1997-10-20 - InfoWar Epilogue 5 (Part III of ‘The True Story of the InterNet’)

Header Data

From: TruthMonger <tm@dev.null>
To: cypherpunks@toad.com
Message Hash: 42718abacc258f53586d38d4d597df4c041e7110bd6564b7a41bdf9046ee8589
Message ID: <344B1AD5.18A9@dev.null>
Reply To: N/A
UTC Datetime: 1997-10-20 10:45:05 UTC
Raw Date: Mon, 20 Oct 1997 18:45:05 +0800

Raw message

From: TruthMonger <tm@dev.null>
Date: Mon, 20 Oct 1997 18:45:05 +0800
To: cypherpunks@toad.com
Subject: InfoWar Epilogue 5 (Part III of 'The True Story of the InterNet')
Message-ID: <344B1AD5.18A9@dev.null>
MIME-Version: 1.0
Content-Type: text/html

Title: The True Story of the Internet Part II









The True Story of the InterNet

Part III


InfoWar

Final Frontier of the Digital Revolution

Behind the ElectroMagnetic
Curtain


by TruthMonger <tm@dev.null>




Copyright 1997 Pearl Publishing



InfoWar Table of Contents

Epilogue 
Cowboy


Epilogue


11 May 1905

Walking on the Marktgasse, one sees a wondrous sight. The cherries
in the fruit stalls sit aligned in rows, the hats in the millinery
shop are neatly stacked, the flowers on the balconies are arranged
in perfect symmetries, no crumbs lie on the bakery floor, no milk
is spilled on the cobblestones of the buttery. No thing is out
of place.

When a gay party leaves a restaurant, the tables are more tidy
than before. When a wind blows gently through the street, the
street is swept clean, the dirt and dust transported to the edge
of town. When waves of water splash against the shore, the shore
rebuilds itself. When leaves fall from the trees, the leaves line
up like birds in V-formation. When clouds form faces, the faces
stay. When a pipe lets smoke into a room, the soot drifts toward
a corner of the room, leaving clear air. Painted balconies exposed
to wind and rain become brighter in time. The sound of thunder
makes a broken vase reform itself, makes the fractured shards
leap up to the precise positions where they fit and bind. The
fragrant odor of a passing cinnamon cart intensifies, not dissipates,
with time.

Do these happenings seem strange?

In this world, the passage of time brings increasing order. Order
is the law of nature, the universal trend, the cosmic direction.
If time is an arrow, that arrow points toward order. The future
is pattern, organization, union, intensification; the past, randomness,
confusion, disintegration, dissipation.

Philosophers have argued that without a trend toward order, time
would lack meaning. The future would be indistinguishable from
the past. Sequences of events would be just so many random scenes
from a thousand novels. History would be indistinct, like the
mist slowly gathered by treetops in the evening.

In such a world, people with untidy houses lie in their beds and
wait for the forces of nature to jostle the dust from their windowsills
and straighten the shoes in their closets. People with untidy
affairs may picnic while their calendars become organized, their
appointments arranged, their accounts balanced. Lipsticks and
brushes and letters may be tossed into purses with the satisfaction
that they will sort themselves out automatically. Gardens need
never be pruned, weeds never uprooted. Desks become neat by the
end of the day. Clothes on the floor in the evening lie on chairs
in the morning. Missing socks reappear.

If one visits a city in the spring, one sees another wondrous
sight. For in springtime the populace becomes sick of the order
in their lives. In spring, people furiously lay waste to their
houses. They sweep in dirt, smash chairs, break windows. On Aarbergergasse,
or any residential avenue in sprint, one hears the sounds of broken
glass, shouting, howling, laughter. In spring, people meet at
unarranged times, burn their appointment books, throw away their
watches, drink through the night. This hysterical abandon continues
until summer, when people regain their senses and return to order.

{Excerpt from "Einstein's Dreams" by Alan Lightman}



Cowboy

"All My Lies Are True,
 And everything I do,
 I really Am."

