mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
514 lines
29 KiB
Text
514 lines
29 KiB
Text
![]() |
==Phrack Inc.==
|
||
|
|
||
|
Volume 0x0e, Issue 0x43, Phile #0x03 of 0x10
|
||
|
|
||
|
|=--------------------------------------------------------------------=|
|
||
|
|=-----------------------=[ Phrack World News]=-----------------------=|
|
||
|
|=-------------------------=[ by EL ZILCHO ]=-------------------------=|
|
||
|
|=----------------------=[ elzilcho@phrack.org ]=---------------------=|
|
||
|
|=--------------------------------------------------------------------=|
|
||
|
|
||
|
|
||
|
1. The TJX Case and the Longer Arm of the Law
|
||
|
|
||
|
2. Stuxnet, Cyberwar, Hacktivism and Political Hacking
|
||
|
|
||
|
3. Wikileaks and Whistleblowing
|
||
|
|
||
|
4. Scene Events: the Final Word
|
||
|
|
||
|
-------------------------
|
||
|
|
||
|
|
||
|
--[ 1. The TJX Case and the Longer Arm of the Law
|
||
|
|
||
|
When the going gets weird: The TJX crew / Probation for the narqs, tough
|
||
|
sentences for the hard luck crowd / The longer-reaching arm of the law
|
||
|
|
||
|
Computer crime and hacking have always made for uncomfortable bed fellows,
|
||
|
splitting hackers into two general camps; The laissez-fair consideration
|
||
|
of those who know they commit several technical crimes before even getting
|
||
|
out of bed in the morning, and those whose fear of the law drives them,
|
||
|
essentially, straight -- condemned to endless nights in front of a
|
||
|
debugger with nary an unauthorized rootshell to be seen.
|
||
|
|
||
|
So where to draw the fuzzy line under the TJX crew, from the manipulating
|
||
|
Gonzales, who narqed out #phrack opers early in 2003, to the erstwhile
|
||
|
seven-foot tall computer programmer the_uT who faces two years in the cage
|
||
|
and a $172.5 million restitution for the writing of a simple computer
|
||
|
program that most of us could have written at age fifteen, under the
|
||
|
influence of ketamine or not?
|
||
|
|
||
|
PWN corespondents have viewed the original source code to 'blabla' and can
|
||
|
attest that it consists of nothing more than a read loop from a raw socket
|
||
|
on a high port outputting, unformatted and unfiltered, data to a file. To
|
||
|
say that tcpdump is a far more sophisticated piece of software for data
|
||
|
thiefing is not an exaggeration.
|
||
|
|
||
|
At least we can say with a comforting certainty that the fine old art of
|
||
|
narqing like a pro will still get you out off the hook in times of phear
|
||
|
and stress. As many old-timers will attest, narqing has been a fine
|
||
|
defensive tradition among hackers over the years, with many well-loved
|
||
|
figures of hacker mythology, from Chris Goggans to Agent Steal, being firm
|
||
|
believers in the practice.
|
||
|
|
||
|
The TJX case has been a prominent reminder of the efficacy of the ancient
|
||
|
technique of daubing one's mates in, with all sides planting knives
|
||
|
between shoulder blades with sickening alacrity and producing some truly
|
||
|
Olympic-grade scores in the Freestyle 100m Narq -- to wit, among others:
|
||
|
|
||
|
* Patrick 'eckis' Toey who faced a maximum sentence of twenty-two years,
|
||
|
reduced to a paltry five years by merit of supplying 'extensive
|
||
|
cooperation' to the authorities.
|
||
|
|
||
|
* Breakout act Jeremy 'horse addict' Jethro -- evidently the star of the
|
||
|
case -- managing to not only narq out everyone he knew, but then managing
|
||
|
to find his Saviour in Our Lord Jesus Christ AND being fined less than
|
||
|
what he actually earned for his crimes (thus earning a nice little
|
||
|
profit); He also managed to get his sentence commuted to probation, on top
|
||
|
of everything else! Once again, this is solid proof that God is indeed on
|
||
|
the side of the just.
