The Anonymous activists behind "OpKKK" -- which infiltrated and unmasked Klan members, including many in US military and police departments -- began by creating thin-but-plausible fake identities on Facebook that signalled support for "Blue Lives Matter." By friending other accounts that indicated support for Blue Lives Matter, they found themselves being auto-suggested friendships with KKK members.
The more Klan accounts they friended, the more the Facebook algorithm located new ones for them to solicit for mutual friending, and the more plausible they seemed to anyone contemplating friending them.
They were greatly aided by the Klan's primitive recognition loop: a Klansman asks "AYAK" ("Are you a Klansman") and listens for the response "AKIA" (A Klansman I am) -- the KKK has a long history of dopey, D&D-inflected wordplay.
As the Grugq points out, closeted gay people had better tradecraft than this with the whole, "friend of Dorothy" thing. The KKK, by contrast "aren’t really good at handling insider threats or figuring out how to keep threats outside." That means "When you want to punch a Nazi in the face, they’ll be easier to find and hunt down."
“Most of them were poor,” OpKKK told me. In one instance, Thomas Moore complained that he was broke and couldn’t pay his electricity bill. He needed $230. What’s particularly funny about this is that Moore wrote, “They’ll never get me!” then gave the Anon information after he offered to help with his bill. He even included the last digits of this social security number.
The bill was never paid by OpKKK. Someone else helped the Little Feller out. OpKKK observed some usual conversations in the groups. In one, group members discussed a man named Jimi Miller who was late to the last Klan rally. One member asks if he’s “friends with the sheriff who wanted to join in.” Another says he’s the guy who “killed Jesse” Another member said, “yup.” So they just admitted to murder.
#OpKKK: How #BlueLivesMatter Movement Helped Anonymous Infiltrate KKK’s Social Media
Amanda Rousseau’s self-learning materials for her Malware Unicorn workshop are a fantastic introduction to understanding and analyzing malware, covering the techniques used by malware authors, reverse-engineering tools, and three kinds of analysis: triage, static and dynamic.
Police who rely on vulnerabilities in crooks’ devices are terminally compromised; the best way to protect crime-victims is to publicize and repair defects in systems, but every time a hole is patched, the cops lose a tool they rely on the attack their own adversaries.
Software can be thought of as a system for encapsulating the expertise of skilled practitioners; translate the hard-won expertise of a machinist or a dental technician or a bookkeeper into code, and people with little expertise in those fields can recreate many of the feats of the greatest virtuosos, just by hitting Enter.
Thread count isn’t like one of those deceiving metrics like camera megapixels or Facebook friends—more threads are always better if you can afford them. If price was no object, we would all be snoozing soundly bundled up in 1.8 kilo-thread sheets every single night. Guess what? Price doesn’t have to be an object with this […]
Maybe it’s entirely because of podcast ads, but drag-and-drop tools like Squarespace have gotten immensely popular in recent years. While it’s definitely a great tool for any non-coders who want to get a small website up and running quickly, managing content with a primarily visual interface can become a pain once you have more than […]
When you can’t wait for the world’s longest meeting to end, the mindless leg bouncing makes your boredom obvious and just annoys everybody else. Everyone knows the TPS reports need the damn cover sheet, but some sadistic colleague keeps forgetting, probably on purpose just to eat into your lunch hour. Enough is enough!While serving a […]