Dave Emory’s entire lifetime of work is available on a flash drive that can be obtained HERE. The new drive is a 32-gigabyte drive that is current as of the programs and articles posted by the fall of 2017. The new drive (available for a tax-deductible contribution of $65.00 or more.)
WFMU-FM is podcasting For The Record–You can subscribe to the podcast HERE.
You can subscribe to e‑mail alerts from Spitfirelist.com HERE.
You can subscribe to RSS feed from Spitfirelist.com HERE.
Please consider supporting THE WORK DAVE EMORY DOES.
This broadcast was recorded in one, 60-minute segment.
Introduction: We begin this concluding program in the series with review of the conclusion of the book, with Levine’s summation of the inextricable nature and symbiosis between the Internet, the tech firms and the so-called “privacy community.”
The key points of discussion and analysis of Levine’s book (as a whole) include:
- The Internet is a weapon, developed for counter-insurgency purposes.
- Big Tech firms network with the very intelligence services they publicly decry.
- Big Tech firms that data mine their customers on a nearly unimaginable scale do so as a direct, operational extension of the very surveillance function upon which the Internet is predicated.
- The technologies touted by the so-called “Privacy Activists” such as Edward Snowden and Jacob Applebaum were developed by the very intelligence services they are supposed to deflect.
- The technologies touted by the so-called “Privacy Activists” such as Edward Snowden and Jacob Applebaum–such as the Tor Internet function and the Signal mobile phone app– are readily accessible to the very intelligence services they are supposed to deflect.
- The organizations that promote the alleged virtues of Snowden, Applebaum, Tor, Signal et al are linked to the very intelligence services they would have us believe they oppose.
- Big Tech firms embrace “Internet Freedom” as a distraction from their own willful and all-embracing data mining and their ongoing conscious collaboration with the very intelligence services they publicly decry.
” . . . . For many Internet companies, including Google and Facebook, surveillance is the business model. It is the base on which their corporate and economic power rests. Disentangle surveillance and profit, and these companies would collapse. Limit data collection, and the companies would see investors flee and their stock prices plummet.
“Silicon Valley fears a political solution to privacy. Internet Freedom and crypto offer an acceptable alternative. Tools like Signal and Tor provide a false solution to the privacy problem, focusing people’s attention on government surveillance and distracting them from the private spying carried out by the Internet companies they use every day. All the while, crypto tools give people a [false] sense that they’re doing something to protect themselves, a feeling of personal empowerment and control. And all those crypto radicals? Well, they just enhance the illusion, heightening the impression of risk and danger. With Signal or Tor installed, using an iPhone or Android suddenly becomes edgy and radical. So instead of pushing for political and democratic solutions to surveillance, we outsource our privacy politics to crypto apps–software made by the very same powerful entities that these apps are supposed to protect us from.
“In that sense, Edward Snowden is like the branded face of an Internet consumerism-as-rebellion lifestyle campaign, like the old Apple ad about shattering Big Brother or the Nike spot set to the Beatles’ ‘Revolution.’ While Internet billionaires like Larry Page, Sergey Brin, and Mark Zuckerberg slam government surveillance, talk up freedom, and embrace Snowden and crypto privacy culture, their companies still cut deals with the Pentagon, work with the NSA and CIA, [and companies like Cambridge Analytica–D.E.] and continue to track and profile people for profit. . . .”
Next, we present the treatment afforded Yasha Levine. As might be expected, Levine received the Jim Garrison/Gary Webb treatment. The retribution directed at Yasha Levine epitomizes why Mr. Emory refers to the so-called progressive sector as “so-called.”
” . . . . The threats and attacks had begun sometime overnight while I slept. By morning, they had reached a vicious and murderous pitch. There were calls for my death—by fire, by suffocation, by having my throat slit by razor blades. People I had never met called me a rapist, and alleged that I took delight in beating women and forcing people to have sex with me. I was accused of homophobia. Anonymous people filed bogus claims with my editor. Allegations that I was a CIA agent poured in, as did claims that I worked with British intelligence. The fact that I had been born in the Soviet Union didn’t do me any favors; naturally, I was accused of being an FSB spy and of working for Russia’s successor to the KGB. I was informed that my name was added to a dark net assassination list—a site where people could place anonymous bids for my murder. The roaming eye of the Internet hate machine had suddenly fixed on me. . . .”
In addition to online bullying, slander and veiled and direct threats, the so-called “privacy activists” joined in pillorying Yasha Levine: ” . . . . Micah Lee, the former EFF technologist who helped Edward Snowden communicate securely with journalists and who now works at The Intercept, attacked me as a conspiracy theorist and accused me and my colleagues at Pando of being sexist bullies, he claimed that my reporting was motivated not by a desire to get at the truth but by a malicious impulse to harass a female Tor developer. Although Lee conceded that my information about Tor’s government funding was correct, he counter intuitively argued that it didn’t matter. . . .
” . . . . Journalists, experts, and technologists from groups like the ACLU, the EFF, Freedom of the Press Foundation and The Intercept and employees of the Tor Project joined in to attack my reporting. Unlike Lee, most did not attempt to engage my reporting but employed a range of familiar PR smear tactics—tactics you usually see used by corporate flacks, not principled privacy activists. They took to social media, telling anyone who showed interest in my articles that they should ignore them instead. Then, when that didn’t work, they tried to discredit my reporting with ridicule, misdirection, and crude insults. . . .
” . . . . A respected ACLU privacy expert, who now works as a congressional staffer, called me “a conspiracy theorist who sees black helicopters everywhere” and compared my reporting about Tor to the Protocols of the Elders of Zion. As someone who escaped state-sponsored anti-Semitism in the Soviet Union, I found the comparison extremely offensive, especially coming from the ACLU. The Protocols were an anti-Semitic forgery disseminated by the Russian Tsar’s secret police that unleashed waves of deadly pogroms against Jews across the Russian Empire in the early twentieth century. Tor employees put forth a torrent of childish insults, calling me a ‘dumb Stalinist state-felcher’ and a ‘fucktard’s fucktard.’ They accused me of being funded by spies to undermine faith in cryptography. One of them claimed that I was a rapist, and hurled homophobic insults about the various ways in which I had supposedly performed sexual favors for a male colleague.
“In the way that these Internet hazing sessions, go, the campaign evolved and spread. Strange people began threatening me and my colleagues on social media. Some accused me of having blood on my hands and of racking up an “activist body count”–that people were actually dying because of my reporting undermined trust in Tor.The attacks widened to include regular readers and social media users, anyone who had the nerve to ask questions about Tor’s funding sources. An employee of the Tor Project went so far as to dox an anonymous Twitter user, exposing his real identity and contacting his employer in the hopes of getting him fired from his job as a junior pharmacist.
It was bizarre. I watched all this unfold in real time but had no idea how to respond. Even more disconcerting was that the attacks soon expanded to include libelous stories placed in reputable media outlets. The Guardian published a story by a freelancer accusing me of running an online sexual harassment and bullying campaign. The Los Angeles Review of Books, generally a good journal of arts and culture, ran an essay by a freelancer alleging that my reporting was funded by the CIA. Paul Carr, my editor at Pando, lodged official complaints and demanded to know how these reporters came to their conclusions. Both publications ultimately retracted their statements and printed corrections. An editor at the Guardian apologized and described the article as a ‘fuck up.’ But the online attacks continued. . . .”
Program Highlights Include:
- The role of Eddie Snowden in misattributing the Shadow Brokers non-hack to Russia.
