Monday, 22 December 2014

The British Constitution and the Right to Keep and Bear Arms for Defence

Source: thelibertarianalliance


Your Right to be Armed

Whatever happened to the right to keep and bear arms?
by RKBA
SRA Secretary Richard Law was invited to tease out the answer to this question in a presentation to the British Constitution Group’s conference in Sutton Coldfield on 1November 2014, and this summary is derived from his notes. Faithful readers of theShooter’s Journal and of this blog may find some of the history familiar, but it remains as true and relevant as it ever was. We should add that Mr Law didn’t use these notes during his presentation, as the print was too small and the light wasn’t good enough to refer to them; and they’ve been lightly edited for publication here.
The short answer to the question is this: the right to keep and bear arms (RKBA) is hiding in plain sight, but to find where it’s hiding and to test whether it’s still real or not, one has to reach back through time to find its beginnings and then follow it to the present.
The dawn of English legislation—the root of what we have today—was originally compiled by King Alfred the Great (AD 849-899), as the Doom (pronounced Dome) Book. Alfred amalgamated several pre-existing Saxon codes of law from the earlier kingdoms and prefixed it with Mosaic Law from the Bible. Biblical law from the Pentateuch tends to be people-oriented, while the early Saxon codes were more concerned with property and inheritance.
Christians are familiar with the Ten Commandments, while Jews recognize a further 603, one of which, at Leviticus 19:15, says: Do not pervert justice; do not show partiality to the poor or favouritism to the great; but judge your neighbour fairly.
Every four-year-old understands the principles of fairness, articulated, often loudly, at that age by a simple phrase: “It’s not fair!”—and often enough they’re right.
King Alfred originated the requirement that the able-bodied men of his counties should turn out when he called them to defend the realm. It was an obligation, rather than a right, but it presumed a right.
Alfred made no legislative or financial provision to arm or train his men. When called upon, they had to turn up ready to go toe-to-toe with the Vikings/French/Irish/etc., so the obligation was both to be armed and to have trained ready for that eventuality. There was nothing in his law that would prevent the men turning out in response to a threat; either individually, or collectively as the militia, to meet any enemy with appropriate force, defensively. Clearly, no one could fulfil his obligation if he didn’t have the right to bear arms in the first place.
This concept survived the Norman invasion, as all William I won at Hastings was the Crown—the right to be recognized as successor to Edward the Confessor. That came with all the legislative baggage of the kingdom. The victorious knights who came with William to enforce his claim to the throne became a tier of government, and the obligation to turn out as necessary followed the top-down style of Norman-French governance. The king called the barons, and they called out their retainers.
The phrase ‘common law’ comes from Henry II (1133–89)’s drive to improve the judiciary in the 1160s. He sent out judges from his own court to the counties to hear matters, so that there was one law common to all the people, reflecting the fairness principle in Leviticus and becoming the proto–quarter sessions and circuits. The common law principles came out of cases being recorded, and judges regarding each other’s decisions as binding in similar cases—the principle known as stare decices.
This wasn’t, in Henry II’s time, the common law as we know it. There were still alternatives to the courts in the form of trial by ordeal and trial by combat, and court hearings did not necessarily trouble to hear evidence. Trial by ordeal was still in use in the witch hunts of the 1640s, and the right to silence that defendants had until Michael Howard’s tenure at the Home Office was actually an obligation until fairly recently.
King John’s Magna Carta in 1215 is sometimes regarded as the first Human Rights Act, although Alfred would probably want his Doom Book regarded as such. King John had a go at revoking Magna Carta the following year, and it was King Edward I who issued a statute reconfirming it in 1297.
So, the common law obligation has been there since before the Norman Conquest: it being a requirement for each man to arm himself as best he could afford (“suitable to his condition”) and to train in preparation for the call-out should it ever come. The time and effort weren’t wasted because, if the realm wasn’t in peril, there could and would be threats to the peace closer at hand.
Also, nobody should set out to take on the Vikings without having trained with the weapons beforehand. The obligation to train is best remembered from a recently repealed archaic law that made it a requirement for yeomen to practice archery on the village green on Sundays. The archers who went to France with Henry V put some 42 tons of arrows on the advancing French in less than fifteen minutes at Agincourt. Their descendants will repeat the performance at the 600th anniversary re-enactment next year.
The individual right to arms was legislated against by King James II (who used militia to enforce his laws, or more particularly to solve his tax-gathering problems). James’s abuses led to his gentle overthrow, and the Bill of Rights in 1689 restated the common law—among other things restoring to Protestants various rights that James had sought to curtail while not denying them to his fellow-Catholics.
The Pilgrim Fathers carried the Bill of Rights to America as the founding principles of their legislation. Their successors had run-ins with George III (1738–1820), who sought to curtail their rights and had a go at collecting their weapons up in lieu of taxes. His local agents failed on both counts because they were up against men who knew their Bible and their rights. And who were, of course, armed.
The United States Constitution was hastily drafted in the 1770s. Hence the need for the rather more leisurely series of amendments promulgated in 1791; and it’s their Second Amendment that muddles thinking somewhat by seemingly tying the individual right to arms inextricably to the militia concept. There are variations of the wording, depending on source, but the US National Archive has it as: A well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms, shall not be infringed.
