking. The Facebook's pages load a keylogger? I would like to hear more about that; so far I have seen no evidence of one. > It should also be self-evident that nobody is ever going to be able to > use a NSA-govcorp bulletin board to attack NSA-govcorp in any meaningful way. > While you managed to inform a dozen people about the real nature of the > society they live in, govcorp used facebook to disinform and manipulate 12 > million people (or some such ratio between benefits and harm caused). That strikes me as a case of "making the perfect the enemy of the good." All the better State sponsored dissident groups do that, both to assert their acolytes' moral superiority and to discourage anyone from doing anything that might have unwanted real world political impacts. As I said before, "It's a piss poor pitiful anarchist who's too stinkin' good to use the State's resources against the interests of the State." I would stack up the long term social and political impact of the dozen or so minds The Facebook may have helped me ruin forever up against any 12,000 or so Normal
Re: My second Facebook thoughtcrime in two weeks!
On 4/19/19 1:35 AM, Punk wrote: > Well, having a facebook account may be rather a matter of self-hatred =P As long as I don't get prosecuted for self abuse it's all good. > The facebook is like democracy. If it could serve any good purpose, it > would be ilegal. "It's a piss poor pitiful anarchist who's too stinkin' good to use the State's resources against the interests of the State." - Me I got a Facebook account for maybe seven or eight years ago. Since then I have used it to find and hook up with local activist orgs; get feedback on propaganda materials (handbills, flyers, etc.) in production and distribute the finished products to people who used them IRL; do volunteer intelligence work for activist orgs; picked up a few paying gigs; and I managed to seriously blow about a dozen minds that I know of. On the whole, The Facebook has served /my/ purposes adequately; the question of whether that's "good" depends who you ask. :o) signature.asc Description: OpenPGP digital signature
Re: My second Facebook thoughtcrime in two weeks!
On 4/18/19 12:11 AM, Shawn K. Quinn wrote: > On 4/17/19 22:09, Steve Kinney wrote: >> Just got locked out of The Facebook for the second time in two weeks, >> this time thanks to a MegaChurch Xtian bitch I happen to know IRL, who >> recognized herself "all to clearly" in this post and falsely reported it >> as a TOS violation: > > It could be the swastikas on the comic book cover, along with the > repeated use of the term "Nazi", were considered "hate speech". I know > is a bit of a stretch, and I too disagree with the decision, but I'm > just saying that is how they think. I would discount the likelihood of a human decision, given that the FU notice from Facebook arrived three minutes (maybe less) after I pushed the 'send' button. No time for a complaint to come up through a queue for human attention - but about right for a "certain person" camping on The Facebook to see my post, fly into a towering rage, and push a few well worn buttons. :D I do plan to create a few "TOS violating" sock puppet accounts, and use one to test my ability to censor other users' content on demand. :o) signature.asc Description: OpenPGP digital signature
My second Facebook thoughtcrime in two weeks!
Me so proud: Just got locked out of The Facebook for the second time in two weeks, this time thanks to a MegaChurch Xtian bitch I happen to know IRL, who recognized herself "all to clearly" in this post and falsely reported it as a TOS violation: http://pilobilus.net/good.little.nazis.html Don't y'all hate on me 'cause I have an account at The Facebook. I set it up when I needed to verify the promotional gimmicks I was building into a couple of commercial websites - the effectiveness of "share on Facebook" buttons (home made, non-tracking unless the sucker clicks on them), positive control of the preview images and text presented, etc. Once it was there, I started using the Facebook account to pump out propaganda. If nothing else, the local activist community noticed and I got yanked into the scene and 'made use of.' My kind of fun! I encourage CPunks readers who also maintain accounts at The Facebook - no need to confess that sin here - to share the above link. Since it's hosted on my website vs. presenting as your very own thoughtcrime, this should not lead to any sanctions. I will, of course, make the said link my own first post once "allowed" to access The Facebook again. Have you annoyed a polite, respectable Nazi Pig today? :o) signature.asc Description: OpenPGP digital signature
Re: Internet Archive Labeled Terrorist, Political Takedown Pending
On 4/11/19 9:19 PM, grarpamp wrote: [...] > http://blog.archive.org/2019/04/10/official-eu-agencies-falsely-report-more-than-550-archive-org-urls-as-terrorist-content/ > > We've been trying to explain for the past few months just how > absolutely insane the new EU Terrorist Content Regulation will be for > the internet. Among many other bad provisions, the big one is that it > would require content removal within one hour as long as any > "competent authority" within the EU sends a notice of content being > designated as "terrorist" content. The law is set for a vote in the EU > Parliament just next week. And as if they were attempting to show just > how absolutely insane the law would be for the internet, multiple > European agencies (we can debate if they're "competent") decided to > send over 500 totally bogus takedown demands to the Internet Archive > last week, claiming it was hosting terrorist propaganda content. [...] > And just in case you think that maybe the requests are somehow legit, > they are so obviously bogus that anyone with a browser would know they > are bogus. Included in the list of takedown demands are a bunch of the > Archive's "collection pages" including the entire Project Gutenberg > page of public domain texts, it's collection of over 15 million freely > downloadable texts, the famed Prelinger Archive of public domain films > and the Archive's massive Grateful Dead collection. Oh yeah, also a > page of CSPAN recordings. So much terrorist content! The Public Domain is an international terrorist organization, engaged in the vicious theft of tens of billions of dollars worth of intellectual property that rightfully belongs to any media corporation that salvages any and all abandoned or derelict Content, i.e. by adding a "brought to you by" line to the title, a price tag, their rightful copyright notice and an End User License Agreement. Public Domain terrorists seek to gut the economies of the Western Democracies by stealing billions, and over time trillions of dollars from the corporations responsible for education and public information supporting Freedom and Democracy throughout the Free World. We shall stop The Public Domain by any means necessary, and seek the death penalty for anyone found to be actively promoting or materially supporting The Public Domain, and/or "free" public access to publicly funded research, art and literature. A public service message from The People In Charge, your faithful and indispensable protectors, reminding you that You Need Us. signature.asc Description: OpenPGP digital signature
Re: AnarchoPunk Update
On 4/10/19 4:03 PM, Punk wrote: > On Wed, 10 Apr 2019 03:50:18 -0400 > grarpamp wrote: > > >> Dealing with Pedophilia in an Anarchist Society with Yaakov Markel via >> Anarchast >> https://www.youtube.com/watch?v=1NWLFBHrWdU > > of course, another quite remarkable thing is how this two scumbags > parrot to the tee the current psychobabble 'scientific' dogmas about > 'therapists', 'trauma' and the like. > > so here's a half sane voice to counter these 'libertarians'. > > https://www.goodreads.com/book/show/7633118-the-trauma-myth > > " psychologist Susan Clancy reports on years of research and contends > that it is not the abuse* itself that causes trauma—but rather the narrative > that is later imposed on the abuse experience." > > go figure. It's all just...propaganda from monkeys and their puritan, > anti-sex (non) 'culture' based on jew-kkkristian (non) 'values'. > > > *there of course is no 'abuse' in consensual acts. The inherent logical disconnect between anarchy and law enforcement underlines the irrelevance of /most/ debate about how an anarchist society should be run. I prefer what used to be called frontier justice: When someone makes enough trouble to motivate enough people to do something about it, they act: Maybe a good talking-to; if that fails to curb the behavior in question, maybe running the offender out of town; if that seems inadequate to protect the community, maybe killing the bastard. Frontier justice is not perfect, but it's the best system we have. Compare the Libertarian belief that incorruptible Courts adjudicating tort claims, on a level playing field where wealth, power, and political prejudice provide no advantages, can exist. :o) signature.asc Description: OpenPGP digital signature
Re: Censorship: Linus Torvalds Comes Out Blatant Censor's Advocate, Anti Privacy/Anonymity
On 4/7/19 4:36 PM, Punk wrote: > On Sun, 7 Apr 2019 00:04:22 -0400 > Steve Kinney wrote: [...] >> A cursory >> search did not turn up a link to the text; my copy arrived in hard cover >> via the Science Fiction Book Club. Interlibrary loan if all else fails... > > > > try > > https://thepiratebay.org/torrent/7780471/Brunner__John Heh. Should have checked there first. :o) signature.asc Description: OpenPGP digital signature
Re: Censorship: Linus Torvalds Comes Out Blatant Censor's Advocate, Anti Privacy/Anonymity
On 4/6/19 11:28 PM, John Newman wrote: [...] > I need to read True Names (thanks!) - although a cursory search > didn't find the phrase. See also The Shockwave Rider by John Brunner, 1975: The first tale of a "hacker" (not so named) who wages war against State actors. A cursory search did not turn up a link to the text; my copy arrived in hard cover via the Science Fiction Book Club. Interlibrary loan if all else fails... I would nominate our Mr. Brunner as the "most under appreciated" SF author of his generation: Uniformly brilliant work IMO; as another example, people who appreciate CPunk concepts would likely find The Stone That Never Came Down very inspirational. :o) signature.asc Description: OpenPGP digital signature
Re: Censorship: Linus Torvalds Comes Out Blatant Censor's Advocate, Anti Privacy/Anonymity
On 4/6/19 5:32 AM, grarpamp wrote: > https://www.linuxjournal.com/content/25-years-later-interview-linus-torvalds > > "Social Media... Add in anonymity, and it's just disgusting. When you > don't even put your real name on your garbage (or the garbage you > share or like), it really doesn't help. I'm actually one of those > people who thinks that anonymity is overrated. Some people confuse > privacy and anonymity and think they go hand in hand, and that > protecting privacy means that you need to protect anonymity. I think > that's wrong. Anonymity is important if you're a whistle-blower, but > if you cannot prove your identity, your crazy rant on some > social-media platform shouldn't be visible, and you shouldn't be able > to share it or like it." > The above sounds like a comparison between The Facebook (makes a token effort to tie accounts to users' True Names), and 4chan (makes a token effort to disconnect users from their True Names). That strikes me as a forced context creating forced either/or alternatives. We need a middle ground between True Names Only and Anonymous FTW. We already have a working example of that middle ground: The i2p network. i2p users host various resources including websites, torrent trackers, and community forums on their own hardware, and access the resources etc. of their choice either anonymously, or pseudonymously via user-chosen screen names. i2p users may disclose their True Names at will, but by default the identity and location of i2p users can not be determined without State level infrastructure access and surveillance resources. An i2p user's actual True Name is his or her i2p router ID, which by design has no connection with any geographic location or birth certificate. Result? A more intelligent, better behaved version of the Internet, with prevailing attitudes reminiscent of the public Internet shortly before AOL popped up and saturation bombed us with weaponized morons, followed by MegaCorporations looking to manipulate, control and extract capital from the said morons. (Younger folks: Look up "Eternal September" for the sad true story.) I can not completely attribute the modest i2p success story to the prevalence of users known by pseudonyms only. To access i2p one has to install and configure software that will not work unless one cam read and apply howto docs and such; this screens out the less-bright 80% of potential users right up front. Size also matters: The smaller the network, the more good or bad behavior stands out, and the larger the benefits of presenting as a good (in the sense of useful) person. At present, i2p has about 60k users according to stats.i2p. But I do not discount the prevalence of stable pseudo-identities as the primary factor affecting the quality of content and discourse in i2p space; without this factor, concerns for reputation would have no impact. Compared to the great unwashed publick visible on the open Internet under their own names, i2p participants seem remarkably polite, intelligent and responsible. Go figure. A user's i2p persona can take any form, and may include the content of websites that live on their creators' own hardware, accessible only via the i2p router network. It takes about a day for anyone who knows HTML to build a website in i2p space; just turn on the server included in the router package and populate the relevant local directories with content. Pseudonyms that become visible in i2p space through participation over time become "persons" in a community, defined by their in-network behavior, building relationships and reputations based on their contributions. The folks who wear those masks mostly take good care of them, because the trust and cooperation of other users in the community has value: When a well respected i2p user asks for something, other users who have benefited from that user's contributions, advice, example etc. make a real effort to come through, because that's what humans do. Smart ones, anyway. :o) Postscript: Above I mentioned True Names, from the Vernor Vinge novella of that name. Published in 1981, True Names introduced the term 'cyberspace' and several key concepts relevant to Cypherpunk interests. If you ain't seen it, here's a copy somebody else hosted so I don't have to: http://www.scotswolf.com/TRUENAMES.pdf signature.asc Description: OpenPGP digital signature
Facebook Censorship? I'm banned right now!