- Snowden’s foreshadowing of the alleged Russian “hack” of the Macron campaign”: ” . . . . ‘That could have significant foreign policy consequences,’ Snowden wrote on Twitter. ‘Particularly if any of those operations targeted US allies. Particularly if any of those operations targeted elections.’ . . .”
- James Bamford’s analysis of WikiLeaker/Tor promoter/BBG associate Jacob Apelbaum as the most likely source of the Shadow Brokers non-hack.
- The ludicrous nature of the “Russia-did it” hypothesis concerning the Macron hacks: ” . . . . The hacked documents in the ‘Macron hack’ not only contained Cyrillic text in the metadata, but also contained the name of the last person to modify the documents. That name, ‘Roshka Georgiy Petrovichan’, is an employee at Evrika, a large IT company that does work for the Russian government, including the FSB (Russian intelligence.) Also found in the metadata is the email of the person who uploaded the files to ‘archive.org’, and that email address, frankmacher1@gmx.de, is registered with a German free webmail provider used previously in 2016 phishing attacks against the CDU in Germany that have been attributed to APT28. It would appear that the ‘Russian hackers’ not only left clues suggesting it was Russian hackers behind the hack, but they decided to name names this time–their own names. . . .”
- Neo-Nazi and Glenn Greenwald and Laura Poitras associate Andrew Auerenheimer’s role in modifying the documents in the Macron hack: ” . . . . Shortly after an anonymous user of the 4chan.org discussion forum posted fake documents purporting to show Mr. Macron had set up an undisclosed shell company in the Caribbean, the user directed people to visit nouveaumartel.com for updates on the French election. That website, according to research by web-security provider Virtualroad.org, is registered by ‘Weevlos,’ a known online alias of Andrew Auernheimer, an American hacker who gained notoriety three years ago when a U.S. appeals court vacated his conviction for computer fraud. The site also is hosted by a server in Latvia that hosts the Daily Stormer, a neo-Nazi news site that identifies its administrator as ‘Weev,’ another online alias of Mr. Aeurnheimer, Virtualroad.org says. ‘We strongly believe that the fake offshore documents were created by someone with control of the Daily Stormer server,’ said Tord Lundström, a computer forensics investigator at Virtualroad.org. . . .”
- French cybersecurity chief Guillaume Poupard negated the assertion that Russia hacked the Macron campaign: ” . . . . The head of the French government’s cyber security agency, which investigated leaks from President Emmanuel Macron’s election campaign, says they found no trace of a notorious Russian hacking group behind the attack. . . . ”
1. We review the conclusion of the main part of the book, with Levine’s summation of the inextricable nature and symbiosis between the Internet, the tech firms and the so-called “privacy community.”
The key points of discussion and analysis of Levine’s book (as a whole) include:
- The Internet is a weapon, developed for counter-insurgency purposes.
- Big Tech firms network with the very intelligence services they publicly decry.
- Big Tech firms that data mine their customers on a nearly unimaginable scale do so as a direct, operational extension of the very surveillance function upon which the Internet is predicated.
- The technologies touted by the so-called “Privacy Activists” such as Edward Snowden and Jacob Applebaum were developed by the very intelligence services they are supposed to deflect.
- The technologies touted by the so-called “Privacy Activists” such as Edward Snowden and Jacob Applebaum–such as the Tor Internet function and the Signal mobile phone app– are readily accessible to the very intelligence services they are supposed to deflect.
- The organizations that promote the alleged virtues of Snowden, Applebaum, Tor, Signal et al are linked to the very intelligence services they would have us believe they oppose.
- Big Tech firms embrace “Internet Freedom” as a distraction from their own willful and all-embracing data mining and their ongoing conscious collaboration with the very intelligence services they publicly decry.
” . . . . For many Internet companies, including Google and Facebook, surveillance is the business model. It is the base on which their corporate and economic power rests. Disentangle surveillance and profit, and these companies would collapse. Limit data collection, and the companies would see investors flee and their stock prices plummet.
“Silicon Valley fears a political solution to privacy. Internet Freedom and crypto offer an acceptable alternative. Tools like Signal and Tor provide a false solution to the privacy problem, focusing people’s attention on government surveillance and distracting them from the private spying carried out by the Internet companies they use every day. All the while, crypto tools give people a [false] sense that they’re doing something to protect themselves, a feeling of personal empowerment and control. And all those crypto radicals? Well, they just enhance the illusion, heightening the impression of risk and danger. With Signal or Tor installed, using an iPhone or Android suddenly becomes edgy and radical. So instead of pushing for political and democratic solutions to surveillance, we outsource our privacy politics to crypto apps–software made by the very same powerful entities that these apps are supposed to protect us from.
“In that sense, Edward Snowden is like the branded face of an Internet consumerism-as-rebellion lifestyle campaign, like the old Apple ad about shattering Big Brother or the Nike spot set to the Beatles’ ‘Revolution.’ While Internet billionaires like Larry Page, Sergey Brin, and Mark Zuckerberg slam government surveillance, talk up freedom, and embrace Snowden and crypto privacy culture, their companies still cut deals with the Pentagon, work with the NSA and CIA, [and companies like Cambridge Analytica–D.E.] and continue to track and profile people for profit. . . .”
NB: Mr. Levine does not go into the fascistic character of Snowden, Assange, Greenwald et al. Some of those shows: Greenwald–FTR #888, Snowden–FTR #‘s 756, 831, Assange and WikiLeaks–FTR #‘s 732, 745, 755, 917.
. . . . Then there was the fact that Signal ran on Amazon’s servers, which meant that all its data were available to a partner in the NSA’s PRISM surveillance program. Equally problematic, Signal needed Apple and Google to install and run the app on people’s mobile phones. Both companies were, and as far as we know still are, partners in PRISM as well. “Google usually has root access to the phone, there’s the issue of integrity,” writes Sander Venema, a respected developer and secure—technology trainer, in a blog post explaining why he no longer recommends people use Signal for encrypted chat. “Google is still cooperating with the NSA and other intelligence agencies. PRISM is also still a thing. I’m pretty sure that Google could serve a specially modified update or version of Signal to a specific target for surveillance, and they would be none the wiser that they installed malware on their phones.”
Equally weird was the way the app was designed to make it easy for anyone monitoring Internet traffic to flag people using Signal to communicate. All that the FBI or, say, Egyptian or Russian security services had to do was watch for the mobile phones that pinged a particular Amazon server used by Signal, and it was trivial to isolate activists from the general smartphone population. So, although the app encrypted the content of people’s messages, it also marked them with a flashing red sign: “Follow Me, I Have Something to Hide.” (Indeed, activists protesting at the Democratic National Convention in Philadelphia in 2016 told me that they were bewildered by the fact that police seemed to know and anticipate their every move despite their having used Signal to organize.
Debate about Signal’s technical design was moot anyway. Snowden’s leaks showed that the NSA had developed tools that could grab everything people did on their smartphones, which presumably included text and received by Signal. In early March, 2017, WikiLeaks published a cache of CIA hacking tools that confirmed the inevitable. The agency worked with the NSA as well as other “cyber arms contractors” to develop hacking tools that targeted smartphones, allowing it to bypass the encryption of Signal and any other encrypted chat apps, including Facebook’s WhatsApp. “The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone,” explained a WikiLeaks press release. “These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the ‘smart’ phones that they run on and collecting audio and message traffic before encryption is applied.”