Back in England, the individual right had been settled in 1689, and thereafter two Acts of Parliament sought to prevent the militia forming without having a direct threat to meet—the Unlawful Drilling Act, 1819, and the Public Order Act, 1936. But no one moved to prevent a spontaneous militia forming in defence of the realm in 1859 (volunteer rifle regiments, rifle clubs and the National Rifle Association, all in reaction to a possible invasion from France) and in 1939, when Essex men formed up as the Legion of Frontiersmen long before the Government called out the militia as Local Defence Volunteers, later renamed the Home Guard.
In 1870, the Gun Licensing Act taxed the volunteers and other gun owners in the sum of ten shillings a year each: to be paid unless you held a licence to kill game, which was another tax, or benefitted from an exemption. The 1903 Pistols Act was likewise a tax. You needed only one of these three licences to have a gun beyond the confines of your home, and only then if not exempted.
The government separated shooting clubs from rifle regiments in 1908 with the formation of the Territorial Army. After that, the clubs continued with charitable status for training men in peacetime for the defence of the realm in wartime, until service rifles were ‘prohibited’ in the 1980s, and club charitable status was revoked in the 1990s. Both by the same politician, as it happens: Douglas Hogg (Conservative, Grantham), who left Parliament in 2010 with a moat kept clean at taxpayers’ expense.
Government was generally positive about the possession of rifles by the public, certainly from 1859 on, after they got caught napping and the defence of the realm really was in the hands of the people who lived here; that positive attitude carried through until the Great War and the call-out of the citizen’s army in 1915.
The problem the government had after that was the Irish rebellion in 1916, appallingly handled; combine that with the Russian revolution and a world war which ended with four empires collapsed, twenty-seven royal families redundant or murdered; and all those new, bankrupt countries with inexperienced political leaders and a surfeit of weapons.
The government asked Sir Ernley Blackwell to consider the problem of how to prevent European war surplus being sold off to wannabe rebels in countries like Afghanistan and Ireland. He decided the best thing to do was to ignore the question and crack down on the domestic market, particularly on pistols, and his report became the basis for the Firearms Act, 1920.
Meanwhile, the government had given away captured German rifles, machine guns and field artillery to the public as inducements to buy war bonds. Servicemen returned from foreign battlefields with souvenirs could keep them, and they got a pay off—known as the Dole—of £1; or £2 if they handed the great coat in.The land fit for heroes was clearly nervous about them returning. This combination of events and the Liberal government’s reactive policies help explain why the Liberals became unelectable after 1918.
Commander Kenworthy asked the Home Secretary during the debate if the 1920 Bill affected the right to defence and was told it didn’t. The 1920 Act wasn’t retrospective and contained a lot of exempted occupations. Its intention was to limit the acquisition of firearms, and more particularly of ammunition, to those whom they deemed friends of the government.
The step change came in the 1930s, probably in reaction to developments in the United States, where the prohibition on the manufacture and sale of alcoholic beverages had led to organized crime and a lot of gunfights. The Federal Government passed the Gun Control Act of 1934, which imposed a transfer tax of $200 on machine guns and silencers. Individual states and cities had passed laws before that; Texas banned concealed carry in 1892 and New York prohibited carrying handguns in public places in 1911.
The other reasoning was pragmatic. While you didn’t need a firearm certificate in the UK to possess a firearm for defence, it was and is a handy thing to have when you want to buy ammunition. So having a firearm certificate became worthwhile credential for people who used their firearms a lot.
The Bodkin Committee (which reported in 1934) heard evidence that machine guns had no sporting application against deer, and the subsequent (1937) firearms act created a ‘prohibited weapons’ category, to possess any of which one had to obtain Defence Council authority. This wasn’t a tax. It became Section 5 of the 1968 Act, and applications for such authority are—to this day—free. The issuing authority, which mostly seems to do its best to avoid doing its job, became the Home Office in 1973.
The Prevention of Crime Act, 1953, led to police forces advising people who had firearm certificates for arms they kept for defence, that ‘defence’ was no longer a good reason for possessing a firearm on certificate. Some people changed their good reason—target practice or pest control; others handed their guns in; and some took them off ticket and kept them for defence. The seismic change in government policy—at a time when Winston Churchill was Prime Minister—seems to have come about in reaction to the nuclear bomb.
In 1938, dying Prime Minister Chamberlain went to Germany and returned with Hitler’s autograph on a piece of paper, which he hailed as ‘peace in our time’. He knew perfectly well that he was lying; what he bought was time, during which the Chain Home radar stations were completed, the Observer Corps recruited and trained, conscription started, gas masks issued and Anderson shelters supplied to such of the urban public who had gardens to put them in, and the RAF took delivery of eight-gun monoplane fighter aircraft. So when war came in 1939, Britain had done as much as could have been done to prepare for it.
In 1953, Britain could not afford to do anything to protect the public in the event of an atomic war, so they opted for doing nothing. The assumption was that an exchange of missiles would not be followed up by boots on the ground. The Russians would not invade the UK after polluting it with radiation. War was thus assumed to be a short-term affair, after which government’s problems would all be coming from erstwhile voters.