On 4/6/19 12:19 PM, jim bell wrote:> Jim Bell's comment: > > If a well-functioning AP-type system were available, Zuckerberg wouldn't even dream of doing this. > > Mark Zuckerburg wants censorship to protect his business model: https://nypost.com/2019/04/05/mark-zuckerburg-wants-censorship-to-protect-his-business-model/ > I just got my first three day suspension from The Facebook, for "Bullying and Harassment." We all know how the internet interprets censorship and what it does; here's the offending text: http://pilobilus.net/My.Thoughtcrime.html The offending text contains none of the following: Hate speech, disparagement of any person or product, incitement to violence, solicitation of crime, commercial content, personal attacks of any kind, violent or sexual language of any kind. It was on-topic in the reply thread where I posted it. My thoughtcrime? I questioned the accuracy of the New Zeland Mosque shooter's video, without explicitly describing anything in it. Then I very briefly speculated on the propaganda intent of the video, concluding that the two most obvious but seemingly 100% contradictory objectives would /both/ serve Corporate State interests by "playing both ends against the middle." Bullying and harassment? On second thought, maybe I /did/ break some Perfect Citizen's brain and send him howling into the night. If so, go and do ye likewise. :o) signature.asc Description: OpenPGP digital signature
Re: CNBC: Zuckerberg backs stronger Internet privacy and election laws: 'We need a more active role for governments'
On 3/31/19 1:08 PM, jim bell wrote: > CNBC: Zuckerberg backs stronger Internet privacy and election laws: 'We need > a more active role for governments'. > https://www.cnbc.com/2019/03/30/mark-zuckerberg-calls-for-tighter-internet-regulations-we-need-a-more-active-role-for-governments.html > So the richest man in the world wants three things: Stronger internet privacy laws: Zucking Fuckerberg does not like competition in the consumer surveillance market. Stronger election laws: Less voters - through a process biased to let typical consumers in, screen everyone else out. A more active role for governments: Expand NatSec/LEA surveillance 'partnerships' with service providers, shift the costs of censorship from the private to the public sector. signature.asc Description: OpenPGP digital signature
Re: The Libertarian As Conservative
On 3/28/19 8:12 PM, Punk wrote: > On Wed, 27 Mar 2019 19:27:34 -0400 > Steve Kinney wrote: > > >> >> Fake Libertarians seem to play a large part in this dialogue. >> >> Would you care to describe the difference between Fake and Real >> Libertarians, as you apply these terms? >> >> Until then we can only guess... > > I think I gave more than a few hints, but for completness' sake : fake > libertarians support, among other things : > > 1) big business > 2) theocracy > 3) censorship > 4) the 'minimal' or 'limited' state > 5) imperialism - see ayn rand's 'philosophy' of ethnic cleansing > 6) 'voluntary' slavery - see walter block > 7) feminazism > 8) 'social conservatism' > 9) 'voluntary' authoritarianism > > > That's off the top of my head. There prolly is more stuff I'm > forgetting. As to true or actual libertarians, they would oppose all of that. So in short, Anarchists can call themselves Real Libertarians, but nobody else meets the standard. :o) signature.asc Description: OpenPGP digital signature
Re: The Libertarian As Conservative
On 3/27/19 7:16 PM, Punk wrote: > > > let me add one more datapoint. There's a guy called hans hoppe who is a > 'leading' 'anarcho' fascist and a 'leading' 'intelectual' at moishe.org, > moses.org or mises.org > > here is, in a sentence, what that clown thinks about 'libertarianism' > and conservatism > > "The relationship between libertarianism and conservatism is one of > praxeological compatibility, sociological complementarity, and reciprocal > reinforcement." > > quote comes from a monumental joke of a book called "democracy the god > that failed". > > Of course, every time that asshole says libertarianism he means his own > fake version of it...which is indeed quite close to conservatism. Fake Libertarians seem to play a large part in this dialogue. Would you care to describe the difference between Fake and Real Libertarians, as you apply these terms? Until then we can only guess... :o) signature.asc Description: OpenPGP digital signature
Re: The Libertarian As Conservative
On 3/27/19 2:25 PM, Punk wrote: > On Tue, 26 Mar 2019 19:06:03 -0400 > Steve Kinney wrote: > >> >> Between Libertarian and Conservative I see differences in belief and >> style, but not in motives and actions. > > yes in practice all that 'libertarians' do is wprk and praise google, > goldman sachs, facebook and all teh rest of corporate criminals. > >> I would not describe >> Libertarians as "Conservatives who do drugs," but maybe as >> "Conservatives who have no use for fundamentalist religion." I think >> that hits the mark squarely. > > well that's funny because there actually are a lot of 'libertarians' > who are fully deranged theocrats - many of them are part of the lew rockwell > mafia and the moises.org 'institute' - see for reference > > > https://blog.skepticallibertarian.com/2013/04/08/gary-north-the-libertarian-taliban/ > > scum like rockwell and jeffrey tucker(promoted in this list by > grarpamp) are 'anarcho' CATHOLICS (infinite self parody) - but since they > are really 'tolerant' they are accomplices of protestant nutcase north who > wants to...stone heretics (no, I'm not making this shit up). > > So, the views of many 'libertarians' on jew-kkkristian religion are > actually straight from the dark ages. There are very very few libertarians > who speak against organized religion, also known as organized fraud but the > majority of 'libertarians' are actual religious fraudsters or accomplices who > 'tolerate' fraud and theocracy. I guess it just shows to go ya: I must hang out with a hip crowd. I, too, would have to cite media personalities appearing in propaganda placements, to name a Libertarian who embraces the Religous Reich agenda. I am sure such folks must exist, somewhere (and that there is pr0n of it), but I would view THEM as Libertarian Heretics, who definitely need to get stoned, preferably on a Sunday morning. if 250 micrograms doesn't do it, double the dose. :o) signature.asc Description: OpenPGP digital signature
Re: The Libertarian As Conservative
On 3/26/19 6:22 PM, Punk wrote: > > The Libertarian As Conservative - Bob Black > > https://theanarchistlibrary.org/library/bob-black-the-libertarian-as-conservative > > --- > > I think Black's views are mostly accurate. Vast majority of people who > pretend to be 'libertarians' are in reality rabid supporters of industrial > fascism. An interesting article, but a little long winded and jargon heavy for my taste. I like radical propaganda that does not alienate "regular folks" on contact. When I see "Libertarian as Conservative" I mentally respond, "So what else is new?" If the Libertarian ideology of its leading U.S. advocates did not share key features with Conservative theory and practice, why would Republican operatives have taken the trouble to co-opt the Libertarian Party in a hostile buy-out back in the 1990s? Today our Libertarian speakers, authors and pretend-candidates work in tandem with the Republican Party: Both do their best to defend billionaires and their corporations from taxation, fight against unions as a matter of principle, assert the right of Corporate persons to destroy communities and natural resources to enhance shareholder value for absentee landlords, etc. When I think about the word "Conservative" as more than just an arbitrary label, I have to ask what the people involved want to "conserve." Libertarians I have personally known were interested in conserving their Middle Class status - real, aspirational or imaginary - against perceived assaults by lesser economic beings and, paradoxically, the State tyranny that makes their preferred way of life possible. Between Libertarian and Conservative I see differences in belief and style, but not in motives and actions. I would not describe Libertarians as "Conservatives who do drugs," but maybe as "Conservatives who have no use for fundamentalist religion." I think that hits the mark squarely. signature.asc Description: OpenPGP digital signature
Re: The US government is involved in black magic
On 3/24/19 6:40 PM, Ryan Carboni wrote: > There has been speculation that there is an occult nexus with the cow > mutilations of the 80s, which involved bloodless killings of cows with > seemingly random organs being surgically removed. It is odd that the > Peggy Hettrick murder case in ‘88 involved surgical removal of some > sexual organs. The crime scene was such that it is possible for someone > to mistake the body for a mannequin. > > It is spectacular that the “FBI Behavioral Science Unit” participated in > something improbable, they thought a high school student with no > connection to the crime other than being seen in the area briefly was > involved. > > It isn’t clear how he could have done it, but no doubt they have all > learned about the Milgram experiment, only to miss the point. If they > were ordered to do the indefensible, would they refuse? If their actions > were questioned, would they defend themselves? Would they defend their > institution? I have got a theory that I have, which is mine, (etc.)... - Anne Elk, Monty Python's Flying Circus According to this theory that I have, the cattle mutilation reports present as highly consistent with germ warfare research in progress. The MK NAOMI papers tell us that our three letter agencies have release "weakened strains" of pathogens in U.S. cities, and monitored hospital admissions to track their spread. So I see no reason they would hesitate to do similar research on BW vectors in livestock populations. Why? To develop both attacks and defenses against economic warfare by means of epidemics affecting commercially valuable animals. First and foremost, the nature of the wounds and the tissues collected appear fully consistent with collecting specimens relevant to evaluating the behavior of an infectious disease in progress: Organs presenting as potential sites for entry and/or initial infection by pathogens, and blood which would indicate the metabolic and immune responses to infection. Second, in most reports it seems obvious that the samples were collected by someone equipped with laser cutting tools: Clean, straight edged wounds that did not bleed - not even one drop. As these procedures /apparently/ took place at sites without so much as a wall socket, whoever did it had to carry both the (then) rare and expensive laser surgery gear /and/ its power source with them. Third, helicopters. I have seen reports where witnesses describe hearing and, rarely, seeing helicopters at the sites where the dead animals were later found. "Black helicopters" do exist - 20 years ago I saw three fly right over my house near downtown Orlando, at treetop level. I heard what I thought was a helicopter approaching from maybe a quarter mile away, looked up, and they were passing directly overhead. At the time I assumed they were on a training or demonstration flight. These airplanes first became available at about the time the cattle mutilation stories started to surface. 4th, no tracks. The people who found and reported them saw no signs that any vehicles had been near the animals until the folks who reported them showed up. No ranchers in these areas ever reported any signs of ground-level intruders, as far as I can recall. So, aircraft seem an unavoidable part of the picture. 5th, no flying saucers. I do not recall even one instance where a mutilation report coincided by time and place with any reports describing "classic UFO" phenomena, except where and as consistent with the quiet helicopter model, i.e. stationary or nearly stationary bright lights seen at or very near ground level. I seem to recall a couple of accounts where the lights were pointed at distant observers to obscure whatever was going on at the sites. Had the Hettrick murder been associated with a similar project or program, I would expect to find multiple accounts of similar unsolved murders - but a cursory search turned up nothing that looked connected. In the Hettrick case, a cursory review indicates that investigators found no reason to doubt that her wounds were made by conventional edged tools. Maybe a fan of the Whitechapel killer and/or Ed Gein at work? In re government involvement in "black magic," see papers associated with Michael Aquino, and accounts of military PsyOps exploitation of "superstitious beliefs." Also check out the Stanford Institute, a CIA think tank in Marin County, California: SRI was famous for certifying Israeli stage magician Uri Geller as an authentic miracle worker, but much more important as the organization that produced the New Age Bible called A Course In Miracles. The Course, as its devotees call it, teaches a complete circular argument world-view where wishing literally makes all things so. Therefore all who suffer for any reason voluntarily brought it on themselves - by logical extension "social conscience" presents as a correctable personal weakness. I have seen devotees of the Course demonstrate the results of this
Re: What do you think happened here?
On 3/25/19 7:53 AM, Mirimir wrote: > On 03/24/2019 01:03 PM, Ryan Carboni wrote: >> https://mchap.io/that-time-the-city-of-seattle-accidentally-gave-me-32m-emails-for-40-dollars4997.html >> >>> Somewhere towards the end of the call, I asked them if it was okay to keep >>> the emails. Why not at least ask, right? >> >>> Funny enough, in the middle of that question, my internet died and >>> interrupted the call for the first time in the six months I lived in that >>> house. Odd. It came back ten minutes later, and I dialed back into the >>> conference line, but the mood of the call pretty much 180’d. They told me: >> >>> 1. All files were to be deleted. >> >>> 2. Seattle would hire [Kroll](https://www.kroll.com/en-us/default.aspx) to >>> scan my hard drives to prove deletion >> >>> 3. Agreeing to #1 and #2 would give me full legal indemnification. >> >>> This isn't something I'm even remotely cool with, so we ended the call a >>> couple minutes later, and agreed to have our lawyers speak going forward. >> >> Sudden DDOS attack after attempt to stall for time? >> I tried writing an email about this before, but my Linux machine suddenly >> froze. >> Tempting to claim that naive implementations of IP stacks should be used for >> home users and authentication servers (with the rest using standard >> implementations). Journalists certainly should use a VPN, NAT isn’t a >> firewall, but it is pretty close. >> >> Sent from ProtonMail Mobile > > FYI: https://news.ycombinator.com/item?id=18257867 > > It's a little odd that someone mucking about with ~iffy FOIA requests > doesn't have a decent firewall, and isn't using at least a VPN. > > But at least he had a lawyer on retainer. > > It's a little hard to imagine that the City of Seattle IT folks would > try to pwn his computer. Or even have his ISP disconnect him. At least, > in the time frame of a few minutes. Even harder to imagine, considering that the City of Seattle's IT folks would include the ones who accidentally sent tons of /obviously/ sensitive and privileged information out in response to an FOIA request. I find it more than easy to imagine that the NSA 'noticed' a giant exfiltration of stored government-related communications crossing the networks from their proper home to a residential IP, and flagged it for immediate human attention. That's kind of their job. If so, they would have placed both sender recipient under heel to toe electronic surveillance, likely including implants in the firmware of relevant phones and computers. Collect now, ask questions later. Given that possibility, I also find it easy to imagine that "people" listened in on the phone call about the accidental exposure with great interest - via a toolkit that gave them entire control of the call's infrastructure from end to end. When the question of the receiver keeping all the excess data came up, I can picture somebody pulling the plug on his connection, vs. breaking into the call and saying "oh no you don't" or some such, both to prevent things from getting "way worse" and to buy time for remedial action. Ten minutes sounds about right for the NSA guise to explain their presence on the line to the Seattle guise, scare the living shit out of them, tell them what to say when contact was restored, and turn things back on. In this context, a "Linux machine" freezing while the user was writing an e-mail about this stuff sounds like a shot across the bow, telling the writer that Big Brother Is In Ur Box Watching U Type. Maybe not, but in common experience GNU/Linux rarely freezes except under loads that exceed the capacity of the hardware. Maybe the above mentioned malware malfunctioned when the user's typing kept tripping filters telling it to start copying keystrokes and phone them home "now instead of later". :o) signature.asc Description: OpenPGP digital signature
Re: The NSA Has Apparently Stopped the Domestic Surveillance Program Snowden Exposed - Hit & Run : Reason.com
On 3/5/19 6:27 PM, jim bell wrote: > https://reason.com/blog/2019/03/05/the-nsa-has-apparently-stopped-the-domes > From an article cited in the blog post referenced above: ?When the agency then fed those numbers back to the telecoms to get the communications logs of all of the people who had been in contact with its targets, it ended up gathering some data of people unconnected to the targets. The agency had no authority to collect their information, nor a practical way to go through its large database and cull those records it should not have gathered. As a result, it decided to purge them all and start over." https://www.nytimes.com/2019/03/04/us/politics/nsa-phone-records-program-shut-down.html So... if this presents an accurate account of the NSA's statements, the NSA has very obviously lied. No "practical way to go through its large database and cull those records it should not have gathered"? When in fact, a single query based on the unique identifiers of "authorized" collection targets could grind through those records and delete all that did not include such an identifier in any of the fields. Granted, that might have taken weeks to set up and test and days to run against the 'live' data, costing thousands of dollars worth of burn rate: But that constitutes FAR less than the proverbial drop in the bucket, relative to NSA's staff, technology and budget resources. An operation purging all but "contacts of contacts" would have taken an order of magnitude longer, and so forth with 3rd hand contacts, etc. But IF that database was of any potential use at all for targeting people on enemies' lists for detailed social network profiling (as intended), by definition a clean-up process falls within the scope of NSA capacity and budgets. My guess? The specific program initially exposed by the Snowden docs outlived its usefulness, as a next generation program doing the same job "better, stronger, faster" displaced it. That new program does not exist for legislative and legal purposes, because nobody outside compartments with authorized access to it knows it exists. Considering that U.S. public policy embraces mass murder "in The National Interest," just recording and saving everything that crosses the network for later use in retroactive surveillance raises no possible "moral" or "legal" issues. Hell, consider what archive.org, a nonprofit, manages to do. Example: https://web.archive.org/web/20190130133923/https://www.brookings.edu/research/recording-everything-digital-storage-as-an-enabler-of-authoritarian-governments/ signature.asc Description: OpenPGP digital signature
Re: Riseup blocks Gmail
On 2/27/19 3:41 AM, grarpamp wrote: > On 2/27/19, Shawn K. Quinn wrote: >> Looks more like Google got blacklisted by one of the lists > > Yeah missed that, thanks. > >> an account that can't email >> *@gmail.com is much less useful than one that can. > > Gmail needs to die. I use a GMail account as a junk catcher and for redundant offsite backups of encrypted files. So I don't look at it often - and did not notice when they silently terminated my access a few weeks ago. Why? Because I don't use a web browser or Google "app" to access it. I use IMAP via Thunderbird. Google decided they don't like that, probably because it slashes GMail's surveillance capabilities to the bone while making numerous other service providers available in one convenient location. It only took a few minutes to troubleshoot the problem thanks to teh interwebs. One can restore access by solving a fairly easy maze (follow the path of greatest resistance, per "UX Funnel" page layouts, and click through multiple scary warnings) to turn on access by "less secure apps". In this context less secure would mean not owned by Google, since the configuration I use presents as the most secure and convenient way to access GMail - literally by orders of magnitude. Google just sent me a helpful message begging me to stop what I'm doing before Very Bad Things happen to me, and turn my computer over to them. It's nice to know they care - and as long as I'm getting those, I know they have not sabotaged the account again. Speaking of annoyances, am I the only one who finds the word "app" annoying, and the suggestion that I use "apps" vaguely insulting? I guess I identify more with Dilbert than with The Guys In Marketing... :o/ signature.asc Description: OpenPGP digital signature
Re: How to achieve 1 meter accuracy with Android Was: Re: Dropgang vulnerabilities
On 2/24/19 2:01 AM, jim bell wrote: > https://www.gpsworld.com/how-to-achieve-1-meter-accuracy-in-android/ > > [partial quote begins] > > Recent changes in hardware and standards make one-meter accuracy > possible, in some cases as soon as this year. The transcript of a talk > given to Android developers earlier this year, this article gives a > short overview of location in smartphones, introduces Wi-Fi round-trip > time technology and standards, and then explains the Wi-Fi application > programming interfaces. > > /By Frank van Diggelen, Roy Want and Wei Wang, Android Location, Google/ That's very relevant indeed - one-meter accuracy would remove the need to put any kind of 'flag' on top of a dead drop container. Without retroreflectors or etc. marking packages, broad searches of likely drop areas would not produce results worth paying for. Also buyers would have no need for a means of finding inconspicuous retroreflectors - just a 'really good' mobile phone. Still not "the perfect crime", but a much improved one. :o) signature.asc Description: OpenPGP digital signature
Re: Scientific perfection and Scientific debates
On 2/19/19 7:49 PM, Punk wrote: > > This is quite remarkable, IBM (an american corporation and thus morally > perfect - see ayn rand philosophy) created an Artificial Intelligence > Debater and the Artificial Intelligence Debater scientifically proved that > > > "children who do not attend high quality preschool are far more likely > to commit violent crimes" > > (no I am not making that shit up - that's a literal quote) > > https://www.youtube.com/watch?v=m3u-1yttrVw I did not attend /any/ preschool, instead I sat home watching cop shows, spy dramas and Perry Mason on TV. I have never been arrested or charged for any of my violent crimes. Worked for me. :o) signature.asc Description: OpenPGP digital signature
Re: Vermont legislator proposing a law that bans code instructions on how to create firearms
On 2/12/19 5:02 AM, grarpamp wrote: >> a fair judge > > This seems rare... as in many democracies > and other forms, the judge is appointed at > leisure of executive, paid through executive > tax enforcement, etc. Some have legislative > oversight. Yet where is a design where the people > (criminal / rights courts), or at least the parties > to most cases heard (civil courts), are the > majority executive actors / payers, > and not just some fabled ultimate backstop? > Once in a blue Moon, an honest Judge. https://torrentfreak.com/angry-judge-tears-prenda-copyright-trolls-apart-130312/ :o) signature.asc Description: OpenPGP digital signature
Re: Apollo 11, Govt Drone Shaming, Censors, Bio Hacking, Energy
On 1/28/19 2:36 AM, Shawn K. Quinn wrote: > On 1/28/19 00:59, Steve Kinney wrote: >> I was recently noticed that Google has delisted this page, hosted at my >> vanity website, due to a (bogus) allegation of copyright violation: >> >> http://pilobilus.net/strategic_conflict_docs_intro.html >> >> Imagine how crestfallen, heartborken, etc. I am: Nobody searches for >> "nonviolent conflict documents" but I can toss the link out in the path >> of hundreds, at least, of potentially interested parties via Social >> Media and etc. And now, here in CPunk land. > > Why http when you can torrent... Because I don't want to limit the audience to the 1% or so who use bit torrent (according to some stats I just looked up). Also because I occasionally add files to the archive, and hosting it on a web server (plus updating the copy at archive.org) assures that everybody who downloads it gets the latest version. Mind you, distributing the collection as a torrent makes sense - if enough people "adopt" the thing to keep it seeded, that provides a distributed archival copy, hard to scrub out of the networks. > magnet:?xt=urn:btih:fcdacd77a5249c9d0db6767aea777a2fe56df441=Strategic%5FNonviolent%5FConflict=udp%3A%2F%2F9.rarbg.to%3A2710%2Fannounce=udp%3A%2F%2Ftracker.vanitycore.co%3A6969=udp%3A%2F%2Ftracker.coppersurfer.tk%3A6969=udp%3A%2F%2Fexplodie.org%3A6969=udp%3A%2F%2Ftracker.pirateparty.gr%3A6969%2Fannounce=udp%3A%2F%2Ftracker.cyberia.is%3A6969%2Fannounce Yay! Speaking of torrents, here's a bit of fun: Punishment Park (Peter Watkins, 1971), a pseudo-documentary where a British film crew follows a U.S. political tribunal. The by-definition guilty suspects can choose their sentence: A long prison term, or a three day hike in Punishment Park. Watkins cast real radicals and real pigs in as many roles as possible, and it shows: A couple of them do "lose their shit" on camera. In a 'meta' sense the film really does present as a documentary. Five stars, etc. magnet:?xt=urn:btih:ddf539b77fe77902e9dbb2d9ec09209e888f2d69=Punishment+Park+%28Peter+Watkins%2C+1971%29+Masters+of+Cinema=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969=udp%3A%2F%2Fzer0day.ch%3A1337=udp%3A%2F%2Fopen.demonii.com%3A1337=udp%3A%2F%2Ftracker.coppersurfer.tk%3A6969=udp%3A%2F%2Fexodus.desync.com%3A6969 :o) signature.asc Description: OpenPGP digital signature
Re: Apollo 11, Govt Drone Shaming, Censors, Bio Hacking, Energy
On 1/27/19 8:16 PM, grarpamp wrote: > YouTube said today that it is retooling its algorithm in order to > prevent promoting conspiracies and false information, reflecting a > growing willingness to quell misinformation. > These often serve up unsavory content: conspiracy theories about > mass-shooting events being staged > (https://www.liveleak.com/view?i=fe2_1519717074), that the moon > landing never happened (https://www.youtube.com/watch?v=QhxTwcslfCY), > that the Earth is flat (https://www.youtube.com/watch?v=eKlIroTxxVM). > YouTube promises you'll see less of those kinds of videos. I was recently noticed that Google has delisted this page, hosted at my vanity website, due to a (bogus) allegation of copyright violation: http://pilobilus.net/strategic_conflict_docs_intro.html Imagine how crestfallen, heartborken, etc. I am: Nobody searches for "nonviolent conflict documents" but I can toss the link out in the path of hundreds, at least, of potentially interested parties via Social Media and etc. And now, here in CPunk land. Appy Polly Loggies for the delay, O My Brothers... Having read the document in question (Antifa: The Anti-Fascist Handbook by Mark Bray), I have no worries: The author presents as a partisan advocate of anti-fascism, more interested in getting the word out than making money off /every/ instance where a mark lays eyes on his deathless prose. The said doc presents a remarkably well informed history of Fascist movements and their opponents, IMO a landmark in academic/practical presentations of political history relevant to current events. Get it, read it. The price is right. And the rest of the docs in the archive may present a title or two you wanna see as well. :o) signature.asc Description: OpenPGP digital signature
Re: [Cryptography] Happy birthday, NIA!
