Waking Up in 2020 – Videos to ‘Rabbit Hole’

Waking Up in 2020 – Videos to ‘Rabbit Hole’

Conflict Culture Ultimately Reaches its Critical Mass

Welcome to the Great Awakening of 2020

War, by design. Dividing a population through constant conflict is a strategy developed thousands of years ago, ironically around the same time as the concept of money (currency) was invented into being.  Humans are the only species on earth that must settle a debt simply in order to exist, and the only ones to continually seek fantastically inventive ways of destroying itself and other lifeforms.

Divide and Conquer.  This age old strategy has been used against humanity for thousands of years. Only by keeping humans viewing themselves as ‘different’ and ‘separate’ from each other can they be controlled. Sadly, the result is that life on this planet is under-valued.

Now, in 2020 we’ve reached a critical threshold where the Group Consciousness has started to question itself on a much wider scale.   If you’ve found yourself here, then you probably have questions.  Lots of questions. 

For those that haven’t yet found ‘Purpose’ in your lives – its because you don’t actually know what this is, how it works, and why we’re here.    A hint?  You chose all of this.

Now, you get to finally understand Why.

 

2020 Truth Research

Rabbit Hole Keywords

 


Symbolism,
Occult #GangSigns

Pedo
Cult
in Movies
Hidden in Plain sight (and why)
Art (podestas, Bush playing w paper planes)
DC geographical layout/shapes
Money
Numerology

Hidden Cults
Hollywood
Music Industry (Hwd+Music=”The Industry”
Political Arena
pay to play (Epstein)
“its a big Club and you aint in it” (George Carlin)
Symbolism
Bohemian Grove (ritualistic sacrifice)
Bloodlines (13?)
Satanism/Lucifer worship/Sacrifice
Suicided people (Celebs & genpop researchers)

Predictive
Programming
MK Ultra
Monarch
Paperclip
Mockingbird (Hunger Games)
Masses
snapchat –>masks
9/11 in cartoons, games & ads (photos)
small dose exposure to planned coming events to subdue the people into acceptance
Sexuality–Pedophilia=a sexual orientation that should be accepted (barf)
Fact Checkers:
purpose to mislead masses away from truths
general rule=opposite is usually truth

Q Anon
Info Leaks

Praying Medic
Dylan Monroe
X22 Report
qmap.pub
HT–>PizzaGate:
Liz Crokin
Anthony Weier
-HRC
James Alefantis
Suicided people

(Celebs & genpop researchers)

Cick  for Current Playlists of Not-yet-Censored Videos
Organized for your Truthing pleasure

We’re Busy

Hacking Some New Tech

Private Video Platform, Censorship Free Because
the Best Stuff isn’t On YouTube,
anymore, lol.

so anyway….

New Here?

Not Sure Where to Start?

The Below Playlists May Help In Your Quest…

David Icke |

Pandemic Hoax | C0VID-1984 | The Answer | Past, Present and Future Events
Freedoms Loss By Coronavirus

Personal freedoms have never vanished faster than they are right now, at this very moment.  The buying and selling of politicians by the banking elite have gutted all forms of oversight that used to exist in government framework, and like a cancer this system seeks only more power and control.  This was planned long ago, Operation Lockstep, from a Rockefeller 2010 Planning document.

Our Coverage of Coronavirus 2020 has a Dedicated Website CovidTruth.info

Understanding the Hidden Nature of Reality
and your own power
Quantum Physicists are forced to agree on at least one element of the equation, our world is ultimately non-material. What to us appears ‘solid’ is nothing more than abstract energy appearing to be solid. Understand how just a single thought can be enough to change your life forever.

 

Space Exploration / Extra Dimensional

The Secret Space Program is the common terminology used in Black Ops circles when referring to real feats achieved off-planet. NASA is a cover that distracts from the real agenda, and there are programs which exist that stretch the boundaries of human comprehension.

Human Trafficking / #PizzaGate

800,000 Children go Missing Every Year in the USA,
But we’re wearing masks & fearing
Common Disease with  99% Survival ..?

#SaveOurChildren

Wake Up With Some Activist HipHop
aka Conscious Rap

Some of this craziness might make it into our Social Platforms. Maybe.
Follow if thats your jam.

[WD_FB id="1"]

More Posts with Relevant Video Content

The Fall of the Cabal – 10 Part Documentary

The Fall of the Cabal – 10 Part Documentary

This documentary was made by researcher and author Janet Ossebaard from the Netherlands with the aid of countless anons across the world. It Contains thousands of hours of research. Accept nothing as the truth. DO your own research, and double-check everything presented. This is the only way we become independent thinkers.

read more

Pro Status eh?

How Deep do u Truth, bro?

What About Now … ?

“We’re Just Getting Started”

Bilderberg Flowchart of Connected Organizations

The Great Awakening

Iceberg Visual

Adam Bennett Anon

Adam Bennett Anon

Anonymous radio host know as Lorax aka Adam Bennett Anon was arrested (full article).

Everybody who has known Adam ‘Lorax’ Bennett aka Adam Bennett Anon knows he’s an awesome anon. Furthermore, the article now let us know he was also involved in his local community as an experienced life saver and a fundraising manager for Cancer Support. This kind of person doesn’t belong in jail! He belong to it’s people. The people he give each day of is life to protect.

If you’ve know Lorax, or Adam John Bennett, now is the time to get involved and help!

https://twitter.com/Loraxlive/status/467566452015251456

Take action

Read the #FreeAnons press Releases : We are All Lorax
Read tweets and tweet with the #FreeLorax hash tag
Read this PasteBin
Keep posted for more information!

Articles about the arrest

Surf champ accused of hacking
“Anonymous” hackers charged for targeting Australia, Indonesia
‘Anonymous hacker’ in court in Perth
Hackers charged for targeting Australia, Indonesia
Two Australian Anonymous members arrested for hacking Australian and international websites
AFP arrests two alleged ‘Anonymous’ members

Was The Lorax Setup?

The lifesaving Lorax’s tale took an interesting turn the last few nights, as the internets and ircs were ablaze with controversy, flame wars, and a little good-ole-fashioned ‘he-said she-said.’ What was already looking like a classic tale of governmental overreach and the suppression of Adam John Bennett’s Civil-Rights is turning into a dark tale of deception, duplicity, and police-led treachery. While there was much argument among the anons present, one thing was very clear, the Australian government had tricked and deceived a minor in an unsuccessful attempt to lure the Lorax into a hacking scheme. Having failed in that they have continued to attempt to argue that the research work that he did at his job for a Cancer fighting charity that showed a clear problem with the same security protocol that the Australian Government was proposing using with it’s upcoming, Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014, plan for telecoms to keep their customer’s e-mail and phone metadata for two years.

Soon after Bennett began criticizing the plan there was an alleged hack into AATP (third-largest telecom in Australia) and the Indonesian government, Anonymous was blamed. The Government initially charged the Lorax and two hackers with the breach. After nearly a year of delays and continuations, the court announced that all of the charges for hacking by Bennett would be dropped, but replaced with obscure sounding charges like, “aiding and harassment.” It has become ever more clear that there wasn’t ever much of a case and the government is using Bennett’s bail restrictions to keep his LoraxLive show off of the air.

This dark tale really begins in 2011, even before the government started suggesting an ill-conceived data retention scheme, before anyone hacked AATP and the Indonesian government. Back in the heyday of lulzsec a 15 year-old hacker who we’ll call Hacker-Z (not his real hacker handle) was caught up in the glamour and prestige of the lulzsec-style direct-action hacking. Hacker-Z was like almost nearly ever teenage boy he wanted to listen to loud music and raise a little hell. That sounds anti-social perhaps, but when you see that the things that young hacktivists want to break are things like evil autocratic governments like Libya or Tunisia, or on-line bullying groups, that anti-social streak can begin to turn an odd shade of heroic on a young person. Apparently, according to general consent, it wasn’t hard for the same sort of Five Eyes investigators–who were at that same time acting as the nefarious Sabu’s puppet masters, in a separate scheme to entrap Anons–to get a hold of this inspired, if naive teenager.

Having entrapped the would-be activist with an illegal hacking scheme, they first terrified the lad and his mother with the prospect of nearly life in prison for his unsuccessful attempt, while being directed by undercover government agents, to hack government and military websites; according to some in the chatroom. Having scared his mother as best they could it was easy for the police to convince her to give consent for them to use their son as a mole to keep an eye on on-line hacktivists. Any mother if, confronted with the prospect of sending her only child to prison, for probably, the rest of his life would almost surely make the same decision. Having Hacker-Z as a mole worked well for the police apparently, he was generally reported to be a friendly, helpful, and affable young man. No one on this side of things is sure how much information he really got in his few years, probably, working for the police, but needless to say when he was arrested with the Lorax, many a hard drive was wiped, just in case.

It seems the feds kept Hacker-Z on ice until the day they needed him. That day came, apparently, during the summer of 2012, when the Australian Government first proposed the current anti-privacy legislation that they are quietly pushing through the legislature right now. When The Lorax caught wind of the Government’s plan he immediately saw the obvious problems with warehousing the entire Australian population’s personal web data. Even if the government could show an actual need for all of this personal, which they can’t, Bennett honed in on the first and most obvious problem, security. Eventually Bennett showed, at his workplace, while testing their server, that recent flaws found in OpenSSL, the so called “Heartbleed Bug” could eventually lead to losses of citizen’s personal data to criminals or terrorists, if the government continued with their data retention plan.

Seeing the problem the Lorax did what the Lorax does when the community is in danger; he warned people through his popular show, Lorax Live, whose archives, that haven’t been seized by the government, can be heard here and here. Obviously, the leaders and politicians backed by corporatism and fully vested in the telecom industry, couldn’t afford to have a lot people aware of or critical of their massive transfer of both citizen’s data and the nation’s wealth, in the form of fees paid by taxes, to the nation’s telecoms. No, classically, power becomes annoyed when confronted by truth, this story is no different.

By the Winter of 2012, as far as the Australian government and the Australian Federal Police were concerned; the Lorax had to be silenced. Later when they learned that, while at his job testing his employer’s server’s security, Bennett had discovered a way that the “Heartbleed Bug” might be used to access encrypted files on a server, the very sort of thing that privacy advocates had been screaming about ever since the government first suggested the data retention program, government agents hatched a plan to silence the Lorax.

The police knew that they would never convince a reputable, white-hat security researcher like Adam John Bennett to participate in a criminal attack on the internet’s infrastructure. It is rumored that the police devised a plan to implicate the Lorax without needing him to take part in any illegal activity. To do this, they gathered up their friendly young, unfortunate mole, Hacker-Z and sent him into an irc chat with the Lorax and had him plead with Bennett to give him, Hacker-Z, Bennett’s note’s from his research work on OpenSSL. The authorities, it seems, hoped that by obtaining information on how one might be able to attack encryption from the researcher they could implicate him in a crime and, at least, keep his radio show off the Internet until they got their data retention plans passed into law.

Perhaps more despicable than the government’s attempt frame and implicate a man are its motives, of depriving a citizen of his civil-rights, and its methods of abusing the criminal justice system through the attempted entrapment of an innocent man, and misuse of a citizen’s right to bail in order to silence a benign, but vocal critic of governmental corruption and malfeasance. This is not Syria or Zimbabwe where a critic can simply be tossed in a hole or executed by despots, in “free” societies, like Australia, you must design administrative and judicial straps with which to bind their tongues and hands to things like restrictive bail requirements or plea agreements, to trumped up or false charges. The critic is silenced, the powers-that-be have no blood on their hands, the media calls the former hero-of-the-people a villain, and whatever danger the critic was fighting against is forgotten. It’s all very civilized.

If the police were unaware of who they were dealing with or simply unfamiliar with the world of white-hats is unclear. Bennett did not give their mole any help or information, and not because he believed he was a mole. (As a white-hat researcher Bennett was well aware of cyber-crime and the need for enforcement in the field, it can assuredly be assumed then that he supports law-enforcement and legitimate undercover operations, but any thinking adult would have to wonder about the wisdom of using children as moles to bait and entrap adult criminals.) No, it is rumored that Bennett refused to help the boy, not because he believed he was working with police, rather he believed that the youth might be an impassioned young hacktivist who could possibly do something unwise or damaging with the information, something that might hurt others as well as get the lad in trouble with the law. Most likely, in Bennett’s mind, the young Hacker-Z would be better off waiting until the bugs in OpenSSL were fixed to get a look at the Lorax’s research notes.

Blown off course, but not sunk by the Adam John Bennett’s integrity, the Australian Government tried a new, indirect tack to get their entrapment scheme back on course. They would have Hacker-Z engage an intermediary, another White Hat researcher, someone the Lorax would trust. They found him in a passionate young researcher we’ll call Hacker-X. Hacker-X was known as a knowledgeable and helpful security expert. He had long been very helpful getting newbloods on the right track on-line and helping others secure their computer systems. Like a lot of hacker culture Hacker-X believes in education and the open-sharing of information, not to cause damage but to protect from damage.

Imagine you bought a lock for your front door, it’s a common lock, and there are many like it in your neighborhood. If there was a flaw in that lock that could allow criminals to enter your home then you would like to know about it, wouldn’t you? Of course you would, and it would be good for you to know so you could find a way to fix it or replace it, so the burglars can’t come in. Certainly, you wouldn’t want burglars to know about the flaw, but luckily the vast majority of humans aren’t burglars, likewise very few people interested in computer security are criminals. So, for a researcher such as Hacker-X to want to share something that could easily be used to help secure a network, is understandable and legal. It’s not clear if he already had possession of the notes from Lorax’s research into OpenSSL, or if he actually obtained them on behalf of Hacker-Z, regardless, sharing information about a weakness in an encryption protocol is not illegal, as the Australian Government’s delays and recent charge droppings indicate.

Whether the police were directly involved in or only supervising the alleged hacks on AATP and the Indonesian government isn’t clear, but it has become very clear that they never had any evidence against Adam John Bennett, the Lorax. In an extraordinary judicial move they have dropped all of the charges against Bennett, but have come up with ten new charges that, they claim they will commit to at his next hearing in June. While on one hand it is great to think that the Lorax may end up getting the justice he deserves in a dismissal of all charges at his next hearing, what is maddening is the obvious and bald faced way in which the Australian Government is misusing the criminal justice system to keep him Bennett on the restrictive bail terms that prevent him from broadcasting his show, LoraxLive and his protest about the government’s data retention plan.

Matt DeHart – Military, Programmer, Activist

Matt DeHart – Military, Programmer, Activist

The case of Matt DeHart, a former U.S. drone pilot turned hacktivist, is as strange as it is disturbing. The 29-year-old was recently denied asylum in Canada, having fled there with his family after — he claims — he was drugged and tortured by agents of the FBI, who accused him of espionage and child pornography.

