{"id":1401,"date":"2016-12-26T14:32:50","date_gmt":"2016-12-26T03:32:50","guid":{"rendered":"http:\/\/scriptorum.imagicity.com\/?p=1401"},"modified":"2016-12-26T14:32:50","modified_gmt":"2016-12-26T03:32:50","slug":"dont-argue-as-if-the-world-were-sane","status":"publish","type":"post","link":"https:\/\/village-explainer.kabisan.com\/index.php\/2016\/12\/26\/dont-argue-as-if-the-world-were-sane\/","title":{"rendered":"Don&#8217;t argue as if the world were sane"},"content":{"rendered":"<p>Glenn Greenwald, in every respect a reputable, diligent and ferociously smart gadfly, continually forgets to remember that few people are as sane and as willing to be led by evidence as he is. It&#8217;s his great failing.<\/p>\n<p>Nowhere is it more visible than in his incredulity toward the CIA and the rest of the US state security apparatus concerning their claims of Russian tampering in the election process. He is dead right to mistrust the CIA&#8217;s every utterance. Lying, after all, is a large part of what they do for a living. Likewise, a\u00a0politicised and partisan FBI is not a useful\u00a0source for agenda-free commentary on Russia&#8217;s disinformation campaign.<\/p>\n<p>But none of the above provides a sufficient\u00a0basis to say that Russia has <em>not<\/em> played a direct and active role in the subversion of the American democratic process. Using the\u00a0espionage establishment&#8217;s lack of credibility to refute the claim of Russian meddling is completely illogical.<\/p>\n<p>We discount or discard the CIA&#8217;s claims precisely because we know that they&#8217;ve done far, far worse countless times in the past. We <em>know<\/em> they&#8217;ve planted or spun innumerable stories.\u00a0To people living in vulnerable parts of the world,\u00a0it&#8217;s simply axiomatic that Voice of America and USAID are\u00a0tools of American influence. We also know they\u00a0regularly use economic leverage to bring about certain policies, and they regularly plant stories to\u00a0tarnish the image of any government that doesn&#8217;t toe their line.<\/p>\n<p>Yes, they&#8217;re hypocrites and liars. Nobody disputes that. Yes, they&#8217;re guilty of exactly the sins of which Russia stand accused. But if anything, that realisation should <em>reinforce<\/em> the suspicion that Russia might be giving back as good as it gets. (Or better, depending on where you stand and how you feel about the success of the campaign to tarnish Hillary Clinton&#8217;s reputation.)<\/p>\n<p>The sins of which the Russians stand accused are exactly the things that powerful countries do. They do it continually, shamelessly and cynically. <em>It&#8217;s what they do. <\/em><!--more--><\/p>\n<p>The strong preponderance of evidence points to a multi-pronged, often unmediated Russian campaign\u00a0to subvert faith in American democratic institutions. On the propaganda front, the\u00a0weight of it is irrefutable. Just watch a couple of hours of RT. It&#8217;s slick, nicely weighted cynical propaganda that is calculated to seduce young, disaffected liberals.<\/p>\n<p>The use of troll accounts to conduct disinformation campaigns is likewise well documented. There is sufficient circumstantial evidence to assume that, absent evidence directly contradicting\u00a0what we know, that young Russians are being paid by the state to use social media to spread lies, distrust and conspiracy theories.<\/p>\n<p>And if there were any\u00a0lingering doubt, we&#8217;ve got several on-the-record interviews with Russians claiming to be paid trolls, deriving from independent sources.<\/p>\n<p>There is sufficient circumstantial evidence that Russia was\u00a0behind the DNC hack to\u00a0convince some of the foremost minds in the IT security establishment. Bruce Schneier may not be perfect, but he is trustworthy. And if he says that there&#8217;s <a href=\"https:\/\/www.schneier.com\/blog\/archives\/2016\/07\/russian_hack_of.html\">significant evidence pointing to Russian involvement<\/a> in the interception of Democratic National Congress emails, you should listen. And if you don&#8217;t\u00a0possess evidence contradicting his conclusion, you should accept\u00a0that he&#8217;s probably right.<\/p>\n<p>This is a bit of an argument to authority, I&#8217;ll admit, but having looked at the\u00a0evidence he cites, on this and countless other occasions, I can say that statistically, he&#8217;s right most of the time, and when he&#8217;s not confident about a conclusion, he says so. But in this particular case, having seen the same evidence he has, I also don&#8217;t think he&#8217;s wrong.<\/p>\n<p>Julian Assange&#8217;s claims that he knows\u00a0his source isn&#8217;t Russian is neither credible nor conclusive.\u00a0He&#8217;s locked up in an embassy, for heaven&#8217;s sake. He <em>simply\u00a0cannot know<\/em> where his source got the data from. Any chain of custody breaks when it reaches him. He&#8217;s the weak link in his own argument.<\/p>\n<p>The fact that he is biased, under extreme stress\u00a0and has a history of paranoid persecution complexes that predate his captivity don&#8217;t have to come into it to discard him as a reliable source of evidence.<\/p>\n<p>Most of the debunking of these claims consists of people finding logical inconsistencies in various accounts of the hack. That&#8217;s pretty weak tea.\u00a0Strong evidence can be weakly presented, and usually is, because\u00a0most reporters just don&#8217;t understand tech.<\/p>\n<p>And that ignorance cuts both ways. A lot of the more incredulous posts evince an equal lack of understanding of technology, security and\u00a0intrusion tactics.