Anarchist responsibilities at this time
Extreme state terrorism and extreme repression including kidnapping and torture by secret police demands extreme civil disobedience.
Anarchist responsibilities at this time
While the vast majority of anarchists remain pacific I still argue under diversity of tactics doctrine for a most stringent response to out-of-control state terrorism. Offence IS the best defence but here is the smart play to bring down the last uberstate. Global Intidada attacks can only be expected to ramp up ...wouldn't you press on if you were winning WW4?
Of course... and these attacks may be seen , not just as ,' the price of doing business' or even ' hot pursuit' but also as a kind of natural catastrophe. Then, when we follow up any fresh attack on say, the pentagon, with a massive email hoax campaign to fake out first responders we would be acting in the best anarchist traditions I believe.
Propaganda of the deed, the Mahknovista, Durruti column, Sabate, Actione Directe, June 2cnd, Blac blocista's and etc, etc.
Provided precautions are taken this should be safe. By precautions I mean attention to security culture such as ' Don't ask-don't tell' and ' Need-to-know' cell structure.
Also use of proxies, cut-outs, air-gaps and strong crypto.
Alternatively some may just ' let-it-all-hang-out' Jim Bell style and dare the state to tip it's hand. Extreme provocation demands extreme civil disobedience up to and including darth threats.
It puzzles me actually that the death states hangmen and stormtroopers are able to lead such fear free lives.
The following info is from a death star PDF and contains extracts only for the rebel alliance. May the force be with us.
Anarchist capabilities for synergistic attacks on Amerikkka
9 Many security experts agree that a cyberattack would be most effective if it were used to amplify a conventional bombing or CBRN attack.
To date, the Federal Bureau of Investigation (FBI) reports that cyberattacks attributed to terrorists have largely been limited to unsophisticated efforts such as email bombing of ideological foes, or defacing of web sites. However, it says their increasing technical competency is resulting in an emerging capability for networkbased attacks. The FBI has predicted that terrorists will either develop or hire hackers for the purpose of complimenting large conventional attacks with
cyberattacks.1
Some experts reportedly state that the Internet is now a prime recruiting tool for insurgents in Iraq.5 Insurgents have created many Arabic-language Web sites that are said to contain coded plans for new attacks. Some reportedly give advice on how to build and operate weapons, and how to pass through border checkpoints.6 Other news articles report that a younger generation of terrorists and extremists, such as those behind the July 2005 bombings in London, are learning new technical skills to help them avoid detection by law enforcement computer technology.7
Distinctions between crime, terrorism and war tend to blur when attempting to describe a computer network attack (CNA) in ways that parallel the physical world.
For example, if a nation state were to secretly sponsor non-state actors who initiate a CNA to support terrorist activities or to create economic disruption, the distinction between cybercrime and cyberwar becomes less clear. Because it is difficult to tell from where a cyberattack originates, an attacker may direct suspicion toward an innocent third party. Likewise, the interactions between terrorists and criminals who use computer technology may sometimes blur the distinction between cybercrime and cyberterrorism. So far, it remains difficult to determine the sources responsible for most of the annoying, yet increasingly sophisticated attacks that plague the Internet.
I REPEAT 9 Many security experts also agree that a cyberattack would be most effective if it were used to amplify a conventional bombing or CBRN attack.
Publicity would be also one of the primary objectives for a terrorist attack.
Extensive coverage has been given to the vulnerability of the U.S. information infrastructure and to the potential harm that could be caused by a cyberattack. This might lead terrorists to feel that even a marginally successful cyberattack directed at the United States may garner considerable publicity.12
DHS has reportedly suggested that terrorist groups may be forced, because of increased security measures, to change the weapons they try to use to strike against the United States.22 Many observers that monitor the Internet suggest that due to the effects of intensified counterterrorism efforts worldwide, Islamic extremists are gravitating toward the Internet, and are succeeding in organizing online where they have been failing in the physical world. Terrorist groups increasingly use online services for covert messaging, through steganography, anonymous email accounts, and encryption.23
The Washington Times has reported that Islamic extremists are calling for creation of an Islamist hackers’ army to plan cyberattacks against the U.S. government and that postings on the extremist bulletin board, al-Farooq, carry detailed cyberattack instructions, and include spyware programs for download that can be used to learn the passwords of targeted users.24 Other extremist web sites reportedly resemble online training camps that may offer instructions for how to create a safe-house, how to clean a rocket-propelled grenade launcher, or what to do if captured.25
In February 2005, FBI director Robert Mueller, testified before the Senate Select Committee on Intelligence that terrorists show a growing understanding of the critical role of information technology in the U.S. economy...'
