Donate for the Cryptome archive of files from June 1996 to the present

20 January 2012

Mega Echelon Option


At 02:12 PM 1/20/2012 +0100, Eugen Leitl wrote:

>On Sat, Jan 21, 2012 at 01:52:01AM +1300, Peter Gutmann wrote:
>
>> Kim Schmitz ([Kim Dotcom] or whatever he's calling himself this week) is a survivor.
>> He'll be back, even if Megaupload isn't.
>
>If the charges stick he'll be out of circulation for a while.

Date: Fri, 20 Jan 2012 09:21:11 -0500
To: Eugen Leitl <eugen[at]leitl.org>, Peter Gutmann <pgut001[at]cs.auckland.ac.nz>, cypherpunks[at]al-qaeda.net
From: John Young <jya[at]pipeline.com>
Subject: Re: Megaupload.com seized

Harking back to the Echelon era, it is worth noting that those five countries - US, UK, AU, CA, NZ - are in the forefront of mega-managing the security of the Internet, no doubt refining and expanding the technological tools and sneaky extra-legal practices to work their combined will on global communications.

Gaining access to MegaUpload's emails, business records and financial affairs likely required several multi-jurisdictional actions not only by the Echelon partners but also by allies such as those in NATO.

As often discussed here, the use of military capabilities developed for national security for civilian criminal affairs matters is amply indicated in the MegaUpload indictment.

Indicting MegUpload in the US, in particular in the Eastern District of Virginia, the pre-eminent national security court, also indicates a bias toward national security undergirding arguments for economic security threat. That too was often debated here in the crypto wars of the 1990s.

Recent defense funding authorization of holding alleged terrorists indefinitely, keeping Gitmo alive, SOPA, PIPA, MegaUpload, Bradley Manning, WikiLeaks, huge funding increases for openly hiring hackers and paying those undecover to rat on cohorts, also reminds of the extra-legalities and betrayals of the early public crypto era.

From those crypto lessons -- aspirations to use technology to beat government, then gradual co-optation by legal threats, bribes, scholarships, contracts, stigma, isolation, betrayals, call that the After Echelon Option -- it should be expected that the same means and methods will be used in cyber wars, offense and defense mutually aggrandizing one another.

Backdoors and trojans in widely trusted comsec, crypto and browsing tools; deep packet sniffing and co-optation of sysadmins; false flag attacks, virii, bots and Stuxnets to boost protection funding; super-enhanced capture of EM emanations from every electronic and digital means; unfettered black bag jobs and KVM loggers; enlisting thousands of covert cyber agents as "freedom fighters;" recruitment of educational institutions as cover for spying; promotion of books, articles, news reports and lectures for indoctrination about external threats to divert attention from the internal; these and more are the legacy of Echelon and its new, social media counterparts adeptly mega-managed through legal, extra-legal, illegal and secret access to private data of citizenry worldwide. Once the Echelon enemy was a few other nations, then global terrorists, now it is everyone who questions authoritatives.

Note that there have been a slew of seeming public interest comsec initiatives -- websites, mail lists, bloggers, conferences, research, public relations, anonymouses, just about any that have gotten unusual attention -- in recent years to address cyber threats combined with threats to privacy, veritably in lock step with cyber war open and secret funding. Observing the particpants in these activities there are quite a few recognizable warriors from the crypto-comsec-privacy wars.

Fine minds and good hearts still proposing technological solutions to the issues, warning of legal if not military opposition, oiled with a bit of venal self-advancement in the Jason Granier and "Mudge" mode. Op-eding and ginning up more technical-legalistic fixes to comsec and privacy, reminding of past errors and promises gone awry, sniping at one another, admitting NDA withholdings, apologizing for aiding government and commerce, shading arguments as exquisitely as highest-paid lobbyists and academics, parading an impressive list of coms, edus and orgs after the nyms.

Optimistically, using the wind down of the Cold War as a precedent, when crypto wizards came of out of classified realms due to decline of nat sec jobs, the wind down of GWOT could lead to comsec wizards coming out of similarly classified realms to aid civilians against those comsec wizards remaining in the world of secrecy worldwide.

It would be a swell outcome of classified research to heed its inherent dual use once again on the dual use Internet: between those who want to control it with an iron hand of government and commerce and those who want to free it from that hand. That will depend upon who gets paid to betray the public and those who defend the public.

It is not easy to tell who is who since both copy one another's language, behavior and promises -- most of the charges against MegaUpload, and allegations against Anonymous, could be applied to official spies and globalist "justice" cartels both backed by big-iron-fisted militaries. Call that duality the Mega Echelon Option.