Transcript lightly edited for clarity
Alex Urbelis: This is like, this is the day for, I think, journalist-related talks, isn’t it? It’s a pretty awesome presentation from Joe Cox that just happened. And I think now we have another very special talk from a friend and colleague, Emma Best, Not Your Private Army on the Trail of Cyber Ops, which is going to be another, I think, really fascinating, interesting tale that interweaves criminal operations, hacker culture, and the U.S. federal government and, I think, aspects of the intelligence community as well. So, many of you know Emma Best.
Alex Urbelis: She’s been at Hope many, many times before. She’s an investigative journalist with a national security background. And she was, in 2018, one of the co-founders of Distributed Denial of Secrets, which I think deserves its own form of applause right over there. Distributed Denial of Secrets is an organization, 501c3 organization, that has stood up to, God, I can’t even count any, how many threats they’ve received from people who were very angry about their data being displayed on DDoS.
Alex Urbelis: So, without further ado, let me hand it over to Emma Best.
Emma: So, thank you all for being here. And thanks to HOPE and 2600 for letting me come back and address this topic here. Today I’m going to be talking about a couple of things that I’ve been looking into over the last year or so and what this means for us in general and kind of the questions that it raises about our obligations to sources and the public in general and how we resolve those conflicts because they’re not always the same thing.
So, before we get into the main discussion, which will be talking about four sets of things, really. We’ll be talking about Anonymous briefly and then we will move on to Russia and operations that happened after Russia’s invasion of Ukraine in 2022. And then we’re going to finish up by looking at a couple of times that the cyber realm has interacted directly with kinetic effects and kind of how fucked up that is in general.
And so, before we get into the actual data, let me just talk about the sources that I compiled and I’m using for this. First, there’s a lot of recordings that I managed to get a hold of. Some of them were public, some have been memory hold since then. But in a lot of instances, one of the difficulties with reading chat logs and text communications and things is that it does get hard at times to discern intent. You can’t tell what someone is feeling at any given moment just by reading their text, even sometimes when it seems obvious. We all know that there’s room for doubt at times. And so, getting to hear things from people’s own voices, see it come out of their lips, can be really helpful in clarifying.
Next, we’ve got chat logs, which I just mentioned a lot of them are direct chat logs as well as screenshots of messages and screen recordings of messages, which is lots of messages being scrolled through and recorded as a video.
Several of the hackers who have been involved in these operations agreed to talk to me. I’m not going to get into identifying any of them except that, well, I guess we’ll get to that specific when we get there. What they told me was also corroborated by several other witnesses who were not necessarily involved in things directly, but they were in positions to observe what was happening. They knew the hackers when things were happening, so they were aware of those conversations. They were aware of just a lot of things that helped corroborate the specifics of what was going on.
And one of the most important pieces was I was actually given access to a digital workspace used by the hackers for one of their operations, and this retained a complete history of everything that they had done, who was logging on and accessing things, who did what edits when, and that was very persuasive in terms of documenting exactly the who, what, and when of things.
So, first up, we have Anonymous, which I think everyone here is pretty much familiar with it, but let’s do the obligatory refresher in case anyone isn’t, or this gets posted and taken out of context or something. I’m sure that’ll happen.
So what is Anonymous? It’s a loose-knit collective of trolls, hackers, and activists. There’s no single belief system, structure, goal. And one of the defining attributes of Anonymous was the way it evolved. Anyone could be Anonymous. You say that you’re Anonymous. Boom, you’re Anonymous. And it’s literally unfalsifiable because saying it makes it so. It’s like declaring a new Discordian pope. You can’t dispute it.
Some of Anonymous’ most infamous things involve their war with Scientology and for supporting the Occupy movement, the Arab Spring, and WikiLeaks. So, when I said Anonymous, I don’t know how many of you people listening thought about Aubrey Kirtaner Cottle. He has somewhat recently been arrested and is going through court currently for allegedly hacking Epik and the Texas GOP, which, you know what? Those were pretty decent hacks. I don’t know. Moving on. Not going to get into specifics. Not going to get into specifics of what exactly I didn’t know when at this point because I don’t think we should really be talking about the details of a hack that someone is currently undergoing trial for. It wasn’t a DDoSecrets release, but we mirrored it.
