Patrice Riemens on Sat, 29 Jun 2013 02:56:20 +0200 (CEST) |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
<nettime> A discussion with Cryptome (Natsios, Young) about Prism etc. (The Gawker) |
original to: http://gawker.com/a-discussion-with-cryptome-514154708 (bwo Cyberguerilla.org) A Discussion With Cryptome When the Guardian and Washington Post published their blockbuster NSA reports based on Ed Snowden's leaks, journalists lined up conga-style to congratulate them on the scoops. Not Cryptome. Instead, the secret-killing site blasted the Guardian and Post for only publishing 4 of the 41 slides that Snowden gave them about PRISM, the NSA's system for spying on the internet. "Mr. Snowden, please send your 41 PRISM slides and other information to less easily cowed and overly coddled commercial outlets than Washington Post and Guardian," Cryptome wrote in a June 10th dispatch titled "Snowden Censored by Craven Media." To longtime followers of Cryptome, this response was unsurprising. Before Wikileaks, before Ed Snowden, there was Cryptome. Manhattan-based architects John Young and Deborah Natsios founded Cryptome.org in 1996 as a repository for documents no one else would publish, including lists of CIA assets, in-depth technical schematics of sensitive national security installations, and copyrighted material. As leaking has created a vibrant media ecosystem in recent years, complete with favored outlets, journalists and sources, Cryptome has positioned itself as its curmudgeonly ombudsman, quietly but blisteringly cutting down the hype and blather it sees in its competitors while advocating a form of radical transparency as straightforward as Cryptome.org's bare-bones website. Recently Gawker sat down with Natsios and Young to discuss their thoughts on the state of leaking, the NSA revelations, and the surveillance state. John Young and Deborah Natsios will join us at 2:30pm for a reader Q + A. Please leave your questions in the comments. Interview has been condensed and edited for length and clarity. Gawker: When did you first hear about the NSA leak? Young: I guess when everybody else did. Did you guys get that through your tips? Gawker: No, we didn't get anything about it. Young: Did you go back and look? Gawker: Yeah. Did you? Young: Yeah, I didn't find anything. Gawker: Why do you think Snowden went to established media like the Guardian and the Washington Post as opposed to Wikileaks, or you? Young: Snowden actually learned from [Bradley] Manning's miserable experience, so he was more careful about it. I think he shopped around. But I think he also got some advice. And I think that he has been pretty strategic in his approach. I don't think they're the only ones he sent this stuff to?he's too smart for that. But you notice, most of them were cautious too. I think each side is pretty cautious. Gawker: You've been critical about the fact that the Guardian and the Post only released four out of 41 slides or however many. How would have you handled this differently? Young: Well, we would have dumped it, the whole thing. Everyone else likes to play this game: "What if we harm somebody" or all this kind of crap. Which is strictly cowardice. Of course the companies who run the outlets, their lawyers won't let them do this kind of thing, so if you've got money invested in your operation you won't take these kind of risks. Natsios: Where's Greenwald on the bar? Do you know where he's licensed to practice? Gawker: No? Natsios: Just New York State? Is he actively?what is the status of his licensure? Gawker: I know his practice is defunct, but I don't know if he's licensed. Why do you ask? Natsios: Well, because he would have certain professional, perhaps, obstacles to certain kinds of behaviors. Young: Lawyers won't break the law. Gawker: So your idea is that he's compromised in some way? Young: Well he's cautious. It's one thing to be a rhetorician. It's another thing to break the law. Gawker: But you would break the law? Young: No, I would publish it. In other words, I don't acknowledge the power of the law. I just publish stuff. If someone wants to make a legal case, have at it. But it's not my job to pretend I know what the law is. Gawker: Why do you think all 41 should be out? Apparently the Guardian has judged that these are the newsworthy ones. Young: Well, one to call their bluff. The other is to not let them tease the public with what's coming, which is a well-known journalistic technique, to stretch out the product as though the great stuff is coming. Withholding is a kind of reputation building, to be responsible, respectable, but oh boy, if you knew what we had. This is how spies talk. You can see all of them using that language: If only you knew what we know. You gotta trust us. So it's kind of scammy. Gawker: Wikileaks did that too, with the Manning leaks. Natsios: The serialization of content goes way back to tabloids, Charles Dickens, and other content providers in the 19th century. Young: By the way, I don't have a problem with this, it's just their technique. There are other techniques. There should be many techniques. Gawker: What's the Cryptome technique? Young: Publish what we get, on that grounds we don't know what's good and what's bad and do not want to pretend that we do. Because that's just sheer self-promotion. Gawker: Do you think Snowden is a hero? Young: Yeah, in so far as you want to play up that word. I think that he's quite courageous to do what he's doing. I'm not convinced that he's operating as an individual but he certainly gives all the appearance of being a hero. So I think until proved otherwise, you can look at it that way. But I think he's playing a teasing game too, because he's not so dumb as to dump everything in one place. That's suicide because he knows he gets screwed if he does that. The recipients would screw him in their own defense. I think that it's worth seeing what they do next, because usually these things have steps. They're testing the market right now: Will he get public support by releasing more? Under what circumstances? Who will we give it to? Is this guy going to be badly burned? The military calls this being a rabbit: he's being set up to draw fire and see what happens. And if someone takes a potshot at him, you watch who does. It's risky behavior, but it's a good way to smoke out the opposition. Gawker: In a post on Cryptome, you suggested the leak was a "wargame". Do you think that this might be an elaborate government test? Young: Well, it will certainly be used for that purpose. They're certainly watching the response to this. They not only run their own games, they watch other people's games. Some are fortuitous like this. Some are deliberate. Natsios: I like this notion of the spontaneously combusting war games scenario. It's