
Episode 6
Cypherpunk Bitstream 0x05: Security I
Cypherpunk Bitstream · Cypherpunk Bitstream Team
February 5, 2020Explicit
Audio is streamed directly from the publisher (cdn.taz0.sirion.io) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.
Show Notes
<p>We <a href="https://cdn.taz0.sirion.io/cdn/cypherpunk-bitstream/episodes/CypherpunkBitstream-0x05-Security-I.mp3">talk</a> about security and the current state of the security system (police, intelligence services, and the military).</p>
<h2 id="subscribe">Subscribe</h2>
<ul>
<li><a href="https://pca.st/5ytdtii7">Pocket Casts</a></li>
<li><a href="https://open.spotify.com/show/3o97A7VYhX2lDKyktXXsBG">Spotify</a></li>
<li><a href="https://www.stitcher.com/podcast/cypherpunk-bitstream">Stitcher</a></li>
<li><a href="https://podcasts.apple.com/us/podcast/cypherpunk-bitstream/id1488466327">Apple Podcasts</a></li>
<li><a href="https://overcast.fm/itunes1488466327/cypherpunk-bitstream">Overcast</a></li>
<li><a href="https://podcasts.google.com/?feed=aHR0cHM6Ly90YXowLm9yZy9iaXRzdHJlYW0vaW5kZXgueG1s">Google Podcasts</a></li>
<li><a href="https://player.fm/series/cypherpunk-bitstream">PlayerFM</a></li>
<li><a href="https://www.youtube.com/c/TAZ0Transmissions">YouTube</a></li>
</ul>
<h2 id="show-notes">Show Notes</h2>
<h3 id="what-is-security">What is security</h3>
<ul>
<li>00:02:05 What is security: Security VS Safety.
<ul>
<li>Security: unexpected events that go back to an actor,</li>
<li>Safety: maintaining a status.</li>
</ul>
</li>
<li>00:07:20 Entropy: things decay. Security is not a natural state, but
must be maintained.</li>
<li>00:09:10 Evil people: psychpaths, predators.</li>
<li>00:09:50 Circumstances: acting irrationally.</li>
<li>00:10:25 Hackers: Red Hats, joy of overcoming security systems.</li>
<li>00:11:11 WASP Privilege: no exposure to threats, stuff works most of
the time, no incentive to learn about security.</li>
</ul>
<h3 id="systems">Systems</h3>
<ul>
<li>00:12:29 High trust society VS low trust society: Low trust comes
with high cost and less functional societies.</li>
<li>00:16:16 Symptoms of societies with low trust: different
environments are what make them.</li>
<li>00:16:50 Universal core values of humans: self-preservation,
protecting family and friends, private zones, no drama.</li>
<li>00:18:05 High trust society needs maintenance, will get eroded
quickly by few “bad actors”.</li>
<li>00:19:05 How can you turn a low security, low trust environment into
a high security, high trust environment? Parallel developments also
possible: high security, low trust societies.</li>
<li>00:19:40 Trust builds from history of interactions.</li>
<li>00:20:13 To change, bad memories must die (social memory). See
Thomas Kuhn (1962): The Structure of Scientific Revolutions</li>
<li>00:22:10 Western states want to make people dependent on security
(stateism) and increase state control. Thus, individuals externalize
security, and state is presented as the White Knight.</li>
<li>00:25:15 Are we being played/gamed/manipulated by the state and
state actors?</li>
<li>00:27:38 Just doing our jobs.</li>
<li>00:29:50 Machiavellianism: concepts how states can work.</li>
<li>00:31:20 Hegelian concepts: totalist and collectivist states and
politics.</li>
<li>00:33:20 Look at systemic issues.</li>
</ul>
<h3 id="institutions">Institutions</h3>
<ul>
<li>00:33:30 Inspecting institutions: 1) Police.</li>
<li>00:39:00 Policemen’s selection bias: everyone is a potential
criminal or at least a suspect.</li>
<li>00:40:20 Documentation work of police activity by example of firing
weapons.</li>
<li>00:42:30 Bureaucracy can work.</li>
<li>00:47:30 Police in uniform VS civilian police: both are for peace
preservation.</li>
<li>00:48:00 Military is directed outwards.</li>