|
||
|
|
||
|
* Albert 'soupnazi' Gonzales -- the sole failure here, scoring miserably
|
||
|
by still receiving a massive twenty-year sentence despite having
|
||
|
implicated everyone he knew up to and including his own grandmother
|
||
|
|
||
|
-- and that's just for starters.
|
||
|
|
||
|
The most disconcerting element in the entire show so far for anyone in any
|
||
|
way involved in any sort of criminal activity (or, indeed, anyone who
|
||
|
involves themselves in anything anywhere near anything resembling criminal
|
||
|
activity), is the startling comaraderie and friendly interaction between
|
||
|
international agencies - particularly Interpol and the FBI. Especially the
|
||
|
FBI.
|
||
|
|
||
|
Recent international busts involving novel interaction between agencies
|
||
|
has lent heavy weight to previously unfounded concerns of privacy
|
||
|
advocates. The mere idea of a foreign national's being arrested overseas
|
||
|
and renditioned/transferred to the custody of American civilian agencies
|
||
|
purely on the basis of American testimony and evidence is enough to turn
|
||
|
the stomachs of anyone, and yet it seems to have gone largely under the
|
||
|
radar -- especially among American Citizens.
|
||
|
|
||
|
The pseudo-criminal actions necessitated by the various agencies involved
|
||
|
in order to bring down Gonzales would stagger even the most ardent
|
||
|
Republican waterboarder. To wit, the hard drives belonging to Ukrainian
|
||
|
carder Maksym 'Maksik' Yastremskiy were cloned during his trip to Dubai
|
||
|
and yet again when he was coerced into visiting someone in Turkey (all the
|
||
|
while while US agencies tried to tote the party line that they caught him
|
||
|
while he was taking "vacation" -- conveniently ignoring the fact that they
|
||
|
lured him to visit) and his movements tracked throughout Europe and Asia
|
||
|
over an extended period of time. We can be sure that Interpol had not the
|
||
|
gumption nor Ukrainian officials the interest (or resources) to bring
|
||
|
about this level of interplay. With the evidence in hand, surely only the
|
||
|
FBI can be to blame? The Turkish officials got to crow about a 30 year
|
||
|
prison sentence -- in a Turkish prison, no less -- and the US got to cross
|
||
|
one more name off their "to do" list, case closed, job done -- success all
|
||
|
around.
|
||
|
|
||
|
Further confirmation of such a hearty and hale level of cooperation was
|
||
|
provided just this past October by the FBI, who affirmed that the break-up
|
||
|
of a major Zeus botnet ring was the result of an "unprecedented"
|
||
|
partnership between the FBI and police forces around the world including
|
||
|
the UK's Metropolitan Police, the Security Service of Ukraine (SBU) and
|
||
|
the Netherlands Police Agency. So far the international Operation Trident
|
||
|
Breach effort has yielded more than 150 arrests across the US, the UK and
|
||
|
Ukraine, the FBI said. One can assume that's only "so far" and that once
|
||
|
the narq ball gets rolling, yet more waves of arrests -- and yet more
|
||
|
international cooperation -- will commence in earnest.
|
||
|
|
||
|
Perhaps you are wondering what this has to do with you, at this point.
|
||
|
Perhaps you ARE merely doing your job as a whitehat, researching these
|
||
|
transglobal "criminal conspiracies", reversing malware, sticking to only
|
||
|
machines you have permission to access, maybe even contributing to some
|
||
|
open source projects and communicating giddily about 0day bugs on bugtraq
|
||
|
and full-disclosure, or releasing exploit information on your twitter
|
||
|
feed; after all, in this wired global age, the opportunities for
|
||
|
collaboration are indeed unprecedented. But where does one's level of
|
||
|
responsibility for the use of one's research end and begin? Dig Sklyarov
|
||
|
and the DMCA brouhaha. Witness certain unnamed Linux distros suddenly
|
||
|
being unwilling to allow tools such as SQL Ninja to be included in their
|
||
|
source code repositories.