Disclosure of these hacking tools showed that, in the end, Signal’s encryption didn’t really matter, not when the CIA and NSA owned the underlying operating system and could grab whatever they wanted before encryption or obfuscation algorithms were applied. The flaw went beyond Signal and applied to every type of encryption technology on every type of consumer computer system. . . .
. . . . Convoluted as the story may be, US government support for Internet Freedom and its underwriting of crypto culture makes perfect sense. The Internet came out of a 1960s military project to develop an information weapon. It was born out of a need to quickly communicate, process data, and control a chaotic world. Today, the network is more than a weapon; it is also a field of battle, a place where vital military and intelligence operations take place. Geopolitical struggle has moved online, and Internet Freedom is a weapon in that fight.
If you take a big-picture view, Silicon Valley’s support for Internet Freedom makes sense as well. Companies like Google and Facebook first supported it as a part of a geopolitical business strategy, a way of subtly pressuring countries that closed their networks and markets to Western technology companies. But after Edward Snowden’s revelations exposed the industry’s rampant private surveillance practices to the public, Internet Freedom offered another powerful benefit.
For years, public opinion has been stacked firmly against Silicon Valley’s underlying business model. In poll, after poll, a majority of Americans have voiced their opposition to corporate surveillance and have signaled support for increased regulation of the industry. This has always been a deal breaker for Silicon Valley. For many Internet companies, including Google and Facebook, surveillance is the business model. It is the base on which their corporate and economic power rests. Disentangle surveillance and profit, and these companies would collapse. Limit data collection, and the companies would see investors flee and their stock prices plummet. [Italics are mine–D.E.]
Silicon Valley fears a political solution to privacy. Internet Freedom and crypto offer an acceptable alternative. Tools like Signal and Tor provide a false solution to the privacy problem, focusing people’s attention on government surveillance and distracting them from the private spying carried out by the Internet companies they use every day. All the while, crypto tools give people a [false] sense that they’re doing something to protect themselves, a feeling of personal empowerment and control. And all those crypto radicals? Well, they just enhance the illusion, heightening the impression of risk and danger. With Signal or Tor installed, using an iPhone or Android suddenly becomes edgy and radical. So instead of pushing for political and democratic solutions to surveillance, we outsource our privacy politics to crypto apps–software made by the very same powerful entities that these apps are supposed to protect us from.
In that sense, Edward Snowden is like the branded face of an Internet consumerism-as-rebellion lifestyle campaign, like the old Apple ad about shattering Big Brother or the Nike spot set to the Beatles’ “Revolution.” While Internet billionaires like Larry Page, Sergey Brin, and Mark Zuckerberg slam government surveillance, talk up freedom, and embrace Snowden and crypto privacy culture, their companies still cut deals with the Pentagon, work with the NSA and CIA, [and companies like Cambridge Analytica–D.E.] and continue to track and profile people for profit. It is the same old split-screen marketing trick: the public branding and the behind-the-scenes reality.
Internet Freedom is a win-win for everyone involved–everyone except regular users, who trust their privacy to double-dealing military contractors, while powerful Surveillance Valley corporations continue to build out the old military cybernetic dream of a world where everyone is watched, predicted, and controlled. . . .
2. Next, we present the treatment afforded Yasha Levine. As might be expected, Levine received the Jim Garrison/Gary Webb treatment. The retribution directed at Yasha Levine epitomizes why Mr. Emory refers to the so-called progressive sector as “so-called.”
” . . . . The threats and attacks had begun sometime overnight while I slept. By morning, they had reached a vicious and murderous pitch. There were calls for my death—by fire, by suffocation, by having my throat slit by razor blades. People I had never met called me a rapist, and alleged that I took delight in beating women and forcing people to have sex with me. I was accused of homophobia. Anonymous people filed bogus claims with my editor. Allegations that I was a CIA agent poured in, as did claims that I worked with British intelligence. The fact that I had been born in the Soviet Union didn’t do me any favors; naturally, I was accused of being an FSB spy and of working for Russia’s successor to the KGB. I was informed that my name was added to a dark net assassination list—a site where people could place anonymous bids for my murder. The roaming eye of the Internet hate machine had suddenly fixed on me. . . .”
. . . . The threats and attacks had begun sometime overnight while I slept. By morning, they had reached a vicious and murderous pitch. There were calls for my death—by fire, by suffocation, by having my throat slit by razor blades. People I had never met called me a rapist, and alleged that I took delight in beating women and forcing people to have sex with me. I was accused of homophobia. Anonymous people filed bogus claims with my editor. Allegations that I was a CIA agent poured in, as did claims that I worked with British intelligence. The fact that I had been born in the Soviet Union didn’t do me any favors; naturally, I was accused of being an FSB spy and of working for Russia’s successor to the KGB. I was informed that my name was added to a dark net assassination list—a site where people could place anonymous bids for my murder. The roaming eye of the Internet hate machine had suddenly fixed on me.
Things got even weirder when the Anonymous movement joined the fray. The collective issued a fatwa against me and my colleagues, vowing not to stop until I was dead. “May an infinitude of enormous insects dwell in the fascist Yasha Levine’s intestines,” proclaimed the Anonymous Twitter account with 1.6 million followers. It was a bizarre turn. Anonymous was a decentralized hacker and script kiddie movement best known for going after the Church of Scientology. Now they were going after me—painting a giant target on my back.
I paced my living room, nervously scanning the street outside my window. Reflexively, I lowered the blinds, wondering just how far this was going to go. For the first time, I began to fear for my family’s safety. People knew where I lived. The apartment my wife, Evgenia, and I shared at the time was on the first floor, open to the street, with expansive windows on all sides, like a fishbowl. We contemplated staying at a friend’s house on the other side of town for a few days until things cooled down.
I had been on the receiving end of vicious Internet harassment campaigns before; it comes with the territory of being an investigative journalist. But this one was different. It went beyond anything I had ever experienced. Not just the intensity and viciousness scared me but also the reason why it was happening. . . .
3. In addition to online bullying, slander and veiled and direct threats, the so-called “privacy activists” joined in pillorying Yasha Levine: ” . . . . Micah Lee, the former EFF technologist who helped Edward Snowden communicate securely with journalists and who now works at The Intercept, attacked me as a conspiracy theorist and accused me and my colleagues at Pando of being sexist bullies, he claimed that my reporting was motivated not by a desire to get at the truth but by a malicious impulse to harass a female Tor developer. Although Lee conceded that my information about Tor’s government funding was correct, he counter intuitively argued that it didn’t matter. . . .
” . . . . Journalists, experts, and technologists from groups like the ACLU, the EFF, Freedom of the Press Foundation and The Intercept and employees of the Tor Project joined in to attack my reporting. Unlike Lee, most did not attempt to engage my reporting but employed a range of familiar PR smear tactics—tactics you usually see used by corporate flacks, not principled privacy activists. They took to social media, telling anyone who showed interest in my articles that they should ignore them instead. Then, when that didn’t work, they tried to discredit my reporting with ridicule, misdirection, and crude insults. . . .
” . . . . A respected ACLU privacy expert, who now works as a congressional staffer, called me “a conspiracy theorist who sees black helicopters everywhere” and compared my reporting about Tor to the Protocols of the Elders of Zion. As someone who escaped state-sponsored anti-Semitism in the Soviet Union, I found the comparison extremely offensive, especially coming from the ACLU. The Protocols were an anti-Semitic forgery disseminated by the Russian Tsar’s secret police that unleashed waves of deadly pogroms against Jews across the Russian Empire in the early twentieth century. Tor employees put forth a torrent of childish insults, calling me a ‘dumb Stalinist state-felcher’ and a ‘fucktard’s fucktard.’ They accused me of being funded by spies to undermine faith in cryptography. One of them claimed that I was a rapist, and hurled homophobic insults about the various ways in which I had supposedly performed sexual favors for a male colleague.