So, there’s two different stories when it comes to Kirtaner’s early days. He claimed that he was a founder or the founder of Anonymous. And Kirtaner has told this story to a number of people in different settings. Usually it’s public, and we get about half the story. And in that [version a] CSIS agent, which is Canadian law enforcement and intelligence, they came and visited Kirtaner and said, like, wow, these are some really incredible raids you’re doing. You’re fucking with Hal Turner [note: I misspoke and said “Martin” instead of “Turner”] and all this other stuff.
And this was in the area where we had the Fox News segment that was infamous, the hackers on steroids thing with the exploding truck, which was truly ridiculous. And so he came and said, like, do you want to work for us? And Kirtaner said, no. That has been consistent in every telling that I’ve heard. He said, I don’t want a salaried job. But then there was another offer, and this usually gets left out of the tellings that he does.
The CSIS agent then asked if he would help run raids on Middle Eastern forums and extremist forums. Publicly, Kirtaner has said that he was open to it. He told them maybe, and then just kind of stopped answering their calls and waited for them to stop calling them back. And that was where it ended. But privately, in a number of chats, he has acknowledged that he accepted that offer and that he received basically forms of immunity for this, additional tolerance.
Now, at times he has addressed these contradictions online and in various appearances, and he basically says, I was just trolling. Who from the imageboards hasn’t said, lol, I’m a fed? And you know what? Maybe. Maybe. But let’s go ahead and just take a quick look at what he’s acknowledged publicly.
This was two months before the Atlantic article came out calling him a founder of Anonymous, in which Kirtaner admitted to weaponizing the collective for alphabet agencies. He says, quote, “I was the lucky one to have the blessing of alphabet agencies to weaponize Anonymous as an anti-terrorism thing to boot. Those that came after me, not so much. I’m Canadian, too, so that changes the calculus. And it was a laughable concept, too.” The last part, we can debate whether or not it’s laughable, but this was a very public in plain text admission that he did before his media comeback was truly staged, which, from what I understand, had been in the works for a little bit. He had started claiming founder status of Anonymous as early as 2018, according to some individuals.
But again, you could debate this. You could debate the intent of that tweet. Was it just trolling? Was he fucking with people? What did he actually mean? So, let’s hear him explain it in his own voice, his own words.
Kirtaner: And after I turned down the salary, I’m like, no, no, no. I don’t think I’ll want to be in something like that. And he goes, well, would you be willing to raid al-Qaeda forums for us? Shit, you’re not. He just fucking drops that on me. He wanted us to raid a goddamn al-Qaeda forum. What did you say? Maybe. Well, at the same time, if you actually go, if you go on the Wayback Machine, you start digging through the old /i/ archives that you can go and stuff, you will find terrorist forum raids left and right. They were fucking all over the place.
Host: They were around, yeah.
Kirtaner: Yeah, those were fed posts.
Host: I used to wonder about those, you know.
Kirtaner: Well, now you know for sure.
Host: And I used to look at the invasion board and I would look at some of the threads that came up that got traction. You know, the not-your-personal-army ones are obviously going to fall to the bottom and get deleted, but the ones that did gain traction and that were in a gray area, I would wonder. I said, who’s going to get the visit over this?
Kirtaner: Nobody ever did. Yeah. That’s the fun part.
Host: Yeah, it really makes you think.
Kirtaner: Pretty much my entire run, all of that shit, you take a look at everything that happened afterwards and then you take a look at my period and you can go, you can dig through news, you can dig through arrest records, all that shit. Not a single motherfucker got touched. It was like we had a magic umbrella just protecting everyone under me. You know I’m right.
Trolling? Maybe. I don’t think so. I’ve seen him talk about this stuff in chat logs with hackers that he was trying to recruit and work with at the time. He has acknowledged this as an influence in the past and he has specifically attributed the non-prosecution over the Epilepsy Foundation hack in 2008 to his co-operator status.
