* some of the US government officials protected by the Secret Service were the targets of swatting
* the USSS found the swatting calls were anonymized by a SIM Farm in/near NYC
* their investigation of the SIM Farm found "300 co-located SIM servers and 100,000 SIM cards across multiple sites"
* it could have hypothetically been used for swatting officials at the UN General Assembly, but that seems to be conjecture by the Secret Service, rather than anything they actually have evidence of
Does that seem consistent with what we know?
So the "bad guys" have loads of SIM cards installed into machines that can make calls or send SMS text messages, right? Doesn't each SIM card require an account with a cell phone provider in order to access "the phone network"? If not then are they getting free cell service and how do I sign up with that (ahem) provider? If so then how were those sim cards paid for? Can we follow the money?
Yes, we should be skeptical of anything that is entirely sources from anonymous sources.. even if they align with what we want to believe.
And further, I'd love to see reporters start burning sources that lie to them. After all, the source is risking/destroying the reporter's credibility along the way. Unfortunately, we'll never see that as it's all an access game.
Now I know why.
I've found legitimate stories also sourced from Reuters, but haven't found illegitimate stories NOT sourced from Reuters (in other words, they seem to originate from the same source, not sure why)
An Artist Used 99 Phones to Fake a Google Maps Traffic Jam:
https://www.wired.com/story/99-phones-fake-google-maps-traff...
Google Maps Hacks by Simon Weckert
https://www.youtube.com/watch?v=k5eL_al_m7Q
>99 smartphones are transported in a handcart to generate virtual traffic jam in Google Maps.Through this activity, it is possible to turn a green street red which has an impact in the physical world by navigating cars on another route to avoid being stuck in traffic. #googlemapshacks
Didn’t understand how it’d be used for espionage either, doesn’t even make sense
There's no reason your super evil plan to knock out cell service couldn't just sit hidden.
Rather this just seems like a criminal scam setup that got caught.
https://apnews.com/article/unga-sim-farm-threat-explainer-52...
Cache of devices capable of crashing cell network is found in NYC - https://news.ycombinator.com/item?id=45345514 - Sept 2025 (283 comments)
I'll put that link in the top text too.
It is not accurate to claim "that's not a thing". Citing anonymous sources is a long established practice (in particular when it comes to law enforcement activities or potentially sensitive political reporting). The NYT has formal editorial standards around the identity of anonymous sources that require editors to assess the justification for applying it. It doesn't mean the information is reliable, that's where an editorial eye comes into play, but it does fall under the category of normal journalistic practice.
Next the "Washington Game": there’s a grain of truth here, but it is overstated. Yes, leaks can be part of a strategic move by politicians and it can be a source of exploitation by political operators but to equate all anonymous sourcing with propaganda is misleading. Plenty of such reporting has resulted in significant truths being revealed and powerful people being held accountable (Watergate, the Pentagon Papers, Abu Ghraib). Responsible reporting involves weighing a source's motivations as well as corroborating and contextualizing that information as accurately and truthfully as possible.
The author's dismissiveness oversimplifies (or mischaracterizes, if I am being less generous) the reason and function of anonymity here. They overstate the issue with propaganda and anonymous sources. Accurate in the sense that anonymity can enable propaganda (it has happened), it is inaccurate in its absolutism.
I feel like this sort of tone, with the absolutism, the attempt to reduce the complexity and nuance of reporting to the point where it can be dismissed is pretty typical of what passes for commentary in today's blog/tweet/commentary culture but it really plays more into the hands of those that would sow confusion and mistrust than it does into that of the truth and accuracy.
It's a really good book, I wish more people were aware of it and read it.
When I read a personal blog article articulating a personal opinion, presenting evidence and trying to make a case for their conclusion, I usually apply a different standard. From them, I expect sound reasoning, which often requires a form of independence/neutrality that news organizations don't have.
And let's just say this article is not exactly structured as a sequence of QEDs, so to speak. It doesn't seem like the conclusions follow from the premisses. That's not to say it's wrong, just that if it is right, it would be in part by accident.
Yeah makes a lot of sense when framed like this, the timing of the secret service of all people busting this 'huge' operation was far too suspicious.
With the number of radios seen in the photos from the original story, there must have been a great deal of SMS from that structure. That is very easy to spot with low cost equipment: a TinySA[1] and a directional antenna should be sufficient. Hams do "fox hunting" with similarly basic equipment.
Given the resources of cell operators, the most charitable explanation for how something like this can exist for more than a brief interval is total indifference.
[1] The more recent versions ($150+) are pretty powerful and can see all 4G/5G bands.
Is it somehow illegal to have many sim cards in the same place as having many radios?
The telco's are also capable of bringing down the network, and they are legally allowed to turn their services off. Its not government infrastructure, its a business. If the backbone ISP providers decided to turn off their services for an area for a time, thats fine, there are contractual provisions to deal with that. its not a crime.
