pastebin - collaborative debugging

pastebin is a collaborative debugging tool allowing you to share and modify code snippets while chatting on IRC, IM or a message board.

This site is developed to XHTML and CSS2 W3C standards. If you see this paragraph, your browser does not support those standards and you need to upgrade. Visit WaSP for a variety of options.

n3tBin / Home / Archive

Copyright © 2007-2011, n3t-t3z Team

Posted by Cyber Warfare an on July Sun 20th 1:05 AM - Never Expires
download | new post

  1.    
  2.  �While some people enlist themselves as �firefighters� others are
  3. simply moving the valuables out of the house before it burns down.�
  4.  
  5.  
  6. This excerpt was taken from the document mirrored at cryptome.org ;
  7.  
  8. http://cryptome.org/2014/07/radical-tactics-offline-library.pdf
  9.  
  10.  �There was a time not that long ago when the internet was seen as the
  11. fulfilment of a Deleuzian rhetoric of rhizomatics. In the 1990s, this
  12. description wasn�t that far from the truth. It seemed that the internet
  13. was this indestructible MilSpecs network; impregnable to assault, a
  14. final bastion of free speech and virtual community building. People
  15. bragged for years about how file sharing was impossible to stop, given
  16. internet topology: any clamp down would be met with a rhizomatic resistance
  17. that would always overcome the stiff arboretics of censorship.
  18.  
  19.  This was proven wrong not long ago in Egypt, and continues to be
  20. demonstrated in country after country as national governments and
  21. corporations seek to limit, filter, record, and otherwise hinder free
  22. traffic on the internet. With the 2011 rise against the regime of Hosni
  23. Mubarak, the failure of the rhizomatic became clear through its victory.
  24. As tensions escalated, people were using social media to organize protests,
  25. circulate videos of government brutality and send a variety of messages,
  26. opinions, and observations both to the internal and external Egyptian
  27. mediasphere. For the Mubarak government this was out of alignment with its
  28. interests, and it basically �pulled the plug� on the internet by shutting
  29. down the local Internet Service Providers (ISPs). This had a number of
  30. effects, not all of them intended or desired by the Mubarak regime.
  31.  
  32.  First, there was the desired effect of most people in Egypt not being
  33. able to access the internet. Second, there was the rhizomatic reaction:
  34. people began looking for ways around the restrictions, for example by
  35. accessing satellite phones. These phones had limited bandwidth, which
  36. enabled digital transmission of images, text and short video clips.
  37. However, most people did not have access to these systems, so, the vast
  38. majority of internet users in Egypt were effectively denied access to
  39. online resources that made the protests potent and possible. Third,
  40. there was the secondary effect desired by the ruling elite, namely
  41. to drive most people into more direct and unmediated forms of communication.
  42. The Mubarak regime felt these would be slower and more open to infiltration
  43. and therefore more desirable than digital communication and the spontaneously
  44. organized networks that such communication facilitated.
  45.  
  46.  This, of course, was a complete miscalculation of the situation, as there
  47. was the fourth and final reaction: the army turned away from Mubarak and
  48. sided with the protestors when they realized that the revolution against
  49. Mubarak could be won, and calculating that siding with the revolution,
  50. they could easily dominate the resulting government. As with many revolutions,
  51. revolution is resisted by the army and won by the army. And that is exactly
  52. what transpired: the revolution aiming for a new and greater democracy, run
  53. by a younger and more secular population was stopped by the Egyptian Higher
  54. Military Council with political allies in the Muslim Brotherhood. The removal
  55. of Mubarak and a dozen of his associates was the first step in the Egyptian
  56. military�s power play. The end result was no great change from the Mubarak
  57. regime, as the head of the military council, General Tantawi, has been the
  58. defense minister under Mubarak for over 25 years. Tantawi was forced to resign
  59. by the new President of Egypt from the Muslim Brotherhood. Tantawi�s
  60. successor is another long-term career officer, Abdel Fattah el-Sisi. The
  61. military thus appropriates power to itself and its political allies as it
  62. saw fit, and the political allies were conversely able to affect the
  63. leadership of the military. Elections were permitted, which Mohamed
  64. Morsi�s Muslim Brotherhood won. When Morsi�s rule fell into disfavour,
  65. again, the military stepped in and deposed him. At this writing, Egypt is
  66. still under military rule.
  67.  
  68.  Another angle on that is provided by Andy Bichlbaum of The Yes Men when
  69. he said in a recent interview in answer to the question why �we bother with
  70. the real world if we all sit in front of our computers for the majority of
  71. our lives anyway�:
  72.  
  73.  Because the real world is real, and the virtual world doesn�t really exist.
  74. Computers are only good for communicating simple information from one point
  75. to another, which is an improvement over the telephone, or town criers, or
  76. smoke signals. But the smoke signal has to reference something visceral.
  77. In Egypt, Facebook was supposedly so important, but it was really useful
  78. only to tell everyone to go to Tahrir Square, and that only worked because
  79. everyone knew there was a reason to. Facebook didn�t give the reason;
  80. everyone knew why because of life.