” In the way that these Internet hazing sessions, go, the campaign evolved and spread. Strange people began threatening me and my colleagues on social media. Some accused me of having blood on my hands and of racking up an “activist body count”–that people were actually dying because of my reporting undermined trust in Tor.
The attacks widened to include regular readers and social media users, anyone who had the nerve to ask questions about Tor’s funding sources. An employee of the Tor Project went so far as to dox an anonymous Twitter user, exposing his real identity and contacting his employer in the hopes of getting him fired from his job as a junior pharmacist.
It was bizarre. I watched all this unfold in real time but had no idea how to respond. Even more disconcerting was that the attacks soon expanded to include libelous stories placed in reputable media outlets. The Guardian published a story by a freelancer accusing me of running an online sexual harassment and bullying campaign. The Los Angeles Review of Books, generally a good journal of arts and culture, ran an essay by a freelancer alleging that my reporting was funded by the CIA. Paul Carr, my editor at Pando, lodged official complaints and demanded to know how these reporters came to their conclusions. Both publications ultimately retracted their statements and printed corrections. An editor at the Guardian apologized and described the article as a ‘fuck up.’ But the online attacks continued. . . .”
. . . . Instead of welcoming my reporting on Tor’s puzzling government support, the leading lights of the privacy community answered it with attacks.
Micah Lee, the former EFF technologist who helped Edward Snowden communicate securely with journalists and who now works at The Intercept, attacked me as a conspiracy theorist and accused me and my colleagues at Pando of being sexist bullies, he claimed that my reporting was motivated not by a desire to get at the truth but by a malicious impulse to harass a female Tor developer. Although Lee conceded that my information about Tor’s government funding was correct, he counter intuitively argued that it didn’t matter. Why? Because Tor was open source and powered by math, which he claimed made it infallible. “[Of] course funders might try to influence the direction of the project and the research. In Tor’s case this is mitigated by the fact that 100% of the scientific research and source code that Tor releases is open, that the crypto math is peer-reviewed and backed up by the laws of physics,” he wrote. What Lee was saying, and what many others in the privacy community believed as well, was that it did not matter that Tor employees depended on the Pentagon for their paychecks. They were impervious to influence, careers, mortgages, car payments, personal relationships, food, and all the other “squishy aspects of human existence that silently drive and affect people’s choices. The reason was that Tor, like all encryption algorithms, was based on math and physics—which made it impervious to coercion.
It was a baffling argument. Tor was not “a law of physics” but computer code written by a small group of human beings. It was software like any other, with holes and vulnerabilities that were constantly being discovered and patched. Encryption algorithms and computer systems might be based on abstract mathematical concepts, but translated into the real physical realm they become imperfect tools, constrained by human error and the computer platforms and networks they run on. After all, even the most sophisticated encryption systems are eventually cracked and broken. And neither Lee, nor anyone else could answer the bigger question raised by my reporting: If Tor was such a danger to the US government, why would the same government continue to spend millions of dollars on the project’s development, renewing the funding year after year? Imagine, if during World War II, the Allies funded the development of Nazi Germany’s Enigma machine instead of mounting a massive effort to crack the code.
I never got a good answer from the privacy community, but what I did get was a lot of smears and threats.
Journalists, experts, and technologists from groups like the ACLU, the EFF, Freedom of the Press Foundation and The Intercept and employees of the Tor Project joined in to attack my reporting. Unlike Lee, most did not attempt to engage my reporting but employed a range of familiar PR smear tactics—tactics you usually see used by corporate flacks, not principled privacy activists. They took to social media, telling anyone who showed interest in my articles that they should ignore them instead. Then, when that didn’t work, they tried to discredit my reporting with ridicule, misdirection, and crude insults.
A respected ACLU privacy expert, who now works as a congressional staffer, called me “a conspiracy theorist who sees black helicopters everywhere” and compared my reporting about Tor to the Protocols of the Elders of Zion. As someone who escaped state-sponsored anti-Semitism in the Soviet Union, I found the comparison extremely offensive, especially coming from the ACLU. The Protocols were an anti-Semitic forgery disseminated by the Russian Tsar’s secret police that unleashed waves of deadly pogroms against Jews across the Russian Empire in the early twentieth century. Tor employees put forth a torrent of childish insults, calling me a “dumb Stalinist state-felcher” and a “fucktard’s fucktard.” They accused me of being funded by spies to undermine faith in cryptography. One of them claimed that I was a rapist, and hurled homophobic insults about the various ways in which I had supposedly performed sexual favors for a male colleague.
In the way that these Internet hazing sessions, go, the campaign evolved and spread. Strange people began threatening me and my colleagues on social media. Some accused me of having blood on my hands and of racking up an “activist body count”–that people were actually dying because of my reporting undermined trust in Tor.
The attacks widened to include regular readers and social media users, anyone who had the nerve to ask questions about Tor’s funding sources. An employee of the Tor Project went so far as to dox an anonymous Twitter user, exposing his real identity and contacting his employer in the hopes of getting him fired from his job as a junior pharmacist.
It was bizarre. I watched all this unfold in real time but had no idea how to respond. Even more disconcerting was that the attacks soon expanded to include libelous stories placed in reputable media outlets. The Guardian published a story by a freelancer accusing me of running an online sexual harassment and bullying campaign. The Los Angeles Review of Books, generally a good journal of arts and culture, ran an essay by a freelancer alleging that my reporting was funded by the CIA. Paul Carr, my editor at Pando, lodged official complaints and demanded to know how these reporters came to their conclusions. Both publications ultimately retracted their statements and printed corrections. An editor at the Guardian apologized and described the article as a “fuck up.” But the online attacks continued.
I was no stranger to intimidation and threats. But I knew that this campaign wasn’t just meant to shut me up but was designed to shut down debate around the official Tor story. After the initial outbreak, I laid low and tried to understand why my reporting elicited such a vicious and weird reaction from the privacy community.
Military contractors hailed as privacy heroes? Edward Snowden promoting a Pentagon-funded tool as a solution to NSA surveillance? Google and Facebook backing privacy technology? And why were privacy activists so hostile to information that their most trusted app was funded by the military? It was a bizarro world. None of it quite made sense.
When the smears first started, I had thought they might have been driven by a petty defensive reflex. Many of those who attacked me either worked for Tor or were vocal reporters, recommending the tool to others as protection from government surveillance. They were supposed to be experts in the field; maybe my reporting on Tor’s ongoing ties to the Pentagon caught them off-guard or made them feel stupid. After all, no one likes being made to look like a sucker.
Turns out, it wasn’t that simple. As I pieced the story together, bit by bit, I realized there was something much deeper behind the attacks, something so spooky and startling that at first, I didn’t believe it. . . .
4. Next, we review the Shadow Brokers and Macron hacks, highlighting the roles in these events of: Jacob Appelbaum, Edward Snowden, WikiLeaks and Andre Auerenheimer.
-
Eddie the Friendly Spook endorsed the cover story of the Shadow Brokers’ NSA “hack”–that the event was a hack (despite indicators to the contrary) and that Russia did it. ” . . . If you ask ex-NSA contractor Edward Snowden, the public leak and claims of the Shadow Brokers seem to have Russian fingerprints all over them, and it serves as a warning from Moscow to Washington. The message: If your policymakers keep blaming us for the DNC hack, then we can use this hack to implicate you in much more.‘That could have significant foreign policy consequences,’ Snowden wrote on Twitter. ‘Particularly if any of those operations targeted US allies. Particularly if any of those operations targeted elections.’ . . .”