Prosecutors have shown they’re willing to say anything to convict a hacktivist, even if it means lying

Last week the Canadian Border Services Agency said he will be deported to the U.S. to stand trial “in very short order,” after a Canadian Immigration and Refugee Board ruling earlier this month denying his request for refugee status. He is being denied access to two thumb drives that he says contain evidence of illegal acts perpetrated by a U.S. government agency. Now after three unsuccessful attempts to gain political asylum, he fears that he and the files will be delivered to the very government he sought to escape.

“I cannot imagine any life in a country which has already tortured me,” Matt DeHart told reporter Adrian Humphreys, whose astonishing five-part series in Canada’s National Post documents the bizarre case. “Am I now to be given into the hands of my torturers?”

It’s tempting to dismiss DeHart’s claims based on their sheer outlandishness and his equally outlandish attempts to defect to Russia and Venezuela, which he now says he regrets. But given President Barack Obama’s administration’s penchant for punishing hacktivists and whistleblowers, a disturbing decades-long trend of prosecutorial misconduct and the now established fact that the U.S. has, as Obama put it, “tortured some folks,” it’s clear that the U.S. government’s claims in this case warrant even more skepticism.

Matt DeHart

According to government documents, Matt DeHart admitted during an interrogation to becoming involved with a spy ring during his time as a drone pilot, agreeing to broker the sale of military secrets for up to $100,000 per month through a Russian agent in Canada. But he claims he was being drugged and tortured and simply made the story up.

“I would have told them anything,” he told The National Post of his encounter with the FBI agents, during which he was denied a lawyer. “Information that is derived from torture — to use it against somebody is ridiculous. It’s garbage. I already said it’s not true.”

He testified that the agents admitted the child porn charges were fabricated — a ruse to enable investigation into his involvement with the nebulous hacktivist collective Anonymous. He says the investigation stems from a file he uploaded twice to a hidden website, hosted on the anonymous Tor network from a server in his parents’ house. DeHart claims it contained evidence of government wrongdoing, “an FBI investigation into the [CIA’s] practices.” Screen shots of the WikiLeaks website found on his computer suggest he intended to send the file to the whistleblowing organization.

After the asylum ruling earlier this month, three courts — two in the U.S. and one in Canada — have expressed strong doubts about the child pornography charges that triggered a search warrant onMatt DeHart’s parents’ home in the U.S. Those accusations date to 2008 and stemmed from his association with two teenagers while playing the online game “World of Warcraft,” one of whom was also involved with Anonymous; the charges were ultimately not proved.

After DeHart was arrested while crossing from Canada to the U.S. in 2010, a judge in Bangor, Maine, found it odd that prosecutors were suddenly citing the two-year-old porn accusations and that police hadn’t analyzed Matt DeHart computers for illicit files seven months after they were seized. A judge in Tennessee, where Matt DeHart ‘s family lived before moving to Canada, admitted that “the weight of the evidence is not as firm as I thought it was.” And most recently, the Canadian Immigration and Refugee Board concluded there was “no credible or trustworthy evidence” that DeHart had solicited child porn.

Prosecutorial misconduct helps the government railroad journalists, whistleblowers, hacktivists and any who dare to speak truth to power.

To be sure, Matt DeHart strange behavior throughout this ordeal doesn’t place him in a particularly flattering light. But it’s worth noting that these kinds of serious accusations are often made in cases against hacktivists and whistleblowers, helping place them in the government’s crosshairs and paint them as nefarious even when the accusations are easily disproved.

Barrett Brown, a journalist who investigated links between the U.S. government and private intelligence contractors, had all manner of ridiculous false accusations thrown at him before being sentenced last month to five and a half years in prison. He was initially charged for the innocuous act of copying and pasting a hyperlink to a public file stolen by Anonymous from one chat room into another. The charge was dropped, but the linking was still used to increase the length of his sentence, despite the fact that prosecutors had no evidence Brown had looked at the file or even known what was in it.

At one point, prosecutors claimed that Brown conspired with members of Anonymous to overthrow the U.S. government. They also accused him of participating in “SWATting,” the practice of making fake 911 calls to harass people in their homes, and even of plotting with another journalist to hack the Bahraini government. Not one of these claims was supported by the voluminous collection of chat logs that the government provided as evidence. Nor did additional logs obtained by The Daily Dot, which the prosecution had withheld under seal.

Brown was not entirely without fault in the case, having obstructed a search warrant and posted a YouTube video threatening an FBI agent in response to the seizure of his laptops. But in retrospect, it seems clear the impetus for the case was that the government saw Brown’s investigations as a threat and would say anything to guarantee his conviction, even if that meant knowingly making false statements. As Brown put it during his allocution, “This is not the rule of law … It is the rule of law enforcement.”

Close scrutiny

What can we expect from the Matt DeHart case if this is the prosecutorial legacy it follows?

As The New York Times editorial board recently noted, defendants have no recourse when police and prosecutors lie, cheat and conceal evidence in the courtroom, leading to what one federal judge has described (PDF) as a national epidemic of prosecutorial misconduct. Sometimes it leads to wrongful convictions. Other times, as in Brown’s case, it helps the government railroad journalists, whistleblowers, hacktivists and any who dare to speak truth to power.

Remember Aaron Swartz, an information activist who prosecutors pursued vigorously for the act of downloading too many academic articles from an MIT library? Much like in Brown’s case, prosecutors were accused of withholding evidence and coercing Swartz into taking a guilty plea. Swartz committed suicide in 2013 amid mounting legal costs and the possibility of up to 35 years in prison, triggering the DeHarts’ decision to flee the country.

“Aaron Swartz had very similar psychological makeup, similar age, same circumstances as Matt DeHart,” DeHart’s father, Paul DeHart, a retired U.S. Air Force major, told The National Post. “I do not want to wake up one day and find my son hanging from a rope in the garage of our house. And I have noplace to go to bring this to anyone’s attention.”

With Matt DeHart’s attempted defections and other erratic behavior, it’s admittedly difficult to determine where his true intentions lie. But the government’s actions against him have been just as sketchy, if not more so. His claims must be taken seriously, and his case should be closely scrutinized, lest another potential whistleblower fall prey to the state’s merciless war on leaks.

by Joshua Kopstein, a cyberculture journalist and researcher from New York City. His work focuses on Internet law and disorder, surveillance and government secrecy.

 

Barrett Brown – Journalist, Activist

Barrett Brown – Journalist, Activist

Barrett Brown is an American journalist, essayist and satirist. He is often referred to as an unofficial spokesperson for the hacktivist collective Anonymous, a label he disputes. He is credited with the creation of Project PM, a research outfit and information collective determined to expose agents of the corporate military spying apparatus. Brown’s large vocabulary and quick wit often make his thoughts a joy to read.

 

The Barrett Brown Review of Arts and Letters and Jail: A Funny Thing Happened on the Way to the Prison

The seven guys with whom I recently spent two months living in a small room at the Kaufman County Jail while awaiting transfer were in the distressing habit of compulsively watching local TV news, which is the lowest form of news. They would even watch more than one network’s evening news program in succession, presumably so as to get differing perspectives on the day’s suburban house fires and rush-hour lane closings rather than having to view these events through a single ideological prism.

One day, there was a report about a spate of bank robberies by a fellow the media was dubbing the Lunch Money Bandit after his habit of always striking around noon, when tellers were breaking for lunch. Later that week, there was another report on the suspect, accompanied by surveillance footage — and then, shortly afterward, he was actually brought in to our cell, having just been captured when the cops received a tip from a former accomplice who’d been picked up on unrelated charges.

Lunch Money was an affable twentysomething guy from New Orleans who’d lost his two front teeth fighting off a couple of assailants who’d tried to rob his family’s motel room after Katrina and had already done four years in federal prison for other bank robberies. He would have gladly taken a real job if he’d been able to find one, he said. Still, he conceded, “I just love robbing banks.” I couldn’t imagine what there is to love about such a career; this isn’t the old days when a bank robbery entailed brandishing a Tommy gun, dynamiting a safe, and tearing off in a stolen Model T roadster with your hard-drinking flapper girlfriend and a dozen cloth sacks adorned with dollar sign symbols. These guys today just sort of walk up to the teller and hand over a note to the effect that they have a gun (which they don’t — going armed carries a more serious charge, and there’s no point in bringing a gun to a bank that’s federally insured, even in Texas).

Drug dealers find bank robbers to be fascinating eccentrics and tend to pepper them with questions. One cocaine entrepreneur asked Lunch Money, “What if, like, when you handed her the note, the bitch just laughed in your face?”

“Man, that’d be fucked up,” he replied thoughtfully, visibly shaken by this potential revolution in human affairs.

One night, as we all lay in our bunks discussing the wicked world, Lunch Money proclaimed that Magic Johnson had never actually had HIV and that the whole thing had merely been a plot by the CIA, which had paid him handsomely to fake it so that he could later pretend to “recover” and the U.S. medical establishment could take credit for having developed such effective HIV treatments. As evidence, he noted that Johnson was inexplicably worth over a billion dollars. I debated with him about this for an hour. I’m not too bothered by my five-year prison sentence, as it will be neat to get out when it’s over and see to what extent video game graphics have improved while I was away, but I sure would like to get back the hour I spent arguing about Magic Johnson’s HIV status with the fucking Lunch Money Bandit.

***

The other day I was woken up at 4:30 am, escorted to a small, bare room, strip-searched, put in handcuffs and leg shackles, had a heavy chain wrapped around my midsection, and placed in the back of a dark and cage-lined van that looked like something from one of those Saw movies. But this was good news. It meant that, having recently gotten my ludicrous sentence, I’d now been “designated.” A crack team of specially trained federal prison picker-outers had chosen a facility for me. I was now to begin the multi-stage pilgrimage to the particular compound where I’ll be spending the next one to two years, depending on whether I get into any further trouble (so, two years).

For the majority of federal defendants, this Prisoner’s Progress, as I’m pleased to call it, entails “catching chain,” or being put on the weekly prison bus and taken to the federal inmate processing facility in Oklahoma, where the federal government has been sending its victims since the Trail of Tears. They’ll spend a week or so there before being shipped in turn to their designated prison. Prisons being far more humane than the amusingly horrid little detention centers where most inmates facing charges are kept until they inevitably give in and plea to a crime, this journey is viewed with fond anticipation by federal prisoners, who thus constitute the only population in human history among which it is common to be excited about the prospect of going to Oklahoma.

As for me, I’d rather rip off my own balls and mail them to Stratfor as restitution than set foot in a third-rate state like Oklahoma, regardless of what wonders may lie at the end of that particular rainbow, so it’s a fine thing that I was just going down the road to the Fort Worth Federal Correctional Institution, which will be my home for the next, er, two years. I know little of Fort Worth other than that it’s a lawless haven for half-caste Indian fighters and shiftless part-time cowhands looking to blow their greenbacks and Comanche scalps at one of the town’s countless Chinese-run opium dens, nor am I bothered by the possibility that what little I do know about the town may be 130 years out of date and racist. But I specifically requested that I be sent to this benighted city’s federal prison. For one thing, I’d already “toured the campus,” as it were, shortly after my arrest, when I spent two months at FCI Fort Worth’s jail unit so that the resident psychologists could subject me to a competency evaluation. (Based on their report, Judge Sam Lindsay declared me competent to participate in a trial, which is more than I can say for Judge Sam Lindsay.)

Fort Worth is also the only federal prison aside from FCI Seagoville that’s located near Dallas, and I’m pretty sure I’m still banned from that one, as noted in a prior column, and naturally I want to be close to my parents so that they can visit me with some regularity. My mom, a writer and editor and former flight attendant and South Texas beauty queen who once took me on a vacation to see a swimming pig at a place called Aquarena Springs, is a valuable fountainhead of media gossip, including which outlets are currently going down in flames (The New Republic, as it turns out), and always makes sure to let me know whether and to what extent my haircut is inadequate. Sometimes, if I happen to have a pimple, she insists on popping it right then and there in the visiting room, right in front of the other criminals. Note that I am 33 years old and, arguably, a hardened convict.

Likewise, my dad is my chief source of information regarding plot developments in what I gather to be a popular television program called The Blacklist, new episodes of which he details to me at great length at every opportunity, although I have never asked him for these reports or expressed any interest in the show whatsoever. Incidentally, when I was a kid, he took me on five different occasions to see a film called Hard Target in which the protagonist, ably portrayed by Jean Claude van Damme, finds himself hunted for sport by a wealthy fellow and his mercenary squad of professional trackers, all of whom he ends up killing in turn. My dad also gave me a promotional poster for this movie and, for years afterward, would turn to me and solemnly proclaim the film’s tagline, “Don’t hunt what you can’t kill,” which I suppose is as good advice as any.

Last time he came for a visit, he began to relate to me, apropos of nothing, the nature and potential killing power of some sort of subterranean supervolcano located at Yellowstone and the general circumstances under which it will someday explode and kill a great majority of North Americans, an event which he prophesied with obvious relish. It’s not that he’s one of those ecological mystics who despise humanity and long to see Mother Earth fight back against the ravages of industrial sentience or some such irritating thing. Quite the contrary. In my younger days, he would often drag me around East Texas and command me to assassinate deer and wild boars with rifles he would supply for the purpose, even though I had no ideological differences with any of these animals, and one time, when I was 17, he took me to East Africa to help him exploit the resident natural resources alongside a group of ex-military adventurers with whom we had somehow managed to attach ourselves (this expedition failed rather spectacularly), and lately he seems to have gotten involved in fracking. So he’s certainly no partisan of Nature. It’s just that he’s fond of power in its rawest forms, and if he smiles at the prospect of 400 million deaths, it is only because he feels that man is insufficiently reverent of this particular supervolcano, this god-made-manifest, which therefore has no choice but to lash out against us as punishment. He’s also a longtime pillar of the Dallas Safari Club and on at least one occasion of which I am aware was literally almost eaten by a lion. I could go on and on. Thankfully my parents are divorced, and so I usually only have to deal with these hyperactive Southern Gothic archetypes one at a time these days. Occasionally, though, they set aside their differences in order to come harass me together, and I eventually emerge from the visitation room looking haunted.

I wasn’t taken straight to Fort Worth from Kaufman County, as that would be too quick and easy and cost effective, the prison being less than a half-hour’s drive away; rather, I was taken to the federal courthouse in downtown Dallas to wait for another ride to the Mansfield jail, where I’d already spent much of 2013, and from which I’d eventually be taken to Fort Worth next time a U.S. Marshal happened to be going in that general direction. At the end of the day’s no doubt majestic federal court proceedings, I was placed back in the chew-your-arm-off-and-only-then-shall-I-give-you-the-key van for the ride over to Mansfield. In the rusty cage next to mine were two girls, shackled like I was, who had been to court that afternoon. One had been crying; she’d just been sentenced to eight years for conspiracy to distribute marijuana despite having originally been given reason to expect considerably less time, as she’d cooperated with the FBI. The agents had clearly found her testimony helpful, as they’d met with her a second time, but nonetheless they’d neglected to ask the judge for the sentence reduction they’d promised her in exchange. Like most drug dealers, this girl was in the habit of making and keeping bargains on the strength of her word and expected others to do likewise, but then she’d never dealt with the FBI before.

