“While some people enlist themselves as ‘firefighters’ others are simply moving the valuables out of the house before it burns down.” This excerpt was taken from the document mirrored at cryptome.org ; http://cryptome.org/2014/07/radical-tactics-offline-library.pdf “There was a time not that long ago when the internet was seen as the fulfilment of a Deleuzian rhetoric of rhizomatics. In the 1990s, this description wasn’t that far from the truth. It seemed that the internet was this indestructible MilSpecs network; impregnable to assault, a final bastion of free speech and virtual community building. People bragged for years about how file sharing was impossible to stop, given internet topology: any clamp down would be met with a rhizomatic resistance that would always overcome the stiff arboretics of censorship. This was proven wrong not long ago in Egypt, and continues to be demonstrated in country after country as national governments and corporations seek to limit, filter, record, and otherwise hinder free traffic on the internet. With the 2011 rise against the regime of Hosni Mubarak, the failure of the rhizomatic became clear through its victory. As tensions escalated, people were using social media to organize protests, circulate videos of government brutality and send a variety of messages, opinions, and observations both to the internal and external Egyptian mediasphere. For the Mubarak government this was out of alignment with its interests, and it basically ‘pulled the plug’ on the internet by shutting down the local Internet Service Providers (ISPs). This had a number of effects, not all of them intended or desired by the Mubarak regime. First, there was the desired effect of most people in Egypt not being able to access the internet. Second, there was the rhizomatic reaction: people began looking for ways around the restrictions, for example by accessing satellite phones. These phones had limited bandwidth, which enabled digital transmission of images, text and short video clips. However, most people did not have access to these systems, so, the vast majority of internet users in Egypt were effectively denied access to online resources that made the protests potent and possible. Third, there was the secondary effect desired by the ruling elite, namely to drive most people into more direct and unmediated forms of communication. The Mubarak regime felt these would be slower and more open to infiltration and therefore more desirable than digital communication and the spontaneously organized networks that such communication facilitated. This, of course, was a complete miscalculation of the situation, as there was the fourth and final reaction: the army turned away from Mubarak and sided with the protestors when they realized that the revolution against Mubarak could be won, and calculating that siding with the revolution, they could easily dominate the resulting government. As with many revolutions, revolution is resisted by the army and won by the army. And that is exactly what transpired: the revolution aiming for a new and greater democracy, run by a younger and more secular population was stopped by the Egyptian Higher Military Council with political allies in the Muslim Brotherhood. The removal of Mubarak and a dozen of his associates was the first step in the Egyptian military’s power play. The end result was no great change from the Mubarak regime, as the head of the military council, General Tantawi, has been the defense minister under Mubarak for over 25 years. Tantawi was forced to resign by the new President of Egypt from the Muslim Brotherhood. Tantawi’s successor is another long-term career officer, Abdel Fattah el-Sisi. The military thus appropriates power to itself and its political allies as it saw fit, and the political allies were conversely able to affect the leadership of the military. Elections were permitted, which Mohamed Morsi’s Muslim Brotherhood won. When Morsi’s rule fell into disfavour, again, the military stepped in and deposed him. At this writing, Egypt is still under military rule. Another angle on that is provided by Andy Bichlbaum of The Yes Men when he said in a recent interview in answer to the question why ‘we bother with the real world if we all sit in front of our computers for the majority of our lives anyway’: Because the real world is real, and the virtual world doesn’t really exist. Computers are only good for communicating simple information from one point to another, which is an improvement over the telephone, or town criers, or smoke signals. But the smoke signal has to reference something visceral. In Egypt, Facebook was supposedly so important, but it was really useful only to tell everyone to go to Tahrir Square, and that only worked because everyone knew there was a reason to. Facebook didn’t give the reason; everyone knew why because of life. The failure of the internet is demonstrated in 2013 with Edward Snowden’s leaks, showing how the NSA simply eats the internet whole, digests its contents as a database, and thus exerts control through a hyper-panoptic dragnet of fear and assumed loss of privacy. Even though the files from Snowden were provided