There has been no mention of arrest, was this 'crime' perpetrated by the infamous hackerman in ablack hoodie?
It could be just a scam bot farm but a scam bot farm with the intention of targeting vulnerable UN delegates with scams not necessarily to disrupt any cell tower?
Stopped reading right here. That is a completely valid reason to talk to the media and happens quite often only under that specific condition.
Which parts of the story were embellished and who they were embellished by is an interesting question but the degree to which the original story being bogus is balanced out nicely by the degree to which this article (and the overblown title) itself is bogus.
The facts: a SIM farm was discovered. It had a very large number of active SIMS. It was found in NYC. It was active when it was found.
What is speculative/hard to verify:
It was used for specific swatting attempts. It was put there by nation state level actors rather than just ordinary criminals.
What is most likely bullshit:
That it had anything to do with the UN headquarters being close by.
But that still leaves plenty of meat on the bone.
But the news articles themselves were "massaged" in various ways by some of the same editorial teams to suit the left-leaning or the right-leaning newspapers. The idea that completely different spin can be put to the same news - and by the same editorial teams, was a big eye opener for me.
What this taught me is that the media's primary role is to polarise people to either the left or the right so that they can be herded to vote along or act along prescribed lines. What the media and the establishment hates are people who are not either left or right leaning and who are capable of picking and choosing the narrative depending on what makes the most sense - that is, the so called centrists.
But here we are more than 2 decades later from that time and I see that the spin doctors are busier than ever and the "centrists" have almost completely disappeared.
To be honest, with the contents of the post, probably neither. It's fine if you want to point at different sources and go "ooooh WEF" and make scare quotes with your hands, but that's not actually evidence it's just a description of your existing bias.
Frankly, the overstating of the threat in the original article is frankly about as bad as the overstating of the article being bogus. The feds shut down some sim farm. Is is a massive national security threat? Probably no, that's a bit of an overstatement. The NYTimes ran a clickbaity article, is it bogus? Probably no, that's a bit of an overstatement.
I don't understand why people like this get so wound up by the way places like the NYTimes write up articles. This is the way journalism is written, you don't write articles that say "X happened, but it's probably fine!". You write "X happened, and it could have Y impact!". People are smart enough to read the article and understand, we don't need you making baseless accusations about their sourcing.
Why is triangulation an error?
> The Secret Service dismantled a network of more than 300 SIM servers and 100,000 SIM cards in the New York-area that were capable of crippling telecom systems and carrying out anonymous telephonic attacks, disrupting the threat before world leaders arrived for the UN General Assembly
> that were capable of
They didn't say this is what it was used for but that it was capable of doing so. Are we sure that's false? It sounds correct that the equipment is capable of such things.
Nowhere did the substack author say that cinting anonymous sources is not a thing, which your wording is implying. They say that citing anonymous sources to discuss an ongoing investigation is not a valid reason.
Let's look at the guidelines for ethical journalism and they quote the NYTimes guidelines: anonymous sources... “should be used only for information that we believe is newsworthy and credible, and that we are not able to report any other way.”
"... journalists should use anonymous sources only when essential and to give readers as much information as possible about the anonymous source’s credentials"
So the question is were these anonymous sources essential to the story? Have they given enough information about the sources credentials?
And what, pray tell, is the major scandal in this case? The source isn't alleging any impropriety or illegal activity. Anonymous sources are for stories which are being suppressed or lied about, not for investigations which have not yet publicly been announced due to pending litigation. If there's no obvious motive for why the source would want to be anonymous then all you're reporting on is rumor and gossip.
And why should they care?
A paying customer is a paying customer, never mind the health and integrity of the public phone network (which coincidentally also serves as the primary identification and authentication method for ~everybody in the US).
But in the US, I'm not so sure since things are already deregulated.
If one is setting up to target the U.N. one does not need this sort of setup to do so. Grand Central Station and the Chrysler Building are just as (in)valid a guess at some purported central target, which one does not have to enclose. The 35 mile radius is ludicrous, and very probably a "telephone game" garbling by PR people of the rough range of SMS to a 2G cell tower given certain conditions. And targetting just a few delegates for scams, with kit that costs thousands of quid per gateway box, is stupidity. The scams thrive on large volumes because they don't net 100% of the marks.
This is a way of having VOIP on one side and what will appear to callees like (doing some simple arithmetic based upon the various photographs) a few hundred (in the site where they're on the floor) to several thousand (in the site where they're on garage shelving along the wall) seemingly legitimate cell phones in multiple locations on the other side. The far more sensible hypotheses are an (overseas) scam support operation, or a dodgy telco operator of some kind.
No, they put this in lower manhattan because of the cell density there. It makes the fraud harder to detect in all the noise of normal usage.
It would have been so much easier to be closer to the UNGA and then it would be more effective if that was the intent.