Just as she finished sobbing out her story, something rather incredible happened: the U.S. Marshal who was driving us back to the jail, having been listening to this account, apparently decided that he was sick of serving as another cog in a fascist system that literally places females in chains and ruins their lives over consensual non-crimes like selling marijuana, because he pulled over, stepped out of the van, came around the back, unlocked the girl’s cage, removed her chains and leg irons and handcuffs, gave her all the cash he had on him, kissed her on the forehead, and advised her to hitchhike to Mexico and then catch a flight to Europe, where she’d have another chance at life, far away from the all-seeing state that had sought to deprive her of her youth and freedom.

Just kidding. Actually he drove us to the jail while the girl cried in her cage.

***

Quote of the Day:

“Truth does not often escape from palaces.” —William Durant

***

Editor’s note: Barrett Brown has been incarcerated since September 2012. Go here to read earlier installments of “The Barrett Brown Review of Arts and Letters and Jail.” If you’d like to send him a book, here’s his Amazon wish list.

Barrett Brown #45047-177
FCI Fort Worth
P.O. Box 15330
Fort Worth, TX 76119

 

The Paypal 14 – Activists

The Paypal 14 – Activists

The-Paypal-14The PayPal 14 are a group of defendants allegedly connected with the hacktivist group Anonymous, thirteen of whom pled guilty in a San Jose court in California, United States in December 2013, to charges of conspiring to disrupt access to the PayPal payment service.are a group of defendants allegedly connected with the hacktivist group Anonymous, thirteen of whom pled guilty in a San Jose court in California, United States in December 2013, to charges of conspiring to disrupt access to the PayPal payment service.are a group of defendants allegedly connected with the hacktivist group Anonymous, thirteen of whom pled guilty in a San Jose court in California, United States in December 2013, to charges of conspiring to disrupt access to the PayPal payment service.are a group of defendants allegedly connected with the hacktivist group Anonymous, thirteen of whom pled guilty in a San Jose court in California, United States in December 2013, to charges of conspiring to disrupt access to the PayPal payment service.The-Paypal-14The PayPal 14 are a group of defendants allegedly connected with the hacktivist group Anonymous, thirteen of whom pled guilty in a San Jose court in California, United States in December 2013, to charges of conspiring to disrupt access to the PayPal payment service.are a group of defendants allegedly connected with the hacktivist group Anonymous, thirteen of whom pled guilty in a San Jose court in California, United States in December 2013, to charges of conspiring to disrupt access to the PayPal payment service.are a group of defendants allegedly connected with the hacktivist group Anonymous, thirteen of whom pled guilty in a San Jose court in California, United States in December 2013, to charges of conspiring to disrupt access to the PayPal payment service.are a group of defendants allegedly connected with the hacktivist group Anonymous, thirteen of whom pled guilty in a San Jose court in California, United States in December 2013, to charges of conspiring to disrupt access to the PayPal payment service.

Christopher Doyon – Hacker

Christopher Doyon – Hacker

Christopher-DoyonChristopher Doyon Chris Doyon (alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across the border into Canada.(alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across the border into Canada.(alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across the border into Canada.(alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across the border into Canada.(alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across the border into Canada.Chris Doyon (alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across the border into Canada.(alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across the border into Canada.(alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across the border into Canada.(alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across the border into Canada.(alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across the border into Canada.

Jake Davis – Hacker

Jake Davis – Hacker

Jake-DavisJake Davis Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. Jake Davis He has worked with AnonyJake-DavisJake Davis Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups. Jake DavisJake Davis Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups. Jake DavisJake Davis Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups. Jake Davis

Jeremy Hammond – Hacker, Activst

Jeremy Hammond – Hacker, Activst

Jeremy-HammondJeremy Hammond is a political activist and computer hacker from Chicago. He was convicted and sentenced in November 2013 to 10 years in US Federal Prison for hacking the private intelligence firm Stratfor and releasing the leaks through the whistleblowing website WikiLeaks. political activist and computer hacker from Chicago. He was convicted and sentenced in November 2013 to 10 years in US Federal Prison for hacking the private intelligence firm Stratfor and releasing the leaks through the whistleblowing website WikiLeaks. political activist and computer hacker from Chicago. He was convicted and sentenced in November 2013 to 10 years in US Federal Prison for hacking the private intelligence firm Stratfor and releasing the leaks through the whistleblowing website WikiLeaks.Jeremy-HammondJeremy Hammond is a political activist and computer hacker from Chicago. He was convicted and sentenced in November 2013 to 10 years in US Federal Prison for hacking the private intelligence firm Stratfor and releasing the leaks through the whistleblowing website WikiLeaks. political activist and computer hacker from Chicago. He was convicted and sentenced in November 2013 to 10 years in US Federal Prison for hacking the private intelligence firm Stratfor and releasing the leaks through the whistleblowing website WikiLeaks. political activist and computer hacker from Chicago. He was convicted and sentenced in November 2013 to 10 years in US Federal Prison for hacking the private intelligence firm Stratfor and releasing the leaks through the whistleblowing website WikiLeaks.Jeremy-HammondJeremy Hammond is a political activist and computer hacker from Chicago. He was convicted and sentenced in November 2013 to 10 years in US Federal Prison for hacking the private intelligence firm Stratfor and releasing the leaks through the whistleblowing website WikiLeaks. political activist and computer hacker from Chicago. He was convicted and sentenced in November 2013 to 10 years in US Federal Prison for hacking the private intelligence firm Stratfor and releasing the leaks through the whistleblowing website WikiLeaks. political activist and computer hacker from Chicago. He was convicted and sentenced in November 2013 to 10 years in US Federal Prison for hacking the private intelligence firm Stratfor and releasing the leaks through the whistleblowing website WikiLeaks.

Recommendations for the Hacktivist Community

Recommendations for the Hacktivist Community

Statement of Purpose

I have been observing the hacker and hacktivist communities, at times very
closely, for many years. The exact definition of “hacker” and “hacktivist”
varies from author to author, so I shall make my interpretation of these words
very clear. Let us define a “hacker” as someone who utilizes their knowledge of
computers and of computer networks to make money via illegitimate means. Let us
define a “hacktivist” as someone who utilizes their knowledge of computers and
of computer networks to do justice when justice is not done by the state. I
have found that these two communities are inextricably linked, yet remain
completely separate entities. Many hackers double as hacktivists in their spare
time, although most hacktivists do not fancy themselves hackers.

Although hackers turned hacktivists have the very best of intentions, and their
input and expertise is of great value to the hacktivist community, they have
inadvertently suppressed the potential of the very community they are trying to
aid. The get-in-get-the-goods-get-out methodology of the stolen credit card
driven hacker community that has been transfered to the hacktivist community
via ideological osmosis has tragically affixed blinders to it. It has caused
the hacktivist community to think linearly and strive to do nothing more than
to blindly infiltrate target organizations and immediately leak whatever data
they happen to stumble across. This must change. Stealing and leaking data
makes a point, but it is sometimes necessary to do more than just make a point,
to inflict real, measurable damage. In certain, extreme cases an organization’s
disregard for human rights warrants its immediate and complete obliteration.

In this essay, I will discuss a multitude of ideological, operational, and
technical changes that ought to be made to the hacktivist community. These
proposed changes have been derived from my personal observations. Some will
find the ideas contained within this document to be the product of common
sense. I have found these people to be few in number. If the community accepts
my suggestions it will not only become more effective, but the risks associated
with participating in it will be drastically lowered. My intent in writing this
is not to aid criminals, but rather to aid people who wish to do battle with
governments and corporations that have become criminals. If freedom is to
remain on this earth, its people must be willing and able to take arms to
defend it, both physical and digital.

faceless-men

 

 

 

 

 

 

 

Personal Security

Sound operational security is the foundation from which all effective
cyber-offensives are launched. You should, at all times, put your own, personal
security above the success of your operations and interests. The security
precautions taken by most hacktivists I have met are mediocre at best, and
needlessly so. Maintaining sound personal security is by no means difficult. It
requires much caution but very little skill. I have devised a series of
security precautions that hactivists should take and divided them up into six
main categories: environmental, hardware, software, mental, pattern related,
and archaeological. We shall examine each individually.

(1) Environmental:

There are but two places you can work: at home or in public. Some people insist
that working at home is best and others insist that working in public is best.
The proper working environment debate has been raging on in the hacker
community for quite some time now, and has great relevance to the hacktivist
community, as most governments view hackers and hacktivists as one in the same.
Proponents of the “work in public” argument claim that by always working at a
different public location, you significantly lower your chances of being
apprehended. They argue that even if the authorities are able to trace many of
the cyber-attacks you took part in back to the public places where you took
part in them from, that does not bring them any closer to finding you. Most
retail stores and coffee shops do not keep surveillance footage for more than a
year at the most, and even if the authorities are able to get a photo of you
from some security camera, that does not necessarily lead them directly to your
front door, especially if you wore a hoody the entire time you where working
and the camera never got a clear shot of your face. On the other hand,
proponents of the “work at home” argument argue that the risk of being seen and
reported, or merely recorded while working in a public place far outweighs the
benefits of the significantly large increase in anonymity that working in
public provides. Both sides have legitimate points, and I urge you to consider
both of them.

If you decide to work in public, the number one threat you face is other
people. Numerous large criminal investigations have been solved using the
observations of average everyday citizens who just happened to remember seeing
something suspicious. If people sense that you are trying to hide something,
they will watch you more closely than they would otherwise. It is important to
always “keep your cool” as the old saying goes. Always try to sit in such a way
that your screen is facing away from the majority of the people in the room you
are sitting in. Corners are your friend. Try to blend in with the crowd. Dress
in plain cloths. Draw no attention. If you are in a coffee shop, sip some
coffee while you work. If you are in a burger joint, buy a burger. If you are
in a library or book store, set a few books beside your laptop. Also, be very
aware of security cameras, both inside the establishment you are working in as
well as on the street near it. Being captured on film is alright as long as the
camera can not see what is on your screen. Some store cameras are watched by
actual people who will undoubtedly report you if they find out what you are
doing. More and more governments are starting to place very high quality CCTV
cameras on their streets to monitor their citizens, and these devices can be a
problem if they are peering over your shoulder through a window you are sitting
beside. When working in public, it is possible that you may have to confront a
law enforcement officer face to face. Law enforcement officers can smell
uneasiness from a mile away, and if you look like you are up to no good it is
possible that a cop will come and talk to you. Always have some sort of cover
story made up before you leave home to explain why you are where you are. If
you are forced to confront a law enforcement officer you should be able to talk
your way out of the situation.

If you decide to work at home, the number one threat you face is your own ego.
Just because you are at home does not mean that your working environment is
secure. Be aware of windows in close proximity to your computer as well as your
security-illiterate or gossipy family members. Security issues in relation to
network configuration begin to come into play when you work at home. If your
computer were to somehow get compromised while you are working at home,
perhaps by your government, it would be nearly impossible for the person or
group of people rummaging around inside of your system to get your actual IP
address (provided that you adhere to the software security guidelines that we
will discuss later). However, if your wi-fi password (or the name of your
printer, or the name of another computer on the network) contains your actual
last name and part of your address, tracking you down becomes very easy. A lot
of people name their network devices and structure their network passwords in
this way.

It is also possible that if an attacker that has infiltrated your computer
notices other machines on your network they can pivot to them (infect them with
malware using your computer as a spring board of sorts) and use them to get
your IP address. A lot of Internet enabled household devices have cameras on
them (your smart TV, your Xbox, and your high tech baby monitor to name a few)
and said cameras can potentially be leveraged against you. It is in your best
interest to not have any other machines running on your home network while you
are working. Also, change your wi-fi password every once in awhile and make
sure that the password on the administrative interface of your router is
something other than the out-of-the-box default. If your computer gets
compromised, logging into your router using username “admin” and password
“admin” is elementary for a moderately skilled attacker. Most modern routers
list their WAN IP address on their control panels.

Regardless of where you decide to work, be aware of mirrors and glass picture
frames near your workplace. In the right light, both of these items have the
potential to reflect crystal clear images of your screen to onlookers across
the room. In addition to this, understand that modern cell phones are your
worst enemy. Not only are they always going to be the weakest link in your
security setup, but if they are somehow compromised they are equipped with a
camera and microphone. Recent studies suggest that it is possible for smart
phones to listen to the high pitched noise your CPU makes and deduce your PGP
private key. Furthermore, the metadata collected by your phone coupled with
pattern analysis techniques could potentially allow your government to link
your real life and online personas together after some time. We will discuss
this in depth later. Leave your phones at home and if possible keep all phones,
yours or otherwise, far away from your computer. Other portable devices such as
iPods and tablets potentially pose the same risk that phones do and should be
treated the same.

(2) Hardware:

Modern computers come equipped with microphones, speakers (which can be used as
microphones under the right circumstances), and cameras. All of these features
can potentially be leveraged to identify you if your computer is compromised.
To mitigate these risks, these features should be physically removed. Your
computer’s microphone and speakers should be ripped out of it, but you should
not rip out your web cam, as it will alter the outward appearance of your
computer and potentially draw attention to you. Instead, open your computer’s
screen and snip the wires that connect to your web cam. Wrap the ends of the
wires in electrical tape so sparks do not jump in between them. If you must
listen to an audio file while working, use headphones. Only keep your
headphones plugged into your computer when you are using them. The computer you
use for your hacktivist activities also should not contain a hard drive, as
they are unnecessary for our purposes.

(3) Software:

Always use a TOR enabled Linux live system when working. At the present moment,
Tails (The Amnesiac Incognito Live System) is by far the best live distribution
for your purposes. You can read more about TOR at www.torproject.org and you
can read more about acquiring, setting up, and using Tails at tails.boum.org.
The Tails operating system lives on a USB flash drive. Every time you start up
your computer, you must first insert your Tails flash drive into it. The Tails
website will guide you through making said flash drive. Tails will
automatically direct all of your outgoing traffic into the TOR network in an
effort to hide your IP address. If you use Tails you will be completely
anonymous and be able to work with impunity provided that:

* You keep your Tails USB up to date. New versions of the Tails
operating system are released every few months.

* You do not login into your “real world” accounts while using Tails.
Do not check your Twitter feed while you are working.

* You do not use Tails to create an account with an alias that you have
used before. If you have been “0pwn” for the past seven years, now
is a good time to stop being 0pwn.

* You do not alter Tails’ default security settings. They are the way
they are for a reason.

* You do not use Tails to create an online account with a password that
you have used before. Doing this only makes deanonymizing you easier.

* You do not install and use random packages that “look cool”; they
could be miscellaneous. Only use packages and scripts that you trust.
Tails is not bullet proof.