The (post-nuclear) war-game scenario was that roving bands of heavily-armed and probably rather peeved citizens would appear outside the government bunkers. The scenario never saw them as the voters the government had let down so badly: it saw them only as the problem. So, one solution was to make it harder for these roving bands of common-law militia to get weapons, hence the new policy in 1954: after which firearm certificates would be issued only for possession of firearms for sporting purposes.
Richard Law did some research in the 1980s and could find no evidence that Winston Churchill had ever held a firearm certificate. Churchill wasn’t into shooting as a sport, but he certainly kept firearms for defence, notably a Colt M1911, which was last seen on display in the underground Cabinet Rooms museum in Whitehall. From 1920 until the late 1980s, Scotland Yard recorded details of firearms on certificates in their area on a card index in serial number order. That Colt didn’t have a card.
Following the murder of three London policemen in 1966 by Harry Roberts (just recently released from prison), Home Secretary Roy Jenkins rushed in shot gun certificates, after which the Firearms Act, 1968, was passed as an Act of consolidation. The Home Office commissioned (Sir) John McKay to report on firearms matters. McKay recommended a crackdown on the sporting public and what they used, and most of his recommendations eventually became the Firearms (Amendment) Act 1988, barring most ‘military’–type weapons from civilian sport.
We note at this point that all the restrictions from 1920 onwards relate to firearms used for sporting purposes, and the earlier ‘restrictions’ were all taxes.
In 1998, Mike Burke applied to the Home Office for a Section 5 authority for some prohibited weapon or other. He was refused as a matter of policy and appealed to the High Court, which in turn refused his appeal on the grounds that the Firearms Act, 1968, by implication repealed the Bill of Rights. (FC3 98/7400/3)
In 2002, in the Metric Martyrs case (CO/3308/2001, Thorburn v Sunderland City Council), Lord Justice Laws said that there were ordinary statutes and constitutional ones, and an ordinary statute could not repeal a constitutional one merely by implication. The way to amend constitutional statutes was for a new act to say that that is what it is doing on its face.
Taken together, Burke’s dismissed appeal and the Metric Martyrs case agree that the Bill of Rights has not been amended. The Firearms Acts are relevant to and control sporting guns, not military, militia or personal defence ones. Law, with Peter Brookesmith, set out this train of thought in the book Does the Trigger Pull the Finger (Spitfire 2011). Nobody has challenged what the book says as incorrect. The book also sets out a solution to the various problems the government has created for itself and us.
Currently, the only people regularly benefitting from your common law rights are cops and robbers. Cops because they have always carried firearms under the common law, exercising their (and your) right to be capable of defending themselves; and bad guys because, the anecdotal evidence is, when they claim that a firearm in their possession is for their own defence, they are not charged. The police don’t want to test the common law defence in court, and there are already several precedents confirming that your rights remain untroubled by legislation since the right was re-affirmed in 1689.
In 2008, the United States Supreme Court heard District of Columbia v Heller. This case came about because Washington DC had banned handguns to virtually all its residents, except of course cops and robbers, and the few people who did have permission [sic] to keep a gun at home had to keep it dismantled and unserviceable, in which case it could not be used in the event of a home invasion or police raid.
This turned DC into the murder capital of the United States: statistically the most dangerous place on Earth outside of some war zones. Mr Heller sought to overturn DC’s handgun ban and succeeded because the Supreme Court held that the city’s law infringed Heller’s Second-Amendment rights. The court recognized the right to keep and bear arms as an individual one. DC’s problem was that while the Constitution did not prevent them setting qualifications or taxes on the right, their law prevented the exercise of it altogether, and that was unconstitutional.
The outcome was that DC had to revise its laws and create a carry permit law—thus following many other states in the past twenty years—so that its citizens could be armed for their defence as necessary. The increase in armed citizens, real or imagined, is certainly reflected in the downward trend of crime statistics in America.
Reading between the UK’s lines, we note that our Home Office treads a delicate path; in declining applications to register weapons for defence as a matter of policy, they are actually saying that you don’t need one for the purpose.
But it seems to be the position that the law never has impeded the possession of arms for defence, so a Section 5 application is redundant. But if you make one and get turned down, it would not subsequently be possible for the police to prosecute you for not having one without charging the Home Secretary with complicity, unless the refusal was for some weighty and lawful matter and not issued as a matter of policy.
In 2014, and after several false starts, the Scottish Government published a bill to create an air weapons certificate. In announcing it, Kenny MacAskill said that there was no right to bear arms in modern Scotland.
We asked the question about implied repeal in modern Scotland, and they quoted the Metric Martyrs case back at us in a letter dated 17 September 2014; in effect, this is the argument from our book Does the Trigger Pull the Finger? So, either they’ve read our book and agree with us, or they’ve read the law and come to the same conclusions as we did.
What they haven’t done, yet, is explain the attitude toward the RKBA of Kenny MacAskill—who has also avoided explaining to us, or to anyone, the lawful authority police in Scotland have for being routinely armed (a move made, possibly, because he’s in the process of reducing the drink-drive limit in Scotland in time for Christmas). The Scottish air weapons bill, if passed as drafted, violates the Scotland Act, the Human Rights Act, the European Convention on Human Rights, the Bill of Rights and the Claim of Right, and thus the Treaty of Union and the Firearms Act, 1968, as amended, to name but a few.