Arguably, the reason that the pre-Internet media oligopoly was more centrist was simply because it didn't face competition. If you were NBC and ran a moderate story that didn't quite please hard-core conservatives or leftists, they could...go to ABC and get the same story? But if you do that now, the MAGA types will go read Infowars instead, the leftists will go read Wonkette, and you'll be left with no viewers and no money.
It has nothing to do with voting or acting. It has everything to do with locking in another consistent reader (aka "ad viewer"). If you can get someone ideologically driven, they become hooked, and you can stroke their ego by feeding them confirmation bias news. It becomes addictive, where the person gets hooked on news that tells them they are right.
All of that just to get them to scroll past or listen to ads multiple times a day.
I genuinely believe if we could scooby-do style pull off the mask of who is destroying the country, it would be the media. I have seen too many people in my life (and seemingly everyone online) go off the ideological deep-end because they fell into the media's ad-farming psy-op game.
I believe we're making very similar points in essence - see my other reply. Personally, I'd say that foreign security services having some involvement in this is slightly more plausible. If nothing else, just because some are basically nation-wide gang states, which very well could be doing this just for monetary reasons. Seems a bit more likely, not much, than a fed agency trying to do something (unclear what the author claim is about the point of the lie - "hype it up", I guess), concluding that lying about what they know in a case is a good way to do it, and choosing this case and this particular lie.
in what world is that unlikely? [0]
Just tell people that this is the sort of setup that is used by (overseas) scammers to send messages to thousands of potential victims at a time to rope them into various scams.
Fighting scammers is a hugely popular thing with the general public. No need to dress it up with that U.N. nonsense to get the general public's approval. People wouldn't even have minded that the Secret Service ended up uncovering a scammer support operation whilst tracking down something else.
I'm a little surprised that a behavioral analysis didn't flag these anyway. Probably did, just the networks don't care as long as they get their cut.
A lot of things are not, but US for a while has been on a path that suggests that whether something is legal or not is not the standard. The standard is basically, based partially on personal vibes.
Naturally, this comes years after it was normalized in banking, red flag laws and so on, so I suppose this is not a surprise, but I am surprised that people are making 'this is not illegal argument'.
In this setup, illegal does not matter. If it is suspicious, you are in trouble. For example, I invite you to look at DHS/FBI 'signs'[1][2] to report by private orgs:
- Producing or sharing music, videos, memes, or other media that could reflect justification for violent extremist beliefs or activities
Note the could and despair at the future we are gleefully approaching.
Anyway, I don't disagree with you on principle, but I want you to understand that the system behaves differently these days.
https://tripwire.dhs.gov/documents/us-violent-extremist-mobi... https://www.fbi.gov/file-repository/counterterrorism/us-viol...
What about sending spam and threaths over one of these SIMs? I'm pretty sure that warrants legal action.
That's like saying "during an arrest a car was impounded - this vehicle has the capability to plow into a school and harm children". Like yeah sure the capability is there, but without evidence of intention, why say it?
Real stories have real evidence.
They should also have editorial standards that judge the quality of the information and then decide whether to even print it or not. In this case, without a second source, it probably should /not/ have been printed.
Who is being protected from whom by granting this source anonymity? With your three examples it's clear, but not as much in this case.
I think this is the mechanism of action that will lead to america's downfall.
algorithmic content has connected dopaminergic interest to extremism while simultaneously welcoming influence from both agents of neutral chaos and malicious destruction.
i am currently watching a schism unfold in my immediate family over the death of charlie kirk. if we literally cannot discern the difference between charlie and a fascist/nazi/racist because complexity and nuance are dimensions of information that do not exist, then we are destined for civil war.
you cannot understand vaccine safety, israel v palestine, russia v ukraine, or literally anything else by scrolling instagram reels. stop having an opinion and uninstall the poison.
Claiming that anonymous sources inside an agency/administration is "not a thing" clearly betrays the fact that this person knows nothing about actual journalism. Heck even a casual NYT reader will know that they cite anonymous sources within the administration all the time! Just look at all the reporting about the Musk/Rubio dust-ups!
The NYT article is not sufficiently critical (of something) so it is government propaganda but in other times and places the NYT was not propaganda.
And honestly, probably everyone in a position to know, does know who the "anonymous" source is, but it's just enough plausible deniability that everyone gets away with it. They get to push their narrative but also pretend they are following the rules that are supposed to protect various parties in the process.
Meanwhile if I were on a grand jury and blabbing to the press every evening about an investigation, I could get in real trouble.
Even in simple jobs I've worked there's always been something armchair experts don't consider that makes their quick fix "just do this" or "how hard can it be to do X" ignorant and irrelevant. But he was so enamored of Elon and "saving us money" he couldn't even fathom maybe his kids who are smart and have been in the industry for sometime might know or understand something he doesn't.
Later I asked him "What audit are you talking about?" And he said "Who cares, I know they failed and that's all I need to know." The brazen ignorance mixed with outright callousness masquerading as righteousness is not good.
