prgarnett.net

Dr Philip Garnett – Complex Systems Scientist

Conspiracy Files – Case 1 – Julian Assange and Wikileaks

I have always had an interested in conspiracies, I think it started from watching the X-Files. I have decide to do posts on contemporary conspiracies, partly for a little fun but also I think they are an interesting feature of modern society. I say modern, I suspect that they are as old as human society. I will apply my academic experience to reviewing the evidence, in a slightly humorous way, but also I think it is interesting to look at these things with a critical view. Each case will also have a YouTube video and a Google doc of source material to go with it.

Case 1: Is Julian Assange dead or been abducted? Has Wikileaks been taken over by the CIA? What are the insurance files?

This is an intriguing case, and I suspect it is mostly down to timing. Julian Assange was instrumental in the release of the Clinton and Democrat party emails. As this, and the US election, was coming to a head Julian had his internet connection cut off by the Ecuadorian state. He also received a visit from Pamela Anderson with a sandwich. Shortly after Mr Assange disappeared from the internet, and thus essentially disappeared as that is largely the only medium that we hear from him on. It took a short while but the conspiracy theory that Assange had been killed or abducted, and that Wikileaks had been taken over by the CIA. Although that conspiracy has been floating around for a while.

This combined with tweets of strange codes, the release of insurance files, and the talk of dead man switches, is fuel to the conspiracy fire. Even though people, including Micheal Moore, have reported that they have spoken with or met with Assange, and even a recording of him giving a speech have not extinguished the fire. As these are not indisputable evidence of his safety. It is even possible that if he does reappear (which I suspect he will) that some will consider him and Wikileaks forever compromised. A classic internet conspiracy, and great publicity for Wikileaks; a possible twist in this tail.

In the recording Assange did sound like he had a horrible cold, even through the poor quality of the recording. It is entirely possible that reduced access to the internet and the flu is the true cause of the disappearance. I’m sure we will find out soon.

Take a look at my sources doc here, and the Podcast video is below.

Tags: , , ,

Panama Revisted

The people over at The International Consortium of Investigative Journalists have updated the released panama data. Its not clear to me if that is more data than they had already released, or that this time it is a ready made Neo4J database. They provide two versions of the database, Windows and Mac. Its easy to get it to work in Linux, just copy the graph.db file from out of the archive into the databases directory of your Neo4J install.

I made a quick query to look for officers with the same address. Seems there some, it would need something more sophisticated to did any deeper.

MATCH (n:Officer)–(a:Address)–(m:Officer) RETURN n,a,m LIMIT 25

graph

 

 

 

 

 

Tags: , , , ,

The ‘System’ vs Donald Trump

  • Author:
  • Published: Nov 14th, 2016
  • Category: Politics
  • Comments: Comments Off on The ‘System’ vs Donald Trump

I have been thinking about what Donald Trump means for the ‘system’, by system I am thinking about the complex system that is the US Government Machine and its associated parts. Part of my thinking is that systems of Government have learnt how to persist, they have adaptive to promote and maintain their own existence. The internal system dynamics and relationships are an evolved, and are an emergent property of the ‘system’. The people in the system don’t even really know they are part of it. You could make the argument that this is plausible as a Government needs to be transparent enough to its citizens so that they don’t revolt, but not too transparent that they revolt. This adaption is a buffer between the people and the Government, and allows the system to persist (not statically, its a quasi-stable state). Its not just the Government that as adapted to this way of persisting, its the media, the elite etc etc. The laws, process, norms and culture make it hard to radically alter the system quickly without a massive shock or tremendous effort.

It does bring us to the question of Trump. Trump is a major upset to this entire system, he is a massive shock. So the question is, is the ‘system’ just going to grind him down into nothing. Has the US state ‘system’ seen enough Trumplike behaviour that there are emergent process that will just kick in and slowly squeeze him until he disappears. Maybe the position of stable state will move a bit, its always moving, but not much.

The other possibility is that he is enough of a disruption or shock that the whole system just breaks apart, and self-organises into something completely new… That could produce anything.

