Hand of God Operations
Listen now
Description
This week we talk about interdiction, the NSA, and Mossad. We also discuss exploding pagers, targeted strikes, and paramilitary organizations. Recommended Book: Uncertainty in Games by Greg Costikyan Transcript In the world of technology, and especially computers—or anything with microchips and thus, some computing capabilities—a “backdoor” is a bit of code or piece of hardware that allows someone (or a group of someones) to get inside that computer or compute-capable device after it’s been delivered and put into use. At times the installation of backdoors is done beneficently, allowing tech support to tap into a computer after it’s been sold so they can help the end-user with problems they encounter. But in most cases, this term is applied to the surreptitious installation of this kind of hardware or software, and generally it’s meant to allow those doing the installing to surveil the activities of whomever is using the product in question, or maybe even to lock them out and/or hijack its use at some point in the future, should they so desire. There are potential downsides to the use of backdoors even when they’re installed with the best of intentions, as they can allow malicious actors, like hackers, working independently or for agencies or nation states, to tap into these devices or networks or whatever else with less effort than would have otherwise been required; in theory such a backdoor would give them one target to work on, rather than a bunch of them, which would mean attempting to access each and every device individually; a backdoor in an operating system would allow hackers who hacked that backdoor system access to every device that uses said OS, for instance. Backdoor efforts undertaken by the US National Security Agency, the NSA, were famously divulged by whistleblower Edward Snowden, revealing all sorts of—to many people outside the intelligence world, at least—unsavory activities being conducted by this agency, among them efforts to install backdoors in software like Linux, but also hardware like routers and servers, at times opening these devices up and installing what’s called a Cottonmouth, which allows the NSA to gain remote access to anything plugged into that device. This sort of interdiction, which is basically the interception of something before it reaches its intended destination—so intercepting a modem that’s been ordered by a big company, opening it up, installing a backdoor, then repackaging it and sending it on its way to the company that ordered it as if nothing has happened—is not uncommon in the intelligence world, but the scope of the NSA’s activities in this regard were alarming to pretty much everyone when they were divulged, with leaks and reporting showing, basically, that the NSA had figured out ways to put hardware and software backdoors in just about everything, in some cases resulting in the mass collection of data from American citizens, which goes beyond their legal remit, but also the surveillance of American allies, like the chancellor of Germany. What I’d like to talk about today is another, recent high-visibility example of an intelligence agency messing with devices ordered by a surveillance target, and what consequences we might expect to see now that this manipulation has come to light. — In the world of covert operations—spy stuff, basically—a “hand of God” operation is one that is almost immaculately targeted to the point where it might almost seem as if those who are struck did something to piss off a deity; those who the targeters want to hit are hit, and everyone else is safe or relatively safe. In 2020, a hand of God operation was launched against an Iranian general named Qassem Solaimani while he was near the Baghdad airport, an American Reaper drone hitting Solaimani and his escorts’ cars with several missiles, killing the general and nine other people who were with him, but leaving everyone else in the area largely unscat
More Episodes
This week we talk about neural networks, AGI, and scaling laws. We also discuss training data, user acquisition, and energy consumption. Recommended Book: Through the Grapevine by Taylor N. Carlson Transcript Depending on whose numbers you use, and which industries and types of investment those...
Published 11/19/24
Published 11/19/24
This week we talk about the Double Reduction Policy, gaokao, and Chegg. We also discuss GPTs, cheating, and disruption. Recommended Book: Autocracy, Inc by Anne Applebaum Transcript In July of 2021, the Chinese government implemented a new education rule called the Double Reduction Policy. This...
Published 11/12/24