It's quite annoying
And I'm aware that it's conceivably possible that cops have altered their behavior with the introduction of body cameras.. If so, then good. But I don't believe police shooting statistics actually back up such a hypothesized change in police behavior, and I doubt making cops wear body cameras could really do much to alter the behavior of a cop set in his ways. And in fact, most police departments have been quite happy to have body cameras because the body cameras show the world what cops already knew; their job is to wrangle the most unhinged retards our country makes.
After everything the gov't has tried to hype in the last decade (I'm including some things under Biden's term too), and esp. the efforts made in Trump second term, sure seems like it checks out to me.
So maybe you could name one of the conclusions and its premises, and describe how they don't follow. Cause I certainly don't follow what you're on about.
"The other 0.003 mg were lost while trying to get them in the evidence bag."
Humm... No?
The “literal New York Times” doesn't exist anymore. This is not investigative journalism. This is just acting as the mouth piece for some anonymous government official.
I found the focus on the source being anonymous odd as well. I think the correct lesson is that substacks have just as much propensity towards being propaganda as the nyt does.
Gel-Mann Amnesia affect applies here: every time I've seen mainstream media cover a subject that I have personal experience or expertise with, it's been shockingly inaccurate. This includes the NYTimes. It includes random guys on Substack too, but I've found that random guys on Substack when speaking about their area of expertise are actually pretty accurate. It's left to the reader to determine whether some random guy on Substack is actually speaking to an area of their expertise, but other comments here have attested that the author actually knows what he's talking about when it comes to SIM farms.
My computer setup is far from a one-time event, and my cabling is a nightmare.
I don't mean this in derogatory sense. I wasslightly...hm...confused when reading this. When I see something in the news, to the degree that I trust the source, I see it only as a statement of fact, and unless I trust the commentator, I ignore the comment. I only expect descriptive accuracy from the news. This sometimes requires resources that individuals don't generally have.
When I read a personal blog article articulating a personal opinion, presenting evidence and trying to make a case for their conclusion, I usually apply a different standard. From them, I expect sound reasoning, which often requires a form of independence/neutrality that news organizations don't have.
And I can't say that this article is structured as a sequence of QEDs, so to speak. It doesn't seem like the conclusions follow from the premisses. That's not to say is wrong, just that if it is right, it would be in part by accident.
Advertisers have massive leverage over what gets published in the media through pulling and pushing their ad funding.
And "Ex" NSA/CIA/FBI employees work in all branches of communications/media and many in editorial roles like "Foreign Policy Editors/Analysts", "Law Enforcement Analyst" or as consultants for editors.
It's not just "the media" who is destroying the country, it's capitalism and their profit motive.
And now the SS foiling attacks against the UN! Wow, omg! But also, I mean, why do we even care, all they gave us was a broken escalator and teleprompter, amiright?
> The share price of Maple Leaf Gardens, which owns the Toronto Maple Leafs (sic) hockey team...
Pretty clear this is the case, almost all of it could be stopped overnight with a simple whitelist to people you know and a blocklist of countries and regions where you’ll never ever need to take a call from.
Use VPNs? Surely paying for some subscriptions at $3/month is cheaper than renting an apartment in manhattan?
I would think the people at the Times would want to know if they are just being useful idiots here.
However, there have been important and sometimes shocking stories that have been told thanks to reporting based on trustworthy, anonymous sources. The Pentagon Papers is a textbook example.
> What we consider before using anonymous sources:
> How do they know the information?
> What’s their motivation for telling us?
> Have they proved reliable in the past?
> Can we corroborate the information they provide?
> Because using anonymous sources puts great strain on our most valuable asset: our readers’ trust, the reporter and at least one editor is required to know the identity of the source. A senior newsroom editor must also approve the use of the information the source provides.
Is there a particular change you’re proposing?
IMHO, he is also proficient at explaining complex topics involving computers. If others have differing opinions, feel free to share
Anyone know where can we see parent commenter's code or something that demonstrates their knowledge of computers, computer networks or particular knowledge of "SIM farms"
In the end if a journalist can get their story out faster by leaning on a few 'trusted sources' and then move onto the next article, most of them will and their managers will encourage it. Maybe you'll get a more in depth story if it makes it to On The Media a week or two later but that's basically all we have at this point which is very sad.
But a meta point: Most commercial news rooms have become propoganda arms for The Party that churn out low effort AP ticker derivatives, social media gossip, and literal government propaganda from The Party whispered in their ear by an “anonymous source.” The “news rooms” appear devoid of any real journalistic integrity.
I think we are going to see an increasing trend of “true journalists” leaving the legacy news industry to places where they can build direct relationships with their audience, can own their own content distribution channels, and directly monetize those channels. I.E. Substack, YouTube, X, et. al.
SIM farms are normal, common things that exist all over the place to allow messages from far-away senders to be sent as if they came from a local number.
That’s all the author is asking us to believe.
Really? I see a difference between 24h infotainment news and News.