<li>00:49:00 Carl von Clausewitz: war is the extension of politics
[original: war is the continuation of politics by other means].</li>
<li>00:49:39 Border guards are the middle layer between military and
police (control of territorial boundaries VS maintaining territorial
integrity VS maintain security within the borders).</li>
</ul>
<h3 id="intelligence-services">Intelligence services</h3>
<ul>
<li>00:50:00 Intelligence services:</li>
<li>Classification: Intelligence service for proper and covert action</li>
<li>00:51:00 Similarities and differences to Journalism: Are
intelligence services also ad-driven?</li>
<li>00:51:48 Intelligence Agencies report only news that can be
actionable.</li>
<li>00:53:40 Domestic and Foreign Intelligence Services.</li>
<li>00:54:20 Objective reporting: Not mission driven, but report driven.</li>
<li>00:54:41 Two classes of intelligence services: Report requests
coming out of intelligence circle, or mission driven services
(Bundesverfassungsschutz, for example).</li>
<li>00:56:30 FBI: police organization plus intelligence aspect.</li>
<li>00:57:05 Intelligence services are about information, other services
are about action.</li>
<li>00:57:40 Staatsschutz and German Intelligence: police is for prevent
and investigate crimes.</li>
<li>00:59:05 Forensics is for police, subversive or maybe illegal
actions are for intelligence work. In Germany, it’s clearly
seperated; in USA, not so much.</li>
<li>01:02:15 CIA: Considered as Intelligence Agency. Gather information
is their mandate, not catch criminals.</li>
<li>01:05:10 Sending in intelligence to change things: huge toolkit to
act available.</li>
<li>01:05:50 Intelligence and Military Covert Actions are not Security,
but political action. However, it‘s a security issue for the other
side.</li>
</ul>
<h3 id="international-organisations">International organisations</h3>
<ul>
<li>01:06:47 International Security Organizations (Europol, Interpol).
No police powers, limited investigation powers.</li>
<li>01:08:45 Working groups: example SIS (communicating warrants in EU).</li>
<li>01:09:58 Organizations: example Le Circle (high-ranking intelligence
chiefs), Munich Security Forum (conference with high-level security
chiefs).</li>
<li>01:15:00 Why is their image so skewed in the public? (The „Spy
Story“)</li>
<li>01:18:00 Rubicon Series (2010)</li>
<li>01:19:25 CSI Series (2000) - all about forensic analysis of crime
scenes, but in reality it‘s not the dominant part, only few
questions can be answered.</li>
<li>01:21:28 Playbook crime following the standard model VS outliers.</li>
<li>01:22:55 Being secretive about methods means keeping the advantage
from opponents: intelligence agencies VS intelligence agencies from
other countries; police VS criminals.</li>
<li>01:23:40 Sources 1) Scientific Fields: Criminalistics, Criminology.
(Education Material for people that train police, manuals and
coursework can be brought on Amazon, also check out libraries).</li>
<li>01:25:34 Sources 2) Reports: Indictments, Warrants (a lot are
public, depending on country). Caveat: contains successes and legal
processes only.</li>
<li>01:27:08 Sources 3) Private Conversation with Policemen,
Investigators, Intelligence People to get a more accurate picture
about their work.</li>
</ul>
<h3 id="public-private-partnerships">Public private partnerships</h3>
<ul>
<li>01:29:39 Private Security Services.</li>
<li>01:30:45 Cybercrime Investigations: Takedown of Cyberpunker 2 (200
servers in a German bunker).</li>
<li>01:32:25 Private Companies helping the police in Cybercrime
Investigation.</li>
<li>01:32:40 Analyzing digital evidence: Given to a lab from a private
company. (Cyberforensics, not done by police)</li>
<li>01:34:18 White-Collar Crime: Fraud, Commercial Fraud cases etc.
