30 December 2011
WABC Interview about Anonymous
The recorded interview occurred at 9AM this morning. Klein was in Jerusalem,
JYA in New York.
Related (not by JYA):
http://cryptome.org/0006/anonymous-mused.htm
From: AaronKlein21[at]aol.com
Date: Fri, 30 Dec 2011 08:50:46 -0500 (EST)
Subject: Re: interview request - WABC Radio
To: jya[at]pipeline.com
excellent, got these. Interview will be available on podcasts
(www.wabcradio.com) and at my own
site (www.kleinonline.com) after
it airs live on Sunday [1 January 2012]. Interview will air at about 5:20
PM Eastern on WABC Radio (770 AM in New York).
In a message dated 12/29/2011 10:18:53 P.M. Jerusalem Standard Time,
jya[at]pipeline.com writes:
Dear Aaron,
For your use if you wish here are a few points for the interview:
1. "Anonymous" is a term usable, and used, by a wide variety of persons,
and does not indicate any particular group except as a transient means of
identification and publicity.
2. The term has been in use for this purpose for a very long time and is
not a recent invention.1
3. Most persons who have used the term are never identified.
4. The few persons who have admitted using the term, and then disclosed their
true identity, have suffered for the admission, thus, it is considered to
be rather dangerous to claim to be "Anonymous" due to heavy baggage it carries,
in particular the risk of being scapegoated for much more than done.
5. There are innumerable permuations of the term, combined with prefixes
and suffixes, which are used to indicate a particular person, group or
initiative.
6. Anonymous and its permuations are frequently spoofed, forged, faked and
lied about to disparage, provoke, anger, ridicule and goad into disclosure
of true identity.
7. Many other anonymizing identities,
pseudonyms2,
aliases3,
nicknames4 and false
personas5 are in use and have been in use for
a very long time -- true identities are often
unstable.6
8. Many persons use multiples of false identities, especially online.
9. There are a host of means to profile users of anonymizing means and methods
through language, writing, grammar, location, association, epithets,
provocations, dares, insults, ploys, and other overt and covert
manipulations.7
10. Betrayals and informants are common among anonymizing cultures, and an
experienced user will never disclose true
identity.8
11. Anonymizing cultures are heavily infiltrated by law enforcement officials,
spies, counterspies, commercial spies, hackers, academics and others who
monetize their knowledge of the cultures.8
12. For every open and public means to deploy anonymizing discourse there
are multiples of private and secret means.9
13. Use of anonymizing will be greatly increased as a result of very poor
privacy protection and security on the Internet, on telephone systems, on
online communication systems, on postal systems, on banking, purchasing and
commercial transactions, on governmental transactions, on personal transactions,
on education, religious and non-profit transactions.
14. A principal benefit of recent hacks by "Anonymous" and WikiLeaks-like
initiatives is to highlight the weaknesses of privacy protection and security
systems, including national security, and undermine belief that legacy
authorities can be relied upon to provide what they have long promised.
We can discuss other aspects as you prefer.
I would like receive a copy of the interview after broadcast.
Regards,
John
_____
At 11:31 AM 12/28/2011 -0500, you wrote:
can u do Sunday 3:20 PM Eastern? Also u have a few mins to chat for background
today?
In a message dated 12/26/2011 7:47:05 P.M. Jerusalem Standard Time,
jya[at]pipeline.com writes:
Hi Aaron,
It will be a pleasure to participate, on-air will be just fine.
Please suggest a day and time.
Regards,
John
212-873-8700
Notes:
1. Anonymous. First Known Use: 1563
[http://www.merriam-webster.com/dictionary/anonymous]
2. Pseudonym. First Known Use: 1833
[http://www.merriam-webster.com/dictionary/pseudonym]
3. Alias. First Known Use: 15th century
[http://www.merriam-webster.com/dictionary/alias]
4. Nickname. Early as 1303
[http://en.wikipedia.org/wiki/Nickname#Etymology]
5. Persona. First Known Use: 1909
[http://www.merriam-webster.com/dictionary/persona]
6. Identity. 156070
[http://dictionary.reference.com/browse/identity]
7.
http://www.mendeley.com/research/automatically-profiling-the-author-of-an-anonymous-text/
8. Writings, talks, lectures, chats and bulletin boards of,
among others, Kevin Poulsen, Kevin Mitnick, Adrian Lamo, BernieX, Emmanuel
Goldstein, Digital Gangster, Social Media, Wired (which cultivates,
and specializes in reporting on, governmental informants and undercover agents).
9. Examples, among many others, BlackNet (Tim May), DarkNet
(CCC), Anonymizers, The Onion Router, IntelNet, NSANet, SIRPRNet, LEO.gov,
Tor Hidden Sites, MeshNets, Numbers Station, Mules, Burst Signals, Cellphone
back and GPS channels, Wi-Fi back and GPS spectra, Military EM comms and
GPS spectra, the vast global underground culture of informants, spies, black
and gray markets, and secret facilities, finance, transport and incarceration.
|