On 1/27/19 9:14 PM, grarpamp wrote: > On 1/21/19, Dave Horsfall wrote: >> The predecessor of the CIA, the National Intelligence Agency was created by >> President Truman on this day in 1946; it merged with its operational arm, >> the CIG (Central Intelligence Group) to become another TLA, the CIA, in 1947, >> located at Foggy Bottom. > > Why are you celebrating singing cheer praise and thanks > songs and giving happy gifts for a bunch of top secret lying > human experimenting torturing murderers since inception... "You got to love your enemies, because hate makes you misunderestimate them." - George W. Bush I would not doubt that he learned a more grammatically correct version of that saying at his daddy's knee, what with Poppy's history as Director of Central Intelligence. It's very much "spook think," and immensely valuable to the likes of us as well. In re the CIA, a few years ago I ran across a copy of The Secret Team by Col. L. Fletcher Prouty: He went directly from OSS work to a senior briefer position at CIA, and he did not like what he saw. The Secret Team presents as the /only/ significant history and analysis of the CIA's structure and function. I would even say that nobody understands that gang's methods, and the scope and distribution of their power, who does not know their Prouty: https://archive.org/details/pdfy-JnCrjsoqI22z8p9i Speaking of spook think, The Psychology of Intelligence Analysis by Richards J. Hauer, a textbook for the guise and gals who do real intelligence work (as opposed to various forms of terrorism, wet work, etc.), presents as required reading for radicals IMO. Emotionally loaded perceptions of "enemy" actors lead to gross errors in estimating their intentions, capabilities and likely actions. Our Mr. Hauer definitely earned his pay while pounding out this textbook at taxpayer expense, and to their credit the CIA makes it available to the public. But this link from JYA should reduce the paranoia factor for those interested in learning how "competent spies" really do their thing. http://cryptome.org/2013/01/aaron-swartz/Psychology-of-Intelligence-Analysis.pdf Go and do ye likewise: When Satan himself tells the truth, that does not magically convert it to a lie. :o) > https://en.wikipedia.org/wiki/Human_rights_violations_by_the_CIA > https://en.wikipedia.org/wiki/Extraordinary_rendition > https://en.wikipedia.org/wiki/Enhanced_interrogation_techniques > https://en.wikipedia.org/wiki/Targeted_killing > https://en.wikipedia.org/wiki/Project_MKUltra > https://en.wikipedia.org/wiki/Project_ARTICHOKE > https://en.wikipedia.org/wiki/Project_MKOFTEN > https://en.wikipedia.org/wiki/Unethical_human_experimentation_in_the_United_States > https://en.wikipedia.org/wiki/CIA_activities_in_the_United_States > https://en.wikipedia.org/wiki/Sidney_Gottlieb > https://en.wikipedia.org/wiki/Frank_Olson > https://en.wikipedia.org/wiki/Harold_Blauer > https://en.wikipedia.org/wiki/Blue_sky_memo > https://en.wikipedia.org/wiki/Bush_Six > https://en.wikipedia.org/wiki/Gina_Haspel#Torture_and_destruction_of_evidence_controversy > https://en.wikipedia.org/wiki/United_States_v._Khalid_Sheikh_Mohammed#Torture_and_the_role_of_Gina_Haspel > https://en.wikipedia.org/wiki/Abu_Omar_case > https://en.wikipedia.org/wiki/List_of_CIA_controversies > https://en.wikipedia.org/wiki/Senate_Intelligence_Committee_report_on_CIA_torture > https://en.wikipedia.org/wiki/U.S._Army_and_CIA_interrogation_manuals > https://en.wikipedia.org/wiki/United_States_and_state-sponsored_terrorism > https://en.wikipedia.org/wiki/United_States_and_state_terrorism > https://en.wikipedia.org/wiki/Family_Jewels_(Central_Intelligence_Agency) > signature.asc Description: OpenPGP digital signature
APNewsBreak: Undercover agents target cybersecurity watchdog
APNewsBreak: Undercover agents target cybersecurity watchdog > NEW YORK (AP) — The researchers who reported that Israeli software was used > to spy on Washington Post journalist Jamal Khashoggi’s inner circle before > his gruesome death are being targeted in turn by international undercover > operatives, The Associated Press has found. > > Twice in the past two months, men masquerading as socially conscious > investors have lured members of the Citizen Lab internet watchdog group to > meetings at luxury hotels to quiz them for hours about their work exposing > Israeli surveillance and the details of their personal lives. In both cases, > the researchers believe they were secretly recorded. [...] https://www.apnews.com/9f31fa2aa72946c694555a5074fc9f42 I was happy to see that Israeli malware vendor NSO has "zero competence" in the field of human intelligence, and that their efforts to penetrate Citizen Labs harmed no one's interests but their own. The academic security researchers from Citizen Lab spotted NSO's wannabe intelligence officers as hostiles at once, which comes as no surprise: "Security is security" in any context. The Citizen Lab guise demonstrated a real understanding of their subject matter by taking effective steps to steal the initiative early, with (apparently) decisive results. https://citizenlab.ca/ :o) signature.asc Description: OpenPGP digital signature
Re: Dropgang vulnerabilities
On 1/13/19 10:43 PM, Mirimir wrote: > Dropgangs, or the future of dark markets Here's some ideas about structural vulnerabilities in the Dropgang protocol, as described at https://opaque.link/post/dropgang/ Dead drop reuse: To achieve acceptable security each dead drop may be used once only, because hostile buyers could place 'their' dead drops under video surveillance and record every courier and customer visit to the drop following their own transaction. Couriers delivering to dead drops can not determine if their supplier sends them to previously used dead drops, unless they service only dead drops they set up and document themselves. Couriers should transmit the locations of drops they have developed only when presented with an order to fill, to assure that their distributor can not send other couriers and customers to use them first. The added surveillance exposure of making two visits to the same site - setup and delivery - presents less exposure than trusting that the anonymous seller will never send a courier to a previously used dead drop. Sales layer incentives for reusing dead drops include faster service during episodes of high demand for their products, and reducing the payment demands (time & labor = money) of their pool of delivery agents by reducing the need to develop new dead drops. Compared to single-use dead drops, reusing dead drops would enable distributors to reduce the cost of compensating agents to select and document new dead drops by up to 1/n the number of delivery agents employed, without disclosing to any delivery agent that the distributor does reuse dead drops. Absent an active and aggressive adversary, reusing dead drops would present few risks, so distributors may "get away with it" long enough to establish, in their own minds, that reuse is safe enough, and "either way I am not personally at risk." In the context of potential reuse of dead drops by unwitting delivery agents, isolation of the Sales layer from the Distribution layer via cryptography and mix networking tends to create potential hazards rather than removing them: Exposing delivery agents to drop-dead risks may cost sales agents some employees but has no other immediate repercussions as no evidence implicates them in exposing service agents to hostile actors. Over time a sales layer actor who burns delivery agents may run into trouble secondary to "cooperating witnesses" assisting investigators working their way up the chain of product custody; faith in the security of the protocol could easily lead some bad faith actors to dismiss that possibility. I noted that the article linked above endorses reuse of dead drops as acceptable, by saying that "An ideal dead drop is however used exactly once. Only then can the risks of using it be reduced to pure bad luck." I would hesitate to make purchases via the Dropgang protocol, because customers have no way of assuring that hostile buyers did not visit the same dead drops first - and some Dropgang advocates do not seem to understand the severity of the risks associated with dead drop reuse in the Dropgang context. Dead drop profiling: I believe the ability of hostile actors to in effect purchase dead drop locations, and delivery timing information, presents as an Achilles heel of the Dropgang protocol even with single use dead drops: Controlled buys would enable State or other well funded actors to map and profile dead drop sites, reducing scope of counter-Dropgang surveillance from "everywhere people can go" to target areas. The more random-ish and widely dispersed the dead drop sites, the higher the overhead in developing and servicing new drop sites due to travel time, orientation to unfamiliar terrain, etc. In most instances dead drops will concentrate in the most convenient terrain for delivery agents and customers. As geographic clusters of dead drops appear in data from controlled buys, more effective surveillance of those areas would follow. This observation suggests a security advantage when fewer, higher value transactions are handled, reducing the number of data points available to hostile buyers, and justifying more travel and effort to service drops. Bulk purchasers may also tolerate longer latency between orders and pickups than end use consumers. Higher latency reduces exposure to timing attacks and retroactive surveillance. Timing attacks: Controlled purchases in conjunction with surveillance of suspected delivery agents (distribution layer) enable timing attacks, as buyers would know that the agent who filled their orders did so between the times the orders were placed and picked up. Surveillance State adversaries could correlate controlled buys with the movements of individuals in a pool of suspects. Also, creating spikes in demand through multiple controlled purchases could prompt increased activity by delivery agents during time frames of an attacker's choice. Conducting intensive surveillance of likely drop areas
Re: Apple Talks Shit About Privacy at CES
On 1/6/19 3:56 PM, grarpamp wrote: > https://www.engadget.com/2019/01/05/apple-ces-2019-privacy-advertising/ > https://www.engadget.com/2016/02/18/fbi-apple-iphone-explainer/ > https://www.android.com/security-center/ > https://source.android.com/security > https://apple.com/privacy > > "What happens on your iPhone, stays on your iPhone." > That privacy priority came > into clear focus three years ago when Apple refused to assist the FBI > in unlocking an iPhone that belonged to a suspected terrorist in San > Bernardino, CA. I would describe that episode as a publicity stunt cooked up by the FBI and DoD contractor Apple. If I recall correctly, Apple claimed it "could not" unlock the device in question; but after public attention started to die down, a 3rd party forensics shop did unlock it. Meanwhile, back in the network security world, Declan Mccullagh reported: https://www.cnet.com/news/apple-deluged-by-police-demands-to-decrypt-iphones/ "ATF says no law enforcement agency could unlock a defendant's iPhone, but Apple can 'bypass the security software' if it chooses. Apple has created a police waiting list because of high demand." :o) signature.asc Description: OpenPGP digital signature
Re: How Feminism, aka worthless feminazi scum is funded
On 1/6/19 5:54 PM, Punk wrote: > feminazi scum (aka feminists) got a 200 millions loan from the > americunt government. > > Notice how feminist scum in a banana republic is 'financed' by the > supreme scum of the planet, the americunt government. Though of course, the > loan will be repaid with money stolen from argie taxpayers. So americunt scum > will actually get back their 'capital' PLUS usury. > > > > https://www.iadb.org/es/noticias/el-bid-acompana-medidas-para-impulsar-la-igualdad-de-genero-en-argentina Funny thing: All the feminists I have known had a primarily anarchist orientation. I guess it depends on who you run around with - and/or whether one's information comes from personal contacts or mass media propaganda sources. If that seems "wrong" look up Emma Goldman, Lucy Parsons and Simone De Beauvoir. Feminazis seem to have originated in the New Left. Presenting a caricature of reactionary Marxism, the New Left rose to prominence in the 1960s, displacing and discrediting Liberal and Pacifist voices in U.S. media during the Vietnam War. I suspect these folks had US State sponsors: The FBI's funding and direction of terrorist cells in the U.S. at that time (per evidence in Court cases acquitting "dupes") indicates vigorous political warfare against home grown U.S. dissidents. Failure to field a media personality propaganda front demonizing dissidents would make no sense at all. Following a make-over in the late 70s & early 80s, the New Left and its new recruits call themselves Progressives. Working as freelance profiteers under the sponsorship of folks like Our Mrs. Clinton and her network, our Progressives continue to use every means at their disposal - now a respectable arsenal of propaganda assets, astroturf fronts, friendly elected officials, etc. - to discredit and suppress grass roots Liberal and Pacifist political activism, not to mention anti-Fascist organizers and anything resembling anarchism. :o/ signature.asc Description: OpenPGP digital signature
Re: Privacy -focused Proton Mail is Full of Niggers and jews
On 1/4/19 2:26 PM, Winter-chan wrote: > Pic related. > "Your e-mail or phone number will not be linked to the account created. It is only used during the sign-up process. A hash will be saved to prevent abuse of ProtonMail systems." If true, so much the better. If false, any throw-away e-mail service - accessed via "anonymized" means - produces the same result as if the above was true. I guess that makes Niggers and Jews smarter than ... well, certain people. :o) signature.asc Description: OpenPGP digital signature
Re: Where is Coderman?