Those of you who may not remember, they hacked the Epilepsy Foundation website and put a lot of GIFs on there that flashing images so that people who went to get help for their epilepsy or information about it instead were triggered and this had real-world consequences for some people and Kirt has said, like, I was never touched for that. I have even publicly acknowledged being part of that. He has said that and what’s interesting is the FBI did, they did basically drop it. You can go back and in a CNN interview where they’re debating Anonymous, the host on CNN jumps in and says that, no, the FBI actually said that this wasn’t Anonymous. Anonymous had nothing to do with this, which was very interesting because it was publicly and widely attributed to Anonymous at the time. People found the posts where they were planning this on the image boards. It was written about. There was really no reason to conclude that, but they did. I don’t know. Maybe the FBI is trolling us.
Now, I mentioned before, Kirtaner turned down the salary from CSIS and he has consistently said in every chat log I’ve been given that he could never really be a kept pet. He could never really be a kept asset and he never worked as a contractor or had any sort of formal arrangement. Instead, he has given grace for his activities, specifically when they happen to align with some of the government’s interests, similar to the Middle Eastern forum raids that they discussed earlier. And again, he has discussed this publicly in an audio, piece of audio that I can share.
Kirtaner: There is a distinct difference between dead ass being a patriot and doing it for the greater good than being an asset. Like, you know, there’s a level of tolerance versus being something that you could classify as a designated asset. I’m sure you can agree there.
So, again in his own words, never a designated asset. Just, I don’t know, what’s the word? Useful idiot?
So let’s go ahead and talk about the Epik hack and criminal complaint real quick because there’s a couple things that are kind of relevant. First off, “to the FBI agents reading my Discord logs, eat my ass. I helped your sedition charges. Least you could do is pay for my therapy.” Great, great stuff.
One of the interesting things that jumped out at me, though, was, this is kind of just a fun little fuck-up on the FBI’s part. They say that on January 18th, 2022, he posted these four messages. If you look at the dates, no, this was 2021, September 26. And, fun fact, neither indicate anything. They’re both quotes from articles published by The Washington Post. Two separate articles, I believe, one of which I’m mentioned in along with DDoSecrets. For some reason, the FBI didn’t think that, hey, we should redact Emma’s name in this even though they went ahead and redacted Rob Monster’s name in the criminal complaint. He was the CEO of Epik and is publicly cited and acknowledged in many places. So, why the fuck he deserved privacy and I don’t, who the hell knows. But the Epik data, we didn’t republish that until after it was already out. It was released on a torrent and allegedly there was just one seeder at the time and their IP address happened to match Kirtaner’s.
A couple of interesting things that I found while researching this and I just want to mention them. in private messages, he brags about, hey, wow, when they were raiding me, they missed this big box of hard drives sitting next to my computer. And then there’s a picture of a box of hard drives. More recently, this was public in either Discord or I think actually on his Twitter account, GBMilady, Game Boy Milady, some NFT bullshit. Fun fact, there’s apparently some, like, extreme white supremacist background ties to that. So NFT space, always, always great. Gotta love it. He posted about, oh, wow, when they did the raid, they also missed these phones. One was in a [glovebox] and the other was in my bed because who’s ever heard of a search warrant being executed where they tear a place apart and bother to check the bed. Like, that’s, no one hides anything under a mattress. That’s just silly talk. And again, he posted pictures of them and this was actually apparently a threat against his ex, Libby Shaw. If you know the name, you know the name.
So, there’s a couple other examples in anonymous history that I should try and talk about real quick. First, Backtrace, basically, Anons hated Anons. They started fighting. They said, I don’t want to be anonymous anymore or you’re not anonymous or whatever. And they started doxing each other and harassing each other. And this led to the arrest of some people, including almost certainly Sabu. Many of you will recognize that name immediately and felt your buttholes tighten up and I’m right there with you. But, some interesting things that I found while doing the research for this. There’s long been speculation that the FBI knew more than they acknowledged about the Stratfor hack, and the FBI has consistently denied this in public statements and said, and this was an anonymous official, of course, no one, I think, bothered to put their name to this. “We didn’t find out about the hack until December 6th when it was already too late.” And that is a half-truth at best.