* If you decide to set a sudo password when starting up Tails, make
sure that it is very strong.

* You stay conscious of metadata analysis techniques. We will discuss
these later.

* You switch exit nodes every ten to fifteen minutes. This can be done
by double clicking the little green onion in the upper right hand
corner of your Tails desktop and hitting the “Use a New Identity”
button.

* You follow the communication guidelines laid out later in this
document.

More information can be found on the Tails warning page: https://tails.boum.org/
doc/about/warning/index.en.html. Be aware that it is very easy for your ISP
(which is probably working closely with your government) to tell that you are
using both TOR and Tails. It is probably in your best interest to use something
called “TOR bridge mode”. You can read more about how to configure Tails to
use TOR bridges here: https://tails.boum.org/doc/first_steps/startup_options/
bridge_mode/index.en.html.

Tails is unique in that it has a special feature that wipes your computer’s
memory before it shuts down. This is done in order to mitigate risks associated
with the dreaded “cold boot attack” (a forensics method in which a suspects RAM
is ripped out of his or her computer and then thrown into a vat of liquid
nitrogen to preserve its contents for later analysis). This feature is also
triggered if you pull your Tails flash drive out of your computer while you are
working. If while you are working you ever feel that the authorities are about
to move in on you, even if you have a seemingly irrational gut feeling, yank
your Tails flash drive out of your computer. Tails also has a feature that
allows it to disguises itself as a Windows desktop. Using this feature in
public will reduce your risk of capture significantly.

(4) Mental:

A skilled attacker is well disciplined and knows that he must keep his actions
and skills a secret in order to remain safe from harm. Do not flaunt the fact
that you are dissatisfied with your government, a foreign government, or a
particular corporation. Do not attend protests. Do not publicly advertise the
fact that you have an above average aptitude for computer security offensive or
otherwise. And whatever you do, do not tell anyone, even someone you think you
can trust, that you are planning to launch an organized cyber-attack on any
organization, big or small. If you draw attention to yourself no amount of
security precautions will keep you safe. Keep your “real” life mentally
isolated from your “hacktivist” life. One lapse in operational security could
end you.

Be alert and focused. Remain mentally strong. Come to terms with the illegality
of your actions and what will happen to you if you are apprehended. As a wise
man once said, “A warrior considers himself already dead, so there is nothing
to lose. The worst has already happened to him, therefore he’s clear and calm;
judging him by his acts or by his words, one would never suspect that he has
witnessed everything.” It is perfectly acceptable to be paranoid, but do not
let that paranoia consume you and slow your work. Even if you are extremely
cautious and follow this document’s advice to the letter, you still may be
hunted down and incarcerated, tortured, or killed. Some countries do not take
kindly to hacktivists. It is best that you be honest with yourself from the
beginning. In order to operate effectively you must be able to think clearly
and see the world as it actually is.

(5) Pattern Related:

When your online persona is active your real life persona ceases to exist, and
an observant adversary can use this to their advantage. If your ISP, bank, and
mobile phone provider are “cooperating” with your government and allowing them
to browse through all of their records (a fair assumption in this day and age)
then, eventually, they will be able to deduce your real identity by comparing
everyone’s data to information about your online persona. If the government
looks backs on all of the records they have collected in the past year and
notice that you never make a credit card purchase, watch Netflix, go on your
Facebook, Google, or Twitter account, or change your physical location while
1337Hax0r64 is online on some anti-government forum on the deep web, they will
assume that you are 1337Hax0r64. Even information about your home network’s
bandwidth usage can give away your real identity.

Luckily, performing the type of metadata analysis attack described above takes
time, usually many months. It is very important that you change aliases often,
preferably every three or four months. Shed your old names like a snake sheds
its skin. When you do change your online name, make sure your new identity
can not be tied back to your old one.

DO NOT not launch cyber-attacks from your own computer. Launch attacks only
from hacked servers, servers purchased with washed bitcoins, or free shell
accounts. Certain types of cyber-attacks produce a large amount of traffic over
a short amount of time. If the bandwidth usage of your home network spikes at
the same instant that a government or corporate server is attacked, the time it
takes to deanonymize you is reduced significantly. This is especially true if
you launch multiple attacks on multiple occasions. Launching attacks in this
way can be mentally exhausting. Configuring a new attack server with your tool
set every time your old attack server is banned (an inevitable occurrence) can
be a tedious task indeed. I personally recommend creating a bash script to
automatically install your favorite tools to make this transition process
easier. Most hackers and offensive security professionals use under thirty
non-standard tools to do their job, so configuring a new server with everything
you need should not take very long if you know what you are doing. Consider
equipping your server with TOR and a VNC server (for tools that require GUIs
such as most popular intercepting proxies) as well.

(6) Archaeological:

You must insure that there is no forensics evidence of your actions, digital or
otherwise. If the government breaks into your house and rummages through your
things, they should find nothing interesting. Make sure that you never make any
physical notes pertaining to your hacktivist activities. Never keep any
computer files pertaining to your hacktivist activities in your home. Keep all
of your compromising files, notes, scripts, and unusual attack tools (the ones
that can not be installed with apt-get or the like), and stolen information in
the cloud. It is recommended that you keep all of your files backed up on
multiple free cloud storage providers so that in the event that one of the
providers bans your account you still have all of your data. Do not name your
cloud accounts in such a way that they can be connected back to your online
persona. Never, under any circumstances, mention the names or locations of your
cloud accounts to the people you work with. Always hit the “Use New Identity”
button on your TOR control panel after accessing your cloud storage solutions.
Every time you shed your old alias, shed your old cloud accounts.

Security of Communications

The majority of hacktivists I have met communicate via public IRC. Using IRC is
fine for meeting other hacktivists, but as soon as you muster a team of other
hacktivists who wish to attack the same target as you, move to another more
secure form of communication. Some means of communication are more secure than
others, but completely secure communication does not exist. The following
guidelines are meant to work in conjunction with the personal security
guidelines that where discussed in the previous section. If proper personal
security measures are implemented effectively, compromised communication will
result in operational failure at worst and not complete deanonymization. Since
operational failure may very well set you and your cause back several months,
it is in your best interest to attempt to communicate securely:

* Remember that any of the people you meet on the clearnet, deep web,
or public IRC channels who claim to be on your side could actually
be government agents trying to sabotage your operations.

* If possible, communicate mainly via privacy friendly email accounts
(not Gmail, Yahoo, AT&T, etc.) and encrypt all of your messages with
PGP. When a cyber-attack is being carried out it is often necessary
to be able to communicate with your accomplices instantaneously.
Since encrypting, sending, receiving, and decrypting messages by hand
takes time, using PGP in time sensitive situations like this is not
feasible. If you have to confer in an IM environment, use a program
like TorChat that uses its own form of asymmetric encryption to send
and receive messages instantly.

* Use strong passwords for all of your online accounts. The best way to
make a strong password is to pick eight or nine random words and
string them together. Passwords like this are easy to remember but
hard to guess.

* Never give away any personal information (such as country, interests,
hobbies, health, etc.) or give insight into your feelings or
emotions. Your fellow hacktivists are not your friends and should
never be talked to as such. Giving away this sort of information will
make tracking you easier.

* When you receive messages, do not retain them, even if they are
encrypted. Read them, make note of any hard to remember details
(like long server passwords for example), and then delete them.
Having a mile long digital paper trail can not lead to anything good.
In some cases deleted messages on email serves can be recovered via
computer forensics, but deleting messages quickly may reduce the odds
that they can be.

* When typing messages, do so in a word processor on your computer.
Never write your message inside of a communication program (such as
an online email client, forum PM box, etc.). People have been known
to accidentally send unencrypted messages before. The effects of such
an error can be devastating.

* If you find yourself writing large swaths of text intended for public
release (like essays or manifestos) use a tool like Anonymouth to
obscure your writing style. Your writing style is as unique as a
finger print and can be used to identify you.

* Never, under any circumstances, execute a file on your computer or on
your server that has been given to you by a fellow hacktivist. You
should never run into a situation where doing this is necessary.

* Do not disclose information about your involvement in previous
hacktivist operations to people who where not also part of the same
operation.

* If one of the people that you are working with gets captured, assume
that the people who have captured them know everything that they do.

Philosophy of Attacking

The hacktivist community, like every community, has its own unique set of
philosophical musings, taboos, and dogmas. While I do not advocate the severe
alteration of the principles and philosophies on which the community was built,
I do wish to point out a number of flaws in certain aspects of their
composition. These flaws serve only to hold back the community and should be
openly discussed.

(1) When hacktivists target an organization, their goal is more often than not
to force said organization to stop functioning permanently, or at least for the
longest time possible, in an effort to stall unjust actions from being carried
out or to seek retribution for unjust actions done in the past. Leaking
databases, DoXing influential individuals, defacing websites, and launching
massive DDoS campaigns, four of the modern hacktivist community’s favorite
activities, accomplish this goal – to an extent. Infiltrating a target
organization and sowing discord within its ranks is magnitudes more effective
than leaking credit card numbers or putting a CEO’s social security number on
Pastebin, yet it is rarely, if ever, considered to be a viable course of
action. Subtly and silently fostering suspicion and distrust inside of your
target will have a longer lasting impact than simply pointing out that its
security policy has some weak points.

(2) Hacktivists crave publicity, yet they are the most effective when they
operate undetected. Stay hidden. Although it may seem tempting at times, do not
destroy large amounts of information on your target’s computers or servers.
Doing so will announce your arrival inside of your target’s network rather
loudly. Flashy, public displays of power have no place in the hacktivist
community. Just because you are hiding behind TOR does not mean that you should
not make an effort to cover your tracks. Conceal your attack not to mask your
identity, but to convince your target that no attack was carried out in the
first place.

(3) Once your hacktivist collective has decided to attack an organization,
strike fast and strike hard. Overwhelm your target. A well disciplined and well
organized team of attackers can penetrate most networks within a few hours.
Far too often I have seen hacktivist collectives declare all out war on someone
and then attack them slowly and gain entry into their network days, sometimes
even weeks later. By attacking slowly, you give your target time to react and
strengthen their defenses. Detecting an attack from a large hacktivist
collective is a trivial task, but as history has shown detecting the presence
of one inside of a network, especially a large network, can be tricky.

(4) Cyber-attacks seldom go as planned. If you are attempting to do anything
that involves the coordination of more than two people, keep this in mind. It
is not uncommon for tools to stop working in the middle of an attack. It is not
uncommon for reverse shells to die unexpectedly. It is not uncommon for
seemingly simple actions to take hours to perform. You must be ready to think
on your feet and quickly adjust your attack plan to accommodate the ever
changing conditions within the network you are attacking. Predefined
contingency plans are mostly useless.

(5) Remember that no system is impenetrable. On more than one occasion I have
seen hacktivists give up on trying to infiltrate a target network because their
Nessus scan did not yield any useful results. As a hacktivist, you are not
bound by the typical constraints of a pentester. If you can not successfully
attack a website, try attacking its hosting provider. Try attacking the
administrator’s email account. Try going after random social accounts belonging
to the administrator’s family. Try planting iframes in websites you suspect the
administrator frequents in an effort to infect him. If you cause extensive
collateral damage, who cares? It is not your problem. Sometimes the ends
justify the means. Be creative.

(6) Many hacktivists possess unrealistic, self-constructed mental images of the
ideal cyber-attack. In the majority of these movie-induced delusions, the ideal
attack utilizes numerous 0days, an arsenal of home made tools, and highly
advanced, unimaginably complex network intrusion techniques. In reality, this
type of thinking is incredibly dangerous and causes some hacktivists to attempt
to perform convoluted, elaborate attacks to gain the respect of their peers.
When breaking into highly secured networks, such attacks only draw unnecessary
attention. The best attacks are the ones that work. They are usually simple and
take little time to execute. Using sqlmap to spawn a shell on your target’s
server by exploiting a flaw in their website’s search feature is a viable if
not ideal attack. It allows you to access the inside of your target’s network.
Exploiting a vulnerable FTP daemon on one of your target’s servers using public
exploit code is a viable if not ideal attack. It allows you to access the
inside of your target’s network. Using Metasploit in conjunction with a fresh
Gmail account to launch a phishing campaign against your target’s employees is
a viable if not ideal attack. It allows you to access the inside of your
target’s network. The media hates it when hacktivists use open source software
to do their work. Whenever a hacker or hacktivist is arrested for doing
something that involved using “someone else’s” tools, they are publicly
shammed. “Anyone could have done that” they say. “He’s just an unskilled script
kiddie” they say. Claiming that someone is less of a hacker solely because they
partially depend on someone else’s code borders on absurd. It amounts to
claiming that Picasso is a bad artist because he did not carve his own brushes,
synthesize his own paints, and weave his own canvas. Do not shy away from using
open source tools and publicly available information to accomplish your goals.
Hacking is an art, and nmap is your brush.

Organization and Formation

Most of the hacker and hacktivist groups I have observed are unorganized and
undisciplined. They claim to perform actions as a collective, yet when it comes
time to actually launch an attack they attempt to infiltrate their targets as
individuals, each member launching attacks of their own without making the
faintest attempt to coordinate their actions with others. Here I shall describe
a schema that could be easily adopted by any hacktivist collective to allow it
to facilitate highly coordinated attacks involving large numbers of attackers
with great ease. It will be presented as a series of steps.

Step One: Organize yourselves into multiple small groups. These groups shall be
referred to as strike teams. The ideal strike team is composed of three parts
attack specialists, two parts social engineering specialists. Attack
specialists should at least be able to identify and competently exploit
potential vulnerabilities in websites and be able to exploit vulnerable or
misconfigured services. Social engineering specialists should have at least
some real world experience before participating in a strike team. Attack
specialists should only concern themselves with launching attacks and social
engineering specialists should only concern themselves with social engineering.
Well-defined roles are the key to a strike team’s success. This configuration
will often create an abundance of social engineering specialists, and that is
perfectly acceptable. Having the capability to immediately launch multiple well
planned social engineering campaigns is crucial. The size of a strike team
will be determined by the skill of its members. Highly skilled individuals
should work in very small strike teams (five member teams are acceptable)
whereas unskilled individuals should work in larger strike teams (up to a few
dozen). The organization of strike teams should be coordinated as a collective.
No one person should be given the authority to sort people themselves. Strike
teams should function as “sub collectives” and be autonomous. Hacktivist
collectives are composed of people around the world, most of whom can not be
online all the time. This means that all strike teams should set themselves up
knowing that their members will pop on and offline and that it is possible new
members will have to be annexed at a later time.

Step Two: Within each strike team, agree upon a stratagem; a broad, realistic,
nonspecific plan of action that aims to accomplishes one, very specific goal.
Strike teams should only execute one stratagem at a time. Multiple strike teams
within the same hacktivist collective can execute different stratagems at the
same time in an effort to accomplish some sort of final goal (perhaps to
destabilize an organization or to acquire trade secrets). The next section of
this essay is devoted solely to exploring the concept of stratagems and how to
best form and use them. Strike teams should be allowed to do what they want,
but their initial stratagem should be approved by the collective so that no two
strike teams attempt to do the same thing at the same time.