On 12/31/18 4:30 PM, Where is Coderman? wrote: > A while back Coderman posted about FBI disruption strategies. Did > Coderman get disrupted? Or is Coderman dead? > > “FBI disruption strategies - extra-judicial life destruction > > ''' > Disruption strategy involves “a range of tools including arrests, > interviews, or source-directed operations to effectively disrupt > subject’s activities.” Speaking of which, regional so-called Bureaus of Investigation and even Town Clowns also use 'disruption strategies' to reduce or eliminate the effectiveness of political activists and other annoyances. Step one, two gents in conservative suits visit your employer, flash impressive ID cards, and obtain consent for a "confidential" interview. Then they start asking questions: How well to you know The Subject, have you seen any indications of X, Y or Z? They won't accuse you of anything, but their leading questions say that you are involved in dope dealing, terrorism, child trafficking, or whatever else they judge will frighten and/or anger your employer the most. Kiss that job goodbye. Your next employer visits the State labor department website to complete an unemployment compensation form, and on the same day their phone rings: Your SSN tripped a filter, and an e-mail arrived at your local Fusion Center. A watch officer grabs the script indicated, picks up the phone and asks for an appointment to interview your new employer, again on a "confidential" basis. Needless to say, the new hire intake process ends there and then with weak or no excuses made. How does a person get on an enemies list like the one described? Well, bluntly refusing to inform on your friends will do it - especially if you "turn" the asset who made the recruiting pitch, and/or feed him or her intelligence designed to waste as much of the opposition's money and resources as possible. For instance if you "have reason to believe" that certain people hanging around local activist orgs are Federal informants, persuading informants working for your Town Clowns that they are high level drug dealers might provide some harmless amusement. :o) signature.asc Description: OpenPGP digital signature
Re: Global Elections 2020: John McAfee - Open Call For Do'ers
On 12/30/18 10:04 PM, grarpamp wrote: > https://loggiaonfire.com/magazine/10_things_anyone_can_do_to_help_mcafee_2020_1545155711.html > https://www.facebook.com/mcafeelp > > https://www.lp.org/membership/ > > > 10 Things Anyone Can Do To Help McAfee 2020 > Rob Loggia Dec 18, 2018 > > It is better to be a flamboyant failure than any kind of benign success. > Malcom McLaren > > As we prepare to enter 2019, Team McAfee 2020 has been working behind > the scenes to launch a campaign for President of the United States > such as the nation has never seen before. Public enthusiasm for this > campaign is already very much in evidence, with offers to help rolling > in every day. We are working to get the infrastructure in place to > handle the efficient and successful leveraging of this mass of > humanity, but there is no need to wait to get to work. As U.S. Greens are to the Democratic Party, U.S. Libertarians are to the Republican party: Both orgs present as sucker traps, keeping activist minded Liberals and Conservatives away from their local Democratic and Republican Party HQs, where their input and influence is Not Wanted. :o/ signature.asc Description: OpenPGP digital signature
Re: USA colleges rejuvenating: Appeals Court: Colleges Must Censor, Block Online Services If They Offend Someone - [PEACE]
On 12/24/18 10:21 AM, Razer wrote: > > > On December 22, 2018 11:19:41 AM PST, Steve Kinney > wrote: >> >> >> On 12/22/18 4:02 AM, jim bell wrote: >>> On Saturday, December 22, 2018, 12:35:59 AM PST, Zenaan Harkness >>> wrote: >>> >>> >>>> Snowflakes rejoice >> >> >>> Naturally, the "people with fascist tendencies" probably called >>> themselves "anti-fascists". >>> >>> A comment I read recently: 'Fascists' are classified into two >> groups: >>> 'Fascists' and 'Anti-Fascists'. >> >> Dr. Lawrence Britt studied the fascist regimes of Hitler (Germany), >> Mussolini (Italy), Franco (Spain), Suharto (Indonesia), and Pinochet >> (Chile), Dr. Britt found they all had 14 elements in common. He calls >> these the identifying characteristics of fascism. [...] > Reads alot like Eco. > > "Fascism" isn't the ONLY word being orwellianly redefined. "Nationalism" has > been touted in the media as a fascist trait when in reality parts of that > trait, such as traditionalism and patriotism are used as TOOLS by fascists. > Nationalism isn't fascism... It isn't even an ideology. > > Other, less notable words are being redefined even as I type. Frinstance, > > "considering" https://twitter.com/gymrathippie/status/1076925546922049536?s=19 No surprise there, pulling a battalion strength force out of a country the size of Syria presents as less than a drop in a bucket. The whole U.S. mission in Syria consists of destabilizing the country to prevent construction of gas and oil pipelines. With plenty of "friendlies" already in-country, all it takes is money, guns, and phoned-in tactical intelligence and movement orders. > "Envoy" https://twitter.com/gymrathippie/status/1076900114482876416?s=1 "Envoy" typically refers to a diplomatic representative; it sort of makes sense to me that the U.S. would send an envoy to ISIS, given that the Obama/Trump Administration offered the said mercenary force a chunk of Syria as a country of their very own, provided they could take and hold it. > That one is exceptionally hilarious. > > And this phrase > https://twitter.com/gymrathippie/status/1076896714018050048?s=19 > > Rr Applying the term "populist" to the billionaire funded, propaganda driven Trump Fan Club presents a bizarre non-sequitur. "Populism" has always indicated an exercise in direct democracy, historically associated with liberal, pacifist and environmentalist causes. The Synonyms of "Activist" per Merriam-Webster: http://www.thesaurus.com/browse/activist addict, bigot, bug, crank, crazy, demon, devotee, enthusiast, extremist, fiend, fool, freak, maniac, militant, monomaniac, nut, radical, ultraist, visionary, zealot Not listed as synonyms for "Activist": advocate, champion, engaged, leader, motivated, populist, pro-active, self-starter Do the missing terms qualify as synonyms for "activist"? Advocate as in one who advocates for a cause or position, Engaged as in one who actively takes part, Champion as in one who fights for a cause, Leader as in one who takes the lead, Motivated as in up on your feet and down to the street, Populist as in for the people, Pro-Active as in not waiting for others to act, Self-starter as in taking personal initiative. I guess it all depends on what one's definition of "is" is. :o/ signature.asc Description: OpenPGP digital signature
Re: USA colleges rejuvenating: Appeals Court: Colleges Must Censor, Block Online Services If They Offend Someone - [PEACE]
On 12/22/18 4:02 AM, jim bell wrote: > On Saturday, December 22, 2018, 12:35:59 AM PST, Zenaan Harkness > wrote: > > >>Snowflakes rejoice > Naturally, the "people with fascist tendencies" probably called > themselves "anti-fascists". > > A comment I read recently: 'Fascists' are classified into two groups: > 'Fascists' and 'Anti-Fascists'. Dr. Lawrence Britt studied the fascist regimes of Hitler (Germany), Mussolini (Italy), Franco (Spain), Suharto (Indonesia), and Pinochet (Chile), Dr. Britt found they all had 14 elements in common. He calls these the identifying characteristics of fascism. 1. Powerful and Continuing Nationalism 2. Disdain for the Recognition of Human Rights 3. Identification of Enemies/Scapegoats as a Unifying Cause 4. Supremacy of the Military 5. Rampant Sexism 6. Controlled Mass Media 7. Obsession with National Security 8. Religion and Government are Intertwined 9. Corporate Power is Protected 10. Labor Power is Suppressed 11. Disdain for Intellectuals and the Arts 12. Obsession with Crime and Punishment 13. Rampant Cronyism and Corruption 14. Fraudulent Elections https://ratical.org/ratville/CAH/fasci14chars.html When clashes between Fascist and anti-Fascist groups in the U.S. finally made the evening news in 2017, our mainstream Liberal and Conservative propaganda shops found something to heartily agree on: Anti-Fascist activists "are the real Nazis," worse than actual Fascists. Our MAGA / SJW crowd - the fear driven, propaganda controlled right and left hands of our ruling oligarchy - jumped right on board with that. This unity among ignorant loud-mouthed political consumers tells us something about the motives and agendas of the folks who pull their strings - our ruling oligarchy likes Fascism just fine. Economic hard times have historically enabled Fascist political movements to take power. Our American Fascists and anti-Fascists have this much in common: They see conditions favorable to overt Fascism coming up fast here and now. U.S. NeoNazi and allied organizations have grown rapidly over the last few years, as has the incidence of "random acts" of ultra-violence against their chosen scapegoats. Anti-Fascist activism has increased in response, obstructing and disrupting Fascist-oriented political publicity and recruiting activities. If nothing else, the next few years will present us with lots of opportunities to sort out self proclaimed rebels into those who equate Freedom with their own personal and community power over others, and those who equate Freedom with personal and community self determination for all. The former specialize in impersonating the latter, backed by generations of crypto-Fascist propaganda and supplied with daily talking points by political warfare professionals. But anyone who understands this fundamental difference between Fascist and anti-Fascist motivations will not have a hard time telling the difference. signature.asc Description: OpenPGP digital signature
Re: how to use mobile phone GPS without a SIM card?
On 12/21/18 1:21 PM, juan wrote: > On Fri, 21 Dec 2018 18:06:36 +1100 > Zenaan Harkness wrote: > > >> >> >> Any ideas why GPS would require a SIM card? > > it's because amont the millions of lines of malware known as "androido" > there's one that says : if (no_sim()) disable_gps(); Makes sense to me. Why should a phone's real owner permit its user to access GPS location data without reporting same back to the owner? That free ride would amount to theft of service. Letting GPS work with the radio off would be as silly as designing a mobile phone's case to permit quick, easy battery removal and replacement - the phone's owner decides when "off means off," not the user. signature.asc Description: OpenPGP digital signature
Re: Facebook non-secrecy.
On 12/19/18 4:40 AM, jim bell wrote: > Facebook reportedly gave tech giants access to users’ private messages: > https://nypost.com/2018/12/18/facebook-reportedly-gave-tech-giants-access-to-users-private-messages/ The Facebook gives access to more than just tech giants. Try "any paying customer, first come first served, value added service included." Last year, I sent a resume to a friend via Facebook Messenger. A couple of hours later, the contact e-mail address given in the resume started receiving spam from industrial supply and fabrication shops in China, advertising services directly related to work I did over a decade ago. So The Facebook read the PDF document, interpreted its content, matched it against current client orders and sold it to (at least) one of their actual customers in real time. I did not think of that as especially harmful - one writes a resume with the expectation that it will get passed around, and I only had to delete 20-some UCE messages over the span of a week or ten days. From day one I have considered The Facebook a hotline to hostile parties, and any expectation of privacy there a naive user error. I count any harm that comes of exposing one's "personal information and communications" to The Facebook as self inflicted. signature.asc Description: OpenPGP digital signature
Re: Assange Journalism
On 12/8/18 3:41 PM, juan wrote: > On Sat, 8 Dec 2018 13:44:22 -0500 > Steve Kinney wrote: >> Greenwald distributed the PRISM documents to several press outlets, at >> least one of which edited them before release per side by side >> comparison of published versions. (Or, more than one version was >> distributed by Greenwald for whatever reason.) >> >> So it seems likely that Snowden got his information about how and where >> the documents were forwarded to news outlets from Greenwald himself. > > I didn't see evidence for that. Because Snowden's tale includes how he failed to find a journalist, any journalist, who was interested in his materials /and/ capable of communicating via an encrypted channel. So he had to settle for film maker Poitras, and attorney & partisan political talking head Greenwald - just because Poitras was willing/able to use TOR and/or GPG. Before delivering docs to Greenwald, nobody in the news biz would talk to Snowden, at least not on his terms. After, he had no opportunity to do any more handoffs. Snowden's tale of how "journalists" should decide what to release strikes me as a cover story, explaining away his failure to send the docs to Wikileaks and have done with them, vs. throwing away his entire life, more or less, via contrived-looking cloak and dagger bullshit. :o/ signature.asc Description: OpenPGP digital signature
Re: Scientific American: Is the U.S. Lagging in the Quest for Quantum Computing?
On 12/6/18 12:55 PM, jim bell wrote: > Scientific American: Is the U.S. Lagging in the Quest for Quantum Computing?. > https://www.scientificamerican.com/article/is-the-u-s-lagging-in-the-quest-for-quantum-computing/ I would find it hard to believe that the U.S. "lags" any other country in its quest for quantum computer technology, given that the NSA can make an ironclad case demanding blank checks for QC R: Whoever gets there first, preferably in secret, will make giant strides toward world domination. In addition to breaking PKI ciphers, QC would probably enable breakthroughs in modeling complex systems, reducing many physical problems presently requiring massively parallel, massively iterated digital computation to de facto analog computations yielding nearly instant answers. "World domination" through QC would not include the ability to read all of everyone's message traffic. To date I have not heard anything indicating that QC will break modern symmetric ciphers, but I have information from unpublished sources indicating that the U.S. (therefore probably others as well) still uses one time pads, and/or large single use symmetric ciphers keys, for its most sensitive military communications. Scaling the activities in question up to cover all sensitive State communications presents no technical challenges, only financial ones. Naturally, private individuals will be out in the cold except for a handful of crypto geeks talking among themselves. signature.asc Description: OpenPGP digital signature
Re: snowden and the billionaire monkeys on our back
On 12/5/18 3:20 PM, John Newman wrote: > > Long interview with guy who just wrote a book about faux-philanthropic > leaders of the new gilded age (or something ;) > > https://www.truthdig.com/articles/silicon-billionaires-are-the-lethal-monkey-on-the-back-of-the-american-public/ > > > Interesting part where he described Snowden talking to a bunch of > these people, this "clash of ideals" - > [... snip ...] > It was a very interesting vision, and as he started describing, well, > the way I’m going to do that is I’m going to build all these tools that > would allow dissidents to actually operate more freely. A communication > tool so you can message without getting caught, a Facebook “like” tool > so you can socially network without losing your privacy, some kind of > tokenized identity so you can make clear to different websites that > you’re the same person without revealing which person you are–various > things. Snowden was describing the creation of all these things because > he wanted to live in a world in which dissent of the kind that he made > is possible, in which it’s possible to go up against power and not be > interrupted in that quest; that’s his motivation, his goal. > And it’s like they couldn’t process him; they couldn’t process his set > of motivations. And so Chris Sacca says, wow, you sound like you’re > designing a lot of tools that, they sound like apps, or startup–do you > want to build a startup? I mean, there’s a lot of people here who would > like to be your investor. Snowden just looked at him, puzzled, like–what > are you talking about? I’m talking about freedom and heresy and truth, > and being a dissident, and how a society corrects itself from manifest > injustices through allowing people who have an uncomfortable truth to > tell it. And you’re talking about startups? And it was just this > wonderful collision between someone who believes in real changes, and > these people who kind of believe in the pseudo-change that lines their > own pockets." Um, that's not what it reads like to me. I see Snowden saying he wants to accomplish all these wonderful things that enable political dissent and freedom via network technology. Then he refuses to have anything to do with implementing that vision, going so far as to pretend that he does not understand that building and distributing software and infrastructure is HOW to achieve goals like the ones he mentioned. It sounds like he chose to literally "play dumb" when presented with a room full of people who wanted a shot at implementing his ideas (vs. memorized talking points) in real life. The more I look at Snowden, the less sense he makes: Both in terms of what he says (see above), and in terms of a biography and current public presentation that more or less defy explanation. To date, the only Snowden scenario that makes sense to me portrays him as a spokesmodel: In effect a sock puppet passed from hand to hand. Did he have anything at all to do with "borrowing" certain documents and handing them off to Glen Greenwald? I have no opinion on that. The documents Greenwald released triggered a massive controversy over a small set of political / legal issues that all ended with decisive wins for the U.S. intelligence community. In my view whether that means Snowden failed or succeeded remains an open question. Pending additional information, I would more likely trust a guy named "Mendax" than him. :o/ signature.asc Description: OpenPGP digital signature
Re: The Forgotten Story of the Julian Assange of the 1970s
On 11/29/18 12:48 AM, jim bell wrote: > https://www.politico.com/magazine/story/2018/11/28/assange-wikileaks-prosecute-agee-covert-action-cia-222693 > > > Philip Agee. Good one. :o) I do approve of Phil Agee - I literally shook his hand and thanked him for his service - but he was not a Nice Man. What he saw the U.S. doing in Latin America - sponsoring and directing State terror campaigns against opponents of U.S. backed totalitarian governments - pushed Agee over to the Commie side. He believed that the USSR and its allies presented the only hope for relief from the U.S. reign of terror in various countries south of the U.S. border. Apparently it was the systematic use of torture and murder to make examples of political activists that really got to him. Where widespread concerns about setting precedents negating First Amendment press protections kept Agee from being prosecuted, Assange already has "secret" U.S. criminal charges. The charges against Assange probably assert that he "conspired" with Russian Federation intelligence agencies to harm the U.S. National Interest. This tells us a lot about the evolution of U.S. public policy in the years between: Agee personally collected and published very damaging classified information; Assange has only published materials provided by others. Agee committed criminal offenses under U.S. law; Assange is an Australian under no legal obligation to obey any U.S. chain of command's orders. By the late 1980s Agee was free to travel and speak in the United States. If Assange sets foot outside the Ecuadorian embassy, a joint US/British team already in place will snatch him and ship him to the United States for a show trial. What defensive strategies will Assange use going forward? That's hard to guess. But I would suggest that anyone who approves of Wikileaks' work, and happens to have access to damaging information related to the individuals who would be personally involved in prosecuting Assange, can contribute by collecting as much of that information as possible and sending it along to Wikileaks. signature.asc Description: OpenPGP digital signature
Re: Assange Journalism
Supplementary Insider Threat dox, hosted by JYA: http://cryptome.org/2014/05/insider-threat-warfare.htm Intimately related, from Julian Assange - also hosted by JYA: https://cryptome.org/0002/ja-conspiracies.pdf Insider access and exfiltration is the true "universal decryption key." Even benchtop Quantum Computing, anticipated here in 1992... https://www.youtube.com/watch?v=F5bAa6gFvLs ... will not crack large one time pads. OTPs are still used for materials considered "worth the trouble" of really locking down. The more things change, the more they don't. "Let a thousand flowers bloom." - Mao Tse Tung :o)
Re: Assange Journalism
On 11/28/18 11:40 PM, juan wrote: > On Wed, 28 Nov 2018 19:37:59 -0500 > Steve Kinney wrote: >> If we ask what specific domestic surveillance activities had already >> caused the most controversy, and had the biggest potential for blowback >> if exposed to full public view, "the first two Snowden releases" >> provides a pretty good answer: Bulk surveillance of U.S. telephone and >> Internet traffic. [...] >> Programs that large will eventually become public knowledge. > > more like, they had been public knowledge for years... Not at all. Spook Watchers and political dissidents knew about them, through bits and pieces of hard data and well informed speculation. The broader general public had moderately paranoid suspicions, but it was all conveniently deniable until The Snowden Affair. Ed himself modeled the desired public reaction perfectly, almost as if coached in advance: "Grave concern" with just a slight touch of outrage, in a context assuming that "the government should" obey the law. >> During and after the initial releases from the Snowden Saga, the >> intelligence community won nearly every battle over who can break what >> laws, when, etc. without consequences. > > yes, but that's not "because of snowden" is it? I mean, not meaning to > sound like a broken record but the US is a fascist cesspool and has always > been. "COINTELPRO" > > the 'intelligence community' which is obviously just an arm of the > United Rogue States gets to do whatever they want because that's what being > the state means - unrestrained power. > > >> The Snowden Affair removed many >> potential liabilities by establishing that "we are allowed to do this, >> that and the other thing." > > > I don't see the causal link there. There were the leaks, and then the > govt kept doing whatever the fuck they want. The events may be 'correlated' > but that can be all. Precedents set and settled by the Snowden Affair: - Bulk surveillance of 'private' U.S. communication is legal - Breaking into the computers of Congressional staff during an investigation of IC criminal conduct is not prosecuted - Lying under oath during Congressional hearings is not prosecuted. ... all in the name of National Security. >> Available biographical information, and his extraordinary access to >> numerous "sensitive compartments", indicates his job was most likely >> senior IT administrator and troubleshooter at facilities handling >> classified communications and databases. > > > That's a possibility. Snowden on the other hand says he was a 'senior > analyst' or something like that. Could be. Doesn't matter much though... >> Then again, available biographical information indicates that the guy >> with the "pencil neck geek" physique volunteered for and was accepted >> for training for Special Forces while before he completed Basic Training >> - which does not happen. He then supposedly received a medical >> discharge after breaking both legs in a training accident, which again >> does not happen except where the such injuries qualify as disabling. > > I remembered only one broken leg =P - Regardless, I don't think the > story is too implausible. And if it's made up, I'm not sure for what purpose? Not so much implausible as impossible: Violations of policy and procedure, because recruit Snowden was so special... why? >> That's why I call Snowden an International Man Of Mystery rather than >> any other title: Not only is he a living legend, what we can see of >> that life looks like a "legend" in the sense of an intelligence >> officer's fake back story related to a particular assignment. > > But that means snowden is still 'assigned'? Unless his legend really is true, which seems very unlikely to me, probably so. >> Why did Snowden pick attorney and political commentator Glenn Greenwald >> to hand his documents off to, instead of a journalist? > > greenawald IS a journo =P He's an attorney by trade, Progressive political policy advocate by vocation. As far as I know, he has never been employed by any news organization, and has never gathered information in the field or written a published report. My one item published at Global Research makes me more of a "journalist" than him, LOL. >> Why not contact >> John Young, Sibel Edmonds, an old timer like Daniel Ellsberg - > > not sure if choosing greenwald was particularly bad (at least without > hindsight). Then again, snowden could and should have simply dumped > everything so... > > > >> or
