- �While some people enlist themselves as �firefighters� others are
- simply moving the valuables out of the house before it burns down.�
- This excerpt was taken from the document mirrored at cryptome.org ;
- http://cryptome.org/2014/07/radical-tactics-offline-library.pdf
- �There was a time not that long ago when the internet was seen as the
- fulfilment of a Deleuzian rhetoric of rhizomatics. In the 1990s, this
- description wasn�t that far from the truth. It seemed that the internet
- was this indestructible MilSpecs network; impregnable to assault, a
- final bastion of free speech and virtual community building. People
- bragged for years about how file sharing was impossible to stop, given
- internet topology: any clamp down would be met with a rhizomatic resistance
- that would always overcome the stiff arboretics of censorship.
- This was proven wrong not long ago in Egypt, and continues to be
- demonstrated in country after country as national governments and
- corporations seek to limit, filter, record, and otherwise hinder free
- traffic on the internet. With the 2011 rise against the regime of Hosni
- Mubarak, the failure of the rhizomatic became clear through its victory.
- As tensions escalated, people were using social media to organize protests,
- circulate videos of government brutality and send a variety of messages,
- opinions, and observations both to the internal and external Egyptian
- mediasphere. For the Mubarak government this was out of alignment with its
- interests, and it basically �pulled the plug� on the internet by shutting
- down the local Internet Service Providers (ISPs). This had a number of
- effects, not all of them intended or desired by the Mubarak regime.
- First, there was the desired effect of most people in Egypt not being
- able to access the internet. Second, there was the rhizomatic reaction:
- people began looking for ways around the restrictions, for example by
- accessing satellite phones. These phones had limited bandwidth, which
- enabled digital transmission of images, text and short video clips.
- However, most people did not have access to these systems, so, the vast
- majority of internet users in Egypt were effectively denied access to
- online resources that made the protests potent and possible. Third,
- there was the secondary effect desired by the ruling elite, namely
- to drive most people into more direct and unmediated forms of communication.
- The Mubarak regime felt these would be slower and more open to infiltration
- and therefore more desirable than digital communication and the spontaneously
- organized networks that such communication facilitated.
- This, of course, was a complete miscalculation of the situation, as there
- was the fourth and final reaction: the army turned away from Mubarak and
- sided with the protestors when they realized that the revolution against
- Mubarak could be won, and calculating that siding with the revolution,
- they could easily dominate the resulting government. As with many revolutions,
- revolution is resisted by the army and won by the army. And that is exactly
- what transpired: the revolution aiming for a new and greater democracy, run
- by a younger and more secular population was stopped by the Egyptian Higher
- Military Council with political allies in the Muslim Brotherhood. The removal
- of Mubarak and a dozen of his associates was the first step in the Egyptian
- military�s power play. The end result was no great change from the Mubarak
- regime, as the head of the military council, General Tantawi, has been the
- defense minister under Mubarak for over 25 years. Tantawi was forced to resign
- by the new President of Egypt from the Muslim Brotherhood. Tantawi�s
- successor is another long-term career officer, Abdel Fattah el-Sisi. The
- military thus appropriates power to itself and its political allies as it
- saw fit, and the political allies were conversely able to affect the
- leadership of the military. Elections were permitted, which Mohamed
- Morsi�s Muslim Brotherhood won. When Morsi�s rule fell into disfavour,
- again, the military stepped in and deposed him. At this writing, Egypt is
- still under military rule.
- Another angle on that is provided by Andy Bichlbaum of The Yes Men when
- he said in a recent interview in answer to the question why �we bother with
- the real world if we all sit in front of our computers for the majority of
- our lives anyway�:
- Because the real world is real, and the virtual world doesn�t really exist.
- Computers are only good for communicating simple information from one point
- to another, which is an improvement over the telephone, or town criers, or
- smoke signals. But the smoke signal has to reference something visceral.
- In Egypt, Facebook was supposedly so important, but it was really useful
- only to tell everyone to go to Tahrir Square, and that only worked because
- everyone knew there was a reason to. Facebook didn�t give the reason;
- everyone knew why because of life.
- The failure of the internet is demonstrated in 2013 with Edward Snowden�s
- leaks, showing how the NSA simply eats the internet whole, digests its
- contents as a database, and thus exerts control through a hyper-panoptic
- dragnet of fear and assumed loss of privacy. Even though the files from
- Snowden were provided over the internet, what they show is that the NSA
- basically records and files the entire transmitted digital infosphere �
- every single email, every single webpage, every single phone call.