Drug traffickers are reportedly among the most widespread users of computer messaging and encryption, and often have the financial clout to hire high level computer specialists capable of using steganography (writing hidden messages contained in digital photographs) and other means to make Internet messages hard or impossible to decipher. Access to such high level specialists can allow terrorist organizations to transcend borders and operate internationally without detection.Officials of the U.S. Drug Enforcement Agency (DEA), reported in 2003 that 14 of the 36 groups found on the U.S. State Department’s list of foreign terrorist organizations were involved in drug trafficking. Consequently, DEA officials reportedly argued that the war on drugs and the war on terrorism are and should be linked.55
News report indicate that hackers have broken into military networks at (1) the U.S. Army Information Systems Agency, (2) the Naval Ocean Systems Center, (3) the Defense Information Systems Agency, and (4) the United States Army Space and Strategic Defense installation. Although some of these successful cyberattacks were directed against unclassified networks, one intrusion reportedly did obtain data on a future Army command and control system.61 Although the hackers are suspected to be based in China, DoD and security officials remain divided over (1) whether the ongoing cyberattacks are coordinated or sponsored by the Chinese government, (2) whether they are the work of individual and independent hackers, or (3) whether the cyberattacks are being initiated by some third-party organization that is using network servers in China to disguise the true origins of the attacks
In August 2005, DoD Directive 3020.40, the “Defense Critical Infrastructure Program,” assigned functional responsibility within DoD for coordinating with public and private sector services for protection of defense critical infrastructures from terrorist attacks, including cyberattack.66 DoD also announced the formation of the Joint Functional Component Command for Network Warfare (JFCCNW) which has responsibility for defending all DoD computer systems. The expertise and tools used in this mission are for both offensive and defensive operations.67 and notifies administrators to help them defend their systems when targeted.68 A similar public/private partnership security warning program was created through the Cyber Incident Detection Data Analysis Center (CIDDAC)69. In 2005, CIDDAC will install special sensors on the networks of participating partner companies to automatically detect cyberattacks and notify administrators and law enforcement.
The European Union has set up the Critical Information Infrastructure Research Coordination Office (CI2RCO), which is tasked to examine how its member states are protecting their critical infrastructures from possible cyberattack.
The project will identify research groups and programs focused on IT security in critical infrastructures.
The proliferation and use of commercial products with unbreakable cryptography could seriously undermine the ability of law enforcement to perform critical missions such as protecting against threats posed by terrorists, organized crime, and foreign intelligence agents.
FROM
Terrorist Capabilities for Cyberattack: Overview and Policy Issues PDF
Some or all of those bodies mentioned may be ' honeypots' Caveat Lecter.
Should I be rendered alive that could and should be taken for proof-of-concept. The force-more-powerful may defeat the strongest most violent, cynical, nihilistic state that ever existed. Best of luck with yr voluntary missions. Long live anarchy and Vive la revolucione VIVA!
posted by professor rat with love for all and malice toward none.
Anarchist responsibilities at this time
While the vast majority of anarchists remain pacific I still argue under diversity of tactics doctrine for a most stringent response to out-of-control state terrorism. Offence IS the best defence but here is the smart play to bring down the last uberstate. Global Intidada attacks can only be expected to ramp up ...wouldn't you press on if you were winning WW4?
Of course... and these attacks may be seen , not just as ,' the price of doing business' or even ' hot pursuit' but also as a kind of natural catastrophe. Then, when we follow up any fresh attack on say, the pentagon, with a massive email hoax campaign to fake out first responders we would be acting in the best anarchist traditions I believe.
Propaganda of the deed, the Mahknovista, Durruti column, Sabate, Actione Directe, June 2cnd, Blac blocista's and etc, etc.
Provided precautions are taken this should be safe. By precautions I mean attention to security culture such as ' Don't ask-don't tell' and ' Need-to-know' cell structure.
Also use of proxies, cut-outs, air-gaps and strong crypto.
Alternatively some may just ' let-it-all-hang-out' Jim Bell style and dare the state to tip it's hand. Extreme provocation demands extreme civil disobedience up to and including darth threats.
It puzzles me actually that the death states hangmen and stormtroopers are able to lead such fear free lives.
The following info is from a death star PDF and contains extracts only for the rebel alliance. May the force be with us.
Anarchist capabilities for synergistic attacks on Amerikkka
9 Many security experts agree that a cyberattack would be most effective if it were used to amplify a conventional bombing or CBRN attack.
To date, the Federal Bureau of Investigation (FBI) reports that cyberattacks attributed to terrorists have largely been limited to unsophisticated efforts such as email bombing of ideological foes, or defacing of web sites. However, it says their increasing technical competency is resulting in an emerging capability for networkbased attacks. The FBI has predicted that terrorists will either develop or hire hackers for the purpose of complimenting large conventional attacks with
cyberattacks.1
Some experts reportedly state that the Internet is now a prime recruiting tool for insurgents in Iraq.5 Insurgents have created many Arabic-language Web sites that are said to contain coded plans for new attacks. Some reportedly give advice on how to build and operate weapons, and how to pass through border checkpoints.6 Other news articles report that a younger generation of terrorists and extremists, such as those behind the July 2005 bombings in London, are learning new technical skills to help them avoid detection by law enforcement computer technology.7
Distinctions between crime, terrorism and war tend to blur when attempting to describe a computer network attack (CNA) in ways that parallel the physical world.