|
||
|
|
||
|
At what point might YOUR code be considered a munition? At what point
|
||
|
might your totally legitimate work as a whitehat (or greyhat, or what have
|
||
|
you) researcher, or pentester, or even systems administrator or website
|
||
|
developer be called into question? While it is certainly difficult to
|
||
|
argue that putting identity thieves behind bars is a quote-unquote "bad
|
||
|
thing", it is also difficult to refute that code itself is being seen as a
|
||
|
munition (just as crypto was not so long ago, and probably will be
|
||
|
increasingly so again, as time passes and the reins tighten up in only
|
||
|
somewhat predictable ways).
|
||
|
|
||
|
If you mistakenly introduce an error into your codebase at work and it
|
||
|
creates a security hole, can you prove it was not intentional? There
|
||
|
really are no guarantees. An overly aggressive legal system will at the
|
||
|
very least threaten to steal time, money, resources, and quite probably
|
||
|
your reputation.
|
||
|
|
||
|
If you're very unlucky you might wind up in jail, or in trouble for
|
||
|
something someone you know was involved in, in hopes that you will be the
|
||
|
next hacker willing to daub in his (or her) mates to be set free, thus
|
||
|
maintaining the cycle of narqing and providing an always-revolving door of
|
||
|
the Usual Suspects to lay blame to. That's not even including the Patriot
|
||
|
Act and wiretaps (an issue pretty much deserving of its own article some
|
||
|
other time).
|
||
|
|
||
|
The exposure of Google's Street View Wifi data gathering fiasco is likely
|
||
|
only the tip of the iceberg -- what we were told was the accidental coding
|
||
|
error of a single engineer (who probably will wear that virtual scarlet
|
||
|
letter on his resume for life). And yet again, in that case, other
|
||
|
countries were first to protest; only lately has there been a strange and
|
||
|
questionable desire TO have those records retained -- for what purpose who
|
||
|
only knows.
|
||
|
|
||
|
The question to wrap all of this up with, here, probably isn't "Does it
|
||
|
affect you now?" (unless you are indeed a blackhat, in which case, no
|
||
|
doubt, this will impact you tremendously). The question is "can you be
|
||
|
sure it never will?"
|
||
|
|
||
|
|
||
|
--[ 2. Stuxnet, Cyberwar, Hacktivism and Political Hacking
|
||
|
|
||
|
It's no secret that, with the US economy in a state of planned poverty,
|
||
|
conventional sense. But the growing speculation, that Iran's nuclear
|
||
|
power plant at Bushehr will turn into a weapons program, is a timely
|
||
|
excuse for governments to exercise their newfound cyber warfare tactics.
|
||
|
Iran believes Stuxnet was intended to derail its nuclear ambitions; and
|
||
|
"analysts" expect us to believe that a string of numbers, the name of some
|
||
|
shrubbery, futbol domains, and weird 2012 shit... somehow indicates Israel
|
||
|
was behind it all. The reality is probably this: as much as Israel's
|
||
|
super star hacking squads would love to take down Bushehr, Russia is
|
||
|
standing in the way, defending its plan for a return on investment.
|
||
|
|
||
|
Stuxnet represents just one of a few big events in this arena since last
|
||
|
issue. We've also had Aurora and that whole Google scandal in China.
|
||
|
Hildawg has been bitching about China from the start, and it came as no
|
||
|
surprise that pressure would be put to bear on big companies, like Google,
|
||
|
to defame China's government in the midst of a GFC. More recently,
|
||
|
Europe's cyberwar simulation has been hailed as a success, with countries
|
||
|
across the EU learning to defend against over 300 attacks. This marks
|
||
|
another milestone in the EU's attempt at coordinating intraregional
|
||
|
cybercrime investigations. Across the Atlantic, USCYBERCOM has finally
|
||
|
gone live. While governments prefer to keep their military hax a secret,
|
||
|
there exists a necessity for them to demonstrate their power. Welcome to
|
||
|
a whole new wave of terror, hackers.