- The code in the files was from 2013, when Snowden undertook his “op.” “. . . . The code released by the Shadow Brokers dates most recently to 2013, the same year Edward Snowden leaked classified information about the NSA’s surveillance programs.. . . Snowden also noted that the released files end in 2013. ‘When I came forward, NSA would have migrated offensive operations to new servers as a precaution,’ he suggested — a move that would have cut off the hackers’ access to the server. . . . ”
- Author James Bamford highlighted circumstantial evidence that WikiLeaker Jacob Applebaum–who appears to have facilitated Snowden’s journey from Hawaii to Hong Kong–may have been behind the Shadow Brokers non-hack. “. . . . There also seems to be a link between Assange and the leaker who stole the ANT catalog, and the possible hacking tools. Among Assange’s close associates is Jacob Appelbaum, a celebrated hacktivist and the only publicly known WikiLeaks staffer in the United States – until he moved to Berlin in 2013 in what he called a ‘political exile’ because of what he said was repeated harassment by U.S. law enforcement personnel. In 2010, a Rolling Stone magazine profile labeled him “the most dangerous man in cyberspace.”In December 2013, Appelbaum was the first person to reveal the existence of the ANT catalog, at a conference in Berlin, without identifying the source. That same month he said he suspected the U.S. government of breaking into his Berlin apartment. He also co-wrote an article about the catalog in Der Spiegel. But again, he never named a source, which led many to assume, mistakenly, that it was Snowden. . . .”
In the summer of 1972, state-of-the-art campaign spying consisted of amateur burglars, armed with duct tape and microphones, penetrating the headquarters of the Democratic National Committee. Today, amateur burglars have been replaced by cyberspies, who penetrated the DNC armed with computers and sophisticated hacking tools.
Where the Watergate burglars came away empty-handed and in handcuffs, the modern- day cyber thieves walked away with tens of thousands of sensitive political documents and are still unidentified.
Now, in the latest twist, hacking tools themselves, likely stolen from the National Security Agency, are on the digital auction block. Once again, the usual suspects start with Russia – though there seems little evidence backing up the accusation.
In addition, if Russia had stolen the hacking tools, it would be senseless to publicize the theft, let alone put them up for sale. It would be like a safecracker stealing the combination to a bank vault and putting it on Facebook. Once revealed, companies and governments would patch their firewalls, just as the bank would change its combination.
A more logical explanation could also be insider theft. If that’s the case, it’s one more reason to question the usefulness of an agency that secretly collects private information on millions of Americans but can’t keep its most valuable data from being stolen, or as it appears in this case, being used against us.
In what appeared more like a Saturday Night Live skit than an act of cybercrime, a group calling itself the Shadow Brokers put up for bid on the Internet what it called a “full state-sponsored toolset” of “cyberweapons.” “!!! Attention government sponsors of cyberwarfare and those who profit from it !!!! How much would you pay for enemies cyberweapons?” said the announcement.
The group said it was releasing some NSA files for “free” and promised “better” ones to the highest bidder. However, those with loosing bids “Lose Lose,” it said, because they would not receive their money back. And should the total sum of the bids, in bitcoins, reach the equivalent of half a billion dollars, the group would make the whole lot public.
While the “auction” seemed tongue in cheek, more like hacktivists than Russian high command, the sample documents were almost certainly real. The draft of a top-secret NSA manual for implanting offensive malware, released by Edward Snowden, contains code for a program codenamed SECONDDATE. That same 16-character string of numbers and characters is in the code released by the Shadow Brokers. The details from the manual were first released by The Intercept last Friday.
The authenticity of the NSA hacking tools were also confirmed by several ex-NSA officials who spoke to the media, including former members of the agency’s Tailored Access Operations (TAO) unit, the home of hacking specialists.
“Without a doubt, they’re the keys to the kingdom,” one former TAO employee told the Washington Post. “The stuff you’re talking about would undermine the security of a lot of major government and corporate networks both here and abroad.” Another added, “From what I saw, there was no doubt in my mind that it was legitimate.”
Like a bank robber’s tool kit for breaking into a vault, cyber exploitation tools, with codenames like EPICBANANA and BUZZDIRECTION, are designed to break into computer systems and networks. Just as the bank robber hopes to find a crack in the vault that has never been discovered, hackers search for digital cracks, or “exploits,” in computer programs like Windows.
The most valuable are “zero day” exploits, meaning there have been zero days since Windows has discovered the “crack” in their programs. Through this crack, the hacker would be able to get into a system and exploit it, by stealing information, until the breach is eventually discovered and patched. According to the former NSA officials who viewed the Shadow Broker files, they contained a number of exploits, including zero-day exploits that the NSA often pays thousands of dollars for to private hacking groups.
The reasons given for laying the blame on Russia appear less convincing, however. “This is probably some Russian mind game, down to the bogus accent,” James A. Lewis, a computer expert at the Center for Strategic and International Studies, a Washington think tank, told the New York Times. Why the Russians would engage in such a mind game, he never explained.
Rather than the NSA hacking tools being snatched as a result of a sophisticated cyber operation by Russia or some other nation, it seems more likely that an employee stole them.Experts who have analyzed the files suspect that they date to October 2013, five months after Edward Snowden left his contractor position with the NSA and fled to Hong Kong carrying flash drives containing hundreds of thousands of pages of NSA documents.
So, if Snowden could not have stolen the hacking tools, there are indications that after he departed in May 2013, someone else did, possibly someone assigned to the agency’s highly sensitive Tailored Access Operations.
In December 2013, another highly secret NSA document quietly became public. It was a top secret TAO catalog of NSA hacking tools. Known as the Advanced Network Technology (ANT) catalog, it consisted of 50 pages of extensive pictures, diagrams and descriptions of tools for every kind of hack, mostly targeted at devices manufactured by U.S. companies, including Apple, Cisco, Dell and many others.
Like the hacking tools, the catalog used similar codenames. Among the tools targeting Apple was one codenamed DROPOUTJEEP, which gives NSA total control of iPhones. “A software implant for the Apple iPhone,” says the ANT catalog, “includes the ability to remotely push/pull files from the device. SMS retrieval, contact-list retrieval, voicemail, geolocation, hot mic, camera capture, cell-tower location, etc.”
Another, codenamed IRATEMONK, is, “Technology that can infiltrate the firmware of hard drives manufactured by Maxtor, Samsung, Seagate and Western Digital.”
In 2014, I spent three days in Moscow with Snowden for a magazine assignment and a PBS documentary. During our on-the-record conversations, he would not talk about the ANT catalog, perhaps not wanting to bring attention to another possible NSA whistleblower.
I was, however, given unrestricted access to his cache of documents. These included both the entire British, or GCHQ, files and the entire NSA files.
But going through this archive using a sophisticated digital search tool, I could not find a single reference to the ANT catalog. This confirmed for me that it had likely been released by a second leaker. And if that person could have downloaded and removed the catalog of hacking tools, it’s also likely he or she could have also downloaded and removed the digital tools now being leaked.
In fact, a number of the same hacking implants and tools released by the Shadow Brokers are also in the ANT catalog, including those with codenames BANANAGLEE and JETPLOW. These can be used to create “a persistent back-door capability” into widely used Cisco firewalls, says the catalog.
