Spitfire List Web site and blog of anti-fascist researcher and radio personality Dave Emory.
The tag 'encryption' is associated with 2 posts.

Agent Orange and the Internet: The Spawn of Project Agile

In his book–one of the most important in recent memory–Yasha Levine sets forth vital, revelatory information about the development and functioning of the Internet. Born of the same DARPA project that spawned Agent Orange, the Internet was never intended to be something good. Its generative function and purpose is counter-insurgency. In this landmark volume, Levine makes numerous points, including: The harvesting of data by intelligence services is PRECISELY what the Internet was designed to do in the first place. The harvesting of data engaged in by the major tech corporations is an extension of the data gathering/surveillance that was–and is–the raison d’etre for the Internet in the first place. The big tech companies all collaborate with the various intelligence agencies they publicly scorn and seek to ostensibly distance themselves from. Edward Snowden, the Electronic Frontier Foundation, Jacob Appelbaum and WikiLeaks are complicit in the data harvesting and surveillance. Snowden and other privacy activists are double agents, consciously channeling people fearful of having their communications monitored into technologies that will facilitate that surveillance!


Cyber Attribution, the Macron hacks, and the Existential Threat of Unwarranted Certainty

Did you hear the big new hacking news? It’s the The news about ‘Fancy Bear’ already getting ready to wage a new hacking campaign against US politicians? If not, here’s a brief summary: Trend Micro, a Japanese cybersecurity firm, just issued a new report purporting to show that ‘Fancy Bear’ has already set up multiple phishing websites intended to capture the login credentials to the US Senate’s email system. And Trend Micro is 100 percent confident this is the work of ‘Fancy Bear’, the Russian military intelligence hacking team. What led to Trend Micro’s 100 percent certainty that these phishing sites were set up by ‘Fancy Bear’? It appears to be based on the similarity of this operation to the Macron email hack that impacted hit French election last year. The same hack that the French cybersecurity agency said was so unsophisticated that any reasonably skilled hackers could have pulled them off. And the same hacks comically included the name of a Russian government security contractor in the meta-data and were traced back to Andrew ‘weev’ Auernheimer. That’s the hack that this current Senate phishing operation strongly mimics that led to Trend Micro’s 100 percent certainty that this is the work of ‘Fancy Bear.’ So how credible is this 100 percent certain cyber attribution? Well, it’s possible Trend Micro is correct, it’s also extremely possible they aren’t correct. That’s going to be the topic if this post, because Trend Micro is far from alone in making cyber attribution an exercise in gambling with existential risks.