Re: Assange Journalism
On 11/26/18 10:27 PM, juan wrote: > On Mon, 26 Nov 2018 17:48:22 -0500 > Anyway, yes, what you describe is materially possible, so I should have > asked "played, why?". What would the 'leaders' of the NSA gain by having > snowden leak some stuff they previously selected/curated? Obviously they > would not allow the leak of anything 'really top secret'. And coincidentally > snowden's stuff simply confirmed what people with half a brain suspected. > Massive surveillance. Wait, not even suspected but knew about it before > snowden (like ATT fiber taps) > > One scenario I can think off the top of my head is that they allowed > snowden to get hold of some not-really-secret stuff to justify 'tighter > security' inside the NSA? > > But as a bigger political game, I'm not sure what their motives could > be. But more below. If we ask what specific domestic surveillance activities had already caused the most controversy, and had the biggest potential for blowback if exposed to full public view, "the first two Snowden releases" provides a pretty good answer: Bulk surveillance of U.S. telephone and Internet traffic. Programs that large will eventually become public knowledge. Picking how and when that happens, and preparing responses for the press, Congress and the Courts in advance, presents significant advantages. This permits developing and implementing strategies for influencing specific individuals who would play key roles in determining the outcome in publicity, political and legal dimensions (reporters and editors, Senators and DemoPublican Party officials, Fedeeral Prosecutors and Judges). During and after the initial releases from the Snowden Saga, the intelligence community won nearly every battle over who can break what laws, when, etc. without consequences. The Snowden Affair removed many potential liabilities by establishing that "we are allowed to do this, that and the other thing." >> I figure Snowden far too dumb to 'leak correctly,' but too smart not to >> play along once he became an object of property physically passed around >> between ruling class factions. > > Hmm. Snoden doesn't strike me as dumb. At least not so dumb that he was > unable to publish stuff anonymously if he wanted. Especially considering that > his job description was pretty much to track 'enemies of the state'. Available biographical information, and his extraordinary access to numerous "sensitive compartments", indicates his job was most likely senior IT administrator and troubleshooter at facilities handling classified communications and databases. Then again, available biographical information indicates that the guy with the "pencil neck geek" physique volunteered for and was accepted for training for Special Forces while before he completed Basic Training - which does not happen. He then supposedly received a medical discharge after breaking both legs in a training accident, which again does not happen except where the such injuries qualify as disabling. That's why I call Snowden an International Man Of Mystery rather than any other title: Not only is he a living legend, what we can see of that life looks like a "legend" in the sense of an intelligence officer's fake back story related to a particular assignment. Why did Snowden pick attorney and political commentator Glenn Greenwald to hand his documents off to, instead of a journalist? Why not contact John Young, Sibel Edmonds, an old timer like Daniel Ellsberg - or ANYONE with applicable knowledge and experience? Did he fail to look into the history of leaks like the one he was considering, and available venues for same - or was he directed to specific people spotted, recruited and handled by the same employer who spotted, developed and handled him? I doubt that we will never know. >> "By his own account, Snowden often discussed perceived Agency wrongdoing >> with his co-workers, which suggests that he should have been profiled >> and flagged as a potential leaker by the NSA’s internal surveillance >> process." > > > Maybe...not? I assume that people working in such criminal > organizations are a 'tight knit' mafia. They don't really suspect each other. > They are all american heroes fulliling their divine role : making the world > safe for goldman sachs and raytheon. Snowden said: “When you see everything, you see them on a more frequent basis and you recognize that some of these things are actually abuses, and when you talk about them in a place like this, were this is the normal state of business, people tend not to take them very seriously and move on from them. But over time that awareness of wrongdoing sort of builds up and you feel compelled to talk about it, and the more you talk about it, the more you’re ignored, the more you’re told it’s not a problem...” > You say they have 'insider threat' programs but who knows how they > actually run them. Although in 1984 world it seemed as
Re: Assange Journalism
On 11/26/18 3:06 PM, juan wrote: > On Mon, 26 Nov 2018 00:01:39 -0500 > Steve Kinney wrote: >> how about the hatchet job his partner in crime, >> Laura Poitras, did on both IO Error and Mendax in her Risk film? Random >> spiteful bitch, or faithful CIA asset? Either way, fat USIC paycheck >> and/or mega-cred in toxic pseudo-feminist circles accomplished. > > pseudo-feminist? Not at all. They all are true feminists and they all > are feminazis. Those two words are synonymous. > The "feminazis" you refer to do exist; they originated in the New Left, a USIC political warfare project intended to displace and discredit Pacifist and Liberal voices in broadcast media during the Vietnam War. The folks who started the "feminazi" bullshit were from that same crew. The project was successful, and after the war the New Left never went away. They kept working their professional networks and press contacts, and re-emerged as the Progressives in the late 70s - early 80s. They now own and operate the DNC, and through that org, most of the Democratic Party. Real feminists also exist. They typically associate with anarchists and their ilk, and one finds plenty of them in Occupy-related activist orgs. Check Emma Goldman, Lucy Parsons and Simone de Beauvoir for background on "real" feminism. >> >> How was Snowden's choice of Greenwald assured, and was his life in >> danger up to the moment he chose the right non-journalist to pass his >> docs off to? > > he gave copies to different journos apart from greenwald I believe? If so, neither he nor anyone else has ever said so. The Snowden Saga, if at all factual, leaves no room for that to have happened. >> How long did it take him to realize he had been played - >> or has he even figured that out yet? > > played how? snowden constantly parrots that journos have the divine > right to filter whatever information reaches the serfs. Played how? Spotted early by the fairly massive Insider Threat programs at NSA, initiated in response to Chelsea Manning's work. They may have fed him specific documents, kept away from others, transferred him from job to job as necessary to facilitate that process. He may have also been monitored and/or manipulated through his girlfriend, who has joined him in exile - which makes little sense, unless she had something to hide, and/or run from, here in the U.S. I figure Snowden for too dumb to 'leak correctly,' but too smart not to play along once he became an object of property physically passed around between ruling class factions. >> A funny thing happened to the allegedly thousands of documents Ed handed >> to Glenn for publication: After promising Snowden he would release all >> the docs within ten days of breaking the first big story, > > > did he promise that? That doesn't sound realistic given the fact that > snowden supports censorship-by-journo. So at least one article published within days of the Prism release said. Over the next week the reported number of documents given to Greenwald rose very fast, as Greenwald's story changed. I kept very close track of available information during that time frame; this article I wrote back then be of some historical interest: http://www.globalresearch.ca/nsa-deception-operation-questions-surround-leaked-prism-documents-authenticity "By his own account, Snowden often discussed perceived Agency wrongdoing with his co-workers, which suggests that he should have been profiled and flagged as a potential leaker by the NSA’s internal surveillance process." > Regardless, I believe/would assume that snowden gave the docs to > different redundant parties because 'trusting' a single guy like greenwald > is pretty stupid, and snowden is anything but stupid. > To date, no "missing" Snowden docs have turned up anywhere. Considering their cash value to any reporter who has an "exclusive" on any of them, that seems very unlikely if any did exist. > >> All I know for sure about the Snoweden Affair is that once the dust >> settled, the U.S. intelligence community got everything it wanted: > > yeah. Not sure if snowden contributed to that or it's just that his > leak was useless in the grand scheme of things. Anything but useless: Whether or not Snowden was in on the game, the Snowden Affair accomplished important IC objectives, solidifying their power as an autocratic branch of government answerable to no one but themselves. >> 1) Use an extraordinary physical security protocol to upload an >> encrypted archive of your docs to the I2P torrent network. Clues: You >> need a "clean" laptop from a flea market, a home made high gain antenna, >> and a conveniently loc
Re: Assange Journalism
On 11/24/18 2:06 PM, John Young wrote: > Matt Taibbi reports on Assange in Rolling Stone in a one of the more > salient grasps of what journalism has missed about WikiLeaks feeding its > maw. > > https://www.rollingstone.com/politics/politics-news/taibbi-julian-assange-case-wikileaks-758883/ Very impressive article - Matt Taibbi has clearly been paying professional attention to the leakage bizniz. I would guess he did some in depth research based on the question of how he should proceed if offered "red hot" classified docs. Or maybe, after being handed same - in which case he decided to steer clear. I only spotted one error: He attributed the disclosure of NSA tapping Merkel's phones to Snowden, but that was another actor - likely employed at NSA in Germany, and a damn sight better at hide and sneak than good ole Ed. > A noteworthy observation is how all the risk is taken by leakers not by > publishers and journalists -- nor by WikiLeaks and Assange. > > Nearly every major leak to WikiLeaks (and the media) has led to the > leaker being hammered while the publishers are awarded prizes, as with > WikiLeaks. No duh, as they say. I'm about two nines confident that Greenwald's Intercept deliberately burned Reality Winner. Can incompetence alone account for Intercept employees contacting the affected organization to 'fact check' the article in advance of publication by giving away their source's location, then publishing both the serial number of the printer she used, and the date/time she printed the documents? (I pulled the watermarks off an image I downloaded from The Intercept shortly after the story broke, using a freeware image editing program.) Speaking of Greenwald, how about the hatchet job his partner in crime, Laura Poitras, did on both IO Error and Mendax in her Risk film? Random spiteful bitch, or faithful CIA asset? Either way, fat USIC paycheck and/or mega-cred in toxic pseudo-feminist circles accomplished. At least it's a classier way to attention-whore than punching an alt-Reich asshole. We can't leave out Ed Snowden, international man of mystery. How early was he spotted, and to what extent was he manipulated to assure that specific documents would be among those he handed off to a press contact? Hell, DID the published docs come from him? Given the number he claims to have handed off, Ed himself would not be likely to know for sure. How was Snowden's choice of Greenwald assured, and was his life in danger up to the moment he chose the right non-journalist to pass his docs off to? How long did it take him to realize he had been played - or has he even figured that out yet? To date his public presentation in exile remains consistent with making the best of that particular bad situation. A funny thing happened to the allegedly thousands of documents Ed handed to Glenn for publication: After promising Snowden he would release all the docs within ten days of breaking the first big story, Glenn sold them all to the highest bidder, Pierre Omidyar. If Greenwald's claims about how many docs there were are to be believed, over 99% were either destroyed, or locked up securely for blackmail use by his new employer. All I know for sure about the Snoweden Affair is that once the dust settled, the U.S. intelligence community got everything it wanted: Not just authorization to continue illegal domestic surveillance programs, but a clear precedent that U.S. intelligence officials are allowed to tell lies under oath in Congressional hearings, with no consequences other than high-fives back at the office later. "Almost as if" the USIC had lots of advance warning and got to pick the specific battles themselves, with specific purposes in mind. A suggested leaker's protocol: Pardon my language but "fuck journalists." They need have no role until /after/ all your red hot docs are in the public domain. 1) Use an extraordinary physical security protocol to upload an encrypted archive of your docs to the I2P torrent network. Clues: You need a "clean" laptop from a flea market, a home made high gain antenna, and a conveniently located open WiFi hot spot. Don't forget to scramble your MAC address before plugging in the antenna. Include one or more "medium value" docs in the clear, to assure interest in your uploaded archive. In your description of the torrent, promise the key will be published under the same user name within a given time frame. 2) A few days later, use the same security protocol, from a location at least hundreds of miles away from your first upload site, to post the key (a pass phrase, see diceware.com) on the same torrent tracker site in I2P space. 3) Destroy everything used in the above process, and resume your "normal" life. Mission accomplished, you got the docs into more than enough hands to assure public release at /minimal/ personal risk. Better alternatives to this protocol are solicited... And remember, on the day you brag about your success
Re: BBC News: NovaSAR: UK radar satellite returns first images
On 11/24/18 1:51 PM, juan wrote: > On Sat, 24 Nov 2018 18:00:23 + (UTC) > jim bell wrote: > >> NovaSAR:. First all-UK SAR (synthetic aperture radar) satellite sends back >> images. [...] > I guess that kind of news is rather important for cypherpunks because > of the "know your enemy" principle. vs. "Know your terrain," which includes many new (to human experience) overlays generated by sensors and communications networks. On the other hand, other than being a really cool ham radio project (I would describe it as almost literally that) what's the new radar satellite actually used for? https://directory.eoportal.org/web/eoportal/satellite-missions/n/novasar-s quote: NovaSAR-S provides medium resolution (6-30 m) imagery ideal for applications in the following fields: - flood monitoring - agricultural crop assessment - forest monitoring (temperate and rain forest) - land use mapping - disaster management - maritime applications (e.g. ship detection, oil spill monitoring, maritime safety, and security of defence applications). /quote In terms of this gadget's potential for military and State Security purposes, that's almost laughable: A flyswatter vs. laser guided artillery rounds comparison fits the case of comparing NovaSAR-S to military sensor packages. NovaSAR-S makes primitive but useful LandSat functions available to organizations working on shoestring budgets. NovaSAR-S shift the balance of power in the electronic warfare terrain toward some "underdog" players, by eroding intelligence (Earth imaging) monopolies presently held by the world's most powerful organizations. :o) signature.asc Description: OpenPGP digital signature
Re: of elephants and men, and scumbags
On 11/20/18 10:41 PM, juan wrote: >> http://pilobilus.net/Political.Oritnetation.Grid.png > > > I don't think the 2d graph adds much. The assumption that 'economic' > freedom and 'personal' freedom are different things is obviously flawed. > Also, the assumption that 'conservatives' favor 'eonomic' freedom whereas > 'modern' 'liberals' favor 'personal' freedom is flawed as well. In practice > both 'conservatives' and 'liberal' are...fascists =) Not economic vs. personal freedom, but rather, economic (commerce) vs. coercive (political) agency: Concentration of capital and firepower in more or less hands. > Nolan came up with his chart because libertarianism doesn't fit the > mainstream left/right classification, BUT the notion that mainstream left and > right are half libertarian is complete bullshit, wishful thinking and > dishonest pandering. In practice, both liberals and conservatives pay some > *lip service* to 'personal' or 'eonomic' freedom while fully supporting > fascism. I was under the impression that Nolan came up with that chart in an effort to persuade people dissatisfied with the Left/Right spectrum that they "belong in" the Libertarian Party. I can't fault his motives: Before the hostile takeover that converted the Libertarian Party to a Radical Conservative a.k.a. Coprporatist org back in the late 1990s, the Party had a lot to offer - I was a fan and booster. Today, I can not distinguish Libertarian Party advocates and its (rare) candidates for political office from "socially tolerant" Republicans. The Libtards do talk a slightly different game, but I could not care less about that: Performance is my bottom line. > Anyway, we can simply have a line (or segment I guess) with anarchists > on one end and authoritarians on the other end. And then we can classify the > whole library accordingly. That's the X axis on the graph... > As to the placement of left and right in your graph, seems to me that > both left and right should be at the top since both are authoritarian. And > none of them favor free enterprise either... I put the Right near the Anarchist end of the scale, because "Private power" vs. "State power" indicates one central State authority vs. numerous competitive State-chartered Corporate entities: Think Soviet Union vs. United States, toward the end of the Cold War era. Thanks to several generations of full saturation Big Lie propaganda, many people believe that Corporate Capitalism "is" Free Enterprise. But in real life the two present as natural enemies: When an independent sole prop or partnership starts cutting into a major corporation's market by bringing a superior product to market at a competitive price, our Corporate Capitalists use their massive financial reserves to destroy the independent enterprise: Dump lookalike products on the market at a loss, regulate their competitors out of business with the help of friendly, well bribed State agencies, or etc. This perspective comes from first hand observation, as a participant in high functioning small businesses stomped flat as soon as they became competitive by bringing superior products at completive prices to market. :o) signature.asc Description: OpenPGP digital signature
of elephants and men, and scumbags
On 11/20/18 4:31 PM, jim bell wrote: > On Tuesday, November 20, 2018, 12:08:58 PM PST, Razer > wrote: > >>There IS a "Left" and there IS a "Right"... > > Yes, and the origin of that meme was the outcome of the French > revolution in 1789 onwards. "The right", of that location and era, sat > in the legislature on the "right", and "The Left", of that location and > era, sat in the legislature on the "left". > > Simple for post-revolutionary France. But applying that to other > nations and at different times can be difficult. And, being only > one-dimensional, it's quite inadequate and highly misleading. In modern usage, the one dimensional Left/Right scale only measures how stupid, immoral, evil, etc. others are relative to oneself, as a function of the distance between them and oneself on the scale. At least, I have not seen it applied for any other purposes than demonization or self congratulation. The complexity of the rhetoric varies in proportion to the speaker's intelligence and vocabulary. Oddly enough, in this context the Left/Right scale works the same no matter which end of that scale gets which label. That feature enables people to have endless fun "proving" that whichever end the the scale they ain't on represents "the REAL Nazis." The larger the distance between a given Self and Other, the worse and therefore more "Nazi" the Other. One works backward from there to prove the conclusion. A couple of years ago I made graph similar to the Nolan chart but much simpler and more concrete, as its axes represent the distribution of political power in State and Private sectors among larger vs. smaller numbers of individuals. The X axis represents distribution of Private power into fewer hands (Capitalism) or more hands (Free Enterprise). The Y axis represents distribution of State power into fewer hands (Authoritarian) or more hands (Anarchist). I do not label the quadrants, leaving that as an exercise. Examining various "ideologies" in the context of this graph provides a bit of potentially educational fun. Which quadrant would you rather live in, and why? In this example I place the Right and Left on the graph: http://pilobilus.net/Political.Oritnetation.Grid.png My assignment of "Left" and "Right" to specific coordinates does not refer to abstract ideological constructs, but rather represents my observation of the aggregate behavior and practical objectives of people who strongly self-identify with Right and Left brand labels in the United States at present. I like this kind of model because I prefer an ecological approach to political studies: I view popular political ideologies as emotionally loaded verbal formulas used to manipulate people's cognitive processes and responses to commands, for the speaker's benefit at the audience's expense. Conversely, I think of "political reality" as the dynamic evolution of human power relationships in a changing material environment over time. (Lately I have been very gratified to see a discipline called Biophysical Economics on the rise in academia; I would describe it as "economics in a world where the laws of physics exist.") In political rhetoric, Fascism can mean whatever anyone with Fascist leanings needs it to mean, to pin the label on someone else. But academic historians do provide some useful guidelines for the rest of us. Dr. Lawrence Britt has examined the fascist regimes of Hitler (Germany), Mussolini (Italy), Franco (Spain), Suharto (Indonesia) and several Latin American regimes. Britt found 14 defining characteristics common to each: 1. Powerful and Continuing Nationalism - Fascist regimes tend to make constant use of patriotic mottos, slogans, symbols, songs, and other paraphernalia. Flags are seen everywhere, as are flag symbols on clothing and in public displays. 2. Disdain for the Recognition of Human Rights - Because of fear of enemies and the need for security, the people in fascist regimes are persuaded that human rights can be ignored in certain cases because of "need." The people tend to look the other way or even approve of torture, summary executions, assassinations, long incarcerations of prisoners, etc. 3. Identification of Enemies/Scapegoats as a Unifying Cause - The people are rallied into a unifying patriotic frenzy over the need to eliminate a perceived common threat or foe: racial, ethnic or religious minorities; liberals; communists; socialists, terrorists, etc. 4. Supremacy of the Military - Even when there are widespread domestic problems, the military is given a disproportionate amount of government funding, and the domestic agenda is neglected. Soldiers and military service are glamorized. 5. Rampant Sexism - The governments of fascist nations tend to be almost exclusively male-dominated. Under fascist regimes, traditional gender roles are made more rigid. Divorce, abortion and homosexuality are suppressed and the state is represented as the ultimate guardian of the family institution.