Consisting of about 300 megabytes of code, the tools could easily and quickly be transferred to a flash drive. But unlike the catalog, the tools themselves – thousands of ones and zeros – would have been useless if leaked to a publication. This could be one reason why they have not emerged until now.
Enter WikiLeaks. Just two days after the first Shadow Brokers message, Julian Assange, the founder of WikiLeaks, sent out a Twitter message. “We had already obtained the archive of NSA cyberweapons released earlier today,” Assange wrote, “and will release our own pristine copy in due course.”
The month before, Assange was responsible for releasing the tens of thousands of hacked DNC emails that led to the resignation of the four top committee officials.
There also seems to be a link between Assange and the leaker who stole the ANT catalog, and the possible hacking tools. Among Assange’s close associates is Jacob Appelbaum, a celebrated hacktivist and the only publicly known WikiLeaks staffer in the United States – until he moved to Berlin in 2013 in what he called a “political exile” because of what he said was repeated harassment by U.S. law enforcement personnel. In 2010, a Rolling Stone magazine profile labeled him “the most dangerous man in cyberspace.”
In December 2013, Appelbaum was the first person to reveal the existence of the ANT catalog, at a conference in Berlin, without identifying the source. That same month he said he suspected the U.S. government of breaking into his Berlin apartment. He also co-wrote an article about the catalog in Der Spiegel. But again, he never named a source, which led many to assume, mistakenly, that it was Snowden.
In addition to WikiLeaks, for years Appelbaum worked for Tor, an organization focused on providing its customers anonymity on the Internet. But last May, he stepped down as a result of “serious, public allegations of sexual mistreatment” made by unnamed victims, according to a statement put out by Tor. Appelbaum has denied the charges.
Shortly thereafter, he turned his attention to Hillary Clinton. At a screening of a documentary about Assange in Cannes, France, Appelbaum accused her of having a grudge against him and Assange, and that if she were elected president, she would make their lives difficult. “It’s a situation that will possibly get worse” if she is elected to the White House, he said, according to Yahoo News.
It was only a few months later that Assange released the 20,000 DNC emails. Intelligence agencies have again pointed the finger at Russia for hacking into these emails.
Yet there has been no explanation as to how Assange obtained them. He told NBC News, “There is no proof whatsoever” that he obtained the emails from Russian intelligence. Moscow has also denied involvement.
There are, of course, many sophisticated hackers in Russia, some with close government ties and some without. And planting false and misleading indicators in messages is an old trick. Now Assange has promised to release many more emails before the election, while apparently ignoring email involving Trump. (Trump opposition research was also stolen.)
In hacktivist style, and in what appears to be phony broken English, this new release of cyberweapons also seems to be targeting Clinton. It ends with a long and angry “final message” against “Wealthy Elites . . . breaking laws” but “Elites top friends announce, no law broken, no crime commit[ed]. . . Then Elites run for president. Why run for president when already control country like dictatorship?”
Then after what they call the “fun Cyber Weapons Auction” comes the real message, a serious threat. “We want make sure Wealthy Elite recognizes the danger [of] cyberweapons. Let us spell out for Elites. Your wealth and control depends on electronic data.” Now, they warned, they have control of the NSA’s cyber hacking tools that can take that wealth away. “You see attacks on banks and SWIFT [a worldwide network for financial services] in news. If electronic data go bye-bye where leave Wealthy Elites? Maybe with dumb cattle?” . . .
There also seems to be a link between Assange and the leaker who stole the ANT catalog, and the possible hacking tools. Among Assange’s close associates is Jacob Appelbaum, a celebrated hacktivist and the only publicly known WikiLeaks staffer in the United States – until he moved to Berlin in 2013 in what he called a “political exile” because of what he said was repeated harassment by U.S. law enforcement personnel. In 2010, a Rolling Stone magazine profile labeled him “the most dangerous man in cyberspace.”
In December 2013, Appelbaum was the first person to reveal the existence of the ANT catalog, at a conference in Berlin, without identifying the source. That same month he said he suspected the U.S. government of breaking into his Berlin apartment. He also co-wrote an article about the catalog in Der Spiegel. But again, he never named a source, which led many to assume, mistakenly, that it was Snowden.
In addition to WikiLeaks, for years Appelbaum worked for Tor, an organization focused on providing its customers anonymity on the Internet. But last May, he stepped down as a result of “serious, public allegations of sexual mistreatment” made by unnamed victims, according to a statement put out by Tor. Appelbaum has denied the charges.
Shortly thereafter, he turned his attention to Hillary Clinton. At a screening of a documentary about Assange in Cannes, France, Appelbaum accused her of having a grudge against him and Assange, and that if she were elected president, she would make their lives difficult. “It’s a situation that will possibly get worse” if she is elected to the White House, he said, according to Yahoo News.
…
5. Those “Russian government hackers” really need an OPSEC refresher course. The hacked documents in the “Macron hack” not only contained Cyrillic text in the metadata, but also contained the name of the last person to modify the documents. That name, “Roshka Georgiy Petrovichan”, is an employee at Evrika, a large IT company that does work for the Russian government, including the FSB (Russian intelligence.)
Also found in the metadata is the email of the person who uploaded the files to “archive.org”, and that email address, frankmacher1@gmx.de, is registered with a German free webmail provider used previously in 2016 phishing attacks against the CDU in Germany that have been attributed to APT28. It would appear that the “Russian hackers” not only left clues suggesting it was Russian hackers behind the hack, but they decided to name names this time–their own names.
Not surprisingly, given the fascist nature of WikiLeaks, they concluded that Russia was behind the hacks. (For more on the fascist nature of WikiLeaks, see FTR #‘s 724, 725, 732, 745, 755, 917.)
Russian security firms’ metadata found in files, according to WikiLeaks and others.
Late on May 5 as the two final candidates for the French presidency were about to enter a press blackout in advance of the May 7 election, nine gigabytes of data allegedly from the campaign of Emmanuel Macron were posted on the Internet in torrents and archives. The files, which were initially distributed via links posted on 4Chan and then by WikiLeaks, had forensic metadata suggesting that Russians were behind the breach—and that a Russian government contract employee may have falsified some of the dumped documents.
Even WikiLeaks, which initially publicized the breach and defended its integrity on the organization’s Twitter account, has since acknowledged that some of the metadata pointed directly to a Russian company with ties to the government:
#MacronLeaks: name of employee for Russian govt security contractor Evrika appears 9 times in metadata for “xls_cendric.rar” leak archive pic.twitter.com/jyhlmldlbL— WikiLeaks (@wikileaks) May 6, 2017
Evrika (“Eureka”) ZAO is a large information technology company in St. Petersburg that does some work for the Russian government, and the group includes the Federal Security Service of the Russian Federation (FSB) among its acknowledged customers (as noted in this job listing). The company is a systems integrator, and it builds its own computer equipment and provides “integrated information security systems.” The metadata in some Microsoft Office files shows the last person to have edited the files to be “Roshka Georgiy Petrovich,” a current or former Evrika ZAO employee.
According to a Trend Micro report on April 25, the Macron campaign was targeted by the Pawn Storm threat group (also known as “Fancy Bear” or APT28) in a March 15 “phishing” campaign using the domain onedrive-en-marche.fr. The domain was registered by a “Johny Pinch” using a Mail.com webmail address. The same threat group’s infrastructure and malware was found to be used in the breach of the Democratic National Committee in 2016, in the phishing attack targeting members of the presidential campaign of former Secretary of State Hillary Clinton, and in a number of other campaigns against political targets in the US and Germany over the past year.