I am not sure which is worse.

Tags: , , , , , , , ,

US Election – The First Cyberwar?

  • Author:
  • Published: Nov 3rd, 2016
  • Category: Politics, Uncategorized
  • Comments: Comments Off on US Election – The First Cyberwar?

The presidential election is starting to look like the front line in a cyberwar. With different national and global actors waging a war of information (or disinformation), the main weapon being deployed seems to be the sowing the seeds of doubt in the minds of the US electorate. Its hard to say where it all started, but let us start with the emails, hacking, Trump, Wikileaks and the Russians.

So the emails. Wikileaks has got hold of a large number of (I should point out that it is at least plausible that visits to Wikileaks are recorded…) emails from inside the Democratic party, they seemed to think that they were enough of a smoking gun to bring an end to Hillary’s campaign. Maybe during a normal election, there is however nothing normal about this election. That said the constant drip of damaging stories has proved to be, well damaging, just so far not terminal. Where did the emails come from? Well, some people think Russian hackers got hold of them and then handed them over to Wikileaks. There is a degree of credibility to this hypothesis, when exactly the Russians decided to hack into the servers, and what Russians it is however are unknown. Truth be told we don’t know if it was Russians, Wikileaks may not even know it was Russians however they say it wasn’t. So how might this cyberwar be playing out?

Its the Russians and Trump

Russian narrative is useful to the Democrats and they can link Trump (possibly quiet legitimately) to Russians, he likes Putin because Putin said nice things about him. They can also link Trump to the leak/hack, he encouraged the Russians to hack the democratic servers. Maybe, just maybe, Trump’s intervention was enough to get the Russians interested? The timing of that probably doesn’t make sense, but its an interesting thought. Trump therefore could have fired shots in this cyberwar.

Its Russia doing it for themselves

It is possible that this is Russian mischief making, state backed or not, and they did perhaps just for the lolz. Or, to potentially push America into a state of political chaos which they would ultimately benefit from. Keep America fighting itself so they can push on with their own geopolitical agenda. However wins the election next week could very well be instantly bogged down in in this mess, leaving less time for dealing with global issues.

Wikileaks, where do they fit in?

Wikileaks could very well just have received this early Christmas present in their submission system. They have then used it to cause maximum damage by slowly dripping information out, they would likely say this is to increase the exposure of them and the function they perform in global society. Exposing what should be in the public domain. I have sympathy for this ambition, however they are also editorialising this story to cause maximum damage. Not that any other media company would do any different; do we call them a media company now? As far as I have seen there is no evidence that Wikileaks solicited the leak in any way. Therefore it will be up to the public to decide if the emails are in their interest, and potentially important enough to end Clinton’s political ambitions. I think one downside is that many people just read the headlines and not the content.

Where does Trump really fit in?

Is Trump a puppet of Putin that is being supported by Russian hackers? Its not totally out of the question. What the Russians are doing for Trump is well at least two things. One, if they did the hack, is provide a rich source of damaging headlines for Clinton. Trump should be nowhere in this election, but yet he hangs on somehow, helped by Clintons skeletons. The other is that the leaks provide a useful deflection from Trump’s own skeletons, not least the series of women that claim to have been sexually assaulted by him. Claims that have a degree of credibility. The thing that surprises me most about Trump is that anyone finds him at all compelling or even coherent. His speeches are often bizarre, drifting, rants that are difficult to follow. There is almost no policy, other than a few bits about walls and swamps. His suggestion that the election is rigged (unless he wins) just makes it more difficult to believe anything that comes out of this election.

So where does this leave us? Well, knowing very little for sure. This whole thing is the perfect disinformation operation, and it might not even have an orchestrator. The whole election campaign is now post truth, because the truth has become so hard to find in amongst the lies and half-truths. There are so many views, opposing views, and facts on both sides. So many agendas and seeds of doubt being sown, how does anyone make sense of what has been said, or assess its credibility? Cyberwar isn’t just about turning off the lights, it can be more subtle, and in this cyberwar its any sense of the facts and important issues that have been lost into the darkness.