-   Carroll

In other words, if it looks like a duck, walks like a duck and
quacks like a duck...it's probably a duck.
Reality is a Freudian slip.

InfoWar has been around since Adam and Eve gobbled down on the
fruit from the Tree of the Knowledge of Good and Evil.

The fig leaf was the first cover-up. "Sorry, God, but
what's under there is Top Secret."

Adam blamed Eve, Eve blamed the Serpent, and the Serpent blamed
his publicity department, fired six people, replaced them with
Spin Doctors, and went on to become President.

Figuratively speaking, of course.

Now all of the CypherPunks are sitting around slapping their foreheads
and saying:
Old Farts: "I should have listened to Lenny Bruce."

Middle Aged Farts: "I should have listened to Bob Dylan."

Young Farts: "I should have listened to Marilyn Manson."

Stupid Farts: "I should have listened to TruthMonger."


People you should have lynched, and now it's too late:
The person who named a nuclear missile, 'The PeaceKeeper.'
The President who let slip the words, 'New World Order.'
The first person to utter, "What the President meant
to say, was..."
Everyone who said, "I'm from the government, and I'm here
to help you."
...ad infinitum...

How many Nazi intelligence agents and rocket scientist were brought
into the US after World War II to work with the government and
large corporations?
Sorry, Top Secret.
How much biological and germ warfare research is being done with
your tax money?
Sorry, Top Secret.
How many foreign leaders, politicians, diplomats and business
men have been assassinated using your tax dollars?
Sorry, Top Secret.

Of course, now 'National Security' is the 'magic word.' (Or is
that 'magic sword?')

"Intelligence reports indicate that terrorists breathe..."

{Go ahead and extrapolate the preceding government statement
to its final conclusion. Don't forget the breathing tax that will
be necessary to cover the costs of the digital nose implants.}


Your education wasn't 'free,' was it?
You had to pay for it by Pledging Allegiance every morning. You
had to pay for it by sitting up straight at your desk. You had
to pay for it by asking permission to pee. You had to pay for
it by making sure your desk was lined up straight with the others.
You had to pay for it by shutting the fuck up when you had a creative
thought, and hypnotically repeating back the lessons you were
taught. 

Who discovered America? And what the fuck were all of those goddamn
Indians doing there when it was 'discovered?' Fucking troublemakers...


Interactive. Doesn't that sound better than Corporate Message
Recovery? Better than Government Access to God-and-Everything?

The cynics make it all sound so dark and damning. All the Fascists
really want is to make certain that everyone is sitting up straight
in their seats...that the seats are lined up properly...that
no one forgets to pledge allegiance...that you ask permission
before you pee...

"THERE IS NO SECRET PLOT AGAINST
THE CYPHERPUNKS LIST!!!"

We are here to help you...

Tim, sit up straight in your chair. Lucky, sit down, you can go
to the bathroom when I'm finished talking. Bill, Bill and William,
no more back-talk. Adam, apologize to PGP. Duncan, quit fidgeting.
Peter, have you been passing notes to TruthMonger, again? Blanc,
Mr. Gates will not be allowed to pick you up after class unless
he brings a note from your parents. Matthew and Phil, from now
on we will be using 3.0 as the value of pi, as per the new legislation.
Toto! Pull up your pants and leave that puppy alone.
Thank you for the apple, Kent. Would you like to lead the class
in pledging allegiance to PGP for Corporations?


When a US Armed Forces trained killer attacked a Federal Government
Building, who got the blame?
Citizens. Citizens with guns. Citizens with non-government guns.
The Paramilitary.

When a US Secret Intelligence Agency trained cryptographer attacks
a Federal Government Computer System, who will get the blame?

Citizens. Citizens with crypto-munitions. Citizens with non-government
crypto-munitions. The CypherPunks.

Have you figured out what 'InfoWar' is, yet?

Cryptography is merely a battleground. Encryption is merely one
of the most dangerous weapons against the goals of InfoWar.