Corporate Investigators for hire: Forensic Accountants, etc. (Police
work only for special investigator power, or force powers.)</li>
<li>01:37:10 Corporations can use private security services when police
are bound legally (for example, in bribing), then sanatize the data
and give it to the police.</li>
<li>01:41:28 Informal communication lines… like in every other
industry. (But with special privileges: Police, Military,
Intelligence)</li>
<li>01:43:04 Presumably Cardinal Richelieu: „If you give me (three, or
two) six lines written by the hand of the most honest of men, I will
find (seven reasons) something in them which will hang him.“, this
quote might be originated by memorialist Françoise Bertraut de
Motteville (1723), and was later paraphrased.</li>
<li>01:44:46 Real-life cases have a lot of ambiguity going on. It‘s a
work of probabilities, not a binary process.</li>
<li>01:45:45 Can you cover up a crime as a non-corrupt policeman?</li>
<li>01:46:50 Private Security Services exploit the ambiguity of
policework (someone bringing you from outside a full case, only
verification needed, negative evidence often gets lost).</li>
<li>01:48:21 Political Aspect: which crimes are deemed important?</li>
<li>01:49:20 Lobbying and capital power: Intellectual Property Crimes.</li>
<li>01:50:44 Industry identifies perpretators and delivers them to
police.</li>
<li>01:50:58 Filesharing: Machine investigating and filing reports,
backchanneling, automated sting operation (example, IP-Echelon).</li>
<li>01:56:08 Private Agencies provide: Analysis of evidence, production
of leads, investigation.</li>
<li>01:56:26 Money Laundering: not based on investigative results, but
on information provided by for example NGOs (example, Transparency
International).</li>
<li>01:59:28 Chain Analysis Companies produce risk scores for
Cryptocurrency Adresses (public keys).</li>
<li>02:01:05 Face recognition to identify suspects: example, Clearview
AI (finding people software)</li>
<li>02:02:20 Police relies on outside, unchecked influence: Private
Actors (non-illegmitate).</li>
</ul>
<h3 id="private-intelligence">Private Intelligence</h3>
<ul>
<li>02:03:25 Recap of Episode:
<ul>
<li>What outside input is influencing the police</li>
<li>Policy definition</li>
<li>Intelligence field</li>
</ul>
</li>
<li>02:04:22 Tax crimes: special investigators who actively try to find
criminals.</li>
<li>02:04:39 Organized Crime: preventitive task of police (dismantling
organizations, Staatsschutz).</li>
<li>02:05:35 Civil Disobedience: infiltration by police and private
companies.</li>
<li>02:07:00 Private Security: 3 categories
<ul>
<li>private intelligence services</li>
<li>private security services</li>
<li>private military contractors.</li>
</ul>
</li>
<li>02:09:38 Private Intelligence is information gathering.</li>
<li>02:09:53 Private Intelligence VS corporate espionage.</li>
<li>02:11:11 First example.</li>
<li>02:15:00 Why is there so much cheap spy tech for sale?</li>
<li>02:19:53 Second example: credit suisse incident.</li>
<li>02:21:12 Some serious health concerns for the operators and
middlemen (in-betweens).</li>
<li>02:24:05 Birds of a feather flock together: blurry lines of
corporate, state, and private decision makers (different sides of
the law).</li>
<li>02:26:29 Book/Thesis: Stephan Blancke (2011): Geheimdienstliche
Aktivitäten nicht-staatlicher Akteure (private intelligence
activities by non-state actors)</li>
<li>02:27:11 Private inflitrators, informants and agent provocateurs.</li>
<li>02:28:10 Extinction rebellion and very active activists.</li>
<li>02:30:30 Capture bounties.</li>
<li>02:32:45 A quiet business: private infiltration intelligence
services (IMSI-catchers) are often ex police, ex military etc.</li>
<li>02:34:40 Sharing information services between intelligence: 4 eyes,
14 eyes.</li>
<li>02:38:05 HCPP and game theory: will the cryptoanarchists ever get
something done?</li>
<li>02:39:00 Today’s security system is like antique byzantine, easy to
understand from outside, inside not easy to understand- even for the
players themselves.</li>
<li>02:40:25 Ross Ulbricht and Silk Road made agents run with money—is
it the only case, only in this direction?</li>
<li>02:42:00 State systems’ marketing: “protect and serve” by angels?
But, ACAB is also wrong.</li>
<li>02:45:55 Take personal responsibility for own security.</li>
</ul>
<h3 id="outlook">Outlook</h3>
<ul>
<li>02:48:40 Developments/outlook: technologies that make globalization
possible, organizational technologies, reporting and communication.</li>
<li>02:50:25 Old days: reporting was sampling (today: big data, AI).</li>
<li>02:51:00 New incentive structures: financial markets. Old: financial
markets were not global, slow. Today: Global financial markets mean
indirect profit from activities like war, markets can be complex,
distributed, longer reach.</li>
<li>02:52:50 Even dumb criminals can use smart technologies (Dropgangs).</li>
<li>02:54:00 The mastermind/ intelligent criminals VS random criminals:
attribution becomes problematic (witness problem, no review
pointers).</li>
<li>02:57:24 Book: Evan Ratliff (2019): The Mastermind. Drugs. Empire.