|
||
|
|
||
|
The majority of high profile attacks in the last year show a trend towards
|
||
|
highly skilled and targeted hacks that take a lot of time and/or money to
|
||
|
develop. In these cases there is minimal collateral damage, months may
|
||
|
pass before detection, the hackers are anonymous, and the vector is
|
||
|
unique. While these are still large-scale attacks, they're not intended
|
||
|
to affect the entire internet -- just a select few major players, and
|
||
|
sometimes only for a short while. As corporations and governments throw
|
||
|
big bucks into cyber warfare we're going to start to see some of the big
|
||
|
names in the IT industry get left behind.
|
||
|
|
||
|
The continued DDoS of Burma, in the lead-up to its first election in over
|
||
|
20 years, showed a recent and unwelcome return to stupidity and ignorance
|
||
|
at a rate of 10-15gbps, easily dwarfing the Estonia DDoS of 2008. Amnesty
|
||
|
International had been working hard to get radios into Burma, so that
|
||
|
people could keep up with the election news from across the border. Days
|
||
|
after the election, their Hong Kong website was compromised and visitors
|
||
|
were attacked with an IE exploit that Microsoft knew about, but blatantly
|
||
|
refused to patch early.
|
||
|
|
||
|
On the same day that the Burma DDoS began, the Iranian Cyber Army
|
||
|
announced its "botnet for hire", though it is rather unlikely that there
|
||
|
is a substantial link between the two. Their admin system is some kind of
|
||
|
honeypot, their stats are fake, and surely the very idea should have
|
||
|
screamed of an obvious trap. But as the news started to spread, bloggers
|
||
|
began recycling news media, and slower reporters started relying on those
|
||
|
bloggers, until we started coming across reports that ICA was renting out
|
||
|
"the same botnets that took down Twitter and Baidu". Uh, sorry? Last
|
||
|
time I checked, social engineering a dude at Register.com didn't require a
|
||
|
botnet.
|
||
|
|
||
|
But hey, maybe there is a botnet, or at least one in development. It's
|
||
|
hardly as though ICA are the first to do so. But their treatment by news
|
||
|
media is ridiculous. I mean, if these guys really are an "army" then just
|
||
|
where were they when Honker struck out in retaliation for Baidu's
|
||
|
defacement earlier this year? Unfortunately the media still clings to
|
||
|
them because of a handful of high profile defacements. And because they
|
||
|
tend to pop up every time something big happens, some journalists actually
|
||
|
think these kids are an officially sanctioned military force that reports
|
||
|
to Ahmadinejad himself! I don't believe, for a second, that they're even
|
||
|
Iranian to begin with.
|
||
|
|
||
|
On the related note of poor-man's hacking, we're also seeing a rise in
|
||
|
grassroots hacktivism. Social networking sites are making it increasingly
|
||
|
easy to inspire angry mobs of ordinary computer users to take part in a
|
||
|
DDoS by clicking a link. Years ago we laughed at those kinds of methods
|
||
|
(remember the cDc's hacktivismo?). But we're not on dialup anymore, and
|
||
|
there's not a lot you need to get your own "human-net" started -- just a
|
||
|
persuasive cause and a handful of idiot-proof programs. LOIC is popular
|
||
|
for this, as are websites that send GET requests in iframes over and over
|
||
|
and over. Next thing you know, there's thousands upon thousands of stupid
|
||
|
tweeters, staggering forth like something out of Resident Evil. This
|
||
|
isn't even including the more normal botnets that use sites rely on
|
||
|
Twitter for commands. Throw that into the mix and Twitter becomes some
|
||
|
kind of pluralistic middle-class pseudo-political force to be reckoned
|
||
|
with. Law enforcement seem to just give up in those cases. Too many
|
||
|
people to chase. Not enough resources to prosecute them all. The most we
|
||
|
see is the instigators of these human-nets being hunted down. As the RIAA
|
||
|
and MPAA attacks showed us, Anonymous ain't so anonymous when they plan
|
||
|
their attacks in the open, in front of feds, on 4chan and Darknet.