The War is over who will control Information.
The War is over who will control Words.
The War is over who will control Thoughts.
The War is over who will control Attention.
The War is over who will control Virtual Reality.
The War is over who will control WebWorld.

World War III is InfoWar!

Whoever controls Information, controls the Past.
Oswald acted alone..

Whoever controls Information, controls the Present.
 Gilmore acted alone.

Whoever controls Information, controls the Future.
Tim C. May acted alone...


Repeat after me:

"Department of Defense secret agencies created the InterNet,
but they do not control and/or monitor all activity and communications
that take place on it."

"The government has shifted the focus of their engineers,
physicists and secret intelligence agencies from nuclear warfare
to information warfare, but they would not manipulate, destroy
and murder those who present a threat to their preeminence in
this arena of warfare."

"When the government's secret underground laboratories
reveal and share the technology of radar that can see through
solid walls, satellite cameras that can read the newspaper over
your shoulder, and tiny helicopters that can fit inside a peanut
shell, they are not in possession of even greater forms of clandestine
technology."

Reality Check:
Why is strong encryption such a dangerous threat to the secret
and semi-secret agencies, committees and non-government bodies
who rule us from the shadows?
It is because they already have the ability to
monitor all of our activities and communications. Widespread use
of strong encryption threatens that ability.


People who control technology and standards are on the inside.
People who make the chips that go into the computers and peripherals
are on the inside. People who supply the physical routes that
information travels over are on the inside.
People who use the above, are on the outside.

Arms for drugs, drugs for money-arms, drugs and money for favors
and information.

Our secret intelligence agencies tell our legislators that use
of strong crypto will interfere with their manipulation of the
electronic funds of the 'bad' individuals, corporations, and governments.

Why did Colonel Olive North trade weapons and drugs to have the
hostages held until Ronnie RayGuns election and then released
on the day of his inauguration? Because weapons were what the
Iranians wanted.
What if the Iranians had wanted Sun Microsystems financially ruined
in return for the timed release of the hostages? Or Intel? Or
Tim C. May? (Who knows? Maybe the Tim C. Mayonnaise ASCII Art
is part of the Iran-Contra deal.)

Did the US Secret Intelligence Agencies support the development
and release of cryptography that they couldn't break, or didn't
have a backdoor to?
If so, then why was PGP such a threat to 'National Security?'

If the Men in Black don't already have ready access to information
hidden within current forms of encryption, then why would widespread
use of strong encryption be a threat?

Try this:
Go to a command line: type 'cd \PGP262' ; type 'pgp -kxa "My
KeyID" secring.pgp'
Send the output file to Louis J. Freeh, and ask him to please
not read your encrypted files.

Now:
Do the same thing, only dialing in to your machine from a friend's
machine.

Now:
Write a browser Java script that gets the secring.pgp file from
your machine via a web site.

Now: 
Go home, kick your fucking door in, place a disk in the floppy
drive, and type 'pgp -kxa "My KeyID" a:\secring.asc
secring.pgp'.
Mail the disk to Louis J. Freeh

Does your copy of PGP ask for a password before spitting
out the KeyID to any one of a thousand monkeys who sits at your
keyboard and randomly types in the above?
My copy doesn't. 

Below is a copy of a key pulled off of my computer by 19 different
people. It was pulled off of my hard drive by the first individual,
who proceeded to inform a second individual of the method used,
and challenged them to do the same thing, using a different method.
The second did so, and passed all the information along to a third
person, etc., etc.
Nineteen people, nineteen different methods.