Yes, the credit card system of Stratfor had been hacked weeks before. However, the FBI, based on their own descriptions of the surveillance of Sabu while he was cooperating, which was during this period, and their description of debriefings of him, which have been acknowledged by him and his legal team in filings, they should have known about this right away, within hours, end of the day at most. Sabu actually became aware that Stratfor was hacked late December 4th. This is in sealed chat logs. By December 5th, he was talking to the original hacker of the Stratfor server and agreed, like, hey, no, we’ll cover you for this. You know, you want to keep your name out of it? That’s fine.
And it wasn’t until December 6th that, like, yes, they started sharing it internally with other Anons, AntiSec / LulzSec, all this fun stuff, but the FBI knew about it or was grossly incompetent because Sabu recognized the importance of this right away. They said nothing, and it wasn’t until, according to public statements, December 5th that the president, I believe it was, of Stratfor, George Friedman, found out about the hack from, I believe it was, Fred Burton, the senior VP for intelligence, if I’m remembering correctly, and if not, I am very sorry, please don’t sue me for getting your title wrong.
So they knew about this well ahead of time, and then when they finally exfiltrated the emails and further penetrated the server, which was done by Jeremy Hammond, who recently, by the way, got kicked out of DEF CON for saying, Free Palestine, which, hell yeah, from the river to the sea, right, and protesting the presence of military officials and embracing them and taking shots while saying, “go Army,” and generally just embracing the genocidal war machine that engulfs us all.
And so, yeah, they decided to kick him out. Fun additional side fact. I will get back on course soon, I promise, but one of the goons at DEFCON is a hacker with known ties to military intelligence. If you started naming colors, you would eventually get their name. That’s as much as I’m going to say, but, yeah, fun fucking shit. They are connected to a few of the things we’ll talk about later, but let’s go ahead and move on.
Also, compromising anonymous and infiltrating anonymous was Maksym Popov. He was a Russian contractor and former FBI informant. He was written about in Wired, and then I wrote a follow-up piece which got into more details about his infiltration of anonymous, his dealings with Sabu, and getting access to the Syria emails before they were published online, the complete unredacted version. And, yeah, about a million of them still seem to be offline and never published in any form.
Op Isis, Op Paris. Pair of Anonymous side ops where people were going around after the Charlie Hedbo and Paris attacks and basically doxing lots of people with alleged ties to Middle Eastern extremists. They, in several instances, dealt directly with governments or through proxies. In at least one instance, they claimed to have stopped a terror attack, and in another instance in private chats, I found a participant bragging about how they had spoken to people in the intelligence community, and it, indeed, bought them goodwill. Stay away from NATO targets, do the ISIS stuff, and we’ll leave you alone for everything else.
Anonymous Egypt. Not a lot to say. They used anonymous name and branding, but were financially motivated and ransomware affiliates. They worked with both LockBit and Medusa.
More recently, we have Anonymous for Justice. This is actually Iranian intelligence, and they hacked and released a lot of stuff from Israel, and honestly, it’s good shit. A lot of it is. Some of it, they kind of futzed about the value for, but massive troves from the Ministry of Justice. DDoSecrets republished that, but it’s another instance of state hackers just directly using the anonymous name, branding, and images.
So, let’s go ahead and leap ahead to Russia. We are going to have some brief thoughts shared by Mr. Assange.
NYT: You said, you won’t disclose your sources. Fair enough. But you’ve also indicated during a Meet the Press interview that you would be open to accepting verifiable material from intelligence services, saying, quote, if you’re asking would we accept information from U.S. intelligence that we’ve verified to be completely accurate, the answer is yes, of course we would.