|
||
|
|
||
|
The trend toward military-directed cyber attacks is prompting some
|
||
|
academics to call for a change to the laws that regulate the conduct of
|
||
|
hostilities in war. They are questioning whether a country can remain
|
||
|
neutral in a cyber war if the data carrying the attack travels along that
|
||
|
country's pipelines. Some militaries insist that for hackers to qualify
|
||
|
for "prisoner of war" status, these geeks must wear a special hacker
|
||
|
uniform and carry a sidearm (I like to think this uniform would look like
|
||
|
TRON Guy).
|
||
|
|
||
|
And then there's the question of whether something like Stuxnet can be a
|
||
|
legal impetus for conventional war. The real beauty of Stuxnet isn't just
|
||
|
in the code (as specialised and 0-day as it may have been) -- it's also in
|
||
|
the attack vector. If you conveniently lose your malicious USB key in a
|
||
|
parking lot, and some "unscrupulous person" picks it up and decides to use
|
||
|
it at work... YOU are not committing an attack -- at least not directly
|
||
|
(one could argue, after all, that they had no business picking up the usb
|
||
|
key in the first place). Moreover, philosophical arguments aside, if
|
||
|
you're a civilian, the likelihood of you being charged with anything is
|
||
|
extremely remote. Add all of this to the essential argument that hacking
|
||
|
cannot be considered an act of war necessitating self-defense unless the
|
||
|
hack can be compared to a substantive and conventional military attack,
|
||
|
and conventional arguments are essentially thrown out the window. In other
|
||
|
words, in the case of Stuxnet, while Iran recognises there was espionage,
|
||
|
and possibly an intentional attack, the worm was not an "armed attack"
|
||
|
sufficient to qualify self-defense under the UN Charter.
|
||
|
|
||
|
In sum, if the events occurring since the last issue has been anything to
|
||
|
go by, the next decade will see a growing disparity between the nature of
|
||
|
high-profile hacks, but at the end of the day the bulk of it is the same
|
||
|
old same old, with some new shit thrown in. Militaries are fast becoming
|
||
|
a cyber-force to be reckoned with, but in the absence of laws to regulate
|
||
|
their actions, don't expect bombs to fall as a result. While it is most
|
||
|
probably that the recent spate of uniquely targeted high-profile attacks
|
||
|
will go unpunished, what we can expect is the government to play an
|
||
|
increasing role in regulating the Internet and hunting down ordinary
|
||
|
hackers in the name of a "war on cyber terrorism".
|
||
|
|
||
|
|
||
|
--[ 3. Wikileaks and whistleblowing
|
||
|
|
||
|
But what of Wikileaks? While it is undeniable that it has had some impact,
|
||
|
one must ask oneself if we are not just raucously accepting as a date to
|
||
|
the prom the only girl who asked us out and considering ourselves lucky to
|
||
|
have found anyone at all. One could argue that when a society needs a
|
||
|
hero, someone will always be willing to show up fighting, but the same
|
||
|
could be said of most movements, even including the upstart 'Tea Party'
|
||
|
being cawed about on Fox News to cheers by the same people who would have
|
||
|
voted for Obama if they'd been Democrats instead of Republicans. Perhaps
|
||
|
it's unfair to tilt this article so specifically in the direction of the
|
||
|
US -- after all, Wikileaks has shed some light on some tremendously
|
||
|
important stories in the three or four years since its inception -- but
|
||
|
it's hard to argue that 2010 was the year that Wikileaks came to true
|
||
|
nation-wide attention, due in no small part to a certain "redacted" video
|
||
|
going by the sobriquet "Collateral Damage", and then fueled by the
|
||
|
document dumps ostensibly leaked by US insiders concerning Iraq and
|
||
|
Afghanistan that came not long thereafter.
