Yes, it's that time. Your friend is off to New York City this morning, to enjoy the spectacle. You can enjoy it yourself, with frequent updates at this site:
Republican Convention Coverage
By William Rivers Pitt
You can also get the "street action" as it happens with TXTMOB...I've been signed up for two days and my phone seems to be hovering over Manhattan...
Text Messages for Critical Masses?
By Daniel Terdiman
In the history of political protests, police have long had the technological upper hand when it comes to monitoring protesters' movements and actions. But a new tool is giving activists at this year's two major political conventions a chance to stay one step ahead of the police.
Here are the relevant websites:
Nothing is as it seems...
Cleaner Tosses Art Out with the Garbage
I've also enclosed an article for you computer geeks, explaining how you can help us folks in New York from your own keyboard.
And now, without further comment, a rich trove of articles on the events of this coming week...
Activists Plan to Disrupt GOP Convention By Sara Kugler The Associated Press
The Whole World is Watching
By Michelle Goldberg
If militants violently disrupt the GOP convention, it could be Chicago 1968 redux -- and Christmas in August for the Bush campaign.
The protesters are coming...It seemed like the perfect location for next week's Republican convention. But with widespread anti-war feeling, hordes of protesters descending on the city and alleged FBI intimidation fuelling the fear of violence, New York is preparing a noisy reception for President Bush. Gary Younge reports
Wednesday August 25 2004
RNC Protest Organizers Reject Rally Site By Scott Galindez
t r u t h o u t Report
United for Peace and Justice (UFPJ), organizers of the August 29th march in Manhattan during the Republican National Convention, announced today they will not Rally on the West Side Highway. The organizers claim that the site is not a safe place for seniors, children, and people with disabilities to rally.
Anti-war Group Sues City over Denial of Central Park Permit By Sara Kugler
The Associated Press
Judge Rejects One Bid for a Central Park Protest
By Diane Cardwell
New York Times
NY Court Says Anti-Bush Protesters Can't Use Park By Grant McCool Reuters
Police Brace for Unauthorized Convention Protest in Central Park
By Tom Hays The Associated Press
NYPD Accused of Excessive Force Early The Associated Press New York - In the first major clash between police and demonstrators converging for the Republican National Convention, nearly 250 bicyclists were arrested during a protest ride that snaked through the city and passed by Madison Square Garden.
Protest in the Park? Showdown Is Tomorrow
By Jim Dwyer
New York Times
Protest Peacefully, Get Discounts in NYC
Newsday NEW YORK - Mayor Michael R. Bloomberg thinks he's found a way to pin down rowdy protesters at the Republican National Convention - by offering them a powder-blue button that labels them "Peaceful Political Activists."
Poll: Most NYers Support Protests Associated Press
New York Lockdown By Michelle Goldberg Salon.com
Cops plan zero tolerance for violent protests at the GOP Convention. Militant groups plan to disrupt the city like never before. Welcome, delegates!
Dissent Must Come Alive in New York
By Tom HaydenNewsday Protesters need not Fear that they will be Playing into the Hands of Bush's Campaign Strategy.
F.B.I. Goes Knocking for Political Troublemakers By Eric Lichtblau
New York Times WASHINGTON, Aug. 15 - The Federal Bureau of Investigation has been questioning political demonstrators across the country, and in rare cases even subpoenaing them, in an aggressive effort to forestall what officials say could be violent and disruptive protests at the Republican National Convention in New York.
Inquiry Into FBI Questioning Is Sought
By Eric Lichtblau
New York Times WASHINGTON - Several Democratic lawmakers called on Tuesday for a Justice Department investigation into the Federal Bureau of Investigation's questioning of would-be demonstrators about possible violence at the political conventions, saying the questioning may have violated the First Amendment.
The FBI's Pre-emptive Interrogations of "Possible" Demonstrators: Chilling Political Speech
By Bob BarrFindLaw
FBI Expects Violence at GOP Convention
The Associated Press
Listen Up: Unusual Forms of Sound to Emanate From RNC By Amanda Onion ABCNEWS.com
The Long Range Acoustical Device (LRAD), is shown below mounted on an NYPD vehicle. The technology, which can direct sound for four blocks, will be used to communicate with protesters at the RNC.
Goss's Wish List By Michael Isikoff and Mark Hosenball
Rep. Porter Goss, President Bush’s nominee to head the CIA, recently introduced legislation that would give the president new authority to direct CIA agents to conduct law-enforcement operations inside the United Statesincluding arresting American citizens.
