The saying “don’t wrestle with a pig” is a terrible one. A very similar saying, yet dispensing far superior advice, is “don’t strike the King to wound”.
The latter suggests taking on harm can be self-limiting in achieving goals — don’t commit suicide. But the former means what?
That oft-misquoted saying about pigs seems to just emphasize quitting as soon as you start something. Like saying don’t walk up a hill only down.
Is it really wise to advise squeamishness towards any challenge that brings even minimal cost?
In other words, why would you think it wise to run away when someone starts slinging mud? Are you afraid of mud? And does the fact someone else enjoys being in mud change anything?
Makes no sense logically, therefore it’s a saying begging deeper analysis.
Why not defeat an adversary in wrestling and then clean yourself as one would be expected after achieving any task requiring perspiration and exposure?
Consider the following version of the saying, which suggests one is wise to disregard a fear of becoming dirty while working hard to persevere against adversity:
It has been remarked by a wise man that he who wrestles with a hog must expect to be spattered with filth, whether he is vanquished or not. This maxim I have long known and appreciated; nevertheless, there are occasions when it must be disregarded. A man may be attacked in such a way that he is compelled to flagellate his hogship, even at the risk of being contaminated by the unclean beast.
Risk of contamination may be required. Not the most eloquent saying, but a whole heck of a lot better than giving advice to quit something just because it gets hard.
The title of this blog post is from our 2013 RSA Conference panel presentation on the ethics and business of “hack back”, a stage we shared with CrowdStrike and Trend Micro.
It was based on 2012 presentations we had been giving to explain an ethical business model for hack back, based on setting international precedent and trial: a working legal framework for self-defense using information technology.
We had a fairly large turn out those years, and I’ll never forget CrowdStrike’s founder demanding that no recordings be allowed for our panel.
He wanted no press coverage.
I found that highly annoying because the WHOLE point of our efforts at the time was to raise awareness to bring MORE scrutiny, transparency and therefore ethics into the market.
And then CrowdStrike basically took a $50m self-loan and went on to becoming yet another American Anti-Virus company with ties to the FBI, moving the dial not an inch.
David Evenden was hired in 2014 to work in Abu Dhabi on a defensive cybersecurity project, only to discover it was actually an offensive spy operation for a United Arab Emirates intelligence service.
Obviously things really took off around this time Evenden mentions.
I gave several talks after 2013 where I implored people to understand that “hack back” was very active even if people continued trying to keep it secretive.
Why so secretive? One reason obviously is entrapment of those recruited to do the technical work.
Once in Abu Dhabi, Evenden realized he had been deceived and that he and colleagues had actually been recruited to perform offensive hacking operations and surveillance on behalf of the UAE’s National Electronic Security Authority, or NESA (the UAE’s equivalent of the NSA).
The deception didn’t initially concern Evenden, however, because the work was primarily focused on conducting surveillance against would-be terrorist targets.
Ugh. Deception is a very loaded word here.
This is a text-book example of exactly what in 2013 we were working so hard on to avoid. Even if Evenden is lying, he can do so on the basis that deception is very easy when there’s zero transparency built in the system.
Evenden goes on to say literally the exact thing we discussed in our panel of 2013, which as I said was censored by CrowdStrike.
I’m an American and I want to target something overseas. What’s going to happen to me? Nothing. Almost nothing. We just proved that…
Even in 2017 I was on a panel at BSidesLV called “Baby got hack back” where I implored people again to consider how much of it was going on already without transparency or accountability.
It wasn’t a hypothetical for me in 2012. It certainly wasn’t in the news enough in 2017 (there was an audible gasp from my audiences) yet should have been.
Even if these stories would have been published sooner, more importantly an opportunity was missed to run and test far better guidelines for the market to reduce deception and confusion about legal hack back.
So I guess the point here is that this “proof” story is a decade after we very clearly said it’s a viable business plan, with activities mostly obscured and hidden from view, such that it needed open discussion already to avoid errors (e.g. criminal charges).
What does your hair communicate? I don’t mean about you, I mean communicate on its own. Can you think of it as a canvas to write a story, or send an ephemeral signal?
During the Cold War the CIA allegedly trained agents to message using variations of shoe lacing, among other clothing alteration strategies.