-----BEGIN PGP MESSAGE-----
Version: 2.6.2

lQHgAzHiUJEAAAEEAP1slPSwrVd90NVBqfsw6+JP64icmuSrztzyCgaPcXHRiy/J

Kbgi9/gy1iCnWcQh1ATaSzblATSU24Xw+4Ow4s5xOvdxFGoIop6EXwTNfwRa2EZr

6ZZ41Glr9g1g9H0RJwJlkldUcunVNekXel1MYA8VJJynvtZVuntA11SbF0AdAAUT

Ab7sJWrM/6azA/vV2wq4sdyfngUgUHq8Hlo5NHvEjyh2cSoMMNxnpKR3+XYRbYTd

HhwfbOvji1cWnVJF6GBxe3nLvbkbHJU+K3hNNYOT9JKMahu+5wKMbHkwToSsLzyQ

kgn2JlKDJugoycdjInlQs7NiyoOrIYWQzSi4yGbhl2t1Au+67UY/r57J9AIA8V/6

J5x1wH7MACSWU91jXXxpJvSud053nrSgnupEUbFX3dXm0GXf6vdhbQW9eYsIJmCI

pZLrqwBcFe2GWhk9AAIActyoxAgCvFyGSJHHzJVVoKfWk/gjmKs/r7+J9vWnBAkc

Pg0wqUn66Hmq0op28gEXU3qKJiJ8rAQETAxBhfpnJgH83CrrEZDcBY8IKsFI2A19

KahohyDXmsEHIWqKZLSwzjsYcf049RCUxNDPJZchuoMEPkK9414KyPqlJbStsFaE

YZ6itAxNYWdpYyBDaXJjbGU=
=GEo6
-----END PGP MESSAGE-----

Are your 'secret' keys any more secure than mine?
Answer: If you send me a message encrypted to the key above, then
it doesn't really matter, does it? The end result is the same.

Strong crypto is not a threat.
Widespread use of strong crypto is a threat.

The Monitors cannot put the latest-greatest spy chip in every
computer, every printer, every modem. They cannot password-snarf
every system. They cannot compromise every remailer, every ISP,
every private network.
At present, they don't need to.
They can enter my house, and your house, and grab our keys. They
can't do so for everyone, but they don't need to, because everyone
isn't using strong crypto. They can monitor your keyboard and
mine, but they can't monitor everybody's. They can beat you and
I with rubber hoses, but they can't beat everyone with rubber
hoses (although they can dream...).

The days of Judicial Safeguards are history.
There is no longer any need to go down to the local Teleco and
flash a warrant to get access to telephone conversations. The
Monitors own the satellites. Warrants are for when they are ready
to go to trial, and they want to do it by the book.
Hackers don't get warrants. Hackers don't need no stinking badges...and
neither do secret intelligence agencies.

What is the problem with widespread use of strong crypto?

It gets in the way of immediate access to data and communications.

If you understand nothing else about InfoWar, understand this:

The Monitors already have access to almost all data and
communications. They are not attempting to get something they
don't have, they are trying to hold onto something that they already
have.

They can't kill a news story or editorial after it comes
out. They can't put genies back in the bottle after they
are released. Arranging for you to have an unfortunate accident
tomorrow doesn't erase the email you sent today.

Try this:
Get email accounts in the names of your children. Send messages
back and forth between them. Analyze the send and receive timing
of the Dr. Seus messages, as opposed to those of the 'Death Threat'
and 'Tim McVeigh' messages. 
Do traceroutes to find out how the accounts travel via routes
to a variety of systems. Then send emails between the accounts
which threaten the lives of world leaders and various politicians.
Now do traceroutes and find out what routes the accounts travel.

And remember, this is for your children's accounts.

The Monitors can get access to the keys of a thousand individuals
at a corporation, but this is unacceptable. They want access to
one key that allows them to access all of the thousand
individual's files and communications.
Their goals are quite simply to control and monitor information
as close to the source as possible. This is why they need 'Official'
news sources. 'Approved' websites. 'Authorized' encryption programs.

This is why they give away billions of dollars of digital airwaves
to mainstream media. This is why they launch, and then settle,
anti-trust actions, lawsuits, financial and criminal investigations.


NEWS FLASH!!!
Louis J. Freeh just discovered that he can ensure the institution
of GAK, CMR, and all manner of CRAP by killing your newborn
child.

