This document discusses robust telecommunications architectures to support revolutions. It examines the strategic telecommunications requirements for the execution stage of a revolution, which should be timely, secure, verifiable, untraceable, and resistant. It evaluates using text messaging to meet these requirements, finding it does not adequately ensure communications are untraceable or resistant. The document then discusses spycraft techniques like cutouts, dead drops, signals, cover stories, codes and ciphers, and cells that could be used to build a more robust, untraceable network like the secret telephone network created by the Dutch resistance in WWII.
1. Case Summary In a narrative format, brief the Dred Scott case.docx
Robust telephony architectures to support violent revolutions
1. Robust Telephony
Architectures to Support
Violent Revolutions
Or, Telecom and the Second Amendment
Or, Telecom and Occupy Wall Street
1
Moshe Yudkowsky
Disaggregate Corp
moshe@pobox.com
view talk online at http://youtu.be/Bw0d9wHefNg
Tuesday, August 6, 13
3. US Declaration of
Independence
"We hold these truths to be self-
evident, that all men are created
equal, that they are endowed by
their Creator with certain
unalienable Rights, that among
these are Life, Liberty and the
pursuit of Happiness."
3
Tuesday, August 6, 13
4. US Declaration of
Independence
"But when a long train of abuses and
usurpations, pursuing invariably the same
Object evinces a design to reduce them under
absolute Despotism, it is their right, it is their
duty, to throw off such Government, and to
provide new Guards for their future security."
4
Mentions just one duty
Tuesday, August 6, 13
6. Fourth Amendment
"The right of the people to be secure in
their persons, houses, papers, and effects,
against unreasonable searches and seizures,
shall not be violated, and no Warrants shall
issue, but upon probable cause, supported
by Oath or affirmation, and particularly
describing the place to be searched, and the
persons or things to be seized."
6
Tuesday, August 6, 13
7. Communications as a
Weapon
Those rumors about switches buried
100 feet underground? Hardened
against nuclear blasts? They're true.
The City of Chicago operates a
separate fiber network that connects
all police and fire stations.
7
Tuesday, August 6, 13
8. Second Amendment
"A well regulated Militia, being
necessary to the security of a free
State, the right of the people to
keep and bear Arms, shall not be
infringed."
8
Tuesday, August 6, 13
9. On to the Revolution --
9
Tuesday, August 6, 13
10. Power Struggles
10
Revolution masses
Pronunciaminto "national will"
Civil War armed forces
Putsch group in armed forces
Liberation external forces
National Liberation rival internal state
Coup d'Etat seize levers of power
Tuesday, August 6, 13
11. Exercise
What are the strategic
telecommunications requirements
of the execution stage of a
revolution?
11
Tuesday, August 6, 13
12. My current list
12
Timely As fast as needed
Secure Authorized users only
Verifiable Are messages authentic?
Untraceable Resists traffic analysis
Resistant Robust against interference
Tuesday, August 6, 13
13. Fortunately, we have
had test cases
SMS Shutdown in San Francisco
Bittorrent throttling
"Great Firewall"
PRISM, XKeynote, and
13
Tuesday, August 6, 13
15. Exercise
How well does the this solution
meet the requirements?
15
Tuesday, August 6, 13
16. I'd say, not very well
16
Timely Yes
Secure Aggressive and physical attacks?
Verifiable Mostly
Untraceable No
Resistant Seized, outlawed, blocked
Tuesday, August 6, 13
20. Exercise
Using tradecraft, suggest a solution for
at least one of these:
•Robust network
•Untraceable calls
•Signals and messages 20
Cutouts
Dead
Drops
Signals
Cover
stories
Codes &
Ciphers
Cells
Tuesday, August 6, 13
21. During WWII, the Dutch resistance
created a parallel, secret telephone
network.
21
Tuesday, August 6, 13