A “Recognition Signals” instructional manual was distributed in 1953 by a magician named John Mulholland (MKUltra Subproject Number 4, as reproduced by The Official CIA Manual of Trickery and Deception by
H. Keith Melton and Robert Wallace):
The first suggestion is to have the shoelace run as a double strand through the
eyelets nearest the instep, i.e., toward the toes. First, the shoestring is cut in half. Then
the tip of one lace is pushed from the inside of the shoe up through one hole, across the
instep, and down through the opposite hole. The tip of the other half is treated in the
same way but is started from the opposite side. While the cut ends still are outside the
shoe, each is tied, with a slipknot, around the other lace. The tips of the laces then are
drawn so as to have the two knots inside the shoe and each by one of the eyelets. (See
illustration.) The shoe then is laced in the normal way. For one who is looking for such a
possibility, the double lace is easy to distinguish. It will never be seen by one not
particularly looking for it. Though it will not be noticed, it is without reason except to
mend a broken lace were the shoes to be examined.
Because shoelaces are inserted in shoes in three standard ways, any deviation in
these ways becomes useful for signaling. On other pages are illustrations of the standard
ways of lacing shoes and several ways in which shoes could be laced but never are. None
of these alternate ways will attract attention, yet each is very obvious to one looking for
such a signal.
The manual goes on to say things like a neck tie should expose two buttons on a shirt so that the sizes can be alternated to transmit a message. Clothing indeed can easily be altered and be subtle enough to communicate without detection.
So what about hair?
What this “old” manual seems to never mention, which I find a bit strange, is how hair designs can factor into secret messaging.
Even though it has been used like clothing as a signaling device for hundreds if not thousands of years, somehow hair doesn’t show up in 1950s American spy tactics.
In the time of slavery in Colombia, hair braiding was used to relay messages. For example, to signal that they wanted to escape, women would braid a hairstyle called departes. “It had thick, tight braids, braided closely to the scalp and was tied into buns on the top.
And another style had curved braids, tightly braided on their heads. The curved braids would represent the roads they would [take for] escape. In the braids, they also kept gold and hid seeds which, in the long run, helped them survive after they escaped.
A contest in 2015 called ‘Tejiendo Esperanzas‘ (Knitting Hope), celebrating emancipation from slavery, was even reported by the DailyMail with laces woven into braids.
This kind of multi-braid hair style was developed and worn over thousands of years, including by world famous royalty like Cleopatra or Nefertiti.
One might think that it thus would figure as a classic or common style and remain unnoticed.
Aside from feeding into racial ideologies and discrimination based on appearance, some research indicates that details of “messaging” hair styles may have been ignored until much later in history if noticed at all.
My analysis contradicts the finding that eighteenth-century advertisements “very frequently” described runaway slaves’ hair. It may be that longer post-Revolutionary and nineteenth-century advertisements were more likely to focus on details like hair. It may also be that the often-cited compelling descriptions of African American hairstyles were exceptions rather than the rule.
Perhaps some of the secrecy embedded into hair styles could be attributed also to “head rags” or “kerchief” used to hide hair, often from requirements to keep the head under cover.
Concealment was driven not least from late 1700s racism in America that shamed “kinky” and curled hair, leading to ideas like “tignon” of the Louisiana territory being required by 1785 law, or even structured signaling using head coverings.
A South Carolinian who trafficked humans indeed regulated things like a white turban be worn by a chief house servant, obliterating any appearance of natural black hair, while house servants had to cover with a bandana.
…the headwrap was to maintain Southern white power in a society based economically and socially on racial slavery. Noteworthy in this respect are the ordinances which regulated African American dress throughout the South during the eighteenth century. In effect, whites used these dress codes to outwardly distinguish those without power from those who held it.
Underneath, however, remained a “wrapping” often using thread or string with hair parted into sections and rows. Perfect for concealing a message, like a letter inside an envelope.
With all that in mind, I’ll now give you three guesses why thousands of years of design and messaging with black hair is never mentioned in the CIA guide to secrets.
To get a license, Jestina would have to spend more than a year in cosmetology school. Tuition would cost $16,000 dollars or more.
Hint: it’s not consumer safety or harm, as argued in the report, although it is related to fear of what is broadly messaged by corn rows (e.g. black liberty and freedom of expression).
If there’s one thing i learned in my early philosophy classes, it’s the difference between illusion and reality is a desire to achieve meaningful change in others’ lives.
Illusion is for those who can’t stand a notion of doing service that benefits society, which is why it’s odd to see people pitch it as a service training tool.
It could also help clinicians to collaborate on treatments for patients, and make patients feel more involved and informed in the process. Doctors could view, feel and discuss the features of tumour cells, and show patients plans for a medical procedure.
I have to admit I make the same mistake. I keep imagining a VR tool based in history that presents the real world with an overlay to explain disinformation (e.g. when you see streets in Louisiana, it exposes the systemic racism and terrorism).
This is a real development with real street names:
Can you see better the plans for a… harm reduction procedure?
Then I look at history degree enrollment decline and figure very few people (certainly not a mass market) probably want to use the power of story-telling (illusion) to benefit others. Where’s the fun, money, social entry, etc in that?