BE-related

Monte Davis montedavis49 at gmail.com
Fri Mar 10 13:13:16 CST 2017


Foucault, Chomsky, and Fanon at the Council of Elrond:
http://existentialcomics.com/comic/175

On Fri, Mar 10, 2017 at 1:34 PM, David Morris <fqmorris at gmail.com> wrote:

> The related meme is that this Wiki dump was perfectly timed to support
> Trump's claim that Obama tapped his wires.
>
> On Fri, Mar 10, 2017 at 11:12 AM Paul Mackin <mackin.paul at gmail.com>
> wrote:
>
>> How about this from the NY Times:
>>
>> The media, to its credit, eventually sorts things out
>> <https://www.wired.com/2017/03/wikileaks-cia-hack-signal-encrypted-chat-apps/> —
>> as it has belatedly started to do with the supposed C.I.A. cache. But by
>> then, the initial burst of misinformation has spread. On social media in
>> particular, the spin and distortion continues unabated. This time around,
>> for example, there are widespread claims on social media that these leaked
>> documents show that it was the C.I.A. that hacked the Democratic National
>> Committee, and that it framed Russia for the hack. (The documents in the
>> cache reveal nothing of the sort.)
>>
>> https://www.nytimes.com/2017/03/09/opinion/the-truth-about-
>> the-wikileaks-cia-cache.html?ref=opinion
>>
>> You have to read the whole thing to get her reasoning.
>>
>> On Fri, Mar 10, 2017 at 10:46 AM, Kai Frederik Lorentzen <
>> lorentzen at hotmail.de> wrote:
>>
>>
>> Jamie: "Call me cynical, but I fail to see how any of this wikileaks dump
>> is new or surprising information.Of course they are doing that. Have been
>> for years ... "
>>
>> Let me reintroduce the emphasized part of my quote:
>>
>> > The CIA's Remote Devices Branch's UMBRAGE group collects and maintains
>> a substantial library of attack techniques 'stolen' from malware produced
>> in other states including the Russian Federation.
>>
>> With UMBRAGE and related projects the CIA cannot only increase its total
>> number of attack types but also misdirect attribution by leaving behind the
>> "fingerprints" of the groups that the attack techniques were stolen from. <
>>
>> So "Russian hacking" must in general be considered to be CIA hacking?
>> Well, that's OK with me, but ...
>>
>> Am 09.03.2017 um 17:25 schrieb Jamie Anderson:
>>
>> Call me cynical, but I fail to see how any of this wikileaks dump is new
>> or surprising information. Of course they are doing that. Have been for
>> years. What should my response be?
>>
>> On Wed, Mar 8, 2017 at 1:00 AM, pynchon-l-digest <
>> owner-pynchon-l-digest at waste.org> wrote:
>>
>>
>> pynchon-l-digest      Wednesday, March 8 2017      Volume 02 : Number
>> 13324
>>
>>
>>
>> [none]
>>
>> ----------------------------------------------------------------------
>>
>> Date:
>> From:
>> Subject: [none]
>>
>> '"Year Zero" introduces the scope and direction of the
>> CIA's global covert hacking program, its malware arsenal
>> and dozens of "zero day" weaponized exploits against a
>> wide range of U.S. and European company products, include
>> Apple's iPhone, Google's Android and Microsoft's Windows
>> and even Samsung TVs, which are turned into covert
>> microphones.'
>>
>> https://wikileaks.org/ciav7p1/
>>
>> The passphrase has some historical significance:
>>
>> SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds
>> -
>> Pynchon-l / http://www.waste.org/mail/?list=pynchon-l
>>
>> ------------------------------
>>
>> End of pynchon-l-digest V2 #13324
>> *********************************
>>
>>
>>
>>
>>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://waste.org/pipermail/pynchon-l/attachments/20170310/f23d7fc5/attachment.html>


More information about the Pynchon-l mailing list