The metadata attached to the upload of the Macron files also includes some identifying data with an e‑mail address for the person uploading the content to archive.org:
Well this is fun pic.twitter.com/oXsH83snCS— Pwn All The Things (@pwnallthethings) May 6, 2017
The e‑mail address of the uploader, frankmacher1@gmx.de, is registered with a German free webmail provider used previously in 2016 Pawn Storm / APT28 phishing attacks against the Christian Democratic Union, German Chancellor Angela Merkel’s political party.
The involvement of APT28, the editing of some documents leaked by someone using a Russian version of Microsoft Office, and the attempt to spread the data through amplification in social media channels such as 4Chan, Twitter, and Facebook—where a number of new accounts posted links to the data—are all characteristics of the information operations seen during the 2016 US presidential campaign.
…
6. In related news, a group of cybersecurity researchers studying the Macron hack has concluded that the modified documents were doctored by someone associated with The Daily Stormer neo-Nazi website and Andrew “the weev” Auernheimer.
Auerenheimer was a guest at Glenn Greenwald and Laura Poitras’s party celebrating their receipt of the Polk award.
“ ‘We strongly believe that the fake offshore documents were created by someone with control of the Daily Stormer server,” said Tord Lundström, a computer forensics investigator at Virtualroad.org.’ . . .”
Who is in control of the Daily Stormer? Well, its public face and publisher is Andrew Anglin. But look who the site is registered to: Andrew Auernheimer, who apparently resided in Ukraine as of the start of this year:
The analysis from the web-security firm Virtualroad.org. indicates that someone associated with the Daily Stormer modified those faked documents. Like, perhaps a highly skilled neo-Nazi hacker like “the weev”.
Based on an analysis of how the document dump unfolded it’s looking like the inexplicably self-incriminating ‘Russian hackers’ may have been a bunch of American neo-Nazis. Imagine that.
Ties between an American’s neo-Nazi website and an internet campaign to smear Macron before French election are found
A group of cybersecurity experts has unearthed ties between an American hacker who maintains a neo-Nazi website and an internet campaign to smear Emmanuel Macron days before he was elected president of France.
Shortly after an anonymous user of the 4chan.org discussion forum posted fake documents purporting to show Mr. Macron had set up an undisclosed shell company in the Caribbean, the user directed people to visit nouveaumartel.com for updates on the French election.
That website, according to research by web-security provider Virtualroad.org, is registered by “Weevlos,” a known online alias of Andrew Auernheimer, an American hacker who gained notoriety three years ago when a U.S. appeals court vacated his conviction for computer fraud. The site also is hosted by a server in Latvia that hosts the Daily Stormer, a neo-Nazi news site that identifies its administrator as “Weev,” another online alias of Mr. Aeurnheimer, Virtualroad.org says.
“We strongly believe that the fake offshore documents were created by someone with control of the Daily Stormer server,” said Tord Lundström, a computer forensics investigator at Virtualroad.org.
Through Tor Ekeland, the lawyer who represented him in the computer-fraud case in the U.S., Mr. Auernheimer said he “doesn’t have anything to say.”
A French security official said a probe into the fake documents was looking into the role of far-right and neo-Nazi groups but declined to comment on the alleged role of Mr. Auernheimer.
In the run-up to the French election, cybersecurity agencies warned Mr. Macron’s aides that Russian hackers were targeting his presidential campaign, according to people familiar with the matter. On May 5, nine gigabytes of campaign documents and emails were dumped on the internet. The Macron campaign and French authorities have stopped short of pinning blame for the hack on the Kremlin.
Intelligence and cybersecurity investigators examining the flurry of social-media activity leading up to the hack followed a trail of computer code they say leads back to the American far-right.
Contacted by email over the weekend, the publisher of the Daily Stormer, Andrew Anglin, said he and Mr. Auernheimer had used their news site to write about the fake documents because “We follow 4chan closely and have a more modern editorial process than most sites.”
When asked if he or Mr. Auernheimer were behind the fake documents, Mr. Anglin stopped replying.
Mr. Auernheimer was sentenced to 41 months in prison by a U.S. court in late 2012 for obtaining the personal data of thousands of iPad users through an AT&T website. In April 2014, an appeals court vacated his conviction on the grounds that the venue of the trial, in New Jersey, was improper.
Asked if Mr. Auernheimer resided in Ukraine, as a January post on a personal blog indicates, his lawyer said: “I think this is about right.” . . . .
7. French cybersecurity chief Guillaume Poupard denied the NSA/U.S. assertion that APT28 aka “Cozy Bear/Fancy Bear/Russia” hacked the French election.
The head of the French government’s cyber security agency, which investigated leaks from President Emmanuel Macron’s election campaign, says they found no trace of a notorious Russian hacking group behind the attack.
In an interview in his office Thursday with The Associated Press, Guillaume Poupard said the Macron campaign hack “was so generic and simple that it could have been practically anyone.”
He said they found no trace that the Russian hacking group known as APT28, blamed for other attacks including on the U.S. presidential campaign, was responsible.
Poupard is director general of the government cyber-defense agency known in France by its acronym, ANSSI. Its experts were immediately dispatched when documents stolen from the Macron campaign leaked online on May 5 in the closing hours of the presidential race.
Poupard says the attack’s simplicity “means that we can imagine that it was a person who did this alone. They could be in any country.”
There has been some bubbling in the news about repeal of section 230 of the Communications Decency Act. What I find interesting about this story is how many strange bedfellows there are who ALL agree on repeal.
My own feelings are that some tweaking can be done to this law, but that our Congress is likely not up to this task to do it correctly. However, the most vocal person on this is Trump and his calls are not “Tweak 230” or “Fix 230”, it has been “repeal 230 outright”. So that is what I am reacting to rather than more nuanced bills that may come up under Biden.
Outright repealing 230 would allow companies to be held liable for comments posted on their websites. This would have an immediate chilling effect. Facebook, Twitter, and Google would tighten their ToS and ban people by the millions. The FIRST people they would ban would be the very Right-wing posters that are calling for 230 repeal!
Newspapers and news channels with online presences would immediately close their comments sections permanently. Note that many newspapers that used to allow online comments sections now just push that traffic to their Twitter or Facebook platforms. They were thinking ahead and shifting all the liability to the social media platforms in case something like 230 repeal happened down the road.
Factions:
- Conservatives on Twitter, Facebook, and Youtube tired of getting banned. I would agree with them that the Terms of Service of these companies can be inconsistently applied, mostly due to bot automation as the sheer volume of complaints is not human-manageable! However, most of them are banned not for conservative opinions, but for outright racial slurs that are clearly against the ToS. It has been amazing to see people who never shut up about “government intervention in the corporate sphere” suddenly WANT the government to come in and enforce how companies comply with their ToS!
They want “revenge” against Twitter and the like, but have no clue what that would even look like. The actual leaders who make decisions at the social media empires will walk away with their fortunes even if their companies tank. The only people damaged will be low-level workers. And I say this as someone who LOATHES Facebook, Google, and Twitter.
-Identity politics people on the Left who spend all damn day on social media looking for things to get offended by and report. They want a cleaner web, safe for their own politics and nothing else. Yeah, they are right, there are a lot of Nazis and abusive psychos on the Internet, but getting rid of 230 entirely will wreck social media, including the so-called “progressive sectors”.