|
||
|
|
||
|
Yes, we have a responsibility to make information acceessible, or at least
|
||
|
make the knowledge of how such information is stored and used more public,
|
||
|
less draconian and redolent of a country poised to curtsy/bow to 'Mein
|
||
|
Fuhrer' but we also have a responsibility to treat that information with
|
||
|
respect, and more importantly to be able and willing to filter that data
|
||
|
through the sieve of common sense and reason: Data should be valuable
|
||
|
because it is valuable data (and in some cases the releases by Wikileaks
|
||
|
have indeed been valuable data) and not valuable simply by the reasoning
|
||
|
that "they don't want us to have it."
|
||
|
|
||
|
By the same token, sometimes the very act of sticking the proverbial
|
||
|
middle finger up at The Man serves as a call to arms -- or at the very
|
||
|
least a rate limiter: A way to urge the current Powers That Be to think a
|
||
|
little more before trying to instituting even further privacy eroding
|
||
|
measures. Conversely, it is all too easy for any country to consider any
|
||
|
"leak" -- righteously whistleblowing or not -- as an act of war, or an
|
||
|
excuse to add a few zeros to a department's line budget.
|
||
|
|
||
|
And there's something else we all need to be thinking about:
|
||
|
|
||
|
Every country, every war, every movement has secrets. We may tell
|
||
|
ourselves that information wants to be free, but freedom comes with a
|
||
|
price and some secrets are GOOD secrets. More importantly there OUGHT to
|
||
|
be some secrets in the world.
|
||
|
|
||
|
To completely submit to Wikileaks' vision is almost more akin to Big
|
||
|
Brother than anything the US government -- or any other government --
|
||
|
could possible create on its own: A culture where your every move may be
|
||
|
exposed, your every thought may be tallied, your every minutiae published
|
||
|
for the whole world to see, in a world where Google gambols giddily in the
|
||
|
grasses of greed and Facebook and Twitter announce to the world your every
|
||
|
move to a perceived audience of enthralled onlookers all willing to say
|
||
|
'you!' when you say 'ah, me!'. In a way we're already most of the way
|
||
|
there, and that's a very dangerous thing. When your baseline gets reset
|
||
|
and you don't REALIZE that your privacy is being invaded, then the great
|
||
|
big "They" has already won -- and you have just let yourself do the dirty
|
||
|
work for Them.
|
||
|
|
||
|
One could argue that if PFC Manning did indeed leak what has been
|
||
|
attributed to him, he may have done a heroic thing, but the fact that he
|
||
|
may have also broken a trust that he covenanted into in advance with the
|
||
|
US government is difficult to completely discount. The Manning case having
|
||
|
received the attention it has gotten this year has brought up a lot of
|
||
|
grey areas in peoples' political belief systems, but it has also begged
|
||
|
the question: What *is* "whistleblowing" and what is "disloyalty"? What is
|
||
|
"patriotism" and what is "narqing"? When can one trust one's judgment
|
||
|
about another person's true intentions and is it truly as cut-and-dry as
|
||
|
we all wish it would be? Adrian Lamo snitched, but it is always possible
|
||
|
that he thought he was protecting himself or his country even as he may
|
||
|
have also been trying to cobble together some newfound publicity for a
|
||
|
receding career that has been inarguably past its prime for years now. At
|
||
|
some level this isn't about government or whistleblowing or privacy --
|
||
|
it's about society and about interpersonal trust, and perhaps that is
|
||
|
where things get the murkiest. Naive or not, trust is dealt out
|
||
|
increasingly to total strangers on the internet. One could argue that
|
||
|
Manning, if indeed that was Manning, was naive in trusting a veritable
|
||
|
stranger, but most of us do this on a regular basis now; the difference
|
||
|
here is, Manning paid.
|
||
|
|
||
|
Without an explicit agreement of nondisclosure one cannot truly and
|
||
|
totally scorn somebody for "squealing", but by the same token our very
|
||
|
society has been built up on such simple and implicit bonds of trust: I
|
||
|
will not hurt you, I will not steal from you, I will not betray you. I may
|
||
|
not agree with what you do, but I respect your choices as an individual.