not top-down driven, it's just erupts and you study it as a phenomenon and information emerges that wouldn't otherwise in the carefully scripted modeling scenario. Gawker: It seems significant Snowden was an IT guy as opposed to a higher-up, like the other NSA whistleblowers, Thomas Drake or William Binney. Natsios: I think it's interesting looked at in terms of large technosystem theory, the NSA taken as a large technosystem, this operative being something of a prosthetic extension of hardware. Snowden being understood as a kind of cyborgian creature without any political intuition. There's a kind of shock now in the system, now that this piece of hardware has suddenly, you know, gone rogue. And a person of his status, his age, his youth, there seems to be an incredible bias about their having any political voice. It's a key threshold for him to have broken out of his little enclosure and committed the act of conscience. Presumably the cyborg has no conscience, they're just kind of artificially intelligenced. And that's why if he's to be a hero in the literary sense, it's based on this act of conscience argument that he's deploying. Gawker: Snowden told the Guardian that in leaking these documents he wanted to reveal the "architecture of oppression." You're both architects?what does that term mean to you? Young: People take it metaphorically, but we think he means the actual, physical infrastructure. That's how I took it, he's waiting to tell us how this structure actually operates, not the historical version that goes before Congress and goes to the press. A number of people have written about the technology, [journalist James Bamford] and others have written about this so it's not like it's not out there, but I think he's testing the waters for language. The word "architecture" is terribly thrown around, like gravitas and everything else and I think it's been taken that way without saying, "No, he's actually talking about the architecture." This building, these cable system, these hubs. These satellites dishes? actual physical structures. Without which you cannot do what they're doing. Gawker: So you think he has information on what's actually on the ground. Young: He was managing those systems. That's why he's so valuable. Natsios: It's interesting in terms of the five or six big, vintage, historic telecom hubs downtown [in Manhattan]. Speaking of Verizon, my favorite Verizon is the tower at 375 Pearl St. that was bought by this Seattle data farm, Intergate. And now Intergate Manhattan, they tout the fact that they are in the NYPD security zone, and that they have protection from homeland security. For your storage. I mean, it's extraordinary. Homeland security will be standing guard over your data, don't you feel so much better about that? Gawker: I'm also curious if you have any thoughts on the NSA's headquarters?that cube everyone is showing on the news. Natsios: When the parking lot is full or empty? Gawker: What do you mean by that? Young: It is an icon, but most of the work, it's done out in the network. It's widely distributed for security reasons. The headquarters is duplicated in several locations, a standard defense technique. That one is the cartoon version, that's why on the weekend all the cars disappear. Whereas if it were a 24 by 7 operation, they would be there 24 by 7. All these main spy headquarters, on the weekends, they disappear. Empty parking lots. Gawker: In preparing for this interview, I went back some of your tweets and I've noticed that you delete all your tweets regularly. Why do you do that? Young: Because it's trash. We don't need to retain that. It's some of the worst stuff I've ever said. Why would I keep that stuff? This notion that you've got to keep your tweets, it's like your garbage, it's like hoarding. Of course it's being archived somewhere else. The Library of Congress or these sites that collect everything, so there's no need to keep this. And most of them are embarrassing. An hour later you would wish you never said that. Gawker: So you just delete it. Young: And I encourage others out there: You look like an asshole when you leave it up. This interview was conducted last week. Yesterday at 7:30pm, Young and Nastios were visited by two Secret Service agents. The agents asked Young and Nastios to remove list of George W. Bush's family contacts they had posted to Cryptome. The list was leaked by Guccifer, the notorious hacker who broke into George W. Bush's email and leaked his delightful paintings. (This is not the first time authorities have checked out the pair.) Young and Nastios emailed this account of the visit: Two USSS agents appeared at our door about 7:30PM, June 18, 2013 showed ID and badges. They asked are you John Young of Cryptome holding up a NY motor vehicle photo. We said yes that's us. They showed a Guccifer file listing Bush Family contacts said do you recognize this. We said yes. They said we are here at the request of the Bush Family to ask you to remove the Guccifer file, posting it is not illegal, "freedom of information," it contains nothing secret, the family is concerned, some live in New York City, we are politely asking for its removal. We asked what would happen if the file was not removed. They said we don't know, will report your response up the line. We said we see what you are saying. They asked if we had met or knew Guccifer. We said no no. They said he's pretty active. We said she or he. They asked how did you get the file. We said anonymously. They asked by email? We said cant tell. They said understood. We asked to see their IDs again. They said you are not going to publish our names are you we know you do that. We said yes we do and will. They showed their badges while covering their photos and names. They said this is not being recorded is it. We said no lifted our shirt offered to drop our sweats. They said not necessary this is not an NSA thing. We said the NSA thing's a hoot. They said yes yes. They said thank you for courtesy. They said call NY Secret Service to vet us then departed. We got NY SS number online made the call. NY SS said we cannot answer questions call this number in DC. We called DC got a number disconnected message with a number to call and called that number. DC SS answered White House Operations Center. We said NY SS told us to call you to vet agent visit. DC SS said that makes no sense call NY SS again. We called NY SS again and said what DC SS said. NY SS went away for several minutes then asked are you at this NY address. We said yes. NY SS said we confirm two SS agents visited you. End.
# distributed via <nettime>: no commercial use without permission # <nettime> is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mx.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime@kein.org