  81.  
  82.  The failure of the internet is demonstrated in 2013 with Edward Snowden�s
  83. leaks, showing how the NSA simply eats the internet whole, digests its
  84. contents as a database, and thus exerts control through a hyper-panoptic
  85. dragnet of fear and assumed loss of privacy. Even though the files from
  86. Snowden were provided over the internet, what they show is that the NSA
  87. basically records and files the entire transmitted digital infosphere �
  88. every single email, every single webpage, every single phone call.
  89.  
  90.  The perceived success of the web in Egypt compared to its actual efficacy
  91. mirrors the kinds of claims made in the early �frontier� days of the
  92. internet that the web was unstoppable and uncontrollable. It is becoming
  93. very clear now, with the suppression of data lockers, the closing of
  94. library.nu, the constant barrage of restrictive legislation (SOPA, PIPA,
  95. ACTA, etc.), and the overwhelming surveillance by the NSA that the web
  96. is stoppable, vulnerable, and precarious. Indeed, the web has become so
  97. obviously precarious that Julian Assange stated on SXSW in Austin Texas,
  98. 2014: �Now that the internet has merged with human society� the laws that
  99. apply to the internet apply to human society. This penetration of the
  100. internet by the NSA and [British spy agency] GCHQ is the penetration of
  101. our human society. It means there has been a militarisation of our civilian
  102. space. A military occupation of our civilian space� is a very serious matter.�
  103. At the same event, Edward Snowden noted: �The NSA, with this global mass
  104. surveillance that�s occurring in all different countries, not just the US
  105. � it�s important to remember that this is a global issue � they�re setting
  106. fire to the future of the internet.� Snowden went on to exhort the audience
  107. to be �firefighters�. WHILE SOME PEOPLE ENLIST THEMSELVES AS �FIREFIGHTERS�
  108. OTHERS ARE SIMPLY MOVING THE VALUABLES OUT OF THE HOUSE BEFORE IT BURNS DOWN.�
  109.  
  110. � � � � � � � � � � � � � � � � � � � � �
  111. � � � � � � � � � � � � � � � � � � � � �
  112.  
  113. Operation KILLCEN mirrored over 4,000,000 news reports.
  114.  
  115. However, this was just the very beginning �
  116.  
  117.  Operation KILLCEN is in the next phase of releasing a slew of
  118. backups, from updated website archives to recent news troves.
  119.  
  120. Expect more than just that, very soon.
  121.  
  122. Next up? Software w/ serials ; for both Mac OSX & Windows Systems.
  123.  
  124. Archive and backup up everything to hardcopy! Why?
  125.  
  126.  Governments want to change our internet because it is our last hope
  127. and refuge for freedom and individuality. Tyrants hate it. Governments
  128. are now hiring corporations to help engage cyber warfare tactics to
  129. infiltrate and destroy certain networks and older computer systems.
  130. This will increase as time goes on, and you will start to see major
  131. independent news websites and freelance blogspots going down for no
  132. reason at all. The attacks will get more vicious as time goes on.
  133.  
  134.  What was known as the �sneakernet� is actually going to become normal
  135. soon after our internet becomes obsolete under cyber warfare and other
  136. nefarious regulations passed into future laws. The �sneakernet� will
  137. unite older (offlined) communication systems with other files from the
  138. internet we still have today. It won�t be long (give or take, 5 years)
  139. until most people will no longer have older systems that can remain on
  140. the internet 24/7. Very soon, you�ll have to be careful how long you
  141. keep an older computer connected online because it will be detected and
  142. attacked by rogue government built AI-machines that shoot polymorphic
  143. viruses at old desktops like bullets from a gun aimed at a deer!
  144.  
  145.  Speculation has it the NSA�s Utah Data Center may be a covert base
  146. to engage future cyber warfare operations and to create sophisticated
  147. polymorphic attacks much like the �Stuxnet� or similar to �Flame.�
  148.  
  149.  The goal of cyber warfare will be an attempt to force people into
  150. buying all the new, latest updated gadgets ... however those gadgets
  151. include (what were exposed by the press as) �kill switches.�
  152.  
  153. Older computers DO NOT have �kill switches� embedded into the hardware.
  154.  
  155. These older systems will be prime targets during the era of cyber war.
  156.  
  157.  Once people are dependent on the latest gadgets to communicate, their
  158. communications are now under the mercy of governments - and governments
  159. can shut these things offline faster than they can shut down any ISP.
  160.  
  161. You dig? They want TOTAL control of ALL communication systems!
  162.  
  163.  Cyber warfare targeting all older systems while the new systems have
  164. �kill switches� embedded in the hardware, controlled by governments.
  165.  
  166.  What humanity (individually) needs is many offline systems as people
  167. can buy and set up in order to store mass amounts of files and data
  168. offline - this will act like de-central safe havens. Personal portable
  169. libraries can be created from those who choose to exchange files. Also
  170. these systems will be useful for researching backed up information.
  171. In the future �unauthorized information� will remain a big nuisance
  172. to the fascist governments and their �New World Order.�
  173.  
  174. OK enough, you get the point.

Submit a correction or amendment below. (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.
Syntax Highlighting:
To highlight particular lines, prefix each line with @@
Pressing TAB inserts 3 spaces