So there it is. The Bill of Rights reasserts your common law right and obligation to arm yourself as best you can afford and to be prepared. It cannot be repealed by implication, according to Lord Justice Laws, and no attempt has been made to put your rights asunder overtly. The right (and obligation to train) you’ve had for over a thousand years is still there, hiding in plain sight.

These 15 Arguments Will Destroy Chemtrails Deniers

Source: beforeitsnews

B4INREMOTE-aHR0cDovLzIuYnAuYmxvZ3Nwb3QuY29tLy04VmhqYnB2VkY1dy9WSldNeVRiM3ZCSS9BQUFBQUFBQWktVS9GM0VnaVBhSklsZy9zMTYwMC9jdGRlbmllcnMucG5n

As we approach the end of another year let’s remember that humanity is now subjected to yet another full year of spraying with metal particles. Not just humanity but all the poor creatures on earth are being sprayed; every plant and every tree, the bees and birds, the soil and all the little creatures that live in it, even the fish and inhabitants of the sea are suffering as aluminum, sulfur, barium and other toxic metals pile on everywhere altering the pH of the soil, contaminating the water and attacking the very essence of life on earth.
Yes, chemtrails spraying is this big a deal and as another year goes by the globalists and their military industrial complex marches forward with their insanity to control the weather, deliberately engineering a much cooler planet by literally blocking our sunlight and dumping enough toxic metals all over the planet to explain the destruction and slow death of many crops (i.e. food supply), all to the benefit of companies like Monsanto and the U.S. government.
So, as we wrap another year, let us refresh our memory and lay out 15 points about chemtrails and chembomb spraying that everyone should be mindful of. Points that can be used as a weapon to silence online “contrails” trolls whose only mission is to keep the blind sheep asleep and in doubt about the otherwise plain-to-see in-your-face evidence of the chemtrails/chembomb geoengineering programs which are ongoing. Let’s remind our uneducated friends and online trolls that:
1. Often we see ordinary planes who are not spraying, flying in the same air space and altitude as those who are spraying leaving long trails. Given that “contrails” are dependent predominantly on the temperature and humidity of the surrounding atmosphere at that particular atmospheric pressure (which is measurable), and given that changes don’t occur very quickly in nearby airspace this should offer no less than a head scratch for anyone with an understanding of the issue and willing to apply science, reason and common sense.
2. Planes spraying are almost always unmarked, not ordinary commercial planes with passengers. To this day, no one has filmed an ordinary commercial (labeled) passenger jet spraying. It doesn’t mean it hasn’t happened or is not happening, but it is something to consider. This goes along with the unusual government dual strategy of both:

A. Admitting that spraying is real, it’s necessary, cheap, important, developing and well planned, all in an effort to save the planet.
AND
B. Simultaneously the government and in particular its politicians and media and (Hollywood) TV mouthpieces have made a collective decision to DENY chemtrails spraying 9/11 style. Amazingly, when the issue is brought up to the general public it is said to not be happening and it’s all a “conspiracy”. The unmarked planes is a reminder of their commitment to operating in a clandestine manner while simultaneously advancing their plans and quietly conditioning the scholastic types that these are indeed legitimate programs to save the earth.

3. 
Planes that are spraying almost always fly with transponders off. One can verify flight data information by logging on to a site like flightaware.com and look for the plane when it flies over. Rarely if ever, will you see the plane show up on the website flight listing, because it is not sending out signals. This speaks again to their commitment to secrecy and denial.
4. Spraying planes seem to fly in senseless patterns. They often fly in directions not commonly known for commercial flight including making U-turns and sharp turns.
5. Easily verifiable money-making weather modification and atmosphere-manipulating patents are available for anyone to review. These are not conspiracies or secret rumors, these are real patents. These patents are in use or they wouldn’t exist.
6. Spraying planes don’t follow any order of nature with respect to temperature and humidity (important to the “contrails” claims). Unlike a natural (“contrails”) event, the chemtrails we see being sprayed in our skies sometimes every day follow no set temperatures or humidity. In Southern California, for example, we see spraying regardless of whether the temperature on the ground is 50, 70, or 90 degrees Fahrenheit.  We also see the spraying at very low and very high humidity. This disjointed pattern with nature’s temperature and humidity is a stark contrast to what government geoengineers claim is the nature of contrails. All supposed government “contrails” studies show that “contrails” will only form under certain specific temperatures and humidity in accordance to the rules of nature. In other words, according to the rules of nature there are set temperatures and humidities that guarantee no contrails. These temperatures and humidities unfortunately never translate over to reality when one applies the Environmental Lapse Rate (ELR) formula to the known current temperature on the ground to calculate the temperature at plane altitude level.
7. Jets that spray our skies can often be seen to stop their spraying suddenly then restart seconds later. Something characteristic of a deliberate shutting off or perhaps a pause to change chemical canister from which the chemicals are being drawn. With contrails on the other hand we would expect a smooth steady continuation of the condensation trail being created by (supposedly) the ice crystals that (supposedly) form spontaneously from the combustion of ordinary jet fuel. This is not at all what we see when we look up.
8. Throughout the year anyone can easily predict when the chemtrails will stop. In regions with very steady climate as in Southern California, this prediction is based strictly on observation of their spraying schedule not on the temperature or humidity. Hot or cold, we will see spraying throughout the year, and we’ll see the spraying (predictably) stop at specific times of the year.
9. We can observe weather patterns that are often inconsistent with the established weather forecast. The difference? The spraying of the sky. Often the forecast calls for sunshine and blue skies and we’ll observe the planes ruin the sky leaving cloudy overcast skies instead. A sharp difference from the predicted weather.
10. There are known weather modification private companies who admit they manipulate the sky for the purposes of weather modification. This information is public, real and easily verifiable.
11. Attempt at cloud seeding, weather modification, engineered drought, rain making and other manipulation and geoengineering of our skies is admitted by government agents, educators, geoengineers and other entities all claiming it’s for the purposes of “global warming” and planet cooling. This admission is nonetheless the proof these programs are ongoing.
12. Patents for specifically aluminum-resistant seeds are secured by the USDA and promoted by Monsanto. A bizarre coincidence if this is not related to spraying programs which also employ the spraying of aluminum in the sky that eventually falls back to the ground.
13. Photographs of our skies prior to 2000 show little to no lines in the sky. Everyone with a photo collection has this proof in their hands.
14. Where is the documentation of protesters protesting sky lines back in the 1990s? How about the 1980s, ’70s, ’60s, ’50s etc? Where is the history of genuine writers (not government scientists), authors of books and activists writing about the problem of lines in the sky? Where are the photos of activists packing the streets protesting sky lines in the 1970s? Did no one care about the environment back then?? These images and activist literature don’t exists because movements only occur to address things that are actually happening in that generation. Chemtrails and sky lines are actually happening now thus we NOW have a movement to address this serious issue.
15. Trolls and disinformation agents claim ordinary planes have always made persistent contrails when they combust fuel and these trails inevitably change our weather and global climate as a result and block our sunlight. These wild claims suggest that dating back to the Wright brothers’ invention of the first plane; the invention turned out to be a weapon of mass destruction. As bizarre as this sounds, this shifting of the blame for the destruction of our skies from today’s U.S. government, U.S Air Force, the DOD and all its private contractors and accomplice allies to the Wright brothers is inescapably at the root of their argument. Also at the root of this argument is that blue skies were never the norm even in sunny southern California or Hawaii due to natural contrails formation. This bizarre argument of course is a psyop on those who are unaware of the issue; and the younger generations who are now being conditioned to believe this statement is true and that massive weird feathery and smudgy looking clouds injected in the stratosphere and troposphere with chemical trails flown into them is normal.