|
||
|
At what point does that trust need to be broken off? Some secrets are
|
||
|
good, if they contribute to the greater good of society -- and that goes
|
||
|
*both* ways -- at times in favour of the individual, at other times in
|
||
|
favour of government. As a species we always want to root for the Underdog
|
||
|
(and nowhere is this more true than the US, perhaps), but given the fast
|
||
|
fluxing nature of the Internet, who the Underdog is can flip at a second's
|
||
|
notice: At first Wikileaks was the cause celebre of people everywhere,
|
||
|
then came the backlash. All movements have backlashes, and Wikileaks was
|
||
|
bound to not be the exception.
|
||
|
|
||
|
Perhaps one reason so many scorn Wikileaks has to do with the closed-book
|
||
|
nature of a site so overtly and devoutly espousing transparency; at some
|
||
|
point it becomes difficult not to interpret all sides as playing with
|
||
|
similar playbooks. But it's difficult to win at poker at a table where
|
||
|
everybody knows your cards, especially when the rest of the players have
|
||
|
bankrolls that far eclipse your own. Again, the question arises: When is
|
||
|
transparency necessary, and when is secrecy a requirement to make any
|
||
|
progress at all? On the one hand, one must worry about too much
|
||
|
transparency; on the other hand, one must worry about too much lurking in
|
||
|
the shadows. In the past we had journalists to expose corruption; now it
|
||
|
is often journalists themselves fighting off corruption charges, hiding
|
||
|
facts, skewing evidence.
|
||
|
|
||
|
It's incredibly difficult to deny that some transparency, and indeed
|
||
|
Wikileaks itself, can have a positive impact -- and it's hard to imagine a
|
||
|
world where SOME sunshine shouldn't be shed; The trick here is to remember
|
||
|
that such increased levels of exposure demand we be a more responsible,
|
||
|
measured animal -- something as homo sapiens we have really never learned
|
||
|
how to do or be.
|
||
|
|
||
|
There is no way to shove the genie back into the bottle, and old rumours
|
||
|
on the Internet never really die -- they just get archived til someone
|
||
|
else manages to come along and dig them up from their temporary graves.
|
||
|
This holds great promise for the future of integrity, but it also creates
|
||
|
issues when the possibility of outright falsehoods are introduced,
|
||
|
especially through an anonymous third party, or in cases where a split
|
||
|
exists between haves and have-nots; who really has time to monitor their
|
||
|
reputation online to that level? And if someone does besmirch your name,
|
||
|
what can be done?
|
||
|
|
||
|
If your data shows up on a whistleblower site care of a third party, then
|
||
|
it also becomes yet another way to show a display of power: The
|
||
|
Vice-Presidential hopeful breaks the rules -- nay, the law -- and walks
|
||
|
free while the college student who guesses at her password gets sentenced
|
||
|
to a year of supervision or prison. If there is to be light shed, then it
|
||
|
should be an equally penetrating (and perhaps softer) light -- not a light
|
||
|
meant to shine in the victims' faces and hide the face of the perpetrators
|
||
|
-- especially when the label of 'victim' and 'perpetrator' is so murky and
|
||
|
grey (as in the Palin case; one could argue both sides committed some form
|
||
|
of fault).
|
||
|
|
||
|
Julian Assange likes to say 'speak truth to power" but this is a tall
|
||
|
order; to first be able to speak ANYTHING to power, you must basically
|
||
|
gain the ear of the powerful, or you just get thrown
|
||
|
into an eddy, left to whirl around with a bunch of kooks and nutjobs (as
|
||
|
any federal agent handling walk-ins will likely attest to, and too, so
|
||
|
must whistleblowing sites contend with; with fame
|
||
|
comes your own raft of nutjobs to weed out).
|
||
|
|
||
|
It'd be hard to deny that whatever else Wikileaks has accomplished in the
|
||
|
past year, it has gotten someone's attention. Whether that will be a good
|
||
|
thing or a bad thing remains to be seen... But one imagines any call to
|
||
|
arms must bring about some force for good, even if that force is something
|
||
|
as simple as a renewed spirit of vigour and willingness to be involved
|
||
|
among an otherwise sluggish populace juggling its own sense of
|
||
|
powerlessness in a country demanding what essentially constitutes sexual
|
||
|
assault merely in order to board an airplane. To make an omelet you must
|
||
|
first break some eggs; To create a change you must first gain the ear of
|
||
|
not just power but the people itself -- and then you must charge them with
|
||
|
the duty to act.