The News I listen to (AM radio) is compacted into fact, point, counterpoint. And that’s it. When it repeats, no more news. I’m old enough to remember this basic News playbook, and it’s not changed on those stations I listen to.
Are they just making up these "normal journalistic principles"? I see different newspapers publishing quotes anonymously under similar conditions all the time.
`site:nytimes.com “speaking on the condition of anonymity to discuss an ongoing investigation”` has no earlier results
Other outlets have used “speaking on the condition of anonymity to discuss an ongoing investigation” before though.
Is it time to stop treating somebody's IP address as an authentication factor yet?
Off-the-record, "I'd never lie to you" BS from anonymous sources in the "intelligence community" is a lead to investigate, not a story. They weren't called the Pentagon Whispers.
I can only guess, but based on the reporting, it looks like they skipped this guideline.
>> Have they proved reliable in the past?
Which is half the battle. The real question is "have they lied to us in the past?"
https://fivethirtyeight.com/features/which-anonymous-sources...
IIUC, the blog post is not claiming there is no such thing as speaking with the press on the condition of anonymity, it is claiming that requesting anonymity for disclosing the existence (cf. the details) of an investigation into routine criminal activity is reasonable cause for skepticism. The blog post then explains why the author believes the "SIM farm" is a routine criminal enterprise, not something more
One does not have to be an "expert in political propaganda" or rely on one to question, out of common sense, why anonymity is needed to disclose the discovery of a "SIM farm"
This is authority bias. Being a great programmer does not make one an expert in political propaganda, the inner workings of government, or the media.
No, they know what they are doing and you can tell they know what they are doing by the careful way language is used differently for similar facts when the police or other favored entities are involved vs. other entities in similar factual circumstances (particularly, the use of constructions which separates responsibility for an adverse result from the actor, which is overwhelmingly used in US media when police are the actors—and also, when organs of the Israeli state are—but not for most other violent actors.) This is frequently described as “the exonerative mood” (or, sometimes, “the exonerative tense”, though it is not really a verb tense.)
Carefully calibrated, highly-selective use of (often, quite awkward) linguistic constructs does not happen unconsciously, it is a deliberate, knowing choice.
when Barbara Walters was interviewing Fidel Castro , what do you think was going on from the perspective of the United States?
They're not all such prestigious examples, but the point stands.
Those independent channels seem far more amenable to "opinion-havers" than "true journalists" (though perhaps the "true journalists" transform into opinion-havers or secondhand-analysts when they change distribution platforms).
> ...churn out low effort AP ticker derivatives, social media gossip, and literal government propaganda from The Party whispered in their ear by an “anonymous source.”
That stuff is cheap. How do you expect someone moving to a place of fewer resources and less security to make a more expensive product?
> The “news rooms” appear devoid of any real journalistic integrity.
I think you're seeing the result of budget cuts.
Meanwhile, many US companies won't let me, the actual legitimate user they're trying to authenticate, use Google Voice, because it's "so dangerous and spoofable, unlike real SIM cards".
Hopefully this helps a little bit in driving that point home.
It's always funny to see comments like this; because there's always at least 50/50 chance that the article is from someone that is actually prolific, just that the person has a blind-spot for whatever reason.
That is, also, the case here.
It also makes the point that its purpose wasn’t to disrupt cell service, although these things can and will disrupt cell services.
So from my perspective, the article is strange in the sense that the author seems pretty intent on splitting enough hairs to prove the secret service wrong. For me, I don’t care if they are wrong about its purpose— If this helps decrease spam messages, great. If it means that cell services are now more reliable in that area, great. If it’s something that could be hijacked and used for terroristic purposes and has now been neutralized, great.
"Secret Service officials said, speaking on the condition of anonymity"
Their only stated source is "USSS officials" who bafflingly demand "anonymity." I would expect the reporter to tell those /officials/ they need to allow a direct quote or to provide another source; otherwise, their information simply won't be printed.
It's the difference between being a blind mouthpiece and being a reporter.
It's entirely possible that there are good non technical reasons for believing who was behind this while being technically incorrect about what it was that they intended to do.
Some of the more fanciful notions might be unlikely. Some of the evidence is only relevent in context. The distance from the UN is not terribly compelling on its own, the significance of the area of potential impact containing the UN is only because of the timing.
A state action might be for what might seem to be quite mundane reasons. One possible scenario would be if a nation feared an action suddenly called for by other states and they just want to cause a disrupting delay to give them time to twist some arms. Disruptions to buy time like this are relatively common in politics, the unusual aspect would be taking a technical approach.
Today, the Secret Service announced they foiled some big national security threat. Major news organizations (e.g. NYTimes) have repeated their claims without questioning them.
The story is bogus.
What they discovered was just normal criminal enterprise, banks of thousands of cell “phones” (sic) used to send spam or forward international calls using local phone numbers. Technically, it may even be legitimate enterprise, being simply a gateway between a legitimate VoIP provider and the mobile phone network.