Julian Assange: But, okay. Would WikiLeaks take materials from U.S. intelligence services that we verified to be true? Of course. Of course. We’re in the business of educating the public. Now, let’s leap forward a couple of years. Let’s imagine that rival intelligence services in the U.S., in China, want to settle their conflicts about who’s right who’s the good actor, who’s the bad actor on a particular situation by presenting the public the truth. That’s the most amazing advance that I can think of. We would strongly encourage that instead of intelligence agencies planting dodgy stories trying to whip up wars to mainstream media outlets, instead understanding the filters for accuracy that organizations like WikiLeaks have instead pushed into a position where they have to fight it out in the public with the truth.
NYT: I think all journalists would enjoy that.
So, this isn’t about Julian. This isn’t about the 2016 election or Guccifer 2.0, the source for the DNC emails. It is about what Julian called the most amazing advance. And in theory, it sounds great. Intelligence agencies, governments releasing mass amounts of information. Yes, I want this. Do it about yourself. Do it about your enemies. Do it about everyone but the private citizens and we can actually maybe get along.
But while they were asking in the context of the Russian interference in the U.S. presidential election, Julian was answering in a slightly different context that we didn’t really know about at the time and that’s Vault 7 and The Shadow Brokers files which both the Shadow Brokers and WikiLeaks said they had. Julian, in his statement, said we will protect U.S. intelligence. That is not just a deflection of talking about Russia and saying, oh, we would protect Russians. It was a message to those individual sources.
But let’s go ahead and just move on to Russia in general. Let’s talk about the invasion of Ukraine and the response to it. After this brief word from Hillary Clinton. Last one. I promise. I’m like 99% sure.
Hillary Clinton: What I would argue for government support but also non-governmental support. There were reports overnight that Anonymous, a group of hackers, took down Russian TV. I think that, you know, people who love freedom, people who understand that, you know, our way of life depends upon supporting those who believe in freedom as well could be engaged in cyber support for those in the streets in Russia. We did some of that during the Arab Spring when I was secretary of state. I think we could be also attacking a lot of the government institutions and, again, the oligarchs and their, you know, their way of life through cyber attacks.
All right. So there’s basically two parts to that that are worth paying attention to. And the first and most obvious is probably what jumped out to everyone. That was hearing Hillary say something nice about Anonymous. The second, it’s a little bit more tricky. She acknowledged that they did something similar during the Arab Spring. They don’t really talk about this at the time. There’s seemingly no mention of it in her emails that were released through FOIA. So confirming exactly what she meant there is a little bit tricky. But I would highly recommend further examination be given to Tunisia where members of Anonymous who were not previously known to the ones they were interacting with suddenly appeared and said hey we have we have the keys to the kingdom. We can get you into all their websites. And they did. And Anonymous a lot of American and European Anons began hacking and defacing those websites.
There’s also Egypt where interestingly Facebook helped intervene. according to Anonymous member Gregg Housh, who some of you may know from his many media appearances – and more infamously and controversially having been an FBI informant who helped get people arrested – acknowledged that when they were generating support for the protests in Egypt there was an event that was created on Facebook for the Tahrir protests. But they had a problem because nobody wanted to sign up and show up and say like oh I’m the one person here like yeah black bag me. So their solution was to mass generate profiles which then signed up for the protest. And this did in fact help encourage a lot of other genuine accounts to sign up for the protest too. The actual influence that that had on the turnout for the protests is debatable and people better versed in those local politics should look at that.
But one of the most interesting admissions that Gregg made was that they had a Facebook employee disable spam filters for several IP addresses that they were using to generate all these accounts. This is by several years the earliest instance that I know of that Facebook through its employees used its infrastructure to interfere in the politics of a foreign government. And you know to be clear I’m in favor of you know the revolution. I think that they made a lot of improvements. We can definitely talk about current politics but it is a very interesting note that Facebook was used for that. But let’s stay focused on Russia.