One thing we should all keep in mind about chemtrails/chembomb spraying is that the military owns this issue. Activists have as much chance of stopping the U.S. Military Industrial Complex as they do of stopping chemtrails. The battle we face is a very long one, and de-funding the U.S. military – in particular the U.S.A.F. -  may be one option for stopping this. To stop chemtrails we’ll need other countries and power figures to step in to help. The depth of brainwashing, TV and mainstream media hypnosis and conditioning that Americans are under makes this an even more concerning issue. All hands are needed on deck to push back against the U.S. Military Industrial Complex on this issue.
I firmly believe chemtrails/chembombs spraying is by far the greatest challenge humanity faces and could very well seal its doom. Help spread awareness of this issue, don’t give up and keep doing what you can to expose this issue.
As I’ve stated many times, those of us who are alive now are firsthand eyewitnesses to this crime against humanity. We are that generation that people 200 years from now would love to interview regarding the legend of the blue skies which by then will be a fairytale. Future generations will not even know that there was a time when the sky was plain blue without any lines in the sky. They will be so conditioned to see the artificial manipulation of our skies they will not have a clue that blue skies were once the norm.
Save your personal evidence for future generations. I urge everyone to store and preserve all your childhood photos of plain blue skies and keep them somewhere safe. Make copies of your old photos if possible, you have no idea how valuable these will be to someone in the future.
As for us here and now, we cannot take the Military Industrial Complex head on but we can strategize other steps for fighting back including filing lawsuits and writing letters at least if only for the sake of keeping a physical record of our protest recorded in government records. Also write about this crime in articles, blogs and books especially. This will leave a trail of literature for future generations to see.

The FBI told their story about North Korea attacking Sony. Before we retaliate, read what they didn’t tell you.

Source: fabiusmaximus

New North Korean flag -- cyber-pirate

Summary: The government blames North Korea of the Axis of Evil for the attack on Sony, a claim quite like the bogus claims of the past we so credulously believed. No matter how often they lie to us, Americans believe what the government tells us. They lie, we believe, their lies are exposed — rinse, repeat. It makes us easy to govern, incapable of self-government, and quite different than our skeptical unruly forebearers. We can do better. This is a great day to begin. Read this and decide for yourself. This is the most complete collection of information I’ve found on this story.
Follow-up post to Another day, another campaign of fearmongering in America: North Korea’s cyberattack on Sony. I’ll post an update as additional information comes in.