-Trump! Why does he get a separate category from the other right-wingers listed above? I think he has his OWN agenda regarding 230 and is playing his followers like a fiddle. They think he is doing it so they can call people the n‑word on Twitter. But they forget that even before the 2016 election, he was openly calling for the end of free speech laws that protect criticism of public figures! Nearly all his followers have forgotten this. They want 230 gone for “free speech” reasons... but Trump wants it gone for ANTI-Free Speech reasons! In his own words “open up our libel laws so when they write purposely negative and horrible and false articles, we can sue them and win lots of money.” He is not talking about 230 there, but it shows his thinking on the subject of Free Speech.
While nobody needs to make things up to criticize Trump, people do commit libel against him and he would love to be able to sue every pundit and online commentator if he could.
-The most interesting group, to me, is the non-Trump national security element! They claim to want to clean up the Internet of “terrorist, right-wing extremists, and malicious foreign governments”.
However, I think they are really about one thing: closing off the Internet from Russian influence. These are exactly the kind of people who were all for “Internet Freedom” as an American brand, until it blew back on us and we now have multiple foreign powers running cyber-ops in the US. Their view is “that’s not fair, we are only supposed to be able to do that to them!” No group epitomizes this anti-230 element like the “Coalition for a Safer Web”.
First, let’s take a look at their advisory board.
https://coalitionsw.org/advisory-board/
Very familiar names right off the bat, former GOP head Michael Steele and Bush Homeland Security chief Tom Ridge! Another one is Lester Crown, former President and Chair of General Dynamics, which is pretty much his family’s company. Head of the Chicago Council on Foreign Relations.
Most interesting to me is a name I had not heard in many years, Shelby Coffey. Coffey was editor of the LA Times and not only did his newspaper completely miss the Contra Cocaine story, when they finally did write about it, it took the form of hit pieces on Webb and his work. Yeah, Shelby, some of us still remember that stuff...
Also of interest is somebody named Kay’Lee Wells, who simply doesn’t exist on the web other than as a member of this board! She claims to be “Healthcare Executive, Innovation Specialist with expertise in artificial intelligence, machine learning, and biotechnology”. Well, that’s interesting? AI? Machine Learning? Could this play into a possible PROFIT motive that I will discuss momentarily?
Next up, look at the leadership team.
https://coalitionsw.org/team/
President is Marc Ginsberg, former ambassador to Morocco, and an extremely well-connected individual in both the public and private sector. A resume of American University/Georgetown/diplomatic corp screams CIA to me, but I have nothing concrete on that.
https://en.wikipedia.org/wiki/Marc_Ginsberg
Next, we have VP for Content Moderation Eric Feinberg. Take a guess what Eric does in his spare time... Story is behind pay wall, but you can see what is happening in the one sentence that is available.
https://adage.com/article/digital/eric-feinberg-man-google-youtube-brand-safety-crisis/308435
“Mar 27, 2017 — Former agency executive Eric Feinberg has been scouring the web for ads placed on offensive content, and he’s got a patented solution he ...”
Yep, this is a money thing! No surprise at all to see the people pushing for a solution to a political problem looking to PROFIT from said solution. This is why they call it the “Iron Triangle”.
To add a little cultural diversity, they found right-wing black candidate for Congress and Dallas cop Tre Pennie to serve as their law enforcement advisor. Here we have Larry Klayman of Judicial Watch filing a lawsuit on Pennie’s behalf.
http://www.larryklayman.com/dallas-police-sergeant-files-defamation-and-civil-rights-com
Here is President Marc Ginsberg testifying to Congress on online extremism. I do agree with some of his take, but I suspect the result of what they are pushing for would focus mostly on Russia and not on combating the American right or jihad groups. However, in the end, as long as their partner companies make money, what do they really care?
Ginsberg’s testimony is somewhere between “things I agree with” and “awful rant that reminds me of Big Brother”. I agree with a lot of what he says, but I can just feel 1) the profit motive and 2) anti-Russianism seeping through every well-spoken and polished word.
https://docs.house.gov/meetings/IF/IF17/20200924/111041/HHRG-116-IF17-Wstate-GinsbergM-20200924.pdf
First off, let’s look at their main public objectives.
“1.Identify and advocate de-platforming of domestic and foreign social media extremist and hate incitement.
2.Advocate the de-platforming of the illicit sale of illegal substances.
3.Develop policy proposals to remedy the growing threat of fringe websites serving as “feeders” to super spread neo-Nazi, white nationalist incitement.
4.Pending Congressional action on Section 230 of the Communications Decency Act, promote creation of a new Social Media Standards Board. ”
note: Social Media Standards Board? Well that couldn’t possibly go wrong, now could it? And I wonder where the Coalition for a Safer Web would like them to draw their members from? Not hard to figure that one out.
Next, we get to the core of the “profit motive” as I mentioned.Key here is “recommend technological software”. Considering that two of the CSW’s higher ups are involved with a)content moderation software and b)artificial intelligence/machine learning, could it be possible that companies related to them MIGHT get recommendations? Call me a cynic.
“5.Recommend new policy and technological software which would better enable major social media companies to interdict and permanently de-platform incitement of extremist violence and acts of terrorism.
6.Interdict the usage of web-based social media platforms by ISIS and other radical Islamic terrorist organizations.”
They don’t list Russia directly in that list, but here is one of their proud accomplishments.
“The “Base”: Recommended to Congress additional economic sanctions on Russia for providing safe havens for far-right neo-Nazi groups and leaders, including Rinaldo Navarro, the leader of the notorious “accelerationist” neo-Nazi group known as “The Base.”
After this, Ginsberg basically blames Russia for everything from ANTIFA to Proud Boys to the heartbreak of psoriasis.
“Then on June 18, 2020, CSW issued another report disclosing that Eastern European and Russian-based white nationalist groups – some linked to the Russian Government’s Internet Research Agency – continue to incite racial violence during BLM protests via TELEGRAM. Our investigation also revealed that Russian-supported white nationalist groups based in St. Petersburg are being directly supported by the Kremlin or are receiving support to operate from St. Petersburg, including the next generation of members of “The Base.” These Russian-originating trolls are dispatching racist and anti-Semitic content via so-called feeder TELEGRAM accounts based in Hungary, Belarus, Ukraine, and Estonia. Finally, on July 22, 2020, CSW a third report revealing that it had uncovered dozens of TELEGRAM messages from both right-wing groups and ANTIFA ideologues recruiting individuals in Portland, OR to engage in violent protests against federal authorities and local police. Many of these intercepts hijacked the “BlackLivesMatter” hashtag and its variations, such as “Strike Force #BLM. ”
Ginsberg concludes by advocating for his “Social Media Standards Board”.
“But we are realists and we simply do not envision in the foreseeable future a bi-partisan agreement to achieve this objective – even splitting off from content immunity the extremist incitement rags which pass as websites, including GAB, 4chan, 8kun, and the other scum of social media catering to terrorists and funneling Russian disinformation and misinformation into our political discourse.
That is why CSW developed a public/private sector solution to tackle this dilemma – a new Social Media Standards Board (SMSB).
The SMSB would serve as a:•Transparent content moderation auditing organization to monitor compliance by social media companies of a new industry “code of conduct” developed with the participation of concerned citizens groups, social media companies, and the advertising industry – which is, after all, the industry with the most leverage over social media and which created a new Global Alliance for Responsible Media (GARM) to accomplish this goal.
•Forum to incubate and promote new technologies to assist social media companies to fulfill their own customer and vendor obligations to better manage and achieve verifiable commitments to de-platform extremist incitement, dis, and misinformation.”