Tags: , , , , , , , ,

Java Panama Papers Neo4J Network Generator

Further to the first attempt at importing the Panama Papers network data into Neo4J I did a very quick Java program that greats an embedded Neo4J database. It needs a bit of checking as it finds nodes that have the same node_id. Which I assume is some sort of mistake in the program or the data, it also looks like there is some duplicate relationships.

This program generates relationships of the different types. Such as ‘officer_of’, rather than the hack used to get Cypher to import the data (see earlier post).

The code can be found in my new github.

Below is Blairmore, Ian Cameron, the intermediary, and loads of other companies that use the same intermediary.

Fig2

 

 

 

 

 

 

 

Not many directly links to Blairmore.

Tags: , , , ,

Panama Papers: Import Data to Neo4J using Cypher

  • Author:
  • Published: May 11th, 2016
  • Category: Uncategorized
  • Comments: Comments Off on Panama Papers: Import Data to Neo4J using Cypher

I downloaded the panama paper network data, I was hoping it would be all the data, sadly not. Its it still interesting however. The import process is not to tricky. The following Cypher commands will get the data into a running Neo4J database. Note there is a \” in the Addresses file that will break the import. Search for it an replace with \ “. Data can be downloaded from here.

To get the relationships in we have to do a bit of hack as you cannot generate a relationship type on the fly from a CSV file with Cypher. I will do this properly with a bit of Java soon.

Change the paths! This is for the Addresses:

USING PERIODIC COMMIT LOAD CSV WITH HEADERS FROM 'file:/path/Addresses.csv' AS line CREATE (:Addresses { address: line.address, icij_id: line.icij_id, valid_until: line.valid_until, country_codes: line.country_codes, countries: line.countries, node_id: toInt(line.node_id), sourceID: line.sourceID})

For the Intermediaries:

USING PERIODIC COMMIT LOAD CSV WITH HEADERS FROM 'file:/path/Intermediaries.csv' AS line CREATE (:Intermediaries { name: line.name, internal_id: line.internal_id, address: line.address, valid_until: line.valid_until, country_codes: line.country_codes, countries: line.countries, status: line.status, node_id: toInt(line.node_id), sourceID: line.sourceID})

Officers:

USING PERIODIC COMMIT LOAD CSV WITH HEADERS FROM 'file:/path/Officers.csv' AS line CREATE (:Officers { name: line.name, icij_id: line.icij_id, valid_until: line.valid_until, country_codes: line.country_codes, countries: line.countries, node_id: toInt(line.node_id), sourceID: line.sourceID})

Entities:

USING PERIODIC COMMIT LOAD CSV WITH HEADERS FROM 'file:/path/Entities.csv' AS line CREATE (:Entities { name: line.name, original_name: line.original_name, former_name: line.former_name, jurisdiction: line.jurisdiction, jurisdiction_description: line.jurisdiction_description, company_type: line.company_type, address: line.address, internal_id: line.internal_id, incorporation_date: line.incorporation_date, inactivation_date: line.inactivation_date, struck_off_date: line.struck_off_date, dorm_date: line.dorm_date, status: line.status, service_provider: line.service_provider, ibcRUC: toInt(line.ibcRUC) , country_codes: line.country_codes, countries: line.countries, note: line.note, valid_until: line.valid_until, node_id: toInt(line.node_id), sourceID: line.sourceID})

Finally the relationships, or edges. Note the hack, all relationships are of type ACCOC. This isn’t a big problem but offends me a little bit. I will post you Java code that generates the graph dir from the files.

USING PERIODIC COMMIT LOAD CSV WITH HEADERS FROM 'file:/path/all_edges.csv' AS csvLine
MATCH (n1 { id: toInt(csvLine.node_1)}),(n2 { id: toInt(csvLine.node_2)})
CREATE (n1)-[:ACCOC {role: csvLine.rel_type}]->(n2)

Tags: , , , ,

© 2009 prgarnett.net. All Rights Reserved.

This blog is powered by Wordpress and Magatheme by Bryan Helmig.