The backstory is a Secret Service investigation into threats sent to politicians via SMS messages. The miscreant used one of this spam farms to mask their origin. When the Secret Service traced back the messages, using radio “triangulation” (sic) to find the mobile phones, they found these SIM farms instead.
One of the reasons we know this story is bogus is because of the New York Times story which cites anonymous officials, “speaking on the condition of anonymity to discuss an ongoing investigation”. That’s not a thing, that’s not a valid reason to grant anonymity under normal journalistic principles. It’s the “Washington Game” of “official leaks”, disseminating propaganda without being held accountable.
The Secret Service is lying to the press. They know it’s just a normal criminal SIM farm and are hyping it into some sort of national security or espionage threat. We know this because they are using the correct technical terms that demonstrate their understanding of typical SIM farm crimes. The claim that they will likely find other such SIM farms in other cities likewise shows they understand this is a normal criminal activity and not any special national security threat.
Their official statements are obvious distortions, like being within 35 miles of the UN building. Their unofficial statements are designed to exaggerate even more, like “never before seen such an extensive operation”. The Secret Service doesn’t normally investigate such crime, so of course they are unlikely to have seen such an extensive operation.
Another way you know that the NYTimes is lying is because of the independent “experts” they quote to confirm it.
For decades now, when the NYTimes has a cybersecurity story from anonymous government officials, they quote James A. Lewis to confirm it. This guy used to work for CSIS (Center for Strategic and International Studies) but apparently has changed employers recently. Whenever I blog/tweet about bogus NYTimes cybersecurity stories, I point out this relationship with James Lewis. When you see anonymous government officials and James Lewis quoted in a NYTimes story, you are seeing government propaganda.
Another “expert” the NYTimes quotes is Anthony Ferrante [update]. He’s got the resume that the NYTimes loves. I’m famous among hackers for my technical expertise, but I would never be quoted in the NYTimes, because I don’t matter. The NYTimes only quotes people who matter, meaning, people involved at high levels of government, people with their resume posted on WEF.
Both of these “experts” claim things that are objectively silly. Ferrante says “my instinct is this is espionage” and “c_ould be used for eavesdropping_”. This is false, this arrangement cannot be used for eavesdropping and there’s nothing particularly related to espionage here. Lewis claims “only a handful of countries could pull off such an operation, including Russia, China and Israel”. That’s false, I can pull this off, personally. It’s just a SIM farm. Sure, there’s some capital involved, on the order of $1 million, but it could be setup and managed by a single person. It likely wasn’t setup all at once with that much money, but has been slowly growing for years as profits are funneled back into setting up more SIM accounts
Who are you going to trust, these Washington insiders, “people who matter”, or an actual hacker like myself?
I say “phones” above in quotes above because the actual hardware isn’t like the phones you have in your pocket. Your Android/iPhone is a computer with a single “baseband” radio that talks to the cell tower, and maybe two SIMs in case you have two different phone accounts. That’s what a SIM is — a chip that locks you to a specific phone account.
A “SIM box” has single computer (often running Linux), maybe 20 baseband radios, and maybe 100 physical SIM cards. It rotates among the SIM accounts when spamming SMS messages.
A SIM card may be the same sort of prepaid $10/month SIM you buy at Walmart that allows 1000 SMS messages per month. There are other types of accounts they might use, so they aren’t necessarily walking out of a Walmart with bags full of prepaid SIMs after clearing off the shelves, but it’s close enough. They are trying to fly under the radar, appearing to the mobile networks as normal users.
The Secret Service hypes this as some sort of national security threat that can crash cell towers. The reality is that this is just a normal criminal threat that sometimes crashes cell towers. SMS is an ancient technology that works slowly even in modern cell networks. Too many SIM boxes spamming SMS in one location can indeed overwhelm a cell tower. You actually don’t need a bunch of SIM boxes to do it — you can sometimes crash a cell tower with a single baseband radio. Ask me how I know.
The point is: while criminals do sometimes crash or overload cell towers, an actual foreign threat can do this much easier than using SIM farms. In any event, there are thousands of cell towers around New York City satisfying 10 million subscribers, so crashing a few won’t make much difference.
The correct quote from any expert is that this looks like a normal criminal SIM farm, that’s used for a wide range of purposes, often SMS spam. They are pretending to be thousands of normal mobile phone users to prevent the mobile phone companies from shutting them down. Some miscreant likely used the service to hide the origin of threats sent as SMS messages to politicians, which is why the Secret Service is involved. Theres no evidence the Secret Service is involved due to some actual national security or espionage threat — that’s just propaganda they are hyping.
35 miles radius centered on UN building:
[
Some comments on this blogpost;
[
No posts
The incredible vast majority of people in the world are acting in good faith. The way you are framing this is that nearly all journalists are acting in bad faith, which makes me believe the arguments of the parent ("The journalists don't think they're writing these stories to amplify the police narrative") more so than the argument you're making here.