|
||
|
|
||
|
The true collateral damage may wind up being Manning himself, here;
|
||
|
basically judged guilty already, his name forever stored, his
|
||
|
acquaintances being hassled, his personal life bared open to the
|
||
|
world, he serves as both an example of what to strive for and a
|
||
|
cautionary tale for a new age. What the future holds for him remains to be
|
||
|
seen, but with any luck he will receive a fair trial by a jury of his
|
||
|
peers -- if any such people even exist.
|
||
|
|
||
|
Wikileaks may not be perfect -- in fact, it may be deeply flawed -- but
|
||
|
for now it's probably all we're going to get. And we should probably be
|
||
|
grateful for it -- but wary. Always wary. The danger of mixing the message
|
||
|
up with the messenger is always great, and there is no real way for any
|
||
|
whistleblowing site to always be 100% correct. Even governments have an
|
||
|
incredible amount of difficulty verifying the veracity of any information
|
||
|
or separating rumours from fact; to put this level of blind trust in a
|
||
|
volunteer organization with no oversight is bound to be fraught with a
|
||
|
whole host of issues we haven't seen the likes of yet... For instance,
|
||
|
what happens when a non-governmental entity views it as a potential source
|
||
|
of information? Once any whistleblowing site gets information, it is out
|
||
|
there; what is done is done; At this point, false flags and disinformation
|
||
|
is also an issue; the possibility of tricking any whistleblower site to
|
||
|
publish false information would destroy not only its credibility if found
|
||
|
out but possibly be used to forward some governmental or non-governmental
|
||
|
party or agenda. Additionally, to believe everything that any organization
|
||
|
says is as short-sighted as believing everything your government tells you.
|
||
|
|
||
|
Ultimately your conscience will have to be your guide -- and likely no two
|
||
|
consciences will ever completely agree, especially about anything as
|
||
|
at-times agit prop as Wikileaks can be, or as secretive as governments
|
||
|
have always been.
|
||
|
|
||
|
|
||
|
--[ 4. Scene Events: the Final Word
|
||
|
|
||
|
To be sure, many other events have taken place this past year and a half
|
||
|
(the whitehat-vs-blackhat wars forever raging (cue zf05 and the
|
||
|
never-ending arguments about disclosure-vs-nondisclosure); the global
|
||
|
emergence of a harsher, more organized form of cybercrime (and the many
|
||
|
busts that resulted); etc, etc), but several basic themes emerge: There
|
||
|
has been fraud -- but there has always been fraud. There have been
|
||
|
invasions of privacy -- but there have always been invasions of privacy.
|
||
|
There have be governments overstepping their bounds -- but there have
|
||
|
always been governments overstepping their bounds. That doesn't make any
|
||
|
of it acceptable, but it also doesn't make any of it new -- nor does it
|
||
|
give any of us an excuse to pretend it has nothing to do with us (no
|
||
|
matter where you reside or what flag you fly (or choose not to fly,
|
||
|
whatever the case may be)). If anything, there has been an amplification
|
||
|
of all of the above, but none of it is truly 'new'. Read past issues of
|
||
|
Phrack: All of the above has existed in some form or another, just on a
|
||
|
smaller scale. It's still existed.
|
||
|
|
||
|
Judging by the drive for wealth or fame or infamy displayed in so many of
|
||
|
this year's stories, it bears mentioning that we cannot let a few key
|
||
|
players make us forget how important it is to treat technology
|
||
|
responsibly, reasonably -- to love it, to hack it, to, please, take risks,
|
||
|
but to do so with heart
|
||
|
|
||
|
-- with CONSCIENCE --.
|
||
|
|
||
|
In the end it all starts and ends with you.
|
||
|
|
||
|
[EOF]
|
||
|
|
||
|
|
||
|
|