<\/p>\n<p>A good example of this is\u00a0Leonid Bershidsky&#8217;s op-ed saying <a href=\"https:\/\/www.bloomberg.com\/view\/articles\/2016-12-22\/why-i-still-don-t-buy-the-russian-hacking-story\">he still doesn&#8217;t believe that\u00a0Russia is behind the DC hack<\/a>. To his credit, he is clearly keeping a more open mind than many. But his argument\u00a0runs largely like this:<\/p>\n<p style=\"padding-left: 30px;\">The evidence so far is from limited sources; and their interpretation of it\u00a0isn&#8217;t iron-clad. Their recent claim to have linked the same malware to attacks on targeting software used by Ukrainian artillery is poor. It consist mostly of the argument that nobody benefits more than the GRU from subverted\u00a0ballistic calculator software.\u00a0Besides, the only infected examples were found on an online forum, and who gets their targeting software from an online forum when they can get it from their peers?<\/p>\n<p>&#8220;<em>Hence<\/em>,&#8221; he writes, &#8220;<em>it&#8217;s hard for me to believe that this\u00a0infected app\u2014found somewhere on the internet and likely never used by Ukrainian soldiers\u2014offers evidence tying the GRU to APT28<\/em>.&#8221;<\/p>\n<p>Here, right here, is where\u00a0the vast majority of spy masters and tactical officers fail. They assume that people\u00a0are smart and ruled by logic, just as they are. <em>I would never download software from an untrusted source, <\/em>they say<em>, so who would? And if nobody&#8217;s that stupid, why would the Russians bother to show their hand with such a na\u00efve tactic?<\/em><\/p>\n<p>But people <em>are<\/em> that stupid. Repeatedly. Chronically. <em>Historically<\/em>.\u00a0And they remain so in the face of every effort IT administrators have made over the decades since malware was first invented (by the Soviets, incidentally).<\/p>\n<p>One of the first rules of intrusion is that you aim for the weak spot. Why the hell would you invest insane amounts of effort attacking the strongest part of the fort when\u00a0all you have to do is convince some useful idiot to\u00a0do the work for you? Formal experiments have been conducted to demonstrate how this can work. In one case, the attackers simply <a href=\"https:\/\/www.schneier.com\/blog\/archives\/2012\/07\/dropped_usb_sti.html\">dropped\u00a0a few infected USB sticks on the ground<\/a> in a parking lot, and let some credulous bumpkin walk their\u00a0spyware straight into the bank.<\/p>\n<p>This seems to be exactly the\u00a0same tactic as used with the infected targeting software. Leave a few compromised APK files around in forums, then wait for some idiot to download it and use it. He&#8217;ll no doubt be willing to share his copy with others who trust him. In a brief period, it could be possible to compromise and neutralise a number of artillery units.<\/p>\n<p>Assuming that artillery officers are\u00a0technically sophisticated and operate logically is&#8230; er, unwise.<\/p>\n<p>But this is an all-too-common mistake made by people like Glenn and Leonid. They wrongly, and in the face of incontrovertible evidence, persist in wanting the world to operate logically and based on sane impulses. It doesn&#8217;t. People don&#8217;t.<\/p>\n<p>Using people&#8217;s\u00a0many and obvious inconsistencies to discard or debase their point of view\u00a0is a\u00a0silly, fruitless tactic. Yes, the evidence is often argued poorly, but that doesn&#8217;t make the evidence poor. Yes, people say one thing and then say another. But that doesn&#8217;t make all of what they say untrue.<\/p>\n<p>Yes, a particular attack requires some pretty stupid victims to succeed. But the world has never lacked na\u00efve, credulous people.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Glenn Greenwald, in every respect a reputable, diligent and ferociously smart gadfly, continually forgets to remember that few people are as sane and as willing to be led by evidence as he is. It&#8217;s his great failing. Nowhere is it more visible than in his incredulity toward the CIA and the rest of the US [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1406,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,5,8,12],"tags":[],"class_list":["post-1401","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hard-core","category-journamalism","category-reporterage","category-wonk"],"_links":{"self":[{"href":"https:\/\/village-explainer.kabisan.com\/index.php\/wp-json\/wp\/v2\/posts\/1401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/village-explainer.kabisan.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/village-explainer.kabisan.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/village-explainer.kabisan.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/village-explainer.kabisan.com\/index.php\/wp-json\/wp\/v2\/comments?post=1401"}],"version-history":[{"count":0,"href":"https:\/\/village-explainer.kabisan.com\/index.php\/wp-json\/wp\/v2\/posts\/1401\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/village-explainer.kabisan.com\/index.php\/wp-json\/wp\/v2\/media\/1406"}],"wp:attachment":[{"href":"https:\/\/village-explainer.kabisan.com\/index.php\/wp-json\/wp\/v2\/media?parent=1401"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/village-explainer.kabisan.com\/index.php\/wp-json\/wp\/v2\/categories?post=1401"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/village-explainer.kabisan.com\/index.php\/wp-json\/wp\/v2\/tags?post=1401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}