Step Three: As a strike team, map your target’s attack surface. If multiple
strike teams are all attacking the same network, they should share information
very closely in this step. It is very possible that multiple strike teams
working together to accomplish the same goal could actually be attacking
different networks, in which case mapping should be done within individual
strike teams. Each member of a given strike team should attempt to map the
target network themselves, and then members should compare information. It is
very unlikely that anything will be overlooked by every single member of the
team.

Step Four: Divide your target network up into manageable chunks and assign
certain individuals within your team to each one of those chunks. Efficient
devision of labor is key to launching speedy attacks. Here is an example
involving a network composed of four servers (two SQL servers, a DNS server,
and a web server hosting a feature rich corporate site) and a strike team
composed of six attack specialists and four social engineering specialists:

* Have one attack specialist attack the SQL and DNS servers.

* Have one attack specialist attack the website’s multistage user
registration mechanism and login mechanism.

* Have one attack specialist attack the contact and session management
mechanism.

* Have one attack specialist attack any forms not assigned to other
attack specialists as well as any other potentially exploitable
scripts, pages, or mechanisms.

* Have one attack specialist and two social engineering specialists
attempt to launch some sort of phishing champaign against the
company’s employees.

* Have one attack specialist and two social engineering specialists
attempt to convince the company’s hosting provider that they are the
rightful owners of the company’s four servers and have been locked
out of their email account.

Step Five: Drill yourselves. This step is optional but highly recommended.
Procure a server with a large amount of RAM and multiple processors. Have one
member of your strike team set up a virtual network on it that, to the best of
your knowledge, mimics the network you are planning to attack. This one team
member should not participate in the drills themselves, and they should not
give other team members details pertaining to the virtual network. If you are
planning on attacking a large cooperation, set up the virtual network like a
large cooperate network with a labyrinth of firewalls, routers, switches, and
domain controllers. If you are planning on attacking a small cooperation or
home business, set up your network accordingly. You should never have to
visualize more than 12 workstations, even if your team is doing a complex
pivoting exercise. As a group, attempt to break into your virtual network and
execute your stratagem. The virtual network should be deliberately
misconfigured so that there is a way for your team to infiltrate it and
accomplish their simulated goal, but the misconfigurations should be extremely
subtle. The team should have to work very hard to find them. Run multiple
drills. After each drill, the misconfigurations in the network, and potentially
the layout of the network itself, should be altered to force your team to
attack it in a different way or to exercise a different skill. The purpose of
these drills are two fold. Firstly, they allow your team members to get
accustomed to working together. Secondly, they will prepare your team for the
day when they actually go up against your real target network.

Step Six: Execute your stratagem on your target network. Your strike team
should attack methodically and silently. Every member should know what they
need to do and how they need to do it. No mistakes should be made. Every tool
you use should be well honed and function flawlessly. Not a second should be
wasted. Use time to your advantage. Your target organization will be the most
unprepared for an attack in the middle of the night when all of its IT staff
are at home sound asleep. If your stratagem calls for being embedded in your
target network for a long period of time, tread very lightly once you
infiltrate it.

Interlocking Stratagems in Theory

In this section I will give multiple examples of stratagems that an actual
strike team could make use of. You should combine multiple stratagems to
accomplish your ultimate goal. Individual stratagems are like pieces of a
jigsaw puzzle, and are intended to be pieced together. A strike team should
execute multiple stratagems in succession, possibly in cooperation with other
strike teams in an effort to accomplish a common goal. This section is not
intended to be a play book. I encourage you to build off of my stratagems or,
better yet, devise your own. Some stratagems are:

(1) Collect information on individuals within the target organization. Mount a
phishing campaign against the organization and gain access to as many
workstations as possible. Once you have breached its network, do not pivot.
Attempt to locate any useful information on the workstations you have
compromised, and then remain in the network for as long as possible doing
nothing more than idly gathering intelligence.

(2) Take complete or partial control over the target organization’s main means
of communication (usually email). Review a few of their messages and learn how
they are structured and formatted. Then, send a number of blatantly false
messages to one or more members of the organization using the credentials of
another member of the organization. Multiple false messages should be sent over
some period of time. When members of the organization begin to receive false
messages from their colleagues, distrust will begin to take root.

(3) Take complete or partial control over the target organization’s main means
of communication (usually email). Review a few of their messages and learn how
they are structured and formatted. Then, devise some way to intercept and
inspect or modify messages in transit within the target organization
(essentially, perform a man in the middle attack). Every once in awhile, alter
a message in a subtle but disruptive way. Perhaps change a date or a time so
certain individuals do not arrive at their meetings on time or do not arrive at
all. Once you have reason to believe that your modifications have taken their
toll (i.e. the person you targeted missed their meeting), undo the changes you
made to the message you intercepted so upon audit it appears as though the
message was never tampered with. Doing this is usually hard to detect and will
slowly cause the target organization to destabilize itself as tensions between
individuals within it begin to rise and their employees begin to question their
own sanity.

(4) Take complete or partial control over the target organization’s main means
of communication (usually email). Review a few of their messages and learn how
they are structured and formatted. Use the credentials of a high ranking
individual within the target organization to distribute a message that appears
to be from them that claims a terrible tragedy has occurred that warrants an
immediate, brash, resource intensive response from the rest of the
organization. You will most likely not be able to pull this off more than once.
This stratagem works especially well against militant groups with poorly
defined command structures but has other applications as well.

(5) Once inside of the target organization’s network, acquire a small amount of
classified data intended for the eyes of high ranking personnel only.
Strategically plant the data on the computer of one or more lower ranking
individuals. Make it look like an espionage attempt. If many key individuals
within the target organization are accused of trying to siphon out its secrets,
it will be forced to suspend a large portion of its operations while an
investigation is done.

(6) Use a DDoS attack to disrupt the target organization’s communications for a
short period of time when they are most in need of it. For a corporation, this
could be during an important international Skype call. For a government, this
could be immediately following a devastating attack from an insurgency group.
Doing this will cause panic, which will make the target organization
temporarily more susceptible to other kinds of attacks.

(7) Pose as a legitimate company selling legitimate software and befriend the
target organization. Create a piece of software with a very hard to detect
security flaw in it and sell it to them. The flaw could be as simple as a
poorly implemented encryption library or as complex as an insecure multistage
parsing algorithm. It must be incredibly subtle. So subtle that if it is
detected you will be able to write it off as unintentional. It should be
plausibly deniable. Once the target organization installs the vulnerable
software on their machines, leverage it to perform targeted attacks on key
individuals within it. Do not use it to infect entire subnets, as that will
draw to much attention.

(8) Locate a small software provider your target organization already does
business with and infiltrate their network by using other stratagems. Modify
their source code slightly so that their software becomes vulnerable to remote
attack. Do not modify just any code you come across, study the software
provider’s development process and target code that has already been checked
for bugs and is days away from being released to customers. When the target
organization installs the latest version of software from the company that you
have infiltrated, they will become vulnerable. Leverage this vulnerability to
perform targeted attacks on key individuals within the target organization. Do
not use it to infect entire subnets, as that will draw to much attention.

(9) Locate a small software provider your target organization already does
business with and infiltrate their network by using other stratagems. Most
software companies offer rewards to security researchers who find
vulnerabilities in their products. Determine how reported vulnerabilities are
managed by the company you have infiltrated and devise a way to monitor them
in real time. As soon as a security researcher reports a major vulnerability
in a product your target organization uses, use it to perform targeted attacks
on key individuals within it. Do not use it to infect entire subnets, as that
will draw to much attention.

(10) Using other stratagems, infiltrate the computers of a number of influential
individuals within the target organization. Monitor their activity constantly
and closely. If possible, listen to them through their computer’s microphone.
When you believe that one of them has left their computer, undo things they
have just done. Delete the last sentence they wrote. Hit the back button on
their web browser. Close the program they just opened. Over time, this will
lead them to question their sanity.

(11) Using other stratagems, infiltrate the computers of a number of influential
individuals within the target organization. Most modern governments and
corporations are at least partially corrupt. Find evidence of this corruption
and use it to compel one or more of these influential individuals to aid your
cause. If you are unable to find any evidence of corruption, do not be afraid
to bluff. If you make a mysterious window pop up on, say, a CFO’s computer that
alludes to some sort of dirty secret, it is very possible that the CFO will
assume that the hacker who caused the widow to appear knows something about
them that they actually do not. A lot of powerful people have skeletons in the
closet. The media has instilled a fear of hackers into the general populace,
and this fear can be used to your advantage. Most normal people, upon being
confronted by a hacker that has gained complete control of their computer, will
be inclined to believe plausible sounding white lies. Having an “inside man”
within your target organization can be extremely useful.

Interlocking Stratagems in Practice

In this section I shell present an example of a plausible situation that could
warrant the involvement of hacktivists and a corresponding attack loosely built
upon the stratagems from the last section. I have tried to make the situation
realistic, but it is very likely that if you use my writing to plan and execute
your own attack it will play out nothing like the attack depicted below. Most
actual attacks are far more complex than the one presented here. The purpose
of this example is to demonstrate the way in which multiple strike teams should
work together. Notice how at all times each team has one or more specific
goals.

Situation: A hacktivist collective has decided to attack the terrorist
organization Bina Al-ar-mal after they captured and executed a tourist in
Syria. Bina Al-ar-mal is believed to consist of over 40,000 people, has
hundreds of public Twitter feeds and Facebook accounts, and runs a small
terrorist news site hosted on a Russian server. It has three known leaders, who
we shall refer to as Head Terrorist 1, Head Terrorist 2, and Head Terrorist 3.
Twenty-seven hacktivists have joined the effort. They have been split into
three teams: team 1 consists of five of the most highly skilled hacktivists,
team 2 consists of seven moderately skilled hacktivists, and team 3 consists of
fifteen amateur hacktivists.

Time Line:

(Day 1, Hour 1) Team 1 is initially tasked by the collective with infiltrating
as many terrorist Twitter and Facebook accounts as possible. The team starts
enumerating the accounts immediately. They decide that no drill will be
executed, as breaking into Facebook and Twitter accounts is a trivial task.

(Day 1, Hour 1) Team 2 is initially tasked by the collective with infiltrating
the web hosting provider hosting the terrorist group’s website. They begin
reconnaissance.

(Day 1, Hour 1) Team 3 is initially tasked by the collective with attacking
Bina Al-ar-mal’s website directly. They begin to map the website.

(Day 1, Hour 2) Team 1 finishes enumerating the terrorist Facebook and Twitter
accounts. They begin attempting to break into them.

(Day 1, Hour 2) Team 3 finishes mapping Bina Al-ar-mal’s website and begins to
attack.

(Day 1, Hour 3) Team 1 has breached a few terrorist Facebook and Twitter
accounts. After examining their contents they determine that the terrorists
are using SpookyMail email service to communicate off of social media. A few
terrorist email accounts are identified and the team begins to try to break
into those as well.

(Day 1, Hour 3) Team 3 gains read/write access to a limited portion of the
server Bina Al-ar-mal’s website is hosted on. The other teams are alerted.
They set up a simple php based IP logger script to capture the IP addresses of
Bina Al-ar-mal members attempting to check their organization’s news feed.

(Day 1, Hour 6) Team 2’s reconnaissance ends. They have located the web hosting
provider and gathered information on said provider’s website and servers. They
begin attacking them.

(Day 1, Hour 7) Team 1 breaches their first few terrorist email accounts.

(Day 1, Hour 9) Team 2 locates a vulnerability in the the terrorist’s web
hosting provider’s website. They are not able to fully compromise any of their
servers, but they are able to get a list of customer names, domain names, and
billing addresses by exploiting a flaw in the website’s shopping cart feature.
Upon inspecting the list, they discover that the person paying Bina Al-ar-mal’s
hosting bill has a British billing address. The other teams are alerted and
Scotland Yard is notified of the terrorist threat immediately.

(Day 1, Hour 23) Team 1 is able to get Head Terrorist 1’s email address off of
the “contact” pane of one of the hacked terrorist email accounts. They make
ready for a spear phishing attack against him, but decide to wait some time to
launch it, as it is currently the middle of the night where Head Terrorist 1 is
believed to be.

(Day 2, Hour 3) Team 3 has gathered over seven thousand IP addresses of people
viewing Bina Al-ar-mal’s news feed and tries to attack them all using known
router vulnerabilities. When all is said and done they have infected
thirty-seven routers and forty-six workstations. They determine that
thirty-four of these work stations belong to active members of Bina Al-ar-mal.
They observe these workstations passively, hoping to gather information. The
other two teams are briefed on their success.

(Day 2, Hour 8) Team 1 launched a spear phishing attack against Head Terrorist
1 using the hacked email account of another terrorist.

(Day 2, Hour 9) Team 1’s spear phishing attack against Head Terrorist 1 is a
success. They now have full control over his Windows XP laptop and inform the
other two teams of their success. After searching the laptop’s hard drive and
downloading a half gigabyte of confidential documents and IM logs, the team
decides to plant a PDF of the Christian Bible on it along with some real
looking fake papers from the CIA. After gleaning Head Terrorist 2’s and Head
Terrorist 3’s email addresses from the stolen IM logs, the team sends them both
emails from the hacked email account of a lower level terrorist claiming that
Head Terrorist 1 is dirty.

(Day 2, Hour 9) Team 3 decides to take the sensitive information stolen from
Head Terrorist 1’s computer stolen by Team 1 along with other fake CIA
documents and place it on all thirty-four of the terrorist workstations they
control. They use a hacked email account belonging to an uninvolved terrorist
to inform Head Terrorist 2 and Head Terrorist 3 that Head Terrorist 1 is a
traitor an he has at least thirty-four moles inside of their organization, all
of whom they mention by name.

(Day 2, Hour 10) Head Terrorist 1’s laptop is searched by security forces under
the control of Terrorist 2. Head Terrorist 1 is determined to be part of the
CIA and is placed into a cell to be used as leverage against the United States.

(Day 2, Hour 17) Head Terrorist 2 and Head Terrorist 3 raid all thirty-four of
the suspected moles and find the planted documents. They begin to interrogate
all thirty-four of them in order to find out how deep the CIA has penetrated
their organization. None of them know anything but most of them make up real
sounding false information to make the interrogations end.

(Day 3, Hour 3) Team 1 determines that most remaining Facebook and Twitter
accounts can not be breached. Several team members leave and a few stick around
to try and finish off the remaining accounts.

(Day 6, Hour 17) Scotland Yard arrests the person allegedly paying for Bina
Al-ar-mal’s web hosting. It is later determined that the person is actually
part of a London-based Bina Al-ar-mal cell.

(Day 6, hour 20) Team 2 destroys Bina Al-ar-mal’s web site after catching word
of the Scotland Yard raid.