Contents

  1. Articles questioning the FBI’s story
  2. About the attack
  3. Dissenting voices to the official story
  4. Remember this before you believe
  5. Major media see the story
  6. For More Information

(1)  Articles questioning the FBI’s story

.
While most journalists report official government statements, and cite only approving voices, there are a few who quote dissenters. We should pay attention to these few, considering the long list of government lies attributing evil deeds to designated foes. Learning from experience is the beginning of strength.
  1. Sony Pictures hackers say they want ‘equality,’ worked with staff to break in“, Jacob Kastrenakes and Russell Brandom, The Verge, 25 November 2014 — An interview with the hackers. Ignored by journalists; blockbuster news if true.
  2. Sony Hack: Studio Security Points to Inside Job“, The Hollywood Report, 3 December 2014
  3. North Korea Almost Certainly Did Not Hack Sony“, Kim Zetter, Wired, 17 December 2014
  4. Reaction to the Sony Hack Is ‘Beyond the Realm of Stupid’“, Jason Koebler, Motherboard, 17 December 2014
  5. Why You Should Demand Proof Before Believing The U.S. Government On North Korea and Sony“, Jeffrey Carr (cybersecurity expert, CEO of Taia GlobalWikipedia bio), Digital Dao, 17 December 2014 — Excellent background on the cyber-intel agencies and their vendors, and the dubious past of cyber-attack attribution.
  6. Why the Sony hack is unlikely to be the work of North Korea“, Marc Rogers (of web-traffic optimizer CloudFlare), 18 December 2014
  7. US reportedly blaming North Korea for Sony Pictures hack. But why?“, Graham Cluley, 18 December 2014 — Repeats points made elsewhere.
  8. Sony, the DPRK, and the Thailand – Pyongyang Connection“, Jeffrey Carr, Digital Dao, 19 December 2014  — The story becomes more complex.
  9. North Korea Hacked Sony? Don’t Believe It, Experts Say“, Paul Wagenseil, Tom’s Guide, 19 December 2014
  10. Sony hack was the work of SPECTRE“, By Robert Graham (CEO), Errata Security, 19 December 2014 — A logical alternative analysis shows the weakness of the FBI’s case.
  11. How the FBI says it connected North Korea to the Sony hack — and why some experts are still skeptical“, Christina Warren, Mashable, 20 December 2014
  12. Lets blame our perennial adversary!“, the grugq (bio herehis website), undated — The attacker has strong media skills.
  13. Update: “Fauxtribution ?” at Krypt3ia (pseudonomeous hacker), 20 December 2014
  14. Update: Comment by Marcus Ranum, e-security expert (bio here) & on the FM website’s team of authors, posted at Free Thought Blogs, 21 December 2014
I sifted through these articles, each linking to other sources, and assembled the this summary. I believe it shreds the FBI story; at the very least it destroys the certainty about the attackers’ identity. Read and decide for yourself.

(2)  About the attack

.
Hewett Packard posted an excellent summary of the attack and North Korea’s capabilities and possible role. Seetheir August 2014 report about North Korea’s cyber capabilities. They discuss the Chongryon, a group of North Koreans in Japan who run its some of its most important cyber and intelligence programs.
Also see the detailed analysis posted by Risk Based Security.
Why does the government tell us so little of the evidence? Some speculate that the NSA provided much of the evidence, but they’re keeping this SIGINT secret (e.g., Nicholas Weaver at Mashable). That’s logical. The pseudonymous but well-known information security expert going by the handle “the gugq” agrees: “I’ll accept the Feeb’s answer, I just don’t believe they’ve shown their work. Mostly because it’s not their work, they just copied from NSA.” As you see below, after more thought he became more skeptical. So should you.
History suggests skepticism about these stories, given the history of US government and its corporate allies exaggerating the power of designated US foes. The Soviet Union was ominous superpower until it collapsed after years of internal rot (unnoticed by our lavishly funded intel agencies). Brian Honan (info security expert; bio herereminds us of the 1998 “Solar Sunrise” attack by Iraq on US Army websites? US Deputy Defense Secretary John Hamre said it was “the most organized and systematic attack to date” on US military systems. A massive multi-agency task force eventually arrested 4 teenage boys. See the details here.