I absolutely believe that a journalist can present two analogous sets of facts in two completely different ways without even consciously realizing it. These assumptions and biases are baked in deep, especially when you are writing day-in and day-out on short deadlines.
Investigative journalism is really not that expensive. A lot of it boils down to needing a phone and money for gas. Rather than costs, the much bigger obstacle to good journalism is censorship, much of it coming from company leadership, which doesn't want a bad relationship with advertisers or the government.
But I think it’s wrong to call it a “blind spot”. This is not my industry, I don’t know the names, and I’m not qualified to judge whether the author deserves my implicit trust. So I treat this substack with the same skepticism I would any other substack.
https://www.made-in-china.com/showroom/faf448fd0d906a15/prod...
I think scatterbrained, vibes based almost-theories that vaguely imitate real arguments but don't actually have the logical structure, are unfortunately common and important to be able to recognize. This article gets a lot of its rhetorical momentum from simply declaring it's fake and putting "experts" in scare quotes over and over. It claims the article is "bogus" while agreeing that the sim cards are real, were really found, really can crash cell towers, and can hide identities. It also corrects things that no one said (neither the tweet nor the NYT article they link to refer to the cache of sim cards as "phones" yet the substack corrects this phrasing).
The strongest argument makes is about the difference between espionage and cell tower crashing and the achievability of this by non state actors (it would cost "only" $1MM for anyone to do this), but a difference in interpretation is a far cry from the article actually being bogus. And the vagueposting about how quoting "high level experts" proves that the story is fake is so ridiculous I don't even know what to say. Sure, the NYT have preferred sources who probably push preferred narratives, but if you think that's proof of anything you don't know the difference between vibes and arguments.
So I completely understand GPs point and wish more comments were reacting in the same way.
Yes, most newspapers are publishing anonymous quotes from government officials without scrutiny; quotes that are later found to have been completely bogus.
We live in an age of constant memetic warfare and a majority of our content distribution channels have been compromised.
Edit:ascii emoji fail
I cannot conceive of a reason why that would occur
Overall I found the substack author to tell a good story and speak with what seems to be relevant technical experience so I reposted the link that I saw in another hn thread as a separate story, but as other commentors have pointed out it's possible that both he and the original journalist are hyping up conspiracies in both directions (compromised press vs state actor hackers) and actually the truth is often a more boring mid ground (Journalists hyping up stories and shady people doing shady things)
Citation needed. The New York Times has very strict rules about using anonymous sources. It's not some scary, shadow journalism effort. They publish their rules for anonymous sources right on their web site. Google is your friend.
The “literal New York Times” doesn't exist anymore. This is not investigative journalism. This is just acting as the mouth piece for some anonymous government official.
Having been a reader of the New York Times for almost 50 years, I can say the New York Times hasn't changed that much. I can also say that I look at it with a much more critical eye than most because of my journalism degrees and decades of experience as a journalist.
A major problem with society is that some anonymous low-karma recent-joiner rando spews things on HN like "The NYT is very clearly the puppet of washington insiders" and people believe it for no reason other than it tickles the part of their brain that agrees with it. Not because of any kind of objectivity, analysis, proof, or thought.
To pick a nit, you are correct: This was no investigative journalism. This was a routine daily story covering an announcement by a government agency. If you don't know the difference between the two, then you lack the knowledge and understanding required to be critical of any sort of journalism.
As far as I understand it, it's more of the lack of a design (for authentication) that got us into all that trouble, similar to BGP, Email, and many other protocols that were originally designed with trusted counterparties in mind.
It just so happened that the illusion of mutual trust broke down earlier in the Internet than it did in the international phone network. (Some even still believe in it to this day!)
And how is it even supposed to work? How are you going to handle billing? Does a cell phone tower even know the phone number of the connected devices? What's going to happen when the recipient disconnects mid-SMS? What happens when the same number is in use by multiple SIM cards?
And that's the point. No-one would have thought bad of them for following up on stuff within their bailiwick and uncovering a scam support operation. It's the old caught-the-major-bad-guy-in-a-routine-traffic-stop tale, after all.
Maybe, maybe not. It is also true that the incredible vast majority of people in the world aren’t corporate journalists, also.
> The way you are framing this is that nearly all journalists are acting in bad faith
Nearly all American corporate media has a conscious, top-down policy starting with the owners and editorial board to favor certain institutions, which is enforced by hiring, firing, promotions, and assignments of staff. The specific beneficiaries of this vary somewhat between outlet and outlet and over time, but both American police broadly and State of Israel are common beneficiaries across most outlets.
Journalists either comply are they aren’t journalists in the corporate media covering the issues to which these biases are relevant for long. Corporate media journalists aren’t independent actors.
"...I'm sure you believe everything you're saying, but ... if you believed something different, you wouldn't be sitting where you're sitting."
