various updates

This commit is contained in:
optout 2023-11-30 17:12:27 +00:00
parent 311eb347fb
commit 6d40a564c6
No known key found for this signature in database
GPG Key ID: 13BA4BD4C14170C0
1 changed files with 5 additions and 2 deletions

View File

@ -65,8 +65,11 @@
- [Donations](#donations)
- [References](#references)
## Prelude
> These writings spawned as a collaborative effort between a variety of technologists weighing their concerns during the years of the global lockdown & censorship policies (2020-2022). This was published as a form of dissent and non-compliance against private-public collaboration, which had the aims of increased surveillance and censorship. As the proverb goes, "The road to hell is paved with good intentions." While many of those collaborative efforts from CISA and private partners sought to do good, suppression of public discourse only caused blowback in the face of institutions, and their fear narratives, gaslighting, and the more simple forms of propaganda (repetition), have lost their hypnotic effects.
## Introduction
The digital age has ushered in a dystopia, at least for those unwilling to circumvent or stretch the bounds of the law. There is a significant gap in literature in regards to circumvention of surveillance, largely due to this being an underground activity. It is pseudo-illegal; authors would be afraid that creations today will come back to haunt them. Exposing anti-forensic procedures will erode some of their operational security (OPSEC) in the process. This being said, not all of the defensive techniques throughout this writing will be sand-grain granular. However, I hope the ideas described can be applied to help disguise yourself in the sand-swept dunes.
The digital age has ushered in a dystopia, at least for those unwilling to circumvent or stretch the bounds of the law. There is a significant gap in literature in regards to circumvention of surveillance, largely due to this being an underground activity. It is pseudo-illegal; authors would be afraid that creations today will come back to haunt them. Exposing anti-forensic procedures will erode some of their operational security (OPSEC) in the process, coupled with time withering away at its relevance. This being said, not all of the defensive techniques throughout this writing will be as granular as we would have preferred. Though it could have went without saying, technological advancement moves fast, and quantum computing could theoretically weaken or render useless today's cryptographic implementations.
### General Premise
Several concepts will be reiterated throughout this work as security is a process that acts in layers (think about the layers of an onion that is commonly alluded to). Here is a layout of the general concepts that will be explained in further detail throughout this work:
@ -409,7 +412,7 @@ Another example is the use of stylometry in forensic linguistics to identify the
In recent years, stylometry has been used to identify the authors of fake news and propaganda. For instance, researchers at University of California Berkeley used stylometry to identify the authors of fake news articles and bots on social media platforms.
The Unabomber, Ted Kaczynski, was de-anonymized using stylometry. Kaczynski was a domestic terrorist who sent a series of letters and package bombs to universities and airlines between 1978 and 1995, resulting in three deaths and 23 injuries. In 1995, he sent a 35,000-word manifesto called "Industrial Society and Its Future" (also known as the "Unabomber Manifesto") to several newspapers, promising to stop the bombings if the manifesto was published. The FBI and the U.S. Department of Justice were able to use stylometry to identify Kaczynski as the author of the manifesto by comparing it to a set of writing samples from Kaczynski's personal papers. One of the key pieces of evidence was the use of the word "you" which Kaczynski used quite frequently in his manifesto as well as in his personal writings. The analysis also revealed that Kaczynski had a preference for short, simple words and that he used similar grammatical structures and sentence patterns in both his manifesto and his personal writings[^43].
The Unabomber, Ted Kaczynski, was de-anonymized using stylometry. Kaczynski sent a series of letters and package bombs to universities and airlines between 1978 and 1995, resulting in three deaths and 23 injuries. In 1995, he sent a 35,000-word manifesto called "Industrial Society and Its Future" (also known as the "Unabomber Manifesto") to several newspapers, promising to stop the bombings if the manifesto was published. The FBI and the U.S. Department of Justice were able to use stylometry to identify Kaczynski as the author of the manifesto by comparing it to a set of writing samples from Kaczynski's personal papers. One of the key pieces of evidence was the use of the word "you" which Kaczynski used quite frequently in his manifesto as well as in his personal writings. The analysis also revealed that Kaczynski had a preference for short, simple words and that he used similar grammatical structures and sentence patterns in both his manifesto and his personal writings[^43].
In addition to the stylometry, the FBI also used forensic linguistics to analyze the language and grammar used in the letters and manifesto and found that they matched the writing style of Kaczynski's known writings. In April 1996, the FBI searched Kaczynski's cabin in Lincoln, Montana, and found evidence linking him to the Unabomber crimes, including bomb components and a typewriter used to type some of the Unabomber letters. Ted Kaczynski pleaded guilty in 1998 and was sentenced to eight life sentences without the possibility of parole.