Aren't you glad he's one of the 'good' guys?

Follow the Money!

Why do the Monitors want guaranteed access to all information
by 1999? Why are the Europeans planning to introduce a new form
of currency in 1999? What plans do the IRS have for 1999, when
it becomes obvious that many individuals, companies, and countries
do not have the capability to keep their bookwork from falling
into chaos?
Nothing? Right...

The US has plans in place for invading Canada in the event that
there is a need to do so, but they have no plans in place for
financial and organizational chaos being created by the Year2000
Bug. Right...

Governments, corporations, the rich and powerful...none of
them have any plans in place to take advantage of any problems
that arise in society, in government, in financial empires, due
to the Y2K Bug. Right...
 

The 'solutions' are already planned, and in place, waiting for
the problem. The solutions are pre-GAK'ed. The solutions have
eyes and ears.
Why is the IRS being 'rehabilitated' by Congressional investigation?
In preparation for 1999. Just as the FBI, the CIA, the DOJ, etc.,
have been 'rehabilitated.' Just as the government has been 'rehabilitated'
by the Freedom of Information Act, etc., while more and more power
is put into the hands of unelected committees, commissions and
semi-secret agencies.

InfoWar is being fought on the battlegrounds of Virtual Reality,
which are linked by the Information Highway. The armies are governmental
and corporate. The victor's prize, as always, is wealth and power.

On the battlefield of Encryption the war is over Access.

On the battlefield of Virtual Private Networks, the battle is
for Access.

The warplanes, ships, tanks, rockets and missiles...the air,
sea and ground wars...these are a dog-and-pony show for the
masses.
Just as the 'news' is for the masses.

When the Canadian Prime Minister is caught on audio-video calling
the US government criminals and thieves, this is news. This is
why he doesn't say those things into the microphone, except by
accident. It is not 'official' news, not 'managed' news, and it
will not be expanded upon for the general public.
The 'Official' news is 'Blah, blah, blah...'

Even the 'Official' news isn't really 'official' when the governments
deny it.
The Israelis didn't really release a political prisoner
as a result of a deal to have their assassination team returned.
Canadian intelligence agencies don't really help the Mossad
obtain false Canadian passports in return for having their own
back scratched.
As long as they pretend they didn't really get caught, then they
can keep pretending that they don't do this type of thing all
of the time.

This is InfoWar...
There are good pictures and bad pictures...good words and bad
words...good thoughts, ideas and beliefs, and bad ones.
The good people are here, where I am standing, and the bad people
are over there, where I am pointing.
My information is good information. Anything else is bad information.

There are good URL's and bad URL's, good communications and bad
communications.

The Constitution needs to be explained to your children by those
who wrap themselves in the flag, not by those who burn the flag.
CyberSitter!
The Bill of Rights needs to be explained to your children by those
who imprison and kill marihuana smokers, not by those who smoke
marihuana, even if they are doing so in a place where it is legal.
CyberSitter!
The Truth needs to be told to your children by those who the government
gives billions of dollars worth of the citizens' digital airwaves,
not by an armed forces veteran who is telling his story on his
own web page as the life force drains from his body due to his
imagined Gulf War Syndrome. CyberSitter!

Dimitri Vulis needs to be forcefully unsubscribed from the CypherPunks
Mailing List. SandySitter!

"You want anarchy? You can't HANDLE anarchy!"

- Jack Nicholson, playing Terry Nichols, in "Nuke the Murrah
Federal Building!"


InfoWar

There will be soldiers, spies, collaborators and members of the
resistance.
There will not be any winners, only survivors.
There will be survivors who can hold their heads high, and those
who cannot.

Never forget...


"The Xenix Chainsaw Massacre"

"WebWorld & the Mythical Circle of Eunuchs"

"InfoWar (Part III of 'The True Story of the InterNet')

Soviet Union Sickle of Eunuchs Secret WebSite










Thread