For example, if a nation state were to secretly sponsor non-state actors who initiate a CNA to support terrorist activities or to create economic disruption, the distinction between cybercrime and cyberwar becomes less clear. Because it is difficult to tell from where a cyberattack originates, an attacker may direct suspicion toward an innocent third party. Likewise, the interactions between terrorists and criminals who use computer technology may sometimes blur the distinction between cybercrime and cyberterrorism. So far, it remains difficult to determine the sources responsible for most of the annoying, yet increasingly sophisticated attacks that plague the Internet.
I REPEAT 9 Many security experts also agree that a cyberattack would be most effective if it were used to amplify a conventional bombing or CBRN attack.
Publicity would be also one of the primary objectives for a terrorist attack.
Extensive coverage has been given to the vulnerability of the U.S. information infrastructure and to the potential harm that could be caused by a cyberattack. This might lead terrorists to feel that even a marginally successful cyberattack directed at the United States may garner considerable publicity.12
DHS has reportedly suggested that terrorist groups may be forced, because of increased security measures, to change the weapons they try to use to strike against the United States.22 Many observers that monitor the Internet suggest that due to the effects of intensified counterterrorism efforts worldwide, Islamic extremists are gravitating toward the Internet, and are succeeding in organizing online where they have been failing in the physical world. Terrorist groups increasingly use online services for covert messaging, through steganography, anonymous email accounts, and encryption.23
The Washington Times has reported that Islamic extremists are calling for creation of an Islamist hackers’ army to plan cyberattacks against the U.S. government and that postings on the extremist bulletin board, al-Farooq, carry detailed cyberattack instructions, and include spyware programs for download that can be used to learn the passwords of targeted users.24 Other extremist web sites reportedly resemble online training camps that may offer instructions for how to create a safe-house, how to clean a rocket-propelled grenade launcher, or what to do if captured.25
In February 2005, FBI director Robert Mueller, testified before the Senate Select Committee on Intelligence that terrorists show a growing understanding of the critical role of information technology in the U.S. economy...'
Drug traffickers are reportedly among the most widespread users of computer messaging and encryption, and often have the financial clout to hire high level computer specialists capable of using steganography (writing hidden messages contained in digital photographs) and other means to make Internet messages hard or impossible to decipher. Access to such high level specialists can allow terrorist organizations to transcend borders and operate internationally without detection.Officials of the U.S. Drug Enforcement Agency (DEA), reported in 2003 that 14 of the 36 groups found on the U.S. State Department’s list of foreign terrorist organizations were involved in drug trafficking. Consequently, DEA officials reportedly argued that the war on drugs and the war on terrorism are and should be linked.55
News report indicate that hackers have broken into military networks at (1) the U.S. Army Information Systems Agency, (2) the Naval Ocean Systems Center, (3) the Defense Information Systems Agency, and (4) the United States Army Space and Strategic Defense installation. Although some of these successful cyberattacks were directed against unclassified networks, one intrusion reportedly did obtain data on a future Army command and control system.61 Although the hackers are suspected to be based in China, DoD and security officials remain divided over (1) whether the ongoing cyberattacks are coordinated or sponsored by the Chinese government, (2) whether they are the work of individual and independent hackers, or (3) whether the cyberattacks are being initiated by some third-party organization that is using network servers in China to disguise the true origins of the attacks
In August 2005, DoD Directive 3020.40, the “Defense Critical Infrastructure Program,” assigned functional responsibility within DoD for coordinating with public and private sector services for protection of defense critical infrastructures from terrorist attacks, including cyberattack.66 DoD also announced the formation of the Joint Functional Component Command for Network Warfare (JFCCNW) which has responsibility for defending all DoD computer systems. The expertise and tools used in this mission are for both offensive and defensive operations.67 and notifies administrators to help them defend their systems when targeted.68 A similar public/private partnership security warning program was created through the Cyber Incident Detection Data Analysis Center (CIDDAC)69. In 2005, CIDDAC will install special sensors on the networks of participating partner companies to automatically detect cyberattacks and notify administrators and law enforcement.
The European Union has set up the Critical Information Infrastructure Research Coordination Office (CI2RCO), which is tasked to examine how its member states are protecting their critical infrastructures from possible cyberattack.
The project will identify research groups and programs focused on IT security in critical infrastructures.
The proliferation and use of commercial products with unbreakable cryptography could seriously undermine the ability of law enforcement to perform critical missions such as protecting against threats posed by terrorists, organized crime, and foreign intelligence agents.
FROM
Terrorist Capabilities for Cyberattack: Overview and Policy Issues PDF
Some or all of those bodies mentioned may be ' honeypots' Caveat Lecter.
Should I be rendered alive that could and should be taken for proof-of-concept. The force-more-powerful may defeat the strongest most violent, cynical, nihilistic state that ever existed. Best of luck with yr voluntary missions. Long live anarchy and Vive la revolucione VIVA!
posted by professor rat with love for all and malice toward none.
<< Home