So we’ve got Network Battalion 65, a group of hacktivists who were described publicly as being members of Anonymous, former members of Anonymous, or Anonymous adjacent. They were recruited to work on this project. they were recruited primarily by an individual known as John Jackson, Mr. Hacking, a founder of Sakura Samurai. Now they decided to do this to coordinate their hacks with Ukrainian intelligence. And that is where as far as I can tell most of the actual coordination happened. But US intelligence was aware the entire time. After a certain point there were regular briefings that I’m told went very, very high in the Biden administration. But there are several things about Network Battalion 65, NB65, that we should talk about.
First is the Roscosmos hack. This was a hack of Russian satellite systems. It was exaggerated by Russians so that the hack itself could be denied. Russians denied that, oh, satellites were affected. They didn’t hack into satellites. This was never the claim. They did access facilities that were used as part of the general control mechanism and they offlined one of those machines. That was verifiable. But while denying the exaggerated form of the hack, there was a telling comment from one of the Russians involved who I think worked at Roscosmos where he referred to it as a cause for war. After they hacked the Nuclear Institute, NB65 was asked by contact in U.S. intelligence and military to stay away from critical infrastructure. And after that, they did. They started switching to more traditional hacks like VGTRK, Russian state media and all that.
Very controversially, there was the Kaspersky hack and leak which was widely considered a hoax after it came out. Several members insist that it was real. Other members say, no, they’re crazy. The people who say that it was real, I find fairly credible. The data seems to have been diverted at some point and what was published was the publicly accessible Kaspersky code. And very tellingly and importantly, about a week after all of this went down, intelligence agencies began issuing fresh warnings about Kaspersky and their software which has a whole history that I’m told we do not have time to get into.
Very stupidly, several members of NB65 and I think I mentioned a DEF CON goon earlier. I’m just going to mention that again right now for no particular reason. These goons, sorry, these people decided to go on Vice and do an interview. What was produced was a relatively short piece where they actually appeared alongside at one point or not directly alongside but intercut with the director of CISA at the time, Jen Easterly, where again, they raised the issue of things being possible acts of war or interpreted as such used to escalate against the U.S. and they largely dismiss this.
Several interesting traps that may have been laid by NB65. At one point, they tried to submit data to WikiLeaks. They did this while it was already known in public that WikiLeaks’ submission system was down. It had been reported on by the Daily Dot at the time, I believe. and they made sure that I was there to witness it when they went into a WikiLeaks research channel, said, hey, this is who we are. Someone needs to contact us. We have data.
Several years ago, another instance happened where I presented at DEF CON, got off stage, and while speaking to several journalists, was approached by someone who identified himself as Gregg Housh. He said, I’m here with NB65. I’d never met Gregg before, but I later confirmed that it was him. At the time, I considered it a fucking trap. Why would you walk up in front of journalists and say, I’m with this hacktivist group that’s right here. They are potentially involved in all this very sensitive stuff. Also, I mentioned Gregg’s history as an informant, but why did they do a lot of this?
In John Jackson’s own words, more recently, and to be clear, he was not talking about these operations in particular. He said, “people tend to trust their government less when they don’t feel protected,” and so vast amounts of economic damage was done to Russian industries.
This brings us to Russia’s National Republican Army. They were a resistance group allegedly made up of Russians. Their very existence is doubted, but they’ve claimed responsibility for at least two assassinations and numerous acts of sabotage and other issues happening in Russia. in October 2022, they claimed responsibility for the TechnoServ hack. This was publicized in the KyivPost by Jason Jay Smart, who very interestingly works with John Jackson at a place called Shoganai Consulting. They informally started working together in 2022 after the invasion of Ukraine, according to their website, before formalizing their efforts in 2023.
Now, the story is that the hackers were all Russian. I know from speaking to several of them that that is not the case and that the timeline given in the Kyiv Post was inaccurate. They said they were informed about the data and the hack on the day that the article was published. However, I viewed the hackers’ workspace, which included notes about finishing the article and screenshots. The article included cropped versions of the screenshots in their space. So, he knew about it, it seems, prior to what was publicly disclosed and was indeed part of the release. They tried to release it through RSync and Onion services, but basically no one could figure that out except DDoSecrets. We refused to make it public. We have it listed as a limited distribution/reserved data for journalists and verified researchers only because of the state involvement. We didn’t know about the state involvement at the time, but we flagged it with the cyber war category and said, like, there’s a lot of red flags, here’s several of them, and now we’ve confirmed what those red flags mean.