We have fundamentally different priors.
this a very westerner perspective on society. Ask an Eastern European (like myself) how the vast majority of people are really acting.
The term 'past exonerative tense' is dated to 1991.'"Mistakes were made" was popularized by Nixon.
To continue pulling this nonsense is wilful ignorance on the journalists' part, and effectively equivalent to bad faith.
How did this not throw flags with the carriers.
When Bobby tries to convince his friend Jimmy that Charlie is lying, you shouldn't trust him if he says that "I know that Charlie is lying because apples are green".
> One of the reasons we know this story is bogus is because of the New York Times story which cites anonymous officials, “speaking on the condition of anonymity to discuss an ongoing investigation”. That’s not a thing, that’s not a valid reason to grant anonymity under normal journalistic principles.
> It’s the “Washington Game” of “official leaks”, disseminating propaganda without being held accountable.
In general, you can spot this kind of propaganda by realizing that the anonymous source is actually promoting the government's position and so isn't actually in danger. I.E. they aren't a whistleblower, they have no reason to fear repercussions.
Cell networks are not my area of expertise, but cybersecurity is, so I am genuinely interested to learn more.
Also funny was that it was considered espionage at first ... but they found lots of drugs on site -- clearly not espionage.
Let's pick through the official statement.
"In addition to carrying out anonymous telephonic threats, these devices could be used to conduct a wide range of telecommunications attacks. This includes disabling cell phone towers, enabling denial of services attacks and facilitating anonymous, encrypted communication between potential threat actors and criminal enterprises."
This is a mix of bullshit and mundane. Disabling cell towers? I don't buy it. DoS attacks? Yeah, any collection of internet-connected devices can do that. Anonymous, encrypted communication? Everybody's smartphone qualifies for that. You could be talking about arresting a pickpocketer and be technically correct in saying that you siezed a device that could be used to facilitate anonymous, encrypted communication between potential threat actors and criminal enterprises.
"While forensic examination of these devices is ongoing, early analysis indicates cellular communications between nation-state threat actors and individuals that are known to federal law enforcement."
So some foreign government was using these services. You could say the same about AWS.
"The potential for disruption to our country’s telecommunications posed by this network of devices cannot be overstated"
A nice example of the genre of self-disproving statements.
"These devices were concentrated within 35 miles of the global meeting of the United Nations General Assembly now underway in New York City."
It bears repeating that "within 35 miles" of the UN includes the entire New York metro area and a large area beyond. In addition to that, the very concept of electronic equipment being "concentrated within" four thousand square miles doesn't make the least bit of sense.
I'm not even sure the apple is green! If you search `site:nytimes.com “anonymity to discuss an ongoing investigation"` you'll see that this news outlet has done this multiple times in the past.
I suppose "valid" and "normal" are giving the author a bunch of wiggle room here, but he never backs this claim up.
Breaching of this, especially as you're making a case, in most cases at best would invalidate the whole case + bring disciplinary actions upon the individual(s) that committed the breach.
Judging by the other comments, looks similar for the US too.
If you're ever partecipated as expert in any investigation or news article you'd know you'd get usually biased hypothesis, if otherwise it meant you wouldn't have the same impact for the news story. Or if you've ever heard of the Gell-Mann amnesia effect.
https://www.rsaconference.com/experts/robert-graham
BlackICE was a big personal firewall 20 or so years ago - you can read all the CNet/ZDNet reviews if you search for it. You can also look at his code (for a port scanner that can scan the entire Internet in 5 minutes, whew) on GitHub:
The cherry on top is that at the end of the article, they sort of let it slip that this isn't something that they expect would be unusual:
> “This is an ongoing investigation, but there’s absolutely no reason to believe we won’t find more of these devices in other cities,” Mr. McCool said.
If, for whatever reason, the agency feels like it's not risking its own case and wants to blow its trumpet... it really doesn't matter what the names of the spokespeople for the agency are. They don't need to speak anonymously, as they won't get in trouble with anyone at the agency for saying what the agency told them to say to the press. The NYT could just say "officials said" and not name them.
It is not like there is a whistleblower inside the Secret Service with scuttlebutt to dish, and the NYT need to protect the identity of Deep Throat 2.0... and all they had to say was the spam operation itself didn't pose any threat to the UN conference.
I think what the blog author's arguing is that this phrase is unnecessary detail that just adds intrigue to sell a rather mundane story.
There's bias in the sense of selecting stories and editorial judgment, and narrative emphasis. But people have gotten way too comfortable just reflexively claiming stories are fabrications, which I think in truth is extremely rare.
disclosure: I'm an investor/advisor in massive.
You get specific numbers (two arrests and eight search warrants), more specific locations (names of big cities aren't very specific, but they're more specific than a circle 70 miles wide), a specific country running the agents (China), and a specific goal (recruit spies in the US military).
The vague statement about the SIM farms is pretty clearly an attempt to puff up an operation that didn't accomplish much.