(3) Dissenting voices to the official story

(a)  The best summary I’ve seen in rebuttal to the FBI’s story — Excerpt from Marc Rogers’s article (red emphasis added):
  • (1)  The broken English looks deliberately bad and doesn’t exhibit any of the classic comprehension mistakes you actually expect to see in “Konglish”. i.e it reads to me like an English speaker pretending to be bad at writing English.
  • (2)  The fact that the code was written on a PC with Korean locale & language actually makes it less likely to be North Korea. Not least because they don’t speak traditional “Korean” in North Korea, they speak their own dialect and traditional Korean is forbidden. {details and cites follow}
  • (3)  It’s clear from the hard-coded paths and passwords in the malware that whoever wrote it had extensive knowledge of Sony’s internal architecture and access to key passwords. … Occam’s razor suggests the simpler explanation of an insider. It also fits with the pure revenge tact that this started out as.
  • (4)  Whoever did this is in it for revenge. The info and access they had could have easily been used to cash out, yet, instead, they are making every effort to burn Sony down. {explanation follows}
  • (5)  The attackers only latched onto “The Interview” after the media did – the film was never mentioned by GOP right at the start of their campaign. It was only after a few people started speculating in the media that this and the communication from DPRK “might be linked” that suddenly it became linked. I think the attackers both saw this as an opportunity for “lulz” and as a way to misdirect everyone into thinking it was a nation state. After all, if everyone believes it’s a nation state, then the criminal investigation will likely die. …
  • (6)  Whoever is doing this is VERY net and social media savvy. That, and the sophistication of the operation, do not match with the profile of DPRK up until now.
  • (7)  {B}laming North Korea is the easy way out for a number of folks, including the security vendors and Sony management who are under the microscope for this. …
  • (8)  It probably also suits a number of political agendas to have something that justifies sabre-rattling at North Korea …
  • (9)  It’s clear from the leaked data that Sony has a culture which doesn’t take security very seriously. …
  • (10)  Who do I think is behind this? My money is on a disgruntled (possibly ex) employee of Sony.
(b)  From the Mashable article (links added):
Jeffrey Carr, cybersecurity expert {see Wikipedia} and CEO of Taia Global, is one of the skeptics. He told Mashable that “one of the biggest mistakes is that because an attack can be traced to the North Korean Internet that somehow means it’s the North Korean government. That’s a false assumption, because the North Korean Internet is basically provided by outside companies, in this case a Thai company. Nothing presented excludes alternate scenarios, so why jump to the most serious one?”
Carr notes that it appears the FBI is getting most of its intelligence from private security companies, without vetting or verifying that information. He added: “The White House is now getting ready to take some kind of action, as if it’s a sure thing that the North Korean government is involved. Meanwhile you have the hackers who actually are responsible laughing because this is the most epic false flag ever.”
(c)  More from Jeffrey Carr, from his Digital Dao articles:
Is North Korea responsible for the Sony breach? I can’t imagine a more unlikely scenario than that one, and for many of the same reasons that Kim Zetter detailed in her excellent article for Wired. {December 17}
There is a common misconception that North Korea’s ITC is a closed system therefore anything in or out must be evidence of a government run campaign. In fact, the DPRK has contracts with foreign companies to supply and sustain its networks. … For the DPRK, that’s Loxley, based in Bangkok. Thegeolocation of the first leak of the Sony data on December 2 at 12:25am was traced to the St. Regis hotel in Bangkok, an approximately 13 minute drive from Loxley offices.
This morning, Trend Micro announced that the hackers probably spent months collecting passwords and mapping Sony’s network. That in addition to the fact that the attackers never mentioned the movie until after the media did pretty much rules out “The Interview” as Pyongyang’s alleged reason for retaliation. If one or more of the hackers involved in this attack gained trusted access to Loxley Pacific’s network as an employee, a vendor, or simply compromised it as an attacker, they would have unfettered access to launch attacks from the DPRK’s network against any target that they wish. Every attack would, of course, point back to the hated Pyongyang government.
Under international law, “the fact that a cyber operation has been routed via the cyber infrastructure located in a State is not sufficient evidence for attributing the operation to that State” (Rule 8, The Tallinn Manual). (December 19}

CyberWar
This is a media blitz campaign by a group that is steeped in Internet culture and knows how to play to it. They can manipulate it to maximum effect. This is definitely far more sophisticated than the usual rhetoric from North Korea. … To handle this sophisticated media / Internet campaign so well would require a handler with strong English skills, deep knowledge of the Internet and western culture. This would be someone quite senior and skilled. That is, I can’t see DPRK putting this sort of valuable resource onto what is essentially a petty attack against a company that has no strategic value for DPRK.
(e)  Robert Graham (CEO of Errata Security) provides another perspective at their website. Here are two excerpts.
While there may be more things we don’t know, on its face {the FBI press release is} complete nonsense. It sounds like they decided on a conclusion and are trying to make the evidence fit. They don’t use straight forward language, but confusing weasel words, like saying “North Korea actors” instead of simply “North Korea”. They don’t give details.
The reason it’s nonsense is that the hacker underground shares code. They share everything: tools, techniques, exploits, owned-systems, botnets, and infrastructure. Different groups even share members. It is implausible that North Korea would develop it’s own malware from scratch. (19 December 2014)
My story … better explains the evidence in the Sony case than the FBI’s story of a nation-state attack. In both cases, there are fingerprints leading to North Korea. In my story, North Korea is a customer. In the FBI’s story, North Korea is in charge. However, my story better explains how everything is in English, how there are also Iranian fingerprints, and how the threats over The Interview came more than a week after the attack. The FBI’s story is weak and full of holes, my story is rock solid.
I scan the Internet. I find compromised machines all over the place. Hackers have crappy opsec, so that often leads me to their private lairs (i.e. their servers and private IRC chat rooms). There are a lot of SPECTRE-like organizations throughout the world, in Eastern Europe, South America, the Islamic world, and Asia. At the bottom, we see idiot kids defacing websites. The talented move toward the top of the organization, which has nebulous funding likely from intelligence operations or Al Qaeda, though virtually none of their activities are related to intelligence/cyberwar/cyberterror (usually, stealing credit cards for porn sites).
My point is this. Our government has created a single story of “nation state hacking”. When that’s the only analogy that’s available, all the evidence seems to point in that direction. But hacking is more complex than that. In this post, I present a different analogy, one that better accounts for all the evidence, but one in which North Korea is no longer the perpetrator.  (19 December 2014)
(f)  From the Tom’s Guide article:
“There’s no evidence pointing to North Korea, not even the barest of hints,” Robert Graham, CEO of Atlanta-based Errata Security, told Tom’s Guide. “Some bit of code was compiled in Korea — but that’s South Korean (banned in North Korea, [which] uses Chinese settings). Sure, they used threats to cancel The Interview — but after the FBI said they might.”
(g)  Update: Comment by Marcus Ranum, cyber-security expert (bio here) and on the FM website’s team of authors.
The movie angle only cropped up 3 days into the attack, at which point the attackers latched onto it like a bunch of gamergaters who’d found another excuse for misogyny. Prior to the movie angle, there was no North Korea evidence, then it starts popping up.
The malware used is not specifically North Korean. It’s run of the mill stuff using techniques that were notoriously used in the ‘shamoon’ attack against Saudi Aramco (does that make it Israeli?). The “common elements” the FBI boneheads are talking about is the disk wipe module, which is the most popular scriptable disk wipe; I’ve used it myself. Please, nobody point the finger at me for this attack in spite of the “common elements”
This bears all the hallmarks of a bunch of sociopathic American hackers; more like something from the former “anti-sec” crew than anything state-sponsored. I’m guessing the FBI doesn’t want to talk about those “common elements” because anti-sec was being run by the FBI when they attacked Brazilian police and oil exploration assets.
If we ever find out who’s behind it, my money is on some badly adjusted American nihilists in the 20-30 year old unemployed trouble-maker or “security consultant” demographic. These attacks are not sophisticated; what makes them so bad is that they got a very deep foothold in Sony before they started causing trouble, and Sony’s infrastructure was deeply compromised. Most American companies, attacked in a focused manner, would fall just like Sony has.
Marcus sent me a follow-up note:
The attacks almost certainly (in my mind) are the work of some American sociopaths, probably guys pretty much like the antisec crew (which was led by an FBI informant). The tools in use are irrelevant; it would be like saying “the attacker used a gun, which points at Germany because it was an H&K” or “the attacker used a gun, which point to the US because Americans are gun nuts”.
The Korean in the malware comments appears to have been planted there as a deliberate red herring; it’s google translate quality. It would be like saying that”это фигня” shows I’m a KGB agent.
(h) Others experts have expressed skepticism, but with no details. Such Brett Thomas (CTO of internet services provider Vindicia; his bio):

