Donate for the Cryptome archive of 65.000 files from June 1996 to the present

30 December 2011

WABC Interview about Anonymous

The recorded interview occurred at 9AM this morning. Klein was in Jerusalem, JYA in New York.

Related (not by JYA): http://cryptome.org/0006/anonymous-mused.htm


From: AaronKlein21[at]aol.com
Date: Fri, 30 Dec 2011 08:50:46 -0500 (EST)
Subject: Re: interview request - WABC Radio
To: jya[at]pipeline.com

excellent, got these.  Interview will be available on podcasts (www.wabcradio.com) and at my own site (www.kleinonline.com) after it airs live on Sunday [1 January 2012]. Interview will air at about 5:20 PM Eastern on WABC Radio (770 AM in New York).

In a message dated 12/29/2011 10:18:53 P.M. Jerusalem Standard Time, jya[at]pipeline.com writes:

Dear Aaron,

For your use if you wish here are a few points for the interview:

1. "Anonymous" is a term usable, and used, by a wide variety of persons, and does not indicate any particular group except as a transient means of identification and publicity.

2. The term has been in use for this purpose for a very long time and is not a recent invention.1

3. Most persons who have used the term are never identified.

4. The few persons who have admitted using the term, and then disclosed their true identity, have suffered for the admission, thus, it is considered to be rather dangerous to claim to be "Anonymous" due to heavy baggage it carries, in particular the risk of being scapegoated for much more than done.

5. There are innumerable permuations of the term, combined with prefixes and suffixes, which are used to indicate a particular person, group or initiative.

6. Anonymous and its permuations are frequently spoofed, forged, faked and lied about to disparage, provoke, anger, ridicule and goad into disclosure of true identity.

7. Many other anonymizing identities, pseudonyms2, aliases3, nicknames4 and false personas5 are in use and have been in use for a very long time -- true identities are often unstable.6

8. Many persons use multiples of false identities, especially online.

9. There are a host of means to profile users of anonymizing means and methods through language, writing, grammar, location, association, epithets, provocations, dares, insults, ploys, and other overt and covert manipulations.7

10. Betrayals and informants are common among anonymizing cultures, and an experienced user will never disclose true identity.8

11. Anonymizing cultures are heavily infiltrated by law enforcement officials, spies, counterspies, commercial spies, hackers, academics and others who monetize their knowledge of the cultures.8

12. For every open and public means to deploy anonymizing discourse there are multiples of private and secret means.9

13. Use of anonymizing will be greatly increased as a result of very poor privacy protection and security on the Internet, on telephone systems, on online communication systems, on postal systems, on banking, purchasing and commercial transactions, on governmental transactions, on personal transactions, on education, religious and non-profit transactions.

14. A principal benefit of recent hacks by "Anonymous" and WikiLeaks-like initiatives is to highlight the weaknesses of privacy protection and security systems, including national security, and undermine belief that legacy authorities can be relied upon to provide what they have long promised.

We can discuss other aspects as you prefer.

I would like receive a copy of the interview after broadcast.

Regards,

John

_____

At 11:31 AM 12/28/2011 -0500, you wrote:

can u do Sunday 3:20 PM Eastern? Also u have a few mins to chat for background today?

In a message dated 12/26/2011 7:47:05 P.M. Jerusalem Standard Time, jya[at]pipeline.com writes:

Hi Aaron,

It will be a pleasure to participate, on-air will be just fine.

Please suggest a day and time.

Regards,

John

212-873-8700


Notes:

1. Anonymous. First Known Use: 1563 [http://www.merriam-webster.com/dictionary/anonymous]

2. Pseudonym. First Known Use: 1833 [http://www.merriam-webster.com/dictionary/pseudonym]

3. Alias. First Known Use: 15th century [http://www.merriam-webster.com/dictionary/alias]

4. Nickname. Early as 1303 [http://en.wikipedia.org/wiki/Nickname#Etymology]

5. Persona. First Known Use: 1909 [http://www.merriam-webster.com/dictionary/persona]

6. Identity. 1560–70 [http://dictionary.reference.com/browse/identity]

7. http://www.mendeley.com/research/automatically-profiling-the-author-of-an-anonymous-text/

8. Writings, talks, lectures, chats and bulletin boards of, among others, Kevin Poulsen, Kevin Mitnick, Adrian Lamo, BernieX, Emmanuel Goldstein, Digital Gangster, Social Media, Wired (which cultivates, and specializes in reporting on, governmental informants and undercover agents).

9. Examples, among many others, BlackNet (Tim May), DarkNet (CCC), Anonymizers, The Onion Router, IntelNet, NSANet, SIRPRNet, LEO.gov, Tor Hidden Sites, MeshNets, Numbers Station, Mules, Burst Signals, Cellphone back and GPS channels, Wi-Fi back and GPS spectra, Military EM comms and GPS spectra, the vast global underground culture of informants, spies, black and gray markets, and secret facilities, finance, transport and incarceration.