End Result: One of three head terrorists is being held by their own
organization as a traitor and thirty-four unrelated terrorists are being held
by their own organization and brutally interrogated about actions they did not
commit. One terrorist is in the custody of the Scotland Yard, and a British
terror cell has been exposed. Bina Al-ar-mal’s entire communication network is
compromised (but they do not know that yet), and their website has been taken
offline permanently. All members of Bina Al-ar-mal are now becoming
increasingly suspicious of their fellow members and the hacktivist collective
is now in a position to launch further attacks on Bina Al-ar-mal (using the
compromised email and social media accounts) at a later time. This has all been
accomplished in under a week.

________________________________________________________________________________

My public key is available here:

http://pastebin.com/VhW0bmAt
https://paste.ee/p/C5M3U
http://tny.cz/c9b82da0
http://hastebin.com/jikebijifu.hs
http://chopapp.com/#w04dkx06

SHA1: cb36db996bb684e569663ca7b0d93177ecc561be

Grab it while you still can.

________________________________________________________________________________
Disclaimer: All information provided in this document is for educational
purposes only. The ideas presented here are solely academic and should never be
acted upon or put into practice. The author of this document will not be held
responsible in the event any criminal or civil charges be brought against any
individuals misusing the information in this document to break the law.

—–BEGIN PGP SIGNATURE—–
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=QuZa
—–END PGP SIGNATURE—–

Matt DeHart: Former Soldier Wanted by the US for Working with Anonymous

Matt DeHart: Former Soldier Wanted by the US for Working with Anonymous

matt-dehart-anonymous

Life is not easy for 30-year-old .

Just a few years ago he was doing well; as a trained Intelligence Analyst in the US Air National Guard he looked forward to a stable and glamorous career at the center of action, living inside a virtual videogame and fighting America’s enemies via drones. It was a heady combination of gamer geek dreams and the aspirations of a good boy who’d grown up in a military family, following his parents’ path to public service.

Now he sits in a cell in a foreign country, far from his Indiana roots, suffering from PTSD and recovering from two apparent suicide attempts. The last one by diving headfirst onto a concrete floor from a top bunk bed. He’s struggling hard to stay in that cell, too; or at least, never to return to the land of his birth, the land he once served so proudly.

In a series of clipped, yet eloquent, emails Major Paul DeHart, Matt’s father, talked to us about the struggles his family have been through in the days since. “No prison is a good prison. Depriving any human being much less one who has grown up under western law which in theory at least values human dignity and freedom above most things is punishment enough. I will say compared to the way human beings in general and prisoners specifically are treated in any US prison system, state or federal, Canadian prisoners seem to be treated as human beings with at least the potential for rehabilitation.”

“But, the US approach to warehousing prisoners and exploiting them as resources for labour and prison-industrial-complex businesses is no different than the way the US approaches old people in nursing homes or labour in general. From a corporatist standpoint, a human resource which is no longer productive is no longer of any value. The concept of intrinsic human value seems to have been forgotten.”

On his son’s complex situation and appeal for sanctuary: “It’s simple in our book. He was tortured by the US. That is a violation of international law. Does anyone doubt any more that the US tortures people? If they have done it overseas to supposed enemies – why not to their own citizens? Why is the US Senate report in CIA torture still not released. You figure it out. Along those lines – I reference what happened to Canadian citizen [Maher] Arar.”

As Matt himself explained to the National Post, “It’s not that I’m not patriotic — I am. I voted for Bush. My family is military, pretty gung ho. But everything has changed.”

The DeHart case (as explained in the masterful five-part National Post chronicle) is neither straightforward nor at first glance tremendously sympathetic. Of his own volition he walked into the Russian Embassy in Washington, DC. What happened there depends on which version of the stories he’s told you believe. Either he was there to look for work and a new start, having lost faith in the US, or he was there to mislead them about drone technology, deliberately handing them misinformation to protect the country he loved. But what does this have to do with the child pornography charges against him, the only charges which have been filed? And if he’s wanted on child pornography charges, why did the FBI interrogate him as part of an espionage investigation, as the documentation shows?

And what does this have to do with Anonymous?

It all started with Chanology. According to statements DeHart gave Adrian Humphreys of the National Post, he participated in Project Chanology, the original “moralfag” action which pitted Anonymous against the Church of Scientology. There were many aspects to the operation, but the most famous was the adoption of the Guy Fawkes mask, since become inextricably associated with the hacktivist collective. The statements DeHart gave were corroborated by operation founder Gregg Housh, although he could not specifically identify participants, having known them only via pseudonyms.

Chanology was DeHart’s first taste of activism, and he liked it. Getting deeper into the hacktivist scene, he eventually ran a server on which some files which may or may not have been destined for WikiLeaks resided.

His American lawer Tor Ekeland told us via email, “This whole matter revolves around a file that appeared in the fall of 2009 on a TOR server Matt was a co-sys admin. People speculate that it was enroute to Wikileaks, although I have not seen any confirmation of this fact. The file was unencrypted for the first two days on the server. According to published reports, it’s an FBI investigative file of domestic criminal activity by the CIA.”

Then came the raid.

That was 2010. No malware and no such mystery file was found on DeHart’s computer equipment; he’d long since deleted the file, which had been uploaded to the server by someone else.

I opened the door and it was the police task force. Your stomach drops and your heart beats like crazy. It takes you by surprise, even though I had nothing to hide once the server was destroyed…

I was shook up,” Matt said. “I don’t know everything they took, but I know they took everything. After they had left I looked at the search warrant which was left on the couch. It was a generic warrant from the Memphis FBI field office and it said they were searching for child pornography.”

That was when he started to lose faith. Not too long after that he visited the Russian and Venezuelan embassies, looking for the future he could no longer see himself having in the USA. He didn’t find it there and decided to take the same route once taken by escaped slaves, the Underground Railway to the free environs of Canada.

Part of the reasoning, as his father told Humphreys, was that if there was any hold-up with the passport, they’d know the child porn incident wasn’t over. There was no problem with the passport. He left, signed up for a French Immersion course which to his chagrin didn’t take, then enrolled in technical college in scenic Prince Edward Island, intending to study welding. “I figured I’d try something that had nothing to do with computers. I felt good going to Canada,” he explained to the National Post.

All was going well, but in order to start school he needed a student visa, which he had to obtain from his home country.

You see this coming, don’t you?

He bussed across the St Croix river to the American side, where he spent the night at a hotel and took care of the paperwork. Then he headed back to Canada. Presenting his passport at the border, he anticipated no issues. The guard scanned it, checked the computer, scanned it again, went into an office to check something, and suddenly all hell broke loose.

While two guards threw themselves in front of the exit, blocking it, DeHart was cuffed and plopped in a chair. Soon he was tumbled into the back of a Border Patrol vehicle which was driven by an FBI agent and taken to an ICE detention center, where he was refused a lawyer and detained.

DeHart says he was strapped into a lab chair and drugged with an IV drip, before being aggressively questioned for hours. He was shown a new criminal complaint, charging him with soliciting child pornography; it was written that very day.

His father explained some anomalies. “We have repeatedly asked in court in the US for actual transcripts of his interrogations and have been told there are no audio or video records. Yeah right. Two agents are flown out from the national security section in DC to interrogate Matt and there are no records. Hmmm.”

He was transferred from the ICE detention center to another holding facility, where he collapsed and was taken to hospital, where the doctors determined him to be in a paranoid state, claiming persecution by the FBI. His symptoms were consistent with “drug induced psychosis” according to medical personnel.

Department of Justice documents show that DeHart was not actually detained on child porn charges; he was detained relating to an issue of national security/espionage. And he remained detained for months, until a judge added up the inconsistencies in the case, found DeHart a credible witness and not a flight risk, and ordered that he be released with a monitoring bracelet and curfew.

On November 5, Guy Fawkes Day, Million Mask March day, Matt DeHart filed a motion to dismiss the charges against him.

On April 2 of the next year, he and his family fled, driving north almost a full day and night to a border station in Fort Francis, Ontario, where they claimed refugee status and requested asylum from the Canadian government. Ekeland explained, “He and his family are seeking refugee status in Canada based on the fact that Matt was tortured by the FBI and that he cannot get a fair trial in the U.S.”

Paul DeHart said, “We came to Canada to seek protection from the US under international law. We know the tremendous courage it would take any Canadian official to stand up to Canada’s closest ally and biggest trading partner. However, it has been done before. In my generation Canada welcomed war protesters who disobeyed draft laws in the US and came to Canada where tens of thousands of them were granted immigrant status and protected.” In more recent, more Conservative times, however, the Canadian government has been rounding up and repatriating (ie returning to the US) AWOL American soldiers.

The next day the Canadian government from whom they were seeking aid charged Matt with espionage against Canada.

“There are Americans who try to sneak across the Canadian border to flee US law enforcement all the time,’” said Paul DeHart. CBSA [Canada Border Services Agency] I’m sure keeps stats. We did not sneak anywhere. We reported to a CBSA office and declared ourselves as asylum seekers under the UN Convention Against Torture (CAT). Matt was not detained by Canadian officials until the following day when a US Judge issued an arrest warrant for failing to appear at a schedule court hearing.”

And this, along with the still-unresolved child pornography charges, is why Matt DeHart has spent the last year in Canadian jail cells. At one point he won limited release, and was reunited with his family, but when the family moved to a different apartment Matt notified his corrections officer of the move in an incorrect manner: by notifying the company in charge of his electronic monitor, who then notified the officer. His father explained, “Someone in the CBSA made a decision to have him rearrested on a
reporting technicality which had nothing to do with flight risk or danger to the community and forfeit the $10,000 bond we put up. Money by the way we could not afford to lose.” He remains in custody. Rallies for his release have been unsuccessful, if high-profile.

Paul DeHart told us, “You should thank God as Canadians you seem to still have a mature and unbiased judiciary. The judge who reviewed Matt’s bond release in Sept 2013, after CBSA challenged it in court, wrote a very well-supported opinion which basically said in paraphrase – in Canada someone is innocent until proven guilty. If her 13-page opinion is indicative of the quality of
Canadian judges, then I’d say at least judicially, Canadians are in good hands.”

“We are awaiting two decisions by the Immigration and Refugee Board. First, we await the admissibility decision for Matt. He is opposed by the govt for the charges in TN. The final submissions were sent in middle of August. A negative decision will start a time clock on a shortened process to have Matt sent back to the US. Actually, it’s my understanding that he would just have to be deported from Canada. Theoretically it doesn’t have to be back to the US, but where else would he be sent?”

“The other decision is whether as a family we qualify under for protection from the Canadian government. Final submission for that hearing are due this month. No telling how long either decision will take. Considering the unusual nature of our claim, we suspect the Canadian government will be sure to make a very thorough examination of each and have detailed rationale for the decisions.” This is going to involve a lot of lawyers, though, and they are not inexpensive, particularly for a couple of new immigrants who left behind established careers. “The [child porn] case in Tennessee is suspended until/unless Matt returns to the US as we understand it.”

The governments in question don’t appear to be in any rush. Major DeHart raises an interesting question: extradition. “After being in Canada since April 2013, a year and a half, there has been no extradition request from the US. Since these are relatively routine it raises the question – why not?”

We asked DeHart about the extent to which the Canadian and US governments were cooperating on the case. “Who knows?” he replied. “Clearly the questions Matt was asked by both CSIS [Canadian Security Intelligence Service, the “Canadian FBI”] and the War Crimes unit of CBSA were focused on events in the US which had nothing to do with child pornography. Questions Leann and I were asked at the admissibility hearing by CBSA hearings officers seemed to have come directly from the US. And, that makes sense since US border personnel are on Canadian soil and work closely with CBSA.”

Their old government seems content to leave the entire family in the hands of the Canadians, despite maintaining an apparent interest in watching events unfold. “We have not been contacted by anyone from the US government since we came to Canada,” Paul DeHart told us. “I will say that the day after we crossed the border in Ft. Frances we noticed at least a dozen US Homeland Security vehicles parked in that relatively small town. I do know we did not feel safe from the US there.” As a former NSA employee, DeHart is well-equipped to identify HS vehicles.

On September 12 DeHart’s US attorney Tor Ekeland created an online fundraiser to cover his legal expenses. He chose the site GoFundMe, which often works with Anonymous fundraisers.

That same day, the fundraiser was shut down.

“We got an email from GoFundMe saying we’d violated their Terms of Service, and that our account was being terminated,” Ekelund told me via email. “When we asked for explanation we got none. By the time we’d received the email the account had already been deleted.”

Paul DeHart said, “Well, you can draw your own conclusions. Supposedly the site was taken down for a violation of terms of service. But, since it was started and run by a law firm, that makes little sense.”

Not wasting any time, Ekeland immediately rebuilt the fundraiser on Canadian site Fundrazr, which also hosts Julian Assange’s personal fundraiser. “We had the Fundrazr up in an hour or two, most of the time which was spent on looking at alternatives sites. It took about 15 minutes to actually get it up and running again. It stands at $550 of a $10,000 goal.

“No money was lost. Gofundme sent us everything. I really don’t focus on fundraising, and I usually go thousands of dollars out of pocket on the cases I have that are like this. I never make money of these types of cases, and I’m certainly not doing it for the money.”

The future is uncertain, obscured in a blizzard of paperwork, allegations, missing files, and, most recently, very specific publication bans (which we are probably breaking by reporting this). There are two powerful, often collusive, governments

Ekeland explained, “As of this writing, the U.S. government has not taken any action to extradite Matt. They will not try him in absentia.”

Paul DeHart sums it up. “Unless you have spent a large part of your adult life serving in the S military you would have a hard time understanding what an absolutely gut-wrenching, traumatic experience it is to have to fill out a basis of claim form for asylum against the country you love and served. But there is no excuse for what was done to our son, and no one in the US seemed to care about that.”

“It is our intention to remain in Canada and live out the rest of our lives in peace. If we are granted status we would never be allowed to return to the country of our birth. My own mother passed away in May 2013 after we came here. I was unable to attend her funeral.”

“If we are permitted to remain in Canada and Matt is allowed free to pursue life again, then our lives will resume. We will work, live, and make a new life in Canada. We have no ambitions beyond this: to live free from the fear of the US government. Imagine knowing that your head is in the sights of a sniper some 2 miles away. You know that at any moment a trigger can be pulled sending a 50 calibre bullet into your skull and exploding it. I know that’s graphic and perhaps hyperbole, but that is what it
feels like to know that our lives are in the sights of the most powerful government on earth.”

“You wonder if this is the day someone pulls the trigger.”