Re: of elephants and men, and scumbags
On 11/19/18 6:02 PM, juan wrote: >> On the brighter side, now Xenan will have lots of company over there in >> my CPunks Spam folder. I'm sure they will get along just fine, out of >> sight and out of mind. > > I open Zen's messages to see if they include a dailystormer link. I > can't believe he puts one or more links to the ds in every message, but he > does. > > And maybe I should expand my "uh oh" comment a bit. James used to be a > leftist and now he's a rightist. He was a partisan and he is a partisan. He > was a 'progressive' social engineer and now he's a conservative social > engineer, left and right being two sides of the same coin. Ah, the Progressives! I first got to know them back when they were called the New Left: Think "Hanoi" Jane Fonda & co. Over the years my on-contact categorical rejection of the New Left's message evolved into a personal theory that they were, wittingly or otherwise, fielded by a Federal domestic political warfare activity. Their mission: Displace and discredit Pacifists and Liberals who were getting way too much influence during the Vietnam War. As always in mass media, nothing attracts attention like violence, even if it's only violent and deliberately offensive rhetoric; the plan, if plan it was, worked very nicely. In this same time frame, COINTELPRO was A Thing and the FBI went so far as to provide training, money, arms and explosives to Militant Leftists, creating "shocking headlines" in an effort to equate anti-war and other Liberal / ComSymp sentiments with violent extremism in the public mind. In light of the FBI arranging for people to actually bomb banks and such, it would be absurd to imagine that they did not also field double agents, witting or witless, to present a stereotyped "made to be hated" pro-Commie, anti-American "Leftist" message to the Folks At Home. A funny thing happened after the Vietnam War: The New Left still had its press contacts and professional networks, and kept right on going. After a few years of dormancy, Hanoi Jane married a conventional politician and got a faux Liberal makeover. At about that time I started running into people in real life who presented as political activists and talked about "political correctness" as if they had some moral right to dictate what Liberals and Radicals could and could not think, say and do. My initial reaction was "fuck y'all." Subsequent experience has proved my instinctive anarchist response correct. The Progressives worked industriously through the Reagan years, and managed to take over key roles in the Democratic Party. They elected one of their own - The Clintons - to the Presidency. Did the old New Left do that on their own, or with assistance from our Security Services? I have no hard data on that, but need I mention the relationship established when the CIA obtained full support from Governor Clinton for the Iran/Contra cocaine trafficking business, and the infamous Clinton Body Count from that era? Since before that day to the present, Progressive political actors have worked hand in glove with radical fringe Right Wing extremist elements of our "Deep State." The Clintons' zero-tolerance policy toward folks like the Patriot Movement (who remembers Ruby Ridge?), and the mass murder they carried out in Wayco, Texas do not impress me as evidence of an anti-Right agenda. I see a commitment to Corporate interests who dictate a zero tolerance policy toward any kind of wildcat political organizing, not under the firm control of well entrenched, uber-wealthy factions in the U.S. political/economic ecology. Today our peasants outnumber our dominant aristocrats by about 3/4 million to one, and that can't be a comfortable position for a de facto criminal elite to find itself in. Populism presents an existential threat to the world as they know it - a world where less than 1/100,000th of the population literally makes all the decisions affecting our species as a whole. So it can't be allowed, is all. Anyone who doubts the identity vs. "close relationship" of the Progressive establishment with the Far Right needs only look into the relationship between Henry Kissinger and Hillary Clinton: They present themselves in public as best buddies, and Hillary calls him her mentor. Her own track record for mass murder has yet to rise to Kissinger status - Honduras, Libya and Syria notwithstanding - but put her in the Oval Office and watch the fun! In light of the above model, the whole Left vs. Right paradigm in modern U.S. politics presents as a Big Lie. The only differences I see between the Parties of our duoploy are rhetorical, and a bias toward prioritizing service to financial services and communications shareholder value (Democrats) vs. Petrochemicals and Military Contracting industries' shareholder value (Republican). America's real silent majority, our classic Liberals, have no voice in national policy under a system that locks out candidates for
Re: of elephants and men, and scumbags
On 11/18/18 12:17 AM, juan wrote: > On Sun, 18 Nov 2018 14:34:11 +1000 > jam...@echeque.com wrote: > > >> I ceased to be a leftist when > > uh oh... On the brighter side, now Xenan will have lots of company over there in my CPunks Spam folder. I'm sure they will get along just fine, out of sight and out of mind. :o) signature.asc Description: OpenPGP digital signature
Re: of elephants and men
On 11/14/18 11:03 PM, Alfie John wrote: > Hey Zenaan, > > Are your posts always off topic to Cypherpunks? Maybe other people disagree > with me, but I somehow feel your purpose here is to make users unsubscribe 樂 Aw shucks. Zenaan didn't make me unsubscribe. He did make me create a spam filter rule, and all his posts and replies land in their very own folder - just in case the "stopped clock twice daily" effect produces any real surprises. Years later, still waiting :o) signature.asc Description: OpenPGP digital signature
Nigerian 404: Google not found, Internet wobbly
Nigerian 404: Google not found. https://www.theregister.co.uk/2018/11/14/nigerian_telco_bgp/ Reported day one of same. https://www.theregister.co.uk/2018/11/13/google_russia_routing/ If the network's rockin', don't come knockin' https://www.engadget.com/2017/11/07/comcast-internet-outage-level-3-route-leak/ I been seeing brief, intermittent outages that play hell with serious data transmission all over my neighborhood for three days now, and user comments seem to indicate that condition occurs all over the map. Don't even tell me a worm armed with the NSA's login credential (reversed from the hard coded hash) is jumping around between Cisco routers... O sunshine take me now away from here, I'm a needle on a spiral in a groove The turntable spins as the last waltz begins, and the weatherman say's someting's on the move... https://www.youtube.com/watch?v=o2rOWVWJmWU Then again, it's probably nothing. :o) signature.asc Description: OpenPGP digital signature
Re: 1. Freedom Makes People Smarter - homeschooling
On 11/2/18 4:48 PM, Steve Kinney wrote: > > Recommended reading, any and everything by this guy: > > https://en.wikipedia.org/wiki/John_Taylor_Gatto Postscript: Here's a complete copy of Against School, Gatto's most influential essay. http://www.wesjones.com/gatto1.htm signature.asc Description: OpenPGP digital signature
Re: 1. Freedom Makes People Smarter - homeschooling
On 11/1/18 5:17 PM, juan wrote: > On Thu, 1 Nov 2018 22:42:17 +1100 > Zenaan Harkness wrote: > >> Stating the obvious dept, using for those stucked in the oblivious >> dept. > >> 6 Reasons to Start Homeschooling ASAP >> https://www.zerohedge.com/news/2018-10-31/6-reasons-start-homeschooling-asap >> > > yeah you can teach the children about the virtues of trump and putin > and how amazing white supremacists are. Even more important, you can mentally > rape them with your christiano fascist propaganda from the craddle. > vs. point out to them where the curriculum veers off into popular misconceptions and/or propaganda messaging, and provide access to supplemental information where and as indicated. "Brick and mortar" school teaches three lessons of great importance: 1) Show up on time every day whether you want to or not. 2) Do your assigned tasks as directed whether you want to or not. 3) The people in charge always have all the final answers. Any other lessons learned present as added value for the economic and political actors who will exploit obedience trained public school inmates for the rest of their lives. The process of sorting future winners and losers includes giving higher quality instruction to the more obedient kids, while treating the less obedient as stupid and providing them with a "for losers" curriculum. More recently, drugging noncompliant students has joined the mix of strategies for shaping and limiting the social and political impact of "disruptive" personalities in tomorrow's crop of adults. "But what about socialization?" What indeed - see above for the kind of socialization public schools provide. It took 40 years to build a climate of fear sufficient to support literally outlawing normal, organic socialization, i.e. letting your kids run around with the neighbor kids. As a result, public school and broadcast media get the final say as formative social influences on the peer relationships of tomorrow's adult consumers - except where parents remove public school from the mix and work to replace it with "real world" social development opportunities. Recommended reading, any and everything by this guy: https://en.wikipedia.org/wiki/John_Taylor_Gatto :o) signature.asc Description: OpenPGP digital signature
Re: End of the Deep State
On 11/1/18 11:05 AM, Ryan Carboni wrote: > In the coming months, the deep state will end. They will not be capable > of an eye wink argument for their misdeeds. Ignorant, easily led Trump supporters believe he opposes the Deep State. Intelligent, well paid Trump supporters understand that his whole job, and by extension theirs, is to give the Deep State exactly what it wants at all times. To understand this one must understand the difference between what propagandists working the alt-Right crowd mean when they say "Deep State," and what academics who study political systems mean when they say "Deep State." The closer one looks, the smaller the similarity becomes - until it disappears completely. In contemporary propaganda, the term Deep State refers to an hereditary Conspiracy of evil individuals, well known to true believers who take every Conspiracy Theory with any paranoid and/or racist content as rock solid fact. Their version of the Deep State works tirelessly to destroy everything white working class conservative Christians consider right, good and holy. For full details of this version of the Deep State, enter 'illuminati new world order' in any search engine. In political science, the term Deep State refers to the army of career civil servants, appointed officials, and private contractors who conduct the government's actual business. Collectively, they have many shared interests and agendas; and without their advice, consent and cooperation, elected officials can not get anything done. This gives the government as a whole huge inertia, a tendency to "keep doing what it has always done" regardless of popular demand for change, or unwelcome policy directives from elected officials. Below: Four essays introducing and explaining various aspects of the real Deep State. Or in other words, the original Deep State concept our alt-Right propagandists borrowed their new, improved name for the Illuminati / New World Order Conspiracy from. "There is the visible government situated around the Mall in Washington, and then there is another, more shadowy, more indefinable government that is not explained in Civics 101 or observable to tourists at the White House or the Capitol. The former is traditional Washington partisan politics: the tip of the iceberg that a public watching C-SPAN sees daily and which is theoretically controllable via elections. The subsurface part of the iceberg I shall call the Deep State, which operates according to its own compass heading regardless of who is formally in power." https://billmoyers.com/2014/02/21/anatomy-of-the-deep-state/ "The Deep State is not just the military intelligence community, but also consists of transnational corporations, big business and Big Oil, Wall Street, Silicon Valley, and think tanks. Groups and institutions in this structure form various coalitions that can compete, but tend to seek agreement on certain fundamental policies that benefit their mutual positions of power." https://medium.com/insurge-intelligence/republican-insider-trump-is-creating-deep-state-2-0-but-it-might-crash-the-economy-exclusive-704522e6761a “Trump’s not Sir Galahad against the evil Deep State. Of course, they completely ignore the fact that, one, he’s a product of it – that whole New York high finance world is one adjunct of the Deep State. Second, Trump showed it to us with his cabinet picks for the economy. And third, he is advocating a 10 percent increase in military spending. How could this guy be opposed to the Deep State?” https://medium.com/insurge-intelligence/republican-insider-trump-is-creating-deep-state-2-0-but-it-might-crash-the-economy-exclusive-704522e6761a "The United States has, in short, moved beyond a mere imperial presidency to a bifurcated system — a structure of double government — in which even the President now exercises little substantive control over the overall direction of U.S. national security policy. Whereas Britain’s dual institutions evolved towards a concealed republic, America’s have evolved in the opposite direction, toward greater centralization, less accountability, and emergent autocracy." Full text: https://tinyurl.com/thedeepstate signature.asc Description: OpenPGP digital signature
Re: The Assassination Of Donald Trump
On 10/25/18 9:25 PM, CANNON wrote: > On 10/24/2018 08:37 AM, Steven Schear wrote: >> https://www.zerohedge.com/news/2018-10-23/cj-hopkins-assassination-donald-trump > And I am sick of all these low intelligent people trying to compare Trump to > Hitler. Trump is not fit to shine Hitler's boots. Hitler was a combat wounded veteran who lived in poverty and worked tirelessly to develop and promote his political vision; he took big risks and spent time in jail in the process. Hitler was a fanatical extremist, virulently xenophobic, and once his physician started giving him cocaine and amphetamine in his vitamin shots he became full blown paranoid psychotic. Compare Trump: A poor little rich kid, ass deep in old school organized crime, he has managed to piss away 2/3 of his inheritance just proving himself to the public as a Big Success Story. Hitler was many ugly, dangerous things, but never an ignorant, narcissistic buffoon fronting for a radical faction of oligarchs intent on looting the remains of his country's national economy. > I am sick of them saying that Trump and Trump supporters are "nazis" or "kkk". > > Such is utter ridiculousness and lacks any logic. A list of common features of fascism, from historian John Hawkins: 1. Totalitarian 2. Extreme nationalism 3. Top down revolution or movement 4. Destructive divisionism such as racism and class warfare 5. Extreme anti-communism, anti socialism and anti-liberal views 6. Extreme exploitation 7. Opportunistic ideology lacking in consistency as a means to grab power 8. Unbridled Corporatism 9. Reactionary 10. The use of violence and terror to attain and maintain power 11. Cult-like figurehead 12. The expounding of mysticism or religious beliefs Our Mr. Trump, his administration and its backers don't fire on all of the above cylinders, but I see close correlations in Trump administration rhetoric, policy and performance on items 2, 3, 4, 5, 6, 8, 9 and 11. Eight out of twelve ain't a bad start. On item 12, Trump himself does not pose as Christian but a majority of his loyal followers do. Items 1 and 10 would apply, but the inertia of U.S. political institutions greatly slows the Trump crew's progress on establishing a Totalitarian State controlled by State terrorism - further progress on those fronts will require a large scale economic collapse, which we might call a work in progress. > If you want to talk about Hitler, and nazis. Nazi was short for "National > SOCIALIST" in German. > > Socialism is an ideology of the left. "Nazi" derives from NSDAP, itself an acronym for words that translate as Nationalist Socialist Democratic Worker's Party. Why "socialist"? Because at the time the Party's name was coined, Socialism was very popular in Germany - the German people didn't have it, but they wanted it. What they got was iron rule by a consortium of industrialists, bankers and political ideologues, who rose to power with the support of "ultra conservative" U.S. industrial, financial and military power brokers including even the Dulles Brothers. Union busting, and literally rounding up and slaughtering Communists and Socialists do not sound much like the actions of a Left Wing government to me. > And as for antifa, ANTIFA is by definition a fascist group. They are against > free speech, and against other constitutional rights. They suppress > free speech and attack those whom would disagree with them. And they attack > and taunt pro-2nd amendment rallies. They vandalize, > taunt, and attack anyone they disagree with. The opposition to liberty, and > the suppression of those that stand for liberty, > through terrorism and violence is in itself fascism. How can anyone whom is > against free speech, 2nd amendment, and lacks tolerance NOT be considered > fascists? Antifa stands against efforts to organize and grow a U.S. populist movement devoted to White Supremacy under iron Corporate rule. Again, compare the organizations under the Unite The Right banner with the list of common features of fascism presented above: They score higher than the Trump Administration itself, because they do not have to adapt to the constraints of attacking an established government from within its own structure. Comparing today's U.S. Antifa activists to the list of common features of fascism above, I see correlations with items... um, item 9 only. By definition, any social or political movement that names and defines itself as anti-something qualifies as "reactionary." > This world has come to lunacy. Our Reublican and Democratic Parties, and their financial sponsors, share a uniform commitment to continued exponential growth of heavy industry, as well as the ongoing transfer money and power from whole populations to the hands of their financial and industrial masters. They may not "mean to" destroy the world as we know it, but they will do so because "Me first, and if that's a problem it's somebody else's problem." signature.asc
Re: on freedom - Re: [WAR] - Re: (53) Gaddafi's Prophecy, 2011 - "Europe will turn black" - YouTube
On 10/24/18 1:49 PM, juan wrote: > On Wed, 24 Oct 2018 15:09:12 +1100 > Zenaan Harkness wrote: > > >> >> In the case of Australia, we were an industrious, fair minded >> Christian nation > > LMAO! are you out of your fucking mind, or just a retarded troll\ Back in the 1970s on a flight crossing the Pacific, we landed in Australia to refuel. Passengers were allowed out to 'stretch their legs' but black passengers were advised it would be better for them not to leave the plane. I had a teacher whose son was a college basketball player. He was in Australia with his team for an match, and he was arrested for robbing a bank: They just grabbed him off the street and charged him. Within a week the Aussie cops caught the guy who actually did it - positiviely identified by videotape and witnesses, there was no resemblance at all other than dark skin. Several months and several lawyers later, it was finally possible to get the "wrong guy" released and returned. One would expect a nation whose "white" population descended from chronic petty offenders dumped like trash on the far side of the world to know better, but apparently not. Lots of Aussies still seem to need someone "lower" than themselves to look down on and abuse, so I suppose gollywogs provided their only option... :o/ signature.asc Description: OpenPGP digital signature
Re: Yet another reason to call him #$%& Re: yet another reason...