- The perceived success of the web in Egypt compared to its actual efficacy
- mirrors the kinds of claims made in the early �frontier� days of the
- internet that the web was unstoppable and uncontrollable. It is becoming
- very clear now, with the suppression of data lockers, the closing of
- library.nu, the constant barrage of restrictive legislation (SOPA, PIPA,
- ACTA, etc.), and the overwhelming surveillance by the NSA that the web
- is stoppable, vulnerable, and precarious. Indeed, the web has become so
- obviously precarious that Julian Assange stated on SXSW in Austin Texas,
- 2014: �Now that the internet has merged with human society� the laws that
- apply to the internet apply to human society. This penetration of the
- internet by the NSA and [British spy agency] GCHQ is the penetration of
- our human society. It means there has been a militarisation of our civilian
- space. A military occupation of our civilian space� is a very serious matter.�
- At the same event, Edward Snowden noted: �The NSA, with this global mass
- surveillance that�s occurring in all different countries, not just the US
- � it�s important to remember that this is a global issue � they�re setting
- fire to the future of the internet.� Snowden went on to exhort the audience
- to be �firefighters�. WHILE SOME PEOPLE ENLIST THEMSELVES AS �FIREFIGHTERS�
- OTHERS ARE SIMPLY MOVING THE VALUABLES OUT OF THE HOUSE BEFORE IT BURNS DOWN.�
- � � � � � � � � � � � � � � � � � � � � �
- � � � � � � � � � � � � � � � � � � � � �
- Operation KILLCEN mirrored over 4,000,000 news reports.
- However, this was just the very beginning �
- Operation KILLCEN is in the next phase of releasing a slew of
- backups, from updated website archives to recent news troves.
- Expect more than just that, very soon.
- Next up? Software w/ serials ; for both Mac OSX & Windows Systems.
- Archive and backup up everything to hardcopy! Why?
- Governments want to change our internet because it is our last hope
- and refuge for freedom and individuality. Tyrants hate it. Governments
- are now hiring corporations to help engage cyber warfare tactics to
- infiltrate and destroy certain networks and older computer systems.
- This will increase as time goes on, and you will start to see major
- independent news websites and freelance blogspots going down for no
- reason at all. The attacks will get more vicious as time goes on.
- What was known as the �sneakernet� is actually going to become normal
- soon after our internet becomes obsolete under cyber warfare and other
- nefarious regulations passed into future laws. The �sneakernet� will
- unite older (offlined) communication systems with other files from the
- internet we still have today. It won�t be long (give or take, 5 years)
- until most people will no longer have older systems that can remain on
- the internet 24/7. Very soon, you�ll have to be careful how long you
- keep an older computer connected online because it will be detected and
- attacked by rogue government built AI-machines that shoot polymorphic
- viruses at old desktops like bullets from a gun aimed at a deer!
- Speculation has it the NSA�s Utah Data Center may be a covert base
- to engage future cyber warfare operations and to create sophisticated
- polymorphic attacks much like the �Stuxnet� or similar to �Flame.�
- The goal of cyber warfare will be an attempt to force people into
- buying all the new, latest updated gadgets ... however those gadgets
- include (what were exposed by the press as) �kill switches.�
- Older computers DO NOT have �kill switches� embedded into the hardware.
- These older systems will be prime targets during the era of cyber war.
- Once people are dependent on the latest gadgets to communicate, their
- communications are now under the mercy of governments - and governments
- can shut these things offline faster than they can shut down any ISP.
- You dig? They want TOTAL control of ALL communication systems!
- Cyber warfare targeting all older systems while the new systems have
- �kill switches� embedded in the hardware, controlled by governments.
- What humanity (individually) needs is many offline systems as people
- can buy and set up in order to store mass amounts of files and data
- offline - this will act like de-central safe havens. Personal portable
- libraries can be created from those who choose to exchange files. Also
- these systems will be useful for researching backed up information.
- In the future �unauthorized information� will remain a big nuisance
- to the fascist governments and their �New World Order.�
- OK enough, you get the point.
Copyright © 2007-2011, n3t-t3z Team
Posted by Cyber Warfare an on July Sun 20th 1:05 AM - Never Expires
download | new post
Submit a correction or amendment below. (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.