Moving on very quickly, while we still can. They were both given a number of medals and certificates for their work. They have both acknowledged this openly. That’s why I decided to focus on the two of them and Kirtaner, because they are both, all three of them, rather, are public figures. Their names are known. Their stories are somewhat out there. And while John Jackson and Jason Jay Smart were not previously associated with these hacktivist groups, they did participate with others as well, and their general work for the Ukrainian military was acknowledged.
And to be clear, fuck the Russian government. Fuck the invasion of Ukraine. I have no problem with these hacks and these leaks for the most part. What I have a problem with is state actors co-opting hacktivists, recruiting actual hacktivists, and then putting them into positions where they’re compromised. This brings us to kinetic and cyber. This will be very brief, but it’s the part that upsets me the most.
I learned about two sets of operations. One I was able to observe in real time. The other was confirmed to me by several people afterwards, where hacks were proposed of various systems to identify the exact location of people, high-ranking officials in the Russian military, in one instance. The idea was we’re going to drone them. Thankfully, that never happened. The hackers refused, or in the latter case, where I was able to observe it in real time, interest just dissipated. They wound up not doing that, thankfully. That operation was not against Russia, but against a Latin American country.
In at least one instance that I learned of, and I confirmed this with multiple people who were involved, they sabotaged an industrial system in Russia through hacking, and as a result, people died. There was an explosion, and more Russians than I can count on one hand died as a result. It’s war, but they weren’t soldiers. You can decide that they’re just casualties in a larger struggle that they had no role in, but when you do that, you invite them to do the same.
And I have seen, through decades of records and memoirs and first-hand accounts, that is always the pattern. They always say, Communist Russia is doing these horrible things. They’re so bad, you guys [that] we have to do them, too. And in some instances, yeah, other people were doing those things, but in a lot of instances, they weren’t until we started, and then they mimicked our programs. This goes for everything from rendition to torture. We have seen this pattern played out with propaganda. We have seen it so many times, and I am fucking sick of it. And now it is costing lives, and people want to continue pairing kinetic and cyber operations in this way? Fuck you!
Be better. We are supposed to collectively be better than the people we oppose. When we mimic exactly what they do and what we criticize about them, well, then we just get Julian’s flash forward in a nightmare scenario, instead of something that, in some way, moves us closer to transparency and enlightenment. We just get people fucking each other up on national levels, until eventually it is used to support actual actions on the ground. Like, this was an act of war. We’re going to go after you. And we are so lucky it hasn’t happened yet in a way that will blow up for all of us so goddamn massively.
Thank you all for having me here. Abolish ICE. Free Palestine.
Alex Urbelis: If anybody has questions, please come up. Come on down to the front here. We’ll use the microphone. Hopefully they’ll be turned on momentarily. And let’s thank Emma once again for her insightful and incisive remarks.
Attendee: Thank you. Thank you for the talk. Appreciate it. I’m curious to see what your comment would be on, say, like the IT Army of Ukraine and their DDoS attacks and then also one fist. And I know that they have been, they have one fist put themselves out there to identify themselves. So I’m just curious to see those weren’t mentioned in the talk. Just curious to see if you have any comments in those two.
Emma: Yeah, that’s a great question about the IT Army. I think that the IT Army was a really novel idea. And I’ll tell you that after they, they announced their thing, we, we sent them an email from DDoSecrets and said, hey, if you’re going to, if you’re hacking and leaking stuff, like here’s our submission information. We thought it was great that this is a state actor being transparent about their involvement in a grassroots movement and giving people a way to do that. There’s always a risk that those things can escalate, but at least with that transparency, we all knew what we were getting into. It’s when you find out later that, oh, the state was involved in this. The state was, was selecting targets. This, the state was deciding you will execute this exploit on this server because it’ll have a high impact, but not this one because we don’t give a shit.