On 10/21/18 6:46 PM, juan wrote: > On Sat, 20 Oct 2018 15:12:22 -0400 > Steve Kinney wrote: > > >> The high volume of torrent traffic over i2p, > > > I wasn't aware that i2p is mainly used for torrents? I don't recall the statistics but I would guess that torrents account for at least 95% of the traffic on that network. Maybe more like 99-point-something percent. > Last time I checked their eepsites(or whatever they are called) I > didn't find anythign interesting or 'criminal'. In other words, nobody seems > to be using i2p to host anything of value. And I saw more than a few sites > that looked that like russian honeypots. A website on the i2p network (eepsite) can host any files the user puts in the site's /docroot directory. That would include subdirectories with their own index pages, not publicly advertised and available only to "confidential" correspondents who know the names of the subdirectory and index pages in question. That's not quite a "digital dead drop" but comes close. I used to run a moderately popular eepsite and seeded lotsa torrents. "Who" I was and what I may have distributed aside from publicly advertised content is for me to know and others to guess. Let's just say I did it as an exercise and for amusement purposes only. Last time I checked, some of the stuff I seeded out was still bouncing around in there years later. :o) >> and the lng duration of >> typical downloads (25kbps counts as 'decent speed' in there), greatly >> complicate matters for anyone doing traffic analysis, compared to the >> hit-and-run pattern of TOR usage that typically lights up an entry and >> exit router for just a few minutes per user session, during which easily >> fingerprinted clusters of packets, all of them "of interest" to >> potential adversaries, flow thick and fast. > > > Which is exactly the reason why torscum should be promoting the use of > their network for filesharing...if they were honestly interested in > protecting userswhich of course they are not. The Tor Project's position on torrent traffic never made sense to me. More users and more traffic add up to more security. If casual users see a bit more lag, so what? In every instance where security vs. end user arises convenience arises, TOR chooses convenience. I was also very disappointed when the TOR Browser distribution dropped support for router configuration; now they have done away with the last scrap of that. "The Tor circuit display has been relocated and improved! Click the Site Identity button (located on the left side of the URL bar) to see the new circuit display" is a lie; there's no such button in the update I just installed (ver 8.03), which presents the quoted text on its 'update completed' page, but nothing related in any menu accessible to the user. The browser's configuration menu does present "new identity" and "new circuit for this site" buttons; that's all, folks! The "Donate Now" link on the TOR welcome page does work though. >> than they would consider acceptable if they knew about >> them. The reluctance of intelligence services to reveal their >> capabilities by acting on what they know too often provides the best >> protection most users can get... > > > ...but that didn't work too well for ulbricht and a few others like > him... I would say it worked exactly as expected for Ulbricht and a few others like him: Always expect a faulty cost/benefit estimate produces net loss results. :o/ signature.asc Description: OpenPGP digital signature
Re: Yet another reason to call him #$%& Re: yet another reason...
On 10/19/18 5:58 PM, Shawn K. Quinn wrote: > Of course, #$%& has no clue how BitTorrent works. It's nearly pointless > to route just the tracker callbacks through Tor, and routing the actual > data over Tor would overload the network. I don't blame them for making > it easy to block BitTorrent traffic; there are other filesharing tools > which are a better fit if anonymity is a priority (Freenet, GNUNet, etc). TOR schmore. I would describe i2p as an anonymizing torrent distribution network, with some other comms (in-network websites, e-mail, etc.) piggybacking on the infrastructure that file sharing traffic keeps up and running. https://geti2p.net/en/ The Garlic Routing protocol used by i2p looks at least as secure as Onion Routing - and IMO more so, because of both the protocol's architecture, and the dynamics of real world traffic flow where a small number of "dangerous" packets mix into a huge number of movies, TV shows, record albums etc. in transit. Extra paranoid users can configure i2p to use longer chains, further complicating things for adversaries. By default all i2p nodes relay third party traffic, and at present no (advertised) gateways connect i2p to the 'regular' Internet. The high volume of torrent traffic over i2p, and the lng duration of typical downloads (25kbps counts as 'decent speed' in there), greatly complicate matters for anyone doing traffic analysis, compared to the hit-and-run pattern of TOR usage that typically lights up an entry and exit router for just a few minutes per user session, during which easily fingerprinted clusters of packets, all of them "of interest" to potential adversaries, flow thick and fast. The most reliable anonymity against State level adversaries uses TOR for hit-and-run network access via a high gain antenna and open router, or any dodge that physically decouples the user from the physical router's IP address. i2p can't do that very well, because it takes 20 minutes or more to integrate into the network and start moving packets. So double-nought spies and their ilk can get that much mileage out of TOR. So far I have not come up with a way to prevent what I call a Hydra attack against /any/ distributed anonymizing overlay network: An adversary who owns and operates a majority of the relay nodes via geographically dispersed proxies run from a single cloud server literally "can't be beat" except by physically concealing one's identity from the physical Internet router used. Users who expect mere software to defeat network surveillance by top tier actors have started out with false assumptions and end up taking far greater risks than they would consider acceptable if they knew about them. The reluctance of intelligence services to reveal their capabilities by acting on what they know too often provides the best protection most users can get... :o/ signature.asc Description: OpenPGP digital signature
Re: Police told to avoid looking at iphone x
On 10/14/2018 03:33 AM, jim bell wrote: > https://www.engadget.com/2018/10/13/police-told-to-avoid-looking-at-iphone-x/ > > "Police have yet to completely wrap their heads around modern iPhones like > the X and XS, and that's clearer than ever thanks to a leak.Motherboard has > obtained a presentation slide from forensics company Elcomsoft telling law > enforcement to avoid looking at iPhones with Face ID. If they gaze at it too > many times (five), the company said, they risk being locked out So a small piece of tape or comparable makes the thing safe to handle freely, and a mugshot or brief video clip unlocks it? Yet again, security vs. convenience produces the usual winner. :o/ signature.asc Description: OpenPGP digital signature
Re: Media Write Protection / Crypto Devices / BadUSB - #OpenFabs #OpenHW
On 10/13/2018 08:42 AM, Mirimir wrote: >> There is never "no" disk, just a matter of which ones >> are plugged into the box, physically, or remotely. > > OK, I should have said "unless there _is_ no disk, as there _can be_ in > Tails". I've run Tails (and my own LiveCDs) on diskless machines. And > yes, using USB for live systems is iffy. But write-once CDs are pretty > safe, I think. No? Well heck, CDs are cheap. Write once, use once, melt once. If your trust in the Live CD vendor and the "trusted" device used to burn your stack of Live OS CDs is well founded, and the device booted into has no drive (or a power switch on the drive - a very trivial hack even with a laptop), the only things left to worry about are undocumented debugging modules on the CPU, and maybe undocumented BIOS or video chip features. If your activities present a target important enough to justify use of TS/SCI techniques against you, your activities are probably important enough to justify purchasing obsolete laptops in bulk and destroying each after one use. "Fingerprint MY hardware will ya, you bastards? HA! Take that!" Just sayin'. Everything depends largely on one's threat model. Who are your potential adversaries, what are their potential resources, and what's their cost/benefit ratio for doing what it takes to crack your system? Educated guesses here establish parameters for reasonable defensive measures also based on cost/benefit factors. Spoiler: For most of the users most of the time, precautions beyond using a Live OS on a stick don't make much sense. Always consider that the cost of using information obtained via a previously unsuspected attack vector includes a risk of exposing that vector's existence. Parallel construction covers a multitude of sins but not all of them, all of the time. :o) signature.asc Description: OpenPGP digital signature
Re: After Mysterious Closure, Solar Observatory In New Mexico Reopens
On 09/18/2018 03:52 PM, Razer wrote: > > > After Mysterious Closure, Solar Observatory In New Mexico Reopens : NPR > > Laurel Wamsley > > A solar observatory in New Mexico reopened Monday after being closed by > authorities for 10 days — which spawned national interest and > speculation into the cause of its evacuation. [ schnipp ] > "We cannot wait to get back to work to show everyone the world class > research we do every day at the telescope," McAteer said. > > NPR's Emily Sullivan contributed to this report. > > https://www.npr.org/2018/09/17/648804508/after-mysterious-closure-solar-observatory-in-new-mexico-reopens > My venture into Conspiracy Theory re this event, from another forum: NSO has a couple of unique instruments: https://www.nso.edu/telescopes/#more "The NSO Integrated Synoptic Program (NISP) provides long-term synoptic observations of the Sun’s photosphere, chromosphere, and magnetic field. NISP operates a suite of instruments from the Global Oscillation Network Group (GONG) which is located at six sites around the world, resulting in 24/7 observations of the Sun. NISP also operates the Synoptic Optical Long-term Investigations of the Sun (SOLIS) program, which is located at Big Bear Observatory in California. "The National Science Foundation‘s Daniel K. Inouye Solar Telescope (DKIST) which is being built and operated by NSO, will be a 4-m off-axis solar telescope with a suite of cutting-edge first light instruments. Focused on better understanding the behaviors of the solar magnetic field, from the photosphere to the corona, DKIST will revolutionize our understanding of the Sun and it’s dynamic behavior. Using a technique called spectropolarimetery, pioneered by the NSO and the world’s leading solar scientists, we will indirectly measure magnetic fields in the corona for the first time. Some of these instruments may have been "of interest" to the military reconnaissance and/or signals intelligence community. Also note the closure of the nearest Post Office. Was a package sent by or received at NSO that could cause this much ruckus? Depends what it might have been: A chemical or biological weapon could produce the response seen, but why mail it to or from NSO? I rule out chemical or biological payload for two reasons: First, why target the Observatory? Second, early press reports did not describe use of protective clothing by the Feds seen on site, or the presence of any medical or Public Health teams. What else could someone have mailed out that would bring a Federal Shroud of Secrecy and Cone of Silence down on NRO? My guess: A "spectropolarimetery" or other unique sensor and/or its complete engineering docs might have gone missing. If the Feds asked the Geeks what it does, then relayed their answer to NRO for an opinion, the sensor might have got retroactively classified Top Secret due to its potential ability to unmask some U.S. stealth technology, or other wierdshit liek that. I think that accounts for all observations to date, better than anything I have seen so far. If the above scenario did happen, it's a clusterfuck: Any such sensor would leave a massive paper trail through the Solar Astronomy and Astronomical Metrics worlds, no hope in hell of scooping up enough of that data to prevent "hostiles" from reconstructing the sensor from open source clues. :o) signature.asc Description: OpenPGP digital signature
Re: root "login" xterm to increase security?
0On 09/16/2018 11:15 PM, grarpamp wrote: > Any search will bring basic stuff like > > https://insecure.org/sploits/xsecurekeyboard_fequent_query.html > https://www.techrepublic.com/blog/linux-and-open-source/three-features-you-may-not-know-xterm-has/ > http://tutorials.section6.net/home/basics-of-securing-x11 > https://www.reddit.com/r/openbsd/comments/83adcn/does_openbsd_x11_not_have_security_problems/ > > Whether xorg, wayland, xenocara, drivers, ttys, init, login, getty, > etc are receiving any level of scrutiny, audits, fuzzing, code > scans, etc. The ancient and obscure it is, the less people look, > and all the above are exactly that. > Even mashing kbd on a FreeBSD can throw console into > unrecoverable must kill state. > And people talk how trust X? I take it as self evident that physical access can defeat any computer security strategy. One can limit what a naive and/or unprepared party can do with/to a computer they get their grubby fingers on, but a competent and properly equipped adversary - not so much. If the machine is off when the hostile party arrives, at least the data on an encrypted hard drive is safe. Until the next time an authorized user switches the machine on and mounts the file system, under the watchful eye of a hardware keylogger or flashed BIOS. :o) signature.asc Description: OpenPGP digital signature
Re: Alice and Bob
View the Source, Luke On 09/10/2018 08:06 PM, Steven Schear wrote: > Alice is sending her message to Bob > Protecting that transmission is crypto's job > Without the help out of our good friend Trent > It's hard to get that secret message sent > > Work tries to deposit a check of your salary > But with no crypto it'll be changed by Mallory > You think no one will see what it is, you believe? > But you should never forget, there's always an Eve > > > [Hook] > Cause I'm encrypting shit like every single day > Sending data across the network in a safe way > Protecting messages to make my pay > If you hack me you're guilty under the DMCA > > > DES is wrong if you listen to NIST > Double DES ain't no better that got dissed > Twofish for AES that was Schneier's wish > Like a shot from the key Rijndael made a swish > > But Blowfish is still the fastest in the land > And Bruce's uses his fame to make a few grand > Use ECB and I'll crack your ciphertext > Try CFB mode to keep everyone perplexed > > [Repeat hook] > > Random numbers ain't easy to produce > Do it wrong, and your key I'll deduce > RSA: the only public cipher in the game > Created it helped give Rivest his fame > > If we could factor large composites in poly time > We'd have enough money to not have to rhyme > Digesting messages with a hashing function > Using SHA-1'ers so I won't cause disfunction > > [Repeat hook] > > Password confirmed > Standby signature.asc Description: OpenPGP digital signature
Re: latest false flag attack?
On 09/10/2018 05:50 AM, jam...@echeque.com wrote: > On 10/09/2018 10:50, Steve Kinney wrote: >> Everyone Knows that most of the nominal hijackers were Saudi nationals. >> But in real life, most of them remain John Does: Because the real >> people whose identities were stolen by the hijackers turned up alive, > > Liar. A very famous Jew supposedly said it is not what goes into your mouth that makes you unclean, but what comes out of your mouth. Your last couple of posts seem to reflect an effort to prove yourself vicious, ignorant, and either delusional or looking to excuse and promote genocide. Did you know: Genetic testing shows no discernible difference between ethnic Jews and Muslims native to Palestine. Before Jewish refugees led by Zionist trash were dumped in Palestine by countries who didn't want them any more than the Nazis did, the Muslims, Jews and Christians in Palestine just got along. The invaders from the north were also egalitarians of a sort, and fucked over the local Jews as badly as anyone else in the process of stealing "their" land, given to them by the Allied nations after WWII. Observant Jews are some of my favorite people. Not one of them is a Zionist, and most actively condemn Zionism. :o) signature.asc Description: OpenPGP digital signature
Re: latest false flag attack?