over the internet, what they show is that the NSA basically records and files the entire transmitted digital infosphere – every single email, every single webpage, every single phone call. The perceived success of the web in Egypt compared to its actual efficacy mirrors the kinds of claims made in the early ‘frontier’ days of the internet that the web was unstoppable and uncontrollable. It is becoming very clear now, with the suppression of data lockers, the closing of library.nu, the constant barrage of restrictive legislation (SOPA, PIPA, ACTA, etc.), and the overwhelming surveillance by the NSA that the web is stoppable, vulnerable, and precarious. Indeed, the web has become so obviously precarious that Julian Assange stated on SXSW in Austin Texas, 2014: ‘Now that the internet has merged with human society… the laws that apply to the internet apply to human society. This penetration of the internet by the NSA and [British spy agency] GCHQ is the penetration of our human society. It means there has been a militarisation of our civilian space. A military occupation of our civilian space… is a very serious matter.’ At the same event, Edward Snowden noted: ‘The NSA, with this global mass surveillance that’s occurring in all different countries, not just the US – it’s important to remember that this is a global issue – they’re setting fire to the future of the internet.’ Snowden went on to exhort the audience to be ‘firefighters’. WHILE SOME PEOPLE ENLIST THEMSELVES AS ‘FIREFIGHTERS’ OTHERS ARE SIMPLY MOVING THE VALUABLES OUT OF THE HOUSE BEFORE IT BURNS DOWN.” … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … Operation KILLCEN mirrored over 4,000,000 news reports. However, this was just the very beginning … Operation KILLCEN is in the next phase of releasing a slew of backups, from updated website archives to recent news troves. Expect more than just that, very soon. Next up? Software w/ serials ; for both Mac OSX & Windows Systems. Archive and backup up everything to hardcopy! Why? Governments want to change our internet because it is our last hope and refuge for freedom and individuality. Tyrants hate it. Governments are now hiring corporations to help engage cyber warfare tactics to infiltrate and destroy certain networks and older computer systems. This will increase as time goes on, and you will start to see major independent news websites and freelance blogspots going down for no reason at all. The attacks will get more vicious as time goes on. What was known as the “sneakernet” is actually going to become normal soon after our internet becomes obsolete under cyber warfare and other nefarious regulations passed into future laws. The “sneakernet” will unite older (offlined) communication systems with other files from the internet we still have today. It won’t be long (give or take, 5 years) until most people will no longer have older systems that can remain on the internet 24/7. Very soon, you’ll have to be careful how long you keep an older computer connected online because it will be detected and attacked by rogue government built AI-machines that shoot polymorphic viruses at old desktops like bullets from a gun aimed at a deer! Speculation has it the NSA’s Utah Data Center may be a covert base to engage future cyber warfare operations and to create sophisticated polymorphic attacks much like the “Stuxnet” or similar to “Flame.” The goal of cyber warfare will be an attempt to force people into buying all the new, latest updated gadgets ... however those gadgets include (what were exposed by the press as) “kill switches.” Older computers DO NOT have “kill switches” embedded into the hardware. These older systems will be prime targets during the era of cyber war. Once people are dependent on the latest gadgets to communicate, their communications are now under the mercy of governments - and governments can shut these things offline faster than they can shut down any ISP. You dig? They want TOTAL control of ALL communication systems! Cyber warfare targeting all older systems while the new systems have “kill switches” embedded in the hardware, controlled by governments. What humanity (individually) needs is many offline systems as people can buy and set up in order to store mass amounts of files and data offline - this will act like de-central safe havens. Personal portable libraries can be created from those who choose to exchange files. Also these systems will be useful for researching backed up information. In the future “unauthorized information” will remain a big nuisance to the fascist governments and their “New World Order.” OK enough, you get the point. n3tBin

pastebin - collaborative debugging

pastebin is a collaborative debugging tool allowing you to share and modify code snippets while chatting on IRC, IM or a message board.

This site is developed to XHTML and CSS2 W3C standards. If you see this paragraph, your browser does not support those standards and you need to upgrade. Visit WaSP for a variety of options.

n3tBin / Home / Archive

Copyright © 2007-2011, n3t-t3z Team

Syntax Highlighting:
To highlight particular lines, prefix each line with @@
Pressing TAB inserts 3 spaces