Murder. Betrayal. (Paul LeRoux)</li>
</ul>
<h3 id="wrap-up">Wrap up</h3>
<ul>
<li>03:00:59 Donation Report</li>
</ul>
<h2 id="reading-recommendations">Reading Recommendations</h2>
<ul>
<li>Thomas Kuhn (1962): The Structure of Scientific Revolutions</li>
<li>Machiavelli</li>
<li>Hegel</li>
<li>Carl von Clausewitz</li>
<li>Rubicon Series (2010)</li>
<li>Stephan Blancke (2011): Geheimdienstliche Aktivitäten
nicht-staatlicher Akteure (private intelligence activities by
non-state actors)</li>
<li>Evan Ratliff (2019): The Mastermind. Drugs. Empire. Murder.
Betrayal. (Paul LeRoux)</li>
</ul>
<h2 id="discuss">Discuss</h2>
<p>We’re on <a href="https://bbs.anarplex.net/">bbs.anarplex.net</a> with our own board to discuss!</p>
<h2 id="hosts">Hosts</h2>
<ul>
<li><a href="https://opaque.link">Smuggler</a> (<a href="https://twitter.com/TheRealSmuggler">Twitter</a>)</li>
<li><a href="https://frankbraun.org">Frank Braun</a> (<a href="https://twitter.com/thefrankbraun">Twitter</a>)</li>
</ul>
<h2 id="contact">Contact</h2>
<ul>
<li>Email: <a href="mailto:[email protected]">[email protected]</a></li>
<li>PGP fingerprint: <code>1C4A EFDB 8783 6614 C54D E230 2500 7933 D85F 2119</code> (<a href="../../key/bitstream.asc">key</a>)</li>
</ul>
<h2 id="snail-mail">Snail mail</h2>
<pre tabindex="0"><code>Bitstream
Scanbox #06965
Ehrenbergstr. 16a
10245 Berlin
Germany
</code></pre><p>Please send us feedback letters, postcards, and interesting books. You can also send us your dirty fiat by cash in the mail! We take <em>all</em> currencies.</p>
<h2 id="support">Support</h2>
<p>Please support Cypherpunk Bitstream by donating to:</p>
<p><strong>Bitcoin</strong>: <a href="bitcoin://38mzCtXHjgq6RusYQsFy2TQiLvLK7vN5JF"><code>38mzCtXHjgq6RusYQsFy2TQiLvLK7vN5JF</code></a> (also via <a href="https://coinos.io/cypherpunkbitstream">lightning network</a>)</p>
<p><strong>Bitcoin Cash</strong>: <a href="bitcoincash://qrpwhtsag0u4rnuam9a5vwmqnly96znas5f5txjc35"><code>qrpwhtsag0u4rnuam9a5vwmqnly96znas5f5txjc35</code></a></p>
<p><strong>Decred</strong>: <a href="decred://Dsi9j7SdwZrHtCfUmxTNgpVGx2YAboZc7ve"><code>Dsi9j7SdwZrHtCfUmxTNgpVGx2YAboZc7ve</code></a></p>
<p><strong>Monero</strong>: <a href="monero://87UPx5sBS6g6wTvyRqqSMfFM6DzfHCPtFE25VC62vfohZVv4RRNcwif1XAPWTF27U1BKZEsrEXzDr6bMnGoTcThATvamE73"><code>87UPx5sBS6g6wTvyRqqSMfFM6DzfHCPtFE25VC62vfohZVv4RRNcwif1XAPWTF27U1BKZEsrEXzDr6bMnGoTcThATvamE73</code></a></p>
<p><strong>NEAR</strong>: <a href="near://bitstream.near"><code>bitstream.near</code></a></p>
<p><strong>Zcash</strong>: <a href="zcash://t1ewcXqQ9Uog5gMYjeeV46WiWB5j2SwD9Sv"><code>t1ewcXqQ9Uog5gMYjeeV46WiWB5j2SwD9Sv</code></a></p>