On 09/09/2018 09:22 PM, Mirimir wrote: > Someone did, for sure. It could have been Israel and/or Saudi Arabia > also. I suspect that they're all connected, in some clusterfuck way. > Permission to speak freely? Fuck that. As even Dim (the dimmest of us all) would say, "I don't need no permission from the likes of you." The architects of the 911 Event did a great job, and I doubt we will ever be able to prove a God damned thing about who done it. Big clue: If you ever beat Donald Rumsfeld at a game he cares about, you can consider yourself Something Special. He's that good. Israel's greasy fingerprints are present in the form of a fairly massive espionage operation that was quietly rolled up and kicked out of the U.S. earlier that same year. Press reports were scarce but indicated that EOD and radio operator were the predominant MOS of the guise in question - skills applicable to the Event in question. Then there were the famous "Dancing Israelis" who had cleaned out their offices at WTC days before the Event; they ran a moving company, and their rented box trucks tested positive for explosive residues per initial FBI report. After they were shipped back home, one of them mentioned on an Israeli talk show that they were Mossad, probably the only significant "leak" in the whole operation. Around 3000 casualties at a center of international banking and not one Israeli citizen lost? What are the odds?! Everyone Knows that most of the nominal hijackers were Saudi nationals. But in real life, most of them remain John Does: Because the real people whose identities were stolen by the hijackers turned up alive, well, and thoroughly pissed off after they were named as dead hijackers. A minor flaw in the plan... presenting no indicators of who actually did the thing, other than that Saudi intel and their American friends were well positioned to do the identity theft thing against Saudi nationals. Lest we forget, the propaganda aspects of the plan hinged on blaming Osama Bin Ladin (RIP, kidney failure, winter 2001-2 in a nameless cave in eastern Afghanistan*), famously a Saudi national. So Saudis they were - according to the Official Narrative. That Hellfire missile a Predator drone fired before crashing into the Pentagon scored a direct hit on an auditor's office. (I bet a nickel somebody put a corner reflector in the window just to make God damned deadly certain the right one got hit.) That comes closes to "proof" that senior military officials were ass deep in the plot: Who else would have the will and clout to risk exposing the whole operation as a hoax (no airliner debris at the site, imaginary plane's engines didn't even break windows, people with relevant experience reported hearing a missile and smelling cordite) to cover their own asses? The folks working in that office were trying to track down some billions of missing public dollars, and the investigation died with their documents and data. * I suspect Bin Ladin's grave was finally found and positively identified by friendlies in early 2011, giving the Obama Administration a green light to stage the "killing Osama" hoax without risk of subsequent exposure. Soon after a somewhat less-famous helicopter accident cleaned up after, killing the folks who were in a position to say what really happened in Abbottabad that day, and be believed. I <3 history. It's everything that ever happened! And thanks to the Future Shock phenomenon x teh interwebz, I have watched SO much of it happen... :o/ signature.asc Description: OpenPGP digital signature
Re: latest false flag attack?
On 09/07/2018 06:57 PM, juan wrote: > > > > it's been a while since the US military nazis, the wall street bankers, > other amerikan humanitarians and US empire vassal states have carried their > last false flag attack? A new one is overdue? > > Is there any betting on it? =) No point in betting on the United States staging another gas attack in Syria and blaming the Syrian government. On the one hand, nobody who knows this has already happened several times will bet against it. On the other hand, nobody who denies that this ever happened will pay off when it does, because they will "know" it didn't. signature.asc Description: OpenPGP digital signature
Re: Internet fights back, Providers Sellout, 3D Gunbooks For Sale
On 08/29/2018 03:29 PM, Razer wrote: > > Grarpamp: "lol" > > Here ya go laughing boy, the intertubz fights back. My blurb for > #OccupySiliconValley #S17 > > "This #S17 #OccupySiliconValley. It isn't 'geeks who love computers' > anymore. It's the new American Oligarchy... "The 1%"... the enemy. The > Pentagon wrote a contract to store ALL DoD data, including classified > info, that only #Bezos Amazon AWS 'cloud' and a couple of other > operations could fulfill. Amazon=Pentagon, all the way back to Bezos > statements years ago saying he'd co-operate with the CIA, b/c CIA." > > Tactical Briefing: http://abillionpeople.org/occupysiliconvalley.html Meh. Sounds like a conventional offsite backup strategy to me. It does seem to indicate high confidence in the cryptographic tools used to prevent stored data from being read by hostiles, with unusually strong forward security (resistance to cryptanalysis for, say, 50+ years). This contract would also indicate high confidence in methods used to prevent useful source attribution and traffic analysis of files being written into and read out of the archival servers in question, presumably by parties including the vendor providing the service. I'd like to see the protocols involved. If they're that good, they should be published because doing so will enhance The National Interest at no cost to The National Security. He said. With malice aforethought. :o) signature.asc Description: OpenPGP digital signature
Re: [PEACE] Juice Media - Australia's Northern Territory fracking, is SAFE [MINISTRY]
On 08/31/2018 07:15 PM, jam...@echeque.com wrote: > >>> Fracking is safe everywhere - because if it had anywhere ever caused the >>> slightest harm, you guys would have better poster girls. > > On 31/08/2018 19:08, Zenaan Harkness wrote: >> Gas coming out of people's water taps, earthquakes, leaching into >> water. > > Gas only comes out of people's taps when those taps are fed from deep > wells, and gas has always come out of people's taps in those areas. > > And the gas that interests frackers does not harm your drinking water, > only volcanic gases harm your drinking water, which never happens in > areas being fracked, because frackers do not want volcanic gases. You should include the phrase "without irony" somewhere in these posts, to underscore you ironic intent. signature.asc Description: OpenPGP digital signature
Re: I am a criminal
On 08/30/2018 07:14 PM, juan wrote: > On Thu, 30 Aug 2018 19:04:29 -0400 > Steve Kinney wrote: > > >> High strength, heat tolerant materials are unnecessary unless your >> design calls for accelerating and steering a payload that can reliably >> knock down an aircraft, and actually hitting targets with it. > > > and how do you know? Are you some sort of 'military engineer' despite > your 'quaker pacifism' and compassion for the pigs ? I study military history, especially focused on 20th and 21st century wars. I pay attention to military and aerospace technology for many reasons: The time to "lay down that sword and shield, and study war no more" is when we arrive at that riverside. On the journey from here to there, we must study the FUCK out of war to become its masters, not its victims. On the technical side, I have worked in electronics manufacturing and in machine shops. I have run a range projects from designing and building UL Certified life safety equipment to production design and management, and designed and implemented ISO 9000 quality programs. I have some /faint/ clue about how stuff works - including military hardware, thanks in part to direct exposure and in part to reading "aerospace defense industry" trade magazines for a looong time- one likes to keep current on what scams are in progress, or looking for sponsorship. There is no such thing as Quaker Pacifism, although Friends do have a well earned reputation of opposition to war. I helped my Monthly Meeting organize draft counselor training back in 2001 when it looked for a bit like it might be useful. (Spoiler: Any determined individual can legally opt out of the draft under existing U.S. public policy and legal precedents. Religious conviction is not a requirement, although it does qualify.) As for "compassion for the pigs," that phrase kind of says it all. Hate is a Loser Script. Presenting hate as "revolutionary" promotes the failure of revolutionary goals and actions. So how long you been working PsyOps as an unwitting agent for the Other Side? :o) signature.asc Description: OpenPGP digital signature
Re: I am a criminal
On 08/30/2018 11:31 AM, Steven Schear wrote: > You don't appear to have any experience with amateur rocketry. Although > perchlorate based grains can be tricky, zinc-sulphur propellants can be > used safely. (My friends and I flew 24-inch ZnS rockets to altitudes > approaching 10k feet and Mach 1.8 while in HS. Groovy, but a 24 inch rocket casing does not even come close to a practical weapon in portability, accuracy or knock-down power. How much of it was taken up by fuel, vs. payload and avionics? Did it have a steering mechanism with capabilities beyond "keep the rocket vertical"? > Titanium and other exotic metals are unnecessary today. Composites can > easily do the trick. As for actuators, with the right designs, amateur > aircraft servos can suffice although I have seen pneumatic ones used also. High strength, heat tolerant materials are unnecessary unless your design calls for accelerating and steering a payload that can reliably knock down an aircraft, and actually hitting targets with it. Past a cut-off point, efficiency and extra cleverness can not substitute for brute force and total ignorance. In the case at hand, existing munitions indicate that all of the above are necessary for success. > I haven't tested nor seen others evaluate the efficacy of smartphone > motion sensors for combat situations but there are discrete COTS > components whose specs fall within the needed ranges. Discrete COTS components fail spec in this case, because per the stated design they they will be plugged into a "smart phone." By definition that phone is live opposition hardware radio, unless the antennas and/or radio chip are removed. That done, it's still running the opposition's software of choice unless thoroughly cleaned. By the time you're done modding the hardware and software, it's cheaper and far easier to use a Raspberri Pi or similar device. That's what they're for. > Warheads are generally scaled up shotgun shells. Flachets, ideally from > tungsten but cast steel will do, are better than metal shot. Warheads are generally high explosive shaped charges. Some deliver a single penetrator slug, white-hot and ultrasonic; others deliver shot in a narrow cone, horizontal band, or radially as in a bounding mine application. Anti-aircraft shot varies in shape and composition, typically a mix of polyhedrons and bowties, uranium of course. The cleverest warheads can deliver a selection of projectile patterns, by altering the timing of multiple primers in the driving charge. Your plane killer won't need anything that fancy. But it will need to haul a load of heavy metal and top end high explosives to within spitting distance of the target aircraft, figuratively speaking, and fire that warhead right on time. > As for safety even commercial military arms fail. I certainly wouldn't > want to test even the later protyped. ISIS forces seem to have created > some excellent munitions using rather rudimentary materials but clever > engineering. No reason to think those living in a developed country with > access to common materials and a good garage foundry and machine shop > can't do better. The only thing that calls to mind is the cheap knock-offs of WWII stovepipe artillery rockets that were carried in by ISIS to stage a "Syrian Government Chemical Weapons Attack" way back in the early days of the war. The op was fail. Other than that, ISIS & Co. appears to get the best our international gray market arms dealsers can offer, courtesy of your local CIA and its sister agencies, plus buddies overseas. It's a long, hard, complicated road from lighting a big skyrocket to shooting down airplanes, especially under the watchful eyes of State Security as per a civil uprising scenario. Your cell could get a lot more bang for the buck by preparing to attack infrastructure targets affecting industrial facilities, with "kill nobody" among the top strategic objectives. There, extra efficiency and superior cleverness do pay off compared to brute force and total ignorance. Killing people to improve the world presents as the ultimate Loser Script. To rebel as one is told, is not to rebel at all. :o) signature.asc Description: OpenPGP digital signature
Re: I am a criminal
On 08/30/2018 03:15 PM, juan wrote: > On Thu, 30 Aug 2018 10:13:51 -0400 > Steve Kinney wrote: > > >> Solve all of the above problems and proceed: You will discover that >> killing scapegoats > > you are confused about the nature of pigs and the military Our respondent was talking about killing political offenders, not their servants. >> does not repair systemic disorders hard wired into >> the fabric of daily > > right but it can help. Plus there's this little thing called justice. A.K.A. revenge. Revenge is a losing strategy, alienating potential supporters and assuring that the opposition will "fight to the last man" even in hopeless situations. So revenge is a core component of the Rebel As You Are Told package provided to would-be rebels by their rulers. Killing in self defense only, and offering a path to rehabilitation for defectors from the Other Side, are winning strategies. signature.asc Description: OpenPGP digital signature
Re: I am a criminal
On 08/30/2018 12:44 AM, Steven Schear wrote: > Not directly and certainly not the metal combustion chamber or nozzel. > Probably not the parts exposed to high aerodynamic forces either but > these are easily made using common and inexpensive metal shop > fabrication means. Common and inexpensive means of fabricating titanium alloy parts, aerospace guidance systems and servomechanisms, high energy propellants and explosives, etc. And integrating them into one system that does not blow up when the "fire" button is pressed, killing the users. If you want to play with backpack portable anti-aircraft weapons, you have three options: Buy them, steal them, or promise Uncle Sam you will shoot down the planes of his choice while wearing someone else's uniform. Let's imagine that you have managed to get hold of, for instance, a couple of crates of real live stinger missiles, with manuals etc., all airworthy and ready to go: Start using them to off pigs. What happens? A state of emergency, martial law, a coast to coast and international manhunt using every surveillance database and collection method known to man. Forensics teams will find exactly where in the supply chain you got your missiles, and investigators will work forward from there and backward from the scene of the crime until they meet in the middle: You and your team. Would the public rise up? A lot of them would, to help find you: John and Jane Q. Public generally don't approve of politically motivated murder, unless it's been explained in advance by trusted media outlets on the basis of some overriding "necessity", sugar coated, and the gruesome details hidden from them. Your project would get the full demonization treatment and "propaganda works." Solve all of the above problems and proceed: You will discover that killing scapegoats does not repair systemic disorders hard wired into the fabric of daily life and business as usual in a country with hundreds of millions of citizens. :o/ > On Aug 29, 2018 9:13 PM, "Steve Kinney" <mailto:ad...@pilobilus.net>> wrote: > > > > On 08/29/2018 10:07 PM, Steven Schear wrote: > > Stingers seem to be the deciding element for the Soviets in their > > withdrawal from Afghanistan. > > > > Wasn't it Isaac Asimov that used gene-targeted assassination as the > > major plot element in one of his stories? > > Isn't it you who seems to believe that 3D printers can make guided > missiles? > > From there to "ragtag rebel hipsters" making biological weapons to wipe > out scapegoat families ain't a long stretch, as both both reflect an > infantile fantasy life with no significant grounding in material > reality. > > Why not 3D print a few kilos of heroin to fund your rebellion? Or if > that's not your bag, why not 3D print diamonds? Or gold? > > :o) > > > > signature.asc Description: OpenPGP digital signature
Re: I am a criminal
On 08/29/2018 10:07 PM, Steven Schear wrote: > Stingers seem to be the deciding element for the Soviets in their > withdrawal from Afghanistan. > > Wasn't it Isaac Asimov that used gene-targeted assassination as the > major plot element in one of his stories? Isn't it you who seems to believe that 3D printers can make guided missiles? From there to "ragtag rebel hipsters" making biological weapons to wipe out scapegoat families ain't a long stretch, as both both reflect an infantile fantasy life with no significant grounding in material reality. Why not 3D print a few kilos of heroin to fund your rebellion? Or if that's not your bag, why not 3D print diamonds? Or gold? :o) signature.asc Description: OpenPGP digital signature
Re: I am a criminal
On 08/29/2018 06:05 PM, Steven Schear wrote: > No popular insurrection against a modern military has occurred mainly > due to the lack of easy and affordable access of smart weapons. Define "smart weapon." > broad > interpretation of DD's right to publish its 3D plans might soon lead to > practical TOW, Stinger and other smart weapons that could neutralize > commonly deployed advanced military tech. Pardon my language, but your ignorance on this subject matter appears to be absolute. The sentence above presents as meaningless and embarrassing noise, to an audience that understands the technology you are talking about. The CPunks list has more than enough engineers and technicians to assure "no sale" for your ignorant bullshit. :o) signature.asc Description: OpenPGP digital signature
Re: I am a criminal
On 08/29/2018 03:38 PM, Razer wrote: > I wasn't really suggesting using guns to overthow the government. You > might like this explanation of why. > > Randazza at the libertarian legalwonkblog popehat: [...] > We managed to preserve our right to keep military grade rifles and > machine guns, so we all muster down on the Town Common with our guns. We > tried voting. We tried protesting. This is a reasonable time to start > with the armed insurrection stuff. > > So, you, me, all our neighbors, hell our entire city builds a perimeter > around it. We fill sandbags, we all have ammunition, we all have food, > water, supplies, and most importantly, we are all unified and in > complete solidarity. > > And we stand there, resisting whatever it is the government was going to > do to us. > > And then they fly over with one jet, dropping one FAE bomb, and roll in > with three tanks, and in about 12 hours, our "resistance" is reduced to > a few smoking holes. The Tree of Liberty will get its manure all right, > but it will be the manure that you shat out as you ran for cover, as > long range artillery rains down on our town, as we get carpet bombed > from 35,000 feet, and as the sky goes black with drones and cruise missiles. > > We're screwed. As a critique of Right Wing militia fantasies, the above stands up well. But as a statement about armed insurrection in general, it presents a straw man argument: Nobody will stage an armed insurrection against a 21st century government by using 18th century colonial strategy and tactics; anyone who tries it will certainly lose, early and badly. The strategic objectives of modern insurrections rarely include replacing the whole government, and winning tactical options rarely include defeating the national armed forces in head to head conflict; that requires mass defection and non-compliance by the opposing force. Instead, an insurrection seeks "redress of grievances" i.e. radical changes in State policy and procedures. Bringing commerce to a halt via boycotts, civil disobedience, sabotage, etc. reliably produces maximum results at minimum risk. "Economic terrorism" ranks at or near first place in formal assessments of threats to State and Corporate power today. The State exists to provide a stable environment for commerce and to enforce the rights, so called, of absentee landlords. It has no other purpose. When the State fails in these missions and can not restore business as usual by force, the State's owner/operators come to the bargaining table prepared to make concessions. In the United States, the Labor Movement and Civil Rights Movement achieved significant objectives working within this model of domestic political warfare. Competent insurrectionists do not kill people except in self defense; murdering one's opponents only makes it difficult or impossible for the survivors to come to the bargaining table mentioned above. "Off The Pig" was a heavily promoted slogan in the 60s and 70s when the FBI was running "Communist" revolutionary cells in the United States - guess who promoted it, and why? Our rulers and their faithful servants make every reasonable effort to provide the public with pre-failed models of rebellion, and to deny the public access to information about practical populist politics. "Rebel As You Are Told" ranks second behind "Divide The Conquered" among the most necessary, persistent and well funded themes in State and Corporate propaganda today. Anyone who wants to see input from public at large have any impact of State policy and Corporate behavior faces a long uphill climb. Any chance of success must start with basic political education. An example of such: http://pilobilus.net/strategic_conflict_docs_intro.html :o) signature.asc Description: OpenPGP digital signature
Re: I am a criminal
On 08/28/2018 11:05 PM, CANNON wrote: > We live in an era where almost half of the states in the USA are (attempting to) censor the free flow > of information. It is sad... Granted, but what has changed? All I see in the case at hand is empty symbolic posturing by typically sleazy politicians: Low hanging fruit with no possible real world impact, therefore no potential blowback. In the immortal words of Clara Peller, "Where's the beef?" :o) signature.asc Description: OpenPGP digital signature