Featured Image via Free Matt DeHart

NOTE: Matt’s job description has been corrected. He was originally reported to be a drone pilot, but was actually an Intelligence Analyst. His father writes, “His job in the Air National Guard was equivalent to PFC Manning’s in the Army.”

via: TheCryptoSphere.com

Beast 1333 – Rapper, Activist

Beast 1333 – Rapper, Activist

Beast+1333+Templars+of+Hip+HopBeast 1333 is a well known underground Hip Hop rapper of Puerto Rican descent with a huge global cult like following, born in Brooklyn NY (Jan.13,1982).  Anti-NWO Storyteller leaves no conspiracy stone un-turned. UFO’s, Aliens, Cover-Up, Genetic Engineering, Space Travel, Time-Travel, you name it. Friend of Anonymous.

 

 

 

 

http://youtu.be/wyb6qWrm7_s

Question: Should You Trust Tor?

Question: Should You Trust Tor?

nsa-tor-spying

Answer: Not if Your Life is at Stake

By Bill Blunden, July 16, 2014

In the ongoing drizzle of Snowden revelations the public has witnessed a litany of calls for the widespread adoption of online anonymity tools. One such technology is Tor, which employs a network of Internet relays to hinder the process of attribution. Though advocates at the Electronic Frontier Foundation openly claim that “Tor still works[1]” skepticism is warranted. In fact anyone risking incarceration (or worse) in the face of a highly leveraged intelligence outfit like the NSA would be ill- advised to put all of their eggs in the Tor basket. This is an unpleasant reality which certain privacy advocates have been soft-pedaling.

The NSA Wants You To Use Tor

Tor proponents often make a big deal of the fact that the NSA admits in its own internal documents that “Tor Stinks,” as it makes surveillance more work-intensive[2]. What these proponents fail to acknowledge is that the spies at the NSA also worry that Internet users will abandon Tor:

[A] Critical mass of targets use Tor. Scaring them away from Tor might be counterproductive”

Go back and re-read that last sentence. Tor is a signal to spies, a big waving flag that gets their attention and literally draws them to your network traffic[3]. Certain aspects of Tor might “stink” but ultimately the NSA wants people to keep using Tor. This highlights the fact that security services, like the FBI[4], have developed sophisticated tools to remove the veil of anonymity that Tor aims to provide.

For example, the Washington Post reports[5]:

One document provided by Snowden included an internal exchange among NSA hackers in which one of them said the agency’s Remote Operations Center was capable of targeting anyone who visited an al-Qaeda Web site using Tor.”

It’s well known that Tor is susceptible to what’s called a traffic confirmation attack (AKAend-to-end correlation), where an entity monitoring the network traffic on both sides of a Tor session can wield statistical tools to identify a specific communication path. Keep in mind that roughly 90 percent of the world’s internet communication flows through the United States[6], so it’s easy for U.S. intelligence to deploying this approach by watching data flows around entry and exit points[7].

Another method involves “staining” data with watermarks. For example, the NSA has been known to mark network traffic by purchasing ad space from online companies like Google. The ads cause web browsers to create a cookie artifact on the user’s computer which identifies the machine viewing the ad[8]. IP addresses may change but the cookie and its identifiers do not.

De-cloaking Tor users doesn’t necessarily require a federal budget either. According to a couple of researchers slated to speak at Black Hat in a few weeks[9]:

In our analysis, we’ve discovered that a persistent adversary with a handful of powerful servers and a couple gigabit links can de-anonymize hundreds of thousands Tor clients and thousands of hidden services within a couple of months. The total investment cost? Just under $3,000.”

Client Network Exploitation (CNE) Trumps Crypto

Back in 2009 security researcher Joanna Rutkowska implemented what she dubbed the “Evil Maid” attack to foil TrueCrypt’s disk encryption scheme[10]. By compromising the Windows boot environment her team was able to capture the hard disk’s encryption passphrase and circumvent TrueCrypt’s protection. While users can [usually] defend against this sort of monkey business, by relying on a trusted boot process, the success of the Evil Maid attack underscores the capacity for subversion to trump encryption.

This type of client-side exploitation can be generalized for remote network-based operations. In a nutshell, it doesn’t matter how strong your network encryption is if a spy can somehow hack your computer and steal your encryption passphrase (to decrypt your traffic) or perhaps just pilfer the data that they want outright.

Enter the NSAs QUANTUM and FOXACID tag team. QUANTUM servers have the ability to mimic web sites and subsequently re-direct user requests to a second set of FOXACID servers which infects the user’s computer with malware[11]. Thanks to Ed Snowden it’s now public knowledge that the NSA’s goal is to industrialize this process of subversion (a system codenamed TURBINE[12]) so it can be executed on an industrial scale. Why go to the effort of decrypting Tor network traffic when spies can infect, infiltrate, and monitor millions of machine at a time?

Is it any wonder that the Kremlin has turned to old-school typewriters[13] and that German officials have actually considered a similar move[14]? In the absence of a faraday cage even tightly configured air- gapped systems can be breached using clever radio and cellular-based rootkits[15]. As one user shrewdly commented in an online post[16]:

Ultimately, I believe in security. But what I believe about security leaves me far from the cutting edge; my security environment is more like bearskins and stone knives, because bearskins and stone knives are simple enough that I can *know* they won’t do something I don’t want them to do. Smartphones and computers simply cannot provide that guarantee. The parts of their security models that I do understand, *won’t* prevent any of the things I don’t want them to do.”

Software is hard to trust, there are literally thousands upon thousands of little nooks where a flaw can be “accidentally” inserted to provide a back door. Hardware is even worse.

Denouement

About a year ago John Young, the operator of the leaks site Cryptome, voiced serious concerns in a mailing list thread about the perception of security being conveyed by tools like Tor[17]:

Security is deception. Comsec a trap. Natsec the mother of secfuckers”

Jacob Appelbaum, who by the way is intimately involved with the Tor project, responded:

Whatever you’re smoking, I wish you’d share it with the group”

Appelbaum’s cavalier dismissal fails to appreciate the aforementioned countermeasures. What better way to harvest secrets from targets en mass than to undermine a ubiquitous technology that everyone thinks will keep them safe? Who’s holding the shit-bag now? For activists engaged in work that could get them executed, relying on crypto as a universal remedy is akin to buying snake oil. John Young’s stance may seem excessive to Tor promoters like Appelbaum but if Snowden’s revelations have taught us anything it’s that the cynical view has been spot on.

Bill Blunden is an independent investigator whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including The Rootkit Arsenal and Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-IndustrialComplex. Bill is the lead investigator at Below Gotham Labs.

End Notes

1 Cooper Quintin, “7 Things You Should Know About Tor,” Electronic Frontier Foundation, July 1, 2014, https://www.eff.org/deeplinks/2014/07/7-things-you-should-know-about-tor

2 ‘Tor Stinks’ presentation, Guardian, October 4, 2013,http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document

3 J. Appelbaum, A. Gibson, J. Goetz, V. Kabisch, L. Kampf, L. Ryge, “NSA targets theprivacy-conscious,” http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html

4 Kevin Poulsen, “FBI Admits It Controlled Tor Servers Behind Mass Malware Attack,”

Wired, September 13, 2013, http://www.wired.com/threatlevel/2013/09/freedom-hosting-fbi/

5 Barton Gellman, Craig Timberg, and Steven Rich, “Secret NSA documents show campaign against Tor encrypted network,” Washington Post, October 4, 2013

6 James Ball, “NSA stores metadata of millions of web users for up to a year, secret files show,” Guardian, September 30, 2013, http://www.theguardian.com/world/2013/sep/30/nsa-americans-metadata-year-documents/print

7 Maxim Kammerer, [tor-talk] End-to-end correlation for fun and profit, August 20, 2007,https://lists.torproject.org/pipermail/tor-talk/2012-August/025254.html

8 Seth Rosenblatt, “NSA tracks Google ads to find Tor users,” CNET, October 4, 2013, http://news.cnet.com/8301-1009_3-57606178-83/nsa-tracks-google-adsto-find-tor-users/

9 Alexander Volynkin & Michael McCord, “You Don’t Have to be the NSA to Break Tor: Deanonymizing Users on a

Budget,” Black Hat USA 2014, https://www.blackhat.com/us-14/briefings.html#you-dont-have-to-be-the-nsa-to-break-tor-deanonymizing-users-on-a-budget

10 Joanna Rutkowska, “Evil Maid goes after TrueCrypt!” Invisible Things Lab’s Blog, October 16, 2009, http://theinvisiblethings.blogspot.com/2009/10/evil-maid-goes-after-truecrypt.html

11 Bruce Schneier, “Attacking Tor: how the NSA targets users’ online anonymity,” Guardian, October 4, 2013, http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity/print

12 Ryan Gallagher and Glenn Greenwald, “How the NSA Plans to Infect ‘Millions’ of Computers with Malware,”

Intercept, March 12, 2014, https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/

13 Chris Irvine, “Kremlin returns to typewriters to avoid computer leaks,” Telegraph, July 11, 2014,http://www.telegraph.co.uk/news/worldnews/europe/russia/10173645/Kremlin-returns-to-typewriters-to-avoid-computer-leaks.html

14 Cyrus Farivar, “In the name of security, German NSA committee may turn to typewriters,” Ars Technica, July 14, 2014, http://arstechnica.com/tech-policy/2014/07/in-the-name-of-security-german-nsa-committee-may-turn-to-typewriters/

15 Jacob Appelbaum, “Shopping for Spy Gear: Catalog Advertises NSA Toolbox,” Der Spiegel, December 29, 2013, http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html

16 “Iron Box Security,” Cryptome, June 6, 2014, http://cryptome.org/2014/06/iron-box-security.htm

17 “Natsec the Mother of Secfuckers,” Cryptome, June 9, 2013, http://cryptome.org/2013/06/nat-secfuckers.htm

The Other Sabu: A Hypothesis of Non-Compliance

The Other Sabu: A Hypothesis of Non-Compliance

Sabu-informant-or-patsy

New York, NY – May 27th 2014

History was made today in a NYC courtroom with the extra-leniant sentencing of notorious Anonymous hacker turned FBI Informant ‘Sabu’ otherwise known as Hector Xavier Monsegur. But, what if things are not what they appear to be?

When considering history in hindsight, things were rarely what they seemed at the time. Cybersecurity drama and events should be held in similar regard, as the game of smoke and mirrors has never been more applicable than within the globally distributed Internet and its ‘security mechanisms’. Lets take a moment to consider the recent developments with this case and look at the sentencing from a different perspective.

Federal agents and LEAs accross the globe have been known to bend the rules, outright lie, or falsify evidence to suit their best interest. Not in pursuit of truth nor justice, but instead in pursuit of ‘winning’ at whatever cost. Another subject entirely, but it remains a fundamental pillar to this overall hypothesis.. What if Sabu never flipped, and [for reasons still unclear] they are only providing the illusion that he has?

Virtually everything known about how these ‘hacks’ unfolded has been described only by Court Documents and MSM/Fox News opinion of those documents. When considering that the messaging is one sided, it becomes even more interesting when observing how hard the MSM and FBI have pushed this message, which is that ‘Sabu turned informant on a dime’.

Judge Preska, being the wife of a hacked stratfor client, was arguably conflicted from start in Jeremy Hammond’s case, the individual who allegedly hacked Stratfor at behest of Sabu & the FBI. Today, this same judge not only provided a lenient sentence on Hector, but offered a public and glowing praise of the effectiveness of his efforts in subsequent critical takedowns. This is highly suspicious, as a ‘real’ thank you from a judge should be a sealed case, and witness protection. What the message actually sounded like was a backhanded compliment meaning ‘thanks for nothing, and good luck with the death threats’.

Love him or hate him, Sabu isn’t stupid. Certainly not, if he’s capable of doing all of these things the government claims he can do. In that assumption, one would allso assume he would outright demand protection, and probably future employment. What’s the point of flipping on multiple high value targets, if the end result is a publicly announced ‘time served’ with release back into a furious community, hated & minimum-wage forever? Finding a highly intelligent hacker that would agree to this, is incredibly unrealistic.

Taking an objective look at all the evidence, without bias, another theory can emerge. While it’s not much, there are historical Tweets and leaked IRC conversations to keep in mind, that may tell another side of the story. In a final Twitter posting, Sabu calls out the FBI for ‘being cowards, and not to give in’. Another post on the day before going dark, reminiscent of a yet-to-leak Snowden, Sabu describes invasive & illegal government spying, and hints that ‘informants & corporate compliance’ as the government’s only real tools. Some would just say he’s only playing the part. Others could say those tweets were a deliberate slap in the face, and evidence of non-compliance.

In those leaked IRC conversations, if believed are legitimate, outline some additional possibilities and variations to the actual events as we understand them.

http://cryptome.org/2014/05/sabu-m45t3rs4d0w8-2012-0330-0524.pdf

You’ll find that m45t3rs4d0w8 (aka Sanguinarious) brings up the false flag possibility, and they discuss the lies of FoxNews and how ‘anons believe anything’ and ‘dont ask the right questions’. Later in the leaked record, its discussed how the MSM lied about how he was caught. It should be noted that alledged LulSec accomplice, JoePie91 also believes there are inconsitencies with the Sabu story, and how he was nabbed, as documented on his blog March 10, 2012 shortly after Sabu’s public arrest.

http://cryto.net/~joepie91/blog/2012/03/10/something-stinks-in-the-story-of-sabu/

In what could be most telling, m45t3rs4d0w8 not Sabu that then explains “regarding those things they ‘said’ you did” he noticed some court documentation doesnt make sense, has missing dates, and possibly falsified Witness and Defendant signatures. Sabu replies, “Good things to question, sadly no one is questioning like you are”.

Other final bits to mention would be Sabu’s talk of return. “I cant wait until i’m sentenced so i can finally get the truth out”, and his disgust of LEA/FBI manipulations, “they will go through your entire life… they will find a way to blackmail your a**. I’m not even ****ing exaggerating.”

Journalism requires critical thinking in order to truly get the message across. Proposed are critical unanswered questions:

Q. If Sabu is cooperating with such efficiency, why is gov’t hanging him out to dry?

No Witness Protection Offered nor Demanded?
No Sealed Case (to Protect the Informant)?

Anyone else in Sabu’s shoes would likely have said “OK, you got me, i’ll cooperate. But you’re going to seal this case, and give me witness protection. Otherwise the public will crucify me”.

Q. Is there a chance that Sabu was apprehended, but the FBI simply used his alias to entrap Hammond / Davis / Ackroyd/ etc by themselves?

What proof do we really have that Hector himself is responsible?

Q. Could the FBI have decided that publicly promoting Sabu as a crucial Anonymous Informant was a most effective way to ‘make the FBI look good’, whether true or not?

If Sabu had not flipped, do we believe the FBI would admit this failure?
Does the FBI have the will & means to falsify this into reality?

In conclusion, opinion should still be out on whether Hector Xavier Monesgur deserves the landslide of lambasting. It would be wise to dig deeper, withhold some bias (towards the incarcerated) and keep in mind…

All warfare, is based on deception..” Sun Tzu

Who will be the first to interview Xavier, and ask these and likely more very important questions?