Another cautionary note, by Sean Sullivan (security advisor to Finnish internet security firm F-Secure):

Update: Robert M. Lee (Co-Founder at Dragos Security LLC , First Lieutenant USAF – cyberspace Operations Officer; bio here):

.
Sheep watching TV

(4) Remember this before you believe
.

The aide {Karl Rove} said that guys like me were ”in what we call the reality-based community,” which he defined as people who ”believe that solutions emerge from your judicious study of discernible reality.” I nodded and murmured something about enlightenment principles and empiricism.
He cut me off. ”That’s not the way the world really works anymore,” he continued. ”We’re an empire now, and when we act, we create our own reality. And while you’re studying that reality — judiciously, as you will — we’ll act again, creating other new realities, which you can study too, and that’s how things will sort out. We’re history’s actors . . . and you, all of you, will be left to just study what we do.”
— Karl Rove, as quoted in “Faith, Certainty and the Presidency of George W. Bush” by Ron Suskind, New York Times Magazine, 17 October 2004

(5) Some in the major news media see the story

.
Some journalists mix a few skeptical notes to the song played by the government and their journalist supporters.
Sony Hackers Snooped for Months, Then Planted 10-Minute Time Bomb“, Bloomberg, 18 December 2014 — Focuses on the largest fact inconsistent with the FBI’s story.
Think North Korea hacked Sony? Think about this“, PC World, 18 December 2014.
What is FBI evidence for North Korea hack attack?“, BBC, 19 December 2014 — They agree with a point Marc Rogers makes above (3.a.7): “{T}he attack being attributed to a nation state rather than an independent hacking group is the one glimmer of good news for Sony.” They quote him: “If it is a nation state people shrug their shoulders and say that they couldn’t have stopped it. It lets a lot of people off the hook.”
Security experts: FBI report light on evidence linking North Korea to Sony hack“, Christian Science Monitor, 19 December 2014 — “The FBI statement that linked the Sony hack to North Korea relied on previously released and inconclusive evidence, said many cybersecurity insiders.”
Did North Korea Really Attack Sony?“, Bruce Schneier (CTO, security firm CO3), The Atlantic,  22 December 2014 — “It’s too early to take the U.S. government at its word”. The reasoning at the end by Allan Friedman (GW U’s Cyber Security Research Institute) makes zero sense (accusing the wrong party does not “serve as a warning to others that they will get caught if they try something like this.”)

(6)  For More Information

.
(b)  Marcus Ranum explains a major challenge of cyberwar: About Attribution (identifying your attacker).
(c)  Posts about propaganda and information operations run against us. Never forget or forgive, just learn from this history.
  1. Successful propaganda as a characteristic of 21st century America, 1 February 2010
  2. A note about practical propaganda, 22 March 2010
  3. Our leaders have made a discovery of the sort that changes the destiny of nations, 15 September 2010
  4. The easy way to rule: leading a weak people by feeding them disinformation, 13 April 2011
  5. Our minds are addled, the result of skillful and expensive propaganda, 28 December 2011
  6. Understanding our political system: the how-to guide by its builders, 7 October 2012
  7. We can see our true selves in the propaganda used against us, 14 May 2013
  8. A nation lit only by propaganda, 3 June 2013
  9. The secret, simple tool that persuades Americans. That molds our opinions., 24 July 2013
  10. We live in an age of ignorance, but can decide to fix this – today, 15 April 2014
.
Think. Don't be Sheep.