6 November 2010
Wikileaks Initiatives Eyed by Cryptome
During the Wikileaks panel of "The Constitution and National Security: The First Amendment Under Attack," 5 November 2010:
1. Wikileaks should be seen as one of many counter-authority initiatives stretching back three millennia, the numbers increasing rapidly via the Internet, including those using public benefit initiatives to hide the authoritarian -- every authoritarian allows a controlled counter for gloss.
2. Key technology for the initiatives are information and communications security to escape accountability and punishment.
3. Technology always outpaces criminalization, government and business criminals are principal users of high technology to escape accountability and punishment.
4. Half-hearted official controls drive the initiatives underground where most of the important current work is being done, in secret.
5. Decoy technologies and initiatives are used to divert listless official attacks which never disturb the most secret criminality.
6. Publicized initiatives like Wikileaks and intelligence agencies serve as decoys to divert attention away from blackest activities.
7. National security rationale for suppressing counter-authority is the greatest danger to democracy.
8. The US leads in quantity of abuse of national security rationale, other nation, fingerpoint the US to hide their actions as the US does in return, while all covertly cooperate against their citizens and subjects.
9. Pervasive secrecy apparatus in the name of national links all countries in suppressing counter-authority.
10. Unwarranted secrecy is the greater danger to democracies and the greatest asset of authoritarians.
11. All authoritative institutions are distrusted due to complicity with authority which in turn grants them special protection.
12. Authoritative legal and media challenges to authority have become ineffective due to cowardice about national security and comfort with special protection.
13. Challenges to authority and authoritatives are increasing.
14. Covert distribution of information to the public about complicity of authorities and authoritatives are mostly out of sight as parasites on established outlets.
15. Every means for spying on the public by authorities and authoritatives can be used to counter-spy.
16. Every means to data gather, collect and analyze can be used to counter-spy, disperse, store, distribute and retrieve contraband information.
17. Contraband information is being dispersed among unsuspecting hosts and their servers: Google, clouds, server farms, data hubs, corporations, governments, military, media, electronic court records, lawyers, schools, religious, banks and SWIFT, tax revenue and health systems, FOI, GPS and vehicular systems, personal devices and household appliances -- any digital device can be accessed covertly by officials and contrabandits.
18. There is a worldwide lucrative, highly competitive underground market for contraband information, distributed and bought by governments, businesses, universities, individuals, with the criminal and legal commingled.
19. Sale and retrieval of dispersed contraband information is done by technological means similar to that for financial transactions, official and commercial spying, Internet packet technology, steganography and other little known tricks and ploys.
20. Wikileaks, hackers and ex-spies are among many commercial organizations capitalizing on this market, using public benefit as a cover to lure material and to deflect attacks by competitors in government and business.
21. Dual-use technology for concealing this unregulated market and its products is devised by those adept at servicing all aspirants to market and control information flow.
22. Greater attention to Wikileaks is welcomed to cover for the uncelebrated and much more diverse authoritarian counter-authority initiatives.
Not said to a room filled with banned-info-gobbling authoritatives: These technologies and practices were fostered on Cypherpunks in the 1990s and historically by anarchic initiatives and auto-governments, all continually spied on and counter-spied then as now by the latest means of communication and slit-eyed authoritatives. Amply documented by David Kahn in The Codebreakers, and friends.
Later, these points and specific examples were expanded for Clint Hendler, Columbia Journalism Review, who was urged to disbelieve them, instead to interview seasoned information contrabandits xxxxx, some imprisoned by snitches caught in traps.