And finally, for those who are really curious, the schedule for the RNC (thanks, Dana and Nona):
Republican National Convention Schedule: Revised, July 2004
6:00pm - Opening prayer
6:15pm - Supplementary opening prayer
6:30pm - Prayer in thanks of first two prayers
6:45pm - New energy policy presented by Exxon
7:00pm - Canonization of Reagan
7:15pm - Additional prayers
7:30pm - Opening remarks by Halliburton
8:00pm - Prayer for the safety and well-being of Ken "Kenny-boy" Lay
8:15pm - Additional remarks by Halliburton
8:30pm - Stoning of the first homosexual
8:45pm - New healthcare polices presented by HMO leader, Kaiser Permanente
9:00pm - Invasion of Iran or North Korea (TBA)
9:15pm - Halliburton contributes 1.4 billion to Republican party
9:30pm - Reagan elevated to savior, Holy Trinity now referred to as "the quads"
9:45pm - Bush undergoes plastic surgery to look more like Reagan
10:00pm - Cheney runs into Ron Reagan, Jr. Tells him to go fuck himself
10:15pm - Recall of troops from accidental invasion of South Korea (Bush: "Damn, the SOUTH is our ally. My bad.")
10:30pm - Burning at the stake of 16 year-old Jenny Williams, who had an illegal abortion after being raped by her cousin
10:45pm - Dancing around the golden calf
11:00pm - Stoning of the partner of the first homosexual
11:15pm - New forestry policy presented by Weyerhaeuser
11:45pm - Thanking God for his wisdom in choosing Bush as president
12:00pm - Closing prayers (lasting until 2:00am)
2:00 am - Hookers arrive for all delegates
Vive le screed!
DISTRIBUTE WIDELY - DISTRIBUTE WIDELY - DISTRIBUTE WIDELY
ECD - ALL
HACKERS OUT TO DISRUPT THE RNC - BATTLE LOGISTICS ENCLOSED
Contact: CrimethInc Black Hat Hacker's BlocCampaign Website:
Hackers are organizing for a massive electronic civil disobedience
campaign against the Republican party to coincide with the massive
protests in New York City for the Republican National Convention. This
document contains logistical information on how people can participate in
We won't stand idly by while the Republican Party exploits the
democratic city of New York to further their agenda of endless war, attacks on
our freedoms and and breaks for corporations. We demand an end to the
so-called "war on terrorism", which is nothing more than a pretext for
empire and the erosion of our civil rights. As long as Amerikkka
continues to further their war on the poor for the benefit of the rich, we
will use all weapons at our disposal to disrupt the RNC - on the streets,
and on the net.
All are encouraged to help out this campaign in any way they can.
Deface websites, flood email servers, cause financial disruption, change
electronic billboards. Turn the system over and put the people on top.
Hacktivists of the world, unite!
What will be happening?
August 22nd - Day of online direct action a week before the
convention begins. All are encouraged to attack as many right-wing, corporate,
government or military sites as possible. Web defacements, email
attacks, financial disruption, anything and everything. These attacks will be
used to stir discussion of the RNC, encourage people to participate in
the protests in NYC itself, and to build for the mainstream electronic
sit-in on the 29th.
August 29 - September 2nd - Mainstream electronic sit-in while the RNC
is in session. The actions will commence on noon of each day. The
protests will utilize a wide diversity of tactics including email, web, fax
and phone disruption. The logistical details of this campaign are
included in this document below.
Who are we flooding?
The email addresses, fax numbers, and phone numbers listed below are
various contacts of the Republican National Committee and the official
George W. Bush re-election staff.
Isn't this cyber terrorism?
It is important to make a distinction between electronic civil
disobedience and terrorism. Civil disobedience is a fundamental part of the
democratic process which our country was founded upon. Like Henry David
Thoreau and our revolutionary forefathers who shot up the pigs at
Lexington and Concord, electronic civil disobedience is the logical
continuation of these theories applied towards the internet as a medium for
disruption. ECD is a legitimate protest act.
Terrorism tries to instill
fear into people through violence and destruction. Terrorism is not an
act of liberation or unity but of division fear and conquer. A bitter
act of desperation that solves no problems, makes no statement, and
disempowers many. Electronic civil disobedience causes no harm to people or
property. Instead of disempowering, ECD tries to bring people together
to realize and exercise their power over oppressive governments and
corporations using hacking as a means of fighting for social justice.
Who are we?
There is no 'us'. This is a decentralized campaign - there are no
leaders or orders or hierarchy. Most of us don't know the other people
working on this project. None of us know what sorts of attacks are being
planned. This is an autonomous call out, anyone who agrees with what we've
said and wants to participate in this campaign is welcome to resist the
RNC in any way they can.
This call out is issued by the CrimethInc
Black Hat Hacker's Bloc. We are not participating in any of the actions
or any illegal activities ourselves. We recognize the political
significance of the RNC and realize that one way or another there is going to
be some sort of cyber attack. We are simply serving as a press tool to
communicate with the media about different electronic methods people
are employing to protest the RNC.
CrimethInc Black Hat Hacker's Bloc
Campaign Website: http://phil.ist-backup.de/rncelectronic/Email:
This is an autonomous call out for electronic direct action against
the RNC. This document contains a number of resources that can help
people who choose to participate in such actions. If you decide to help out,
you do so on your own terms and accept responsibility for what might
happen. However, there is safety in numbers and there are a number of
people who plan on a number of actions and there is a very low risk. So
If you participate...
Let us know what you're up to! We are
communicating with the media on this project and we want to post on our website
what sorts of attacks are being made. Feel free to rip bits of text from
our website, this document, or any other press release we have made and
use it in your messages. Make sure to link to our page!
Fellow citizens, PARTICIPATE!
You do not
need to be an experienced hacker to help this campaign: we've made it
easy for people to help out through a variety of different ways. The
mainstream electronic sit-in is composed of several methods of disruption:
flooding RNC websites, email addresses, fax and phone numbers. Listed
below are the targets and explanations / tools you can use to help this
WEB SITE FLOODING
We are asking people to use all
tools at their disposal to bombard the given servers with so much traffic
that it will become unable to serve any more web requests. People can
participate in the actions by using the given floodnet scripts on the
campaign website or by launching your own distributed denial of service
The Republican National Convention: http://www.2004nycgop.org/The
Republican National Committee: http://www.rnc.org/
George W. Bush official re-election site: http://www.georgewbush.com/
You can help flood these servers by going to our website and running
the FloodNet tools on our website. There is a web-based tool and
several perl scripts that you can use to flood the targets. You can also
download and run several denial of service applications on your home
machine and point them to the above servers.
A list of good denial of service tools for the Mac is available at Freaky's Mac Archive
A list of good denial of service tools for Windows is
available at elitehackers.com
... but denial of service attacks isn't hacking!
DoS attacks are seen as somewhat lame in the hacking community
because it does not require any actual skills to perform such attacks -
any script kiddie can simply download a few tools and launch attacks
against major servers. It can hardly be considered hacking. But it is a
method of electronic disruption that can bring the enemy's servers to
it's knees. No reason to overlook tools at our disposal.
E-mail bomb attacks are done by sending
tens of thousands of emails to the enemy's contact addresses. This can
make it painful to send and receive emails while simultaneously
consuming server resources, possibly slowing or shutting it down. There are
numerous tools that one can use to perform such attacks.
There are a number of Windows email bombers available for download at
A number of good email bombers for the mac are available at Underground Mac.
http://us.f138.mail.yahoo.com/ym/Compose?To=MemberRelations@gop.com&YY=38531&order=up&sort=date&pos=0&view=a&head=b http://us.f138.mail.yahoo.com/ym/Compose?To=Administration@gop.com&YY=38531&order=up&sort=date&pos=0&view=a&head=b http://us.f138.mail.yahoo.com/ym/Compose?To=Counsel@gop.com&YY=38531&order=up&sort=date&pos=0&view=a&head=b
Fax bombing is a method of electronic
disruption that clogs the enemy's fax communications and wastes their paper and
toner resources. Tape together a few sheets of black construction paper
and start faxing to the following targets. When the first page goes
through, roll it back and tape it to the other end of your sheet to form
an infinite loop of black construction paper. Then sit back and watch
the mayhem begin. Use any and all fax machines at your availability - the
more the merrier!
Phone bombing is another method of
disrupting their communication systems by preventing them from making /
receiving calls. You can either call these numbers and tell them what you
think about the Bush agenda, or you can beige box into someone else's line
and set up auto-dialing scripts to flood their lines.
That's all for today, kids. Stay out of trouble, and don't get
29 August 2004