Max Maverick, Editor
DecryptedMatrix.com

[email protected]

 

 

 

 

EXHIBITS:

Playing the part? Or a slap in the face of federal pressure?

sabu-final-tweet

sabu-tweets-activism-anti-informant

 

 

False Flag op? Willing to cop to 12 charges?

sabu-chat-counts

 

 

Falsified Documents?

sabu-chat-stratfor

 

 

Sabu ready to speak the truth?  Feds lying about how they caught him?

sabu-chat-shells

 

 

Sabu disgusted by blackmail?

sabu-disgusted-by-blackmail

 

 

 

The Fight for @YourAnonNews and the Missing $35,000

The Fight for @YourAnonNews and the Missing $35,000

youranonnews-twitter-fighting

The @YourAnonNews Twitter account has been at the centre of a major upheval in the Anonymous community in the last few days, centring on missing funds of $35,000. Twitter

“A man may die, nations may rise and fall, but an idea lives on. Ideas have endurance without death.” – John F. Kennedy

Anonymous is just such an idea.

However details about in-fighting, backstabbing and missing fundraising donations which were made public over the weekend, threaten to undermine the trust people have in the movement – and especially one of its most prominent voices.

Your Anonymous News (@YourAnonNews) is one of the best known and loudest voices within the Anonymous group of hacktivists, but the person most associated with its operation, Christopher Banks (aka Jackal) has been accused of stealing $35,000 (£20,720) from a fundraising campaign which was designed to help build a new website for the account.

The details about what has happened over the weekend and prior to the events beaming public are confusing and contradictory depending on who you talk to, so let’s first go back to the beginning.

Anonymous’ powerful voice

As I said, Anonymous is an idea rather than a specific group of people, but certain voices within the movement came to the fore in the last few years.

Chief amongst these was the Twitter account @YourAnonNews which was created in April 2011 and was run primarily by a member of Anonymous known as Jackal.

Jackal was in fact Christopher Banks who lived in Denver, and over the next three years the account grew to become the most powerful voice within Anonymous. It currently has over 1.24 million followers.

While Jackal was in charge, running the account alone became too much work and so multiple members of Anonymous were brought on board to help out. At one point up to 25 people had access to the account and it was so well organised, it even had a highly detailed style guide.

Crowd-funding anarchy

In early 2013, Jackal and a few of the other prominent people running the account decided that they wanted to build a website with the goal of creating “a weekly news show, provide embedded coverage of direct actions, and run a new website to help ignite protest and DIY journalism around the world.”

The group turned to Indiegogo, the crowd-funding website and having set out with a goal of raising just $2,000, within weeks it saw 1,307 people donating a total of $54,668.

There were questions raised at the time about the logic of donating money to a project which was so ill-defined – and over a year later those concerns look to have been validated.

Truth and reconciliation

According to a Truth and Reconciliation document published this weekend, the donations were received by Jackal minus deductions from Indiegogo (4%) and credit card fees (3%).

The money was then used to pay for the merchandise which was promised in return for donations, including t-shirts, mugs, buttons, and stickers. The money was also used to buy laptops, broadband access and server time.

The total amount of money accounted for was $19,959, meaning that $34,709 remains unaccounted for.

This was to become the crux of a dispute among those who took charge of YourAnonNews in late 2013.

In October of 2013, Dell Cameron, a reporter with the Daily Dot and someone who had been involved with the Anonymous movement since the Arab Spring, got involved with the account and quickly realised there was something wrong.

None of the merchandise had been posted and there was no sign of the remaining money.

Cameron decided that he needed to get legal advice because, as he told IBTimes UK: “I was taking ownership of an account that had been used to commit a crime.”

Creating a non-profit

Cameron along with others involved with the account including Nicole Powers, Gregg Housh and lawyer Tor Ekeland, came together to form a de facto board to try and administer the account. Their plan was to move the intellectual property into a non-profit organisation which would run the account in the future.

The first point of business was to raise money in order to send out all the merchandise, which was done by raising private donations of $9,000.

At this point Banks still had access to the @YourAnonNews account and this was something Cameron was not happy with, but he was willing to let it be while the group tried to get answers from him about the missing money.

This situation continued until last week, when Cameron – along with Dan Stuckey, a reporter for Vice who was brought on board the @YourAnonNews account – told Ekeland at a meeting in New York that they were going to take control of the account and shut everyone else out.

Ekeland was able to talk them out of making a rash decision at the time, but in the middle of the night on Friday morning, Cameron went ahead with his plan and locked Ekeland, Powers and Housh out of the account, as well as Banks – a move Cameron claims was done with the consent of seven other YourAnonNews contributors.

Imploding

What followed was the cyber equivalent of mud-slinging with wild rumour and speculation being thrown around on social media channels.

Gabriella Coleman, professor at McGill University and an expert on Anonymous, told IBTimes UK that she has never seen anything like what happened on Thursday and Friday last week, when there were so many rumours being slung around various channels online.

It led the three exiled account members to publish the Truth and Reconciliation document on Saturday in an attempt to explain the situation.

By the time the document was published however, Cameron had already relinquished control of the account, following widespread criticism of his usurping of power. Control of the account was handed over to a group of Anonymous members based in Denver, who continue to operate it.

A deal with the devil

Speaking to both Cameron and Ekeland to try and find out exactly what happened, it’s clear there is a difference in opinion.

Cameron believes that Ekeland had done a deal with Banks which would simply brush the missing $35,000 under the carpet and allow him continue using the account – though without anyone knowing this publicly. This was unacceptable to Cameron.

Ekeland admitted he was indeed talking to Banks, but that they were only at the point of negotiation, and that any deal would have been brought to the board for approval, something Ekeland says Cameron was fully aware of.

A email sent by Cameron relating to the situation was also leaked over the weekend, in which Cameron makes potentially libellous and unsubstantiated claims about where the $35,000 went.

“You’re going to f**king regret it”

Cameron says he has personally asked Banks 12 times where the money is, and each time he has refused to give an answer. So far, Banks has remained silent on Twitter about anything to do with this debacle.

Cameron claims he was threatened by Ekeland before the email was leaked, saying: “He didn’t get specific, but he said if you publish a letter like this, you’re going to f**king regret it.”

Ekeland flatly denies that he threatened Cameron adding that he is happy to be no longer involved with the account, having immediately resigned from the board once Cameron locked him out of the account on Friday morning.

Ekeland likened the in-fighting over the @YourAnonNews account to the ring in The Lord of the Rings: “It drives people crazy, they get greedy for it, everyone wants it.”

Ekeland accused Cameron of wanting control of the feed for personal gain, something the Daily Dot reporter denies, claiming he only wanted “to do good” when he joined up.

Despite being the opposite side of the argument, Cameron echoes Ekeland’s sentiments:

“At the end, this is not about Anonymous, this is about a group of people fighting over a social media account. These are grown people squabbling like kids over the equivalent of a toy in the sandbox.”

The future of @YourAnonNews?

Coleman believes that YourAnonNews was close to imploding and that while the Truth and Reconciliation statement which was published on Saturday “may not be enough to save them, it is the wedge that gives them a chance [to survive].”

Numerous Anonymous accounts have been highly critical of the group over recent months for failing to make a public statement on the matter.

In the wake of the statement being made, while there is some appeasement, others believe that the YourAnonNews brand is tarnished forever and should be let to disappear completely.

Coleman counters that the rebirth like this should be expected:

“The strength of Anonymous is to have some points of stability but to be ad hoc and reborn. And it is definitely a great period to be reborn – whether that is going to happen or not is always an open questions.”

What the long-term impact this fiasco will have on @YourAnonNews – and more widely on the Anonymous movement – isn’t clear at this point.

What is clear is that $35,000 of donor’s money is still missing and unaccounted for, and the fight for control of the hugely popular and powerful @YourAnonNews account looks to be only just beginning.

via IBTimes.co.uk

Florida cop arrested for wearing ‘Anonymous’ mask warns ‘there’s a war coming’

Florida cop arrested for wearing ‘Anonymous’ mask warns ‘there’s a war coming’

 

ericsonThe police officer arrested for refusing to remove his “Anonymous” mask at an anti-Obamacare rally gave an interview to Red Pill Philosophy and WeAreChange in which he said that “there’s a war coming” and “it’s time to fight.”

Ericson Harrell wore the Guy Fawkes mask, he said, because it’s a “symbol of protest.”

“I always keep my mask in my truck, my cape in the truck, the flag in truck and everything,” he said. “So I put on the mask and the cape, grabbed the flag, and I stood on the corner.”

Eventually a female police officer confronted him, at which point he asserted “my right to free speech,” and tried to convince the officer that the anti-masking statute didn’t apply to him, because that statute “was not put into place for peaceful protests, not for figures just standing on the side of the road trying to express their first amendment rights.”

After her supervisor showed up, he was arrested for refusing to remove his mask or identify himself.

He stated that the officer and her supervisor thought he was part of a larger anti-Obamacare protest, but “in actual reality, I was alone at the time. I was a soldier of one.”

Harrell also claimed that he only announced himself as a police officer “after the fact, because I didn’t want to get any preferential treatment.”

The anti-masking statute, he correctly claimed, was put into place “sometime in the 1950s because of the Ku Klux Klan trying to intimidate a certain group of people — a certain race of people.” He declined to specify which “group” or “race” that was.

Harrell is currently on administrative leave, and his department will make a decision as to his permanent employment situation after the charges against him are dealt with.

Watch the complete interview with Ericson Harrell below.

 

 

June 6, 2013 – Decrypted Matrix Radio: Anonymous Warns M.I. Complex, PRISM Tech Spying, UFOs in Canada, Newtown Censorship, Haunted by Drone Killings

CLIP: Anonymous – The Military Industrial Complex Threat

Two Secretive Israeli Companies May Have Bugged The US Telecommunications Grid For The NSA

New PRISM leak shows feds can access user accounts for Google, Facebook and more

CLIP: UFO Alien Disclosure By Canadian Minister Of Defense May 2013

Newtown parents ask to block release of photos, audio – Conn. Gov. Signs Bill Restricting Newtown Photos

Robo-Raven Robotic bird created by Army and University of Maryland researchers

Former drone operator says he’s haunted by his part in more than 1,600 deaths

Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

<

June 5, 2013 – Decrypted Matrix Radio: The Peoples Voice, Billionaires Dump Stocks, Obamacare Survey, Manning Transcripts, Anonymous for Turkey, NSA Exposed, DHS Search & Seizure, Lasting Inner Peace

Sgt Bales Pleads Guilty to Murdering 16 Afghan Civilians??

David Icke’s Initiative to Create “The People’s Voice” Broadcasting Network

Billionaires Dumping Stocks, Economist Knows Why

Two-Thirds of Uninsured Americans Don’t Know If They Will Buy Insurance Under Obamacare

Crowdfunded Stenographer Denied Press Pass To Cover Transcript-less Bradley Manning Trial

Anonymous – Message to the Turkish Government (Gezi Park Demonstration – #OccupyTurkey)

Secret Court Documents: NSA Collecting Phone Records of Millions of Americans Daily

DHS: Laptops, Phones Can Be Searched Based On Hunches

The Five Elements of Lasting Inner Peace

Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

<

April 30, 2013 – Decrypted Matrix Radio: Boston Futher Exposed, False Flag Actors, Spying Tech Boost, Insider Leak Updates, Sociopath CEO’s

April 30, 2013 – Decrypted Matrix Radio: Boston Futher Exposed, False Flag Actors, Spying Tech Boost, Insider Leak Updates, Sociopath CEO’s

Techno Tuesday!

Toulouse: Anonymous Theme Song – by Nicky Romero

Bomber Updates – CIA Training

Sandy Hook Principle Re-Used as Actor?

Evidence of CRAFT Mercenaries

Training Drill Denials, Tsarnev Family benefits 100k from feds!?

Tsaranev Brother DIED in custody??

False Bomber ID – NOW DEAD???

Journalist investigates new Security Tech ‘Total Recall’ onsite at the Statue of Liberty NYC

Massive US push for full internet surveillance. CISPA-like zombie bills only die to respawn!

BodyPopper: by Deekline & Wizard

Interesting Benjamin Fulford Updates

Sociopath Nestle CEO: “Water Not a Human Right & should be privatized”

 

Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

April 9, 2013 – Decrypted Matrix Radio: DoJ Cries Espionage, Spying MobileApps, Wikileaks Kissinger Cables, Katt Williams Illuminati, Bird Flu Bio-Weapon, Anonymous Attacks Israel

April 9, 2013 – Decrypted Matrix Radio: DoJ Cries Espionage, Spying MobileApps, Wikileaks Kissinger Cables, Katt Williams Illuminati, Bird Flu Bio-Weapon, Anonymous Attacks Israel

Obama’s 7th Espionage Act Case Against a Non-Spy

Study: Mobile phone apps view private data more than necessary

Wikileaks – The Kissinger Cables

Katt Williams: “We Are Against the Illuminati at Our Own Detriment”

Chinese Colonel Says Latest Bird Flu Virus Is U.S. Biological Weapon

Big Pharma made $711 billion overcharging seniors and disabled

Anonymous blitzes Israel in new cyber attack over War Crimes and Human Rights Violations

4-9

Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

March 1, 2013 – Decrypted Matrix Radio: Manning Cops Plea, Brits Stripped & Droned, SS Thoughts on Gun Control, FAA Investigates

March 1, 2013 – Decrypted Matrix Radio: Manning Cops Plea, Brits Stripped & Droned, SS Thoughts on Gun Control, FAA Investigates

Bradley Manning pleads guilty to misusing classified data in WikiLeaks case

British terror suspects quietly stripped of citizenship… then killed by drones

CLIP: Former Secret Service Agent Speaks Out Against Gun Control

Supreme Court Effectively Says There’s No Way To Challenge Warrantless Wiretapping

What do Kill lists and No Fly lists have in common?

The FAA Wants to Hear From You About Privacy and Domestic Drones

Malware Discovered within Bank of America Hacked emails via Anonymous!

3-1

Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

February 25, 2013 – Decrypted Matrix Radio: Whithouse Drone Denials, DoJ Protecting Blackwater, Gun Control Boycots, Anonymous Hax’d BoA, Health Tips

February 25, 2013 – Decrypted Matrix Radio: Whithouse Drone Denials, DoJ Protecting Blackwater, Gun Control Boycots, Anonymous Hax’d BoA, Health Tips

Obama Press Secretary Ordered to Ignore Drone Program Inquiries, Act as if it didn’t Exist

Gun Companies Boycotting Law Enforcement In Anti-Gun States Grow By More Than 700% In 1 Week

How Many Rights Have Americans REALLY Lost?

Anonymous Hacks Bank of America BIG TIME!

DOJ Gives Blackwater a Whitewash On Felony Charges

Signs That The U.S. Health Care System Is A Gigantic Money Making Scam

Health Benefits of Vitamin D

The Healthiest Seeds on Earth

2-25

Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –