Rustle League and GNAA Allegedly CANADIAN Military

					Rustle League and GNAA Allegedly CANADIAN Military
10 November 2013:

Date: Sat, 9 Nov 2013 21:54:22 -0500
Subject: [Cryptome] About the CN mil thing
From: Percy DodgeXBrowns <setianx[at]gmail.com>
To: <cryptome[at]earthlink.net>

Just so you know, I didn't call the GNAA Chinese interests. I figured it would be good to clarify:

- Kayla is the Chinese operative.

That is all I can speak for. I hope one day I can provide you with proof of that. There is an article
on Infowars today citing the Chinese defence minister saying they do not do any hacking on
August 19. Maybe it's important?

http://www.infowars.com/chinese-troops-will-have-boots-on-the-ground-
in-hawaii-on-tuesday/

I also have written other works concerning the hacker cult of Anonymous. Some of them are not
as good as I had hope, emotional outbursts at best, others (Such as the ones displayed here) are
more real-data based. Please take care to note there are many camps within Anonymous, this one
creates terrorism. I have studied them for some time (Mid-2011).

http://planet.infowars.com/resistance/objectivity-in-contemporary-politics-
how-to-use-anonymous-as-a-platform-of-espionage-subversion-and-revolution

http://planet.infowars.com/resistance/how-to-better-identify-members-of-
anonymos-et-al

They also don't seem to be doing a whole lot other than their current charade. Tyler is going to
be HUGE.

9 November 2013

Rustle League and GNAA Allegedly CN Military



Date: Sat, 9 Nov 2013 01:17:22 -0500
Subject: [Cryptome] Lawful Hacking
From: Percy DodgeXBrowns <setianx[at]gmail.com>
To: <cryptome[at]earthlink.net>
You can publish this with the reply E-mail address.

I saw something you posted on your website, and I couldn't help but argue with the premise of
posting it. Whoop-dee-doo, perhaps, but nonetheless consider that this PDF:

http://cryptome.org/2013/11/lawful-hacking.pdf

A few things wrong with this file:

- First, because I cannot see who sent it to you (No problems really, but it could be the hacker
cult of Anonymous, I'll explain below), I have to leave a margin for the chance that it may be a
file I do not want to download. Lo and behold, the Adobe update service on my PC opened up a
few minutes after opening your copy of the paper. I've got protection which disables it (So I
hope), but because of it's sporadic nature activating, I assume that the PDF reader software has a
vulnerability. At any rate, it is an allegation which could be looked into. Moving on.

- Second, because the file I downloaded from Cryptome, which is the same draft, is
approximately 1/4 of the size of the one I downloaded from another website
(http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2312107). I don't know if you compressed
it, or it was compressed, but I'll leave that as a possibility. [Cryptome compressed the file.]

- Thirdly, because this article's appearance on Cryptome in particular stirs your audience in a
particular way, and I disagree with it if it could be helped. Assuming you got this from some
random dude, it's worth understanding alterior motives for this being made to happen.

So anyway, I want to elaborate on the hacker cult assumption. When Lulzsec died, and many of
the members did their best to operate from a bot computer, through layers of proxy, and through
cunning, they eventually came to form the Rustle League. Bear in mind these are people who
assumed the power of Lulzsec at a time when the opportunity arose to control the mass of
confusion (You cannot call Chanology a structured thing). This, and this is my allegation, was
used by the Chinese military to assume control of terrorism under the disguise of Kayla, who
was able to succeed and control the new organization, the Rustle League.

This shift championed many sub-events, such as the creation of Vince In The Bay, although he
could have just created allegiance at some point, and the alliance between Rustle League and the
Gay Niggers Association of America (GNAA for short, Wikipedia has more). They, assumably
Chinese interests at work through Kayla and the GNAA, then created a scenario where they were
able to create "sock puppets" to simulate real people. This is just the outer shell of this
endeavour, which is visible if you observe it in motion. I assume the same has been done to you
because of the convenience of this carefully placed "GPS device", if you will, which you may or
may not have posted on Cryptome.

I should mention this may have been happening during the reign of Lulzsec. Not understanding
the work of secret communications between the former members and the GNAA has potentially
prevented law enforcement from understanding how this is linked with the original idea of
Project Mayhem, and the creation of Tyler. This began floating around in 2006. It was noted that
a simulated conversation was created on a hacking forum, where it was cleverly established that
the "~el8" and the "pHC" were behind "pr0jekt mayh3m" or something similar. The objectives
listed, which may or may not be valid, indicated that they wanted to create something like Tyler
at this time.

This, of course, all draws back to the work of something abbreviated as the "IUA", or
"International Underground Alliance".

So given the objects at work, you may be distributing a GPS locator to people on the internet
because of espionage committed by the Chinese military. Take note I allege, but I justify. I'm
willing to hear any come back and take it seriously. Nobody should be stupid as to not, given
most fair conditions are existent.

- End

http://cryptome.org/2013/11/rustle-league-gnaa-cn-mil.htm




Chinese troops will have boots on the ground
in Hawaii on Tuesday
Judi McLeod
Canada Free Press
November 9, 2013

Aloha Hawaiians! If you see what you think are soldiers from the Communist Peoples Republic
of China Army wandering about in your neck of the woods Tuesday through Thursday next
week, your imagination is not playing tricks on you.

But don’t worry while Chinese soldiers will have boots on the ground in Hawaii, they are only
really “simulating”.For the first time in history the U.S. Army will host the Communist Peoples
Republic of China’s Army on American soil Nov. 12-14, 2013.

“Simulating humanitarian assistance and disaster relief to a fictional third country”.

You can’t make this stuff up when GridEx 2 is doing it for you.


FEMA's Simulated Blackout Drill
http://www.youtube.com/watch?v=OWUZkr8Brbc
Published on Sep 20, 2013

A multi-national terror drill is scheduled to take place in the coming months that supposedly
aims to assess, test and validate vital infrastructure resources should they come under an unlikely
cyberattack. http://www.infowars.com/government-to...
Stay in the know - Follow Alex on Twitter: https://twitter.com/RealAlexJones
'Like' Alex on FACEBOOK - https://www.facebook.com/AlexanderEme...
http://www.infowars.com/
http://www.prisonplanet.com/
http://www.infowars.net/
http://www.prisonplanet.tv
[[START GETTING HEALTHY NOW BEFORE IT'S TOO LATE]]
**Beyond Tangy Tangerine 2.0 is the most advanced multi-vitamin mineral complex to date.
http://infowarshealth.com/
[[INFOWARS THE MAGAZINE - SEPTEMBER ISSUE]]
http://www.infowarsshop.com/-Infowars...
[[DONATE TO ALEX JONES]] $5 or $10 A week. WE NEED YOU!
http://www.infowars.com/donate/
[[PREPAREDNESS PRODUCTS]] NEW ITEMS**
**EVERYTHING YOU NEED TO SURVIVE THE COLLAPSE**
http://www.infowarsshop.com/-Prepared...
[[HUGE LIST OF DVDS AT INFOWARS STORE]
http://www.infowarsshop.com/-DVDs_c_3...
[[INFOWARS GEAR]]
http://www.infowarsshop.com/-Infowars...
**[[Obamacare: Death Panels Are Cool]] - NEW OBAMA SHIRT**
http://www.infowarsshop.com/Obamacare...
Your Price $19.95 (designed by Alex Jones)**

                                                                                         Category


       News & Politics




Related: FEMA’s Simulated Blackout Drill

GridEx 2 (there was already a GridEx 1in November of 2011) is a massive ‘emergency drill’
planned to take place across the whole of North America with thousands of utility workers,
business executives, National Guard officers, FBI antiterrorism experts and officials from
government agencies, in the United States, Canada and Mexico (who) are preparing for an
emergency drill in November that will simulate physical attacks and cyberattacks that could take
down large sections of the power grid. (New York Times, Aug. 16, 2013).

“Fears about the possible detonation of a nuclear warhead in the skies about the United States,
for the purposes of creating an electromagnetic pulse aimed at sizzling electronics on the ground,
have led a number of public figures to call for significant steps to strengthen the power grid. Ex-
CIA head R. James Woolsey is planing a campaign to convince state governments to pass laws
requiring utilities to harden their electronics against potential EMP attacks.The exercise is touted
as a unified move “to test the resiliency of the U.S. power grid to withstand major damage causes
by a natural disaster or deliberate attack”.

“A key objective of GridEx 2 is to learn how governments would handle a loss of electrical
power that is large enough to drastically affect the delivery of common and essential goods and
services.” (NYT)

Hoping that the U.S., Canada or Mexico aren’t GridEx 2’s “fictional third country” and that the
soldiers out on reconnaissance in Blue Hawaii don’t stamp ‘Made in China’ on it.

The New York Times reported on GridEx 2’s massive, Nov. 13-14 drill on August 16, but never
mentioned the participation of the Peoples Republic of China’s Army.

China’s Xinhua Agencies kicked in on November 6 reporting that American and Chinese
soldiers will train together in the November exercise.

“The US military Pacific Commander, Samuel Locklear, said here Tuesday that a joint
humanitarian assistance and disaster relief exercise to be held this month helps improve the
relationship between the United States and China.” (Xinhua Agencies, Nov. 6, 2013)

”Locklear told a news briefing that the Pacific Command’s Army component commander in
Hawaii has been looking forward to the Nov. 12-14 exercises “for some time”, as the Army will
host the People’s Liberation Army soldiers of China to train together in a field environment,
simulating humanitarian assistance and disaster relief to a fictional third country.

“Summing up his expectations for the joint exercise, Locklear said both militaries can learn
something in disaster management and “better prepare tomorrow than yesterday”.

“In relation to our ability to do this with our Chinese counterparts”, he said, “this kind ofexercise
gives us a place to start, and get into the rhythm of understanding and trusting each other.”

“The joint exercise was announced during an August visit to Washington by Chinese Minister of
National Defense Chang Wanquan, as China and the United States expand their military-to-
military relationship and explore cooperation opportunities in non-traditional security areas.”

On August 19, Defense Secretary Chuck Hagel escorted China Minister of National Defense
Gen. Wanquan during an honor cordon at the Pentagon.

In a same day press conference, Gen. Wanquan said China’s military has never supported any
hacker actions, expressing at the joint press conference that the cyber space is a new field and
cyberspace security threats have become a world wide problem. “China is one of the major
victims of hacker attacks, suffering serious threats from network attacks,” he said.
Meanwhile, let’s hope the last one out of the GridEx 2 simulation exercise turns North America’s
lights back on.

China Deploys New Bomber with Long-Range Land Attack Missile

Bill Gertz FreeBeacon, November 7, 2013 4:35 pm

China’s military recently deployed an upgraded strategic bomber that will carry the military’s
new long-range land attack cruise missile, capable of attacking Hawaii and Guam, according to a
draft congressional report.

The Oct. 8 draft of the forthcoming report of the U.S.-China Economic and Security Review
Commission also reveals that China has developed a new armed drone nearly identical to U.S.
military’s Reaper. The Chinese missile-firing drone likely was developed through Chinese cyber
espionage against U.S. defense contractors.

This article was posted: Saturday, November 9, 2013 at 5:35 am


Tags: war

Related Articles

         Broadcast of Chinese military drill reveals map of Taiwan
         Pakistan tells CIA chief no U.S. boots on the ground
         Chinese Military Capable of Jamming U.S. Communications System
         Obama’s Syria Attack Resolution Authorizes Boots on the Ground
         Boots on the ground: Qatar fielded hundreds of soldiers in Libya

http://www.infowars.com/chinese-troops-will-have-boots-on-the-ground-in-hawaii-on-tuesday/



“GridX 2”:

How do you simulate physical attacks during emergency drills?
             By Judi McLeod (Bio and Archives) Wednesday, October 30, 2013
             Comments at bottom of page | Print friendly | Subscribe | Email Us



             83
If the National Spy Agency (NSA), which spies on all—citizenry and foreign nations alike—and
therefore knows all, then why is it necessary for the emergency drill planned to take place across
North America on November 13-14 “to test the resiliency of the U.S. power grid to withstand major
damage caused by a natural disaster or deliberate attack?”


                                                  “GridEx 2” is coming soon to a town near you.

“That is why thousands of utility workers, business executives, National Guard officers, F.B.I.
antiterrorism experts and officials from government agencies in the United States, Canada and
Mexico are preparing for an emergency drill in November that will simulate physical attacks and
cyberattacks that could take down large sections of the power grid.” (New York Times, Aug. 16,
2013)

According to NSA whistleblower Edward Snowdon, “no telephone in America makes call without
leaving record with NSA.”

Ditto for emails.

Nothing is safe from prying government eyes. Only yesterday, the FBI fined, threatened and forced
Ladar Levison to suspend the operation of his secure email service, Lavabit LLC, telling the
entrepreneur that his users were more likely to trust the government than him. (Daily Caller).

So, is the network keeping the lights on in North America somehow NSA exempt?

We’ll know the results of simulated cyberattacks during “GridEx 2” instantly. It’s called no power.

But how do you simulate physical attacks, and will we ever read the results about any simulated
physical attacks gone wrong?

What about terrorists planning a takedown of the grid. Would November 13-14 appeal to them on the
basis that their terrorism could be conveniently blamed on the “GridEx 2” massive simulation?

How do thousands of utility workers, business executives, bureaucrats communicate with each other
if their simulation exercise actually takes down large parts of the power grid in Canada, the United
Sates or Mexico?

Other than the New York Times and Facebook pickups on “GridEx 2” massive simulation plans, do
the populations of all three countries have any say when organizations decide to conduct dry runs?

“In excess of 150 entities have agreed to take part in the simulated event, called “GridEx 2,” the
Times reports.
“GridEx 2” sounds like something out of a science fiction novel, but it is related to GridEx 2011,
which took place November 16-17 in 2011, and involved not thousands but only 75 companies.

“Fears about the possible detonation of a nuclear warhead in the skies above the United States, for
the purposes of creating an electromagnetic pulse aimed at sizzling electronics on the ground, have
led a number of public figures to call for significant steps to strengthen the power grid. Ex-CIA head
R. James Woolsey is planning a campaign to convince state governments to pass laws requiring
utilities to harden their electronics against potential EMP attacks. (NYT)

“A key objective of GridEx 2 is to learn how governments would handle a loss of electrical power that
is large enough to drastically affect the delivery of common and essential goods and services.”

Some say we’re about to find out without the simulation on November 1, 2013, when a 5 percent,
across the board cut to America’s Food Stamp program begins.

Two weeks ago people panicked when EBT cards failed at supermarket cash outs.

Since October 1, the whole world had a front row seat to the colossal failure of Barack Obama’s
signature, multi-million-dollar healthcare website.

Rehearsals, no matter how massive cannot change the fact Governments goof up all the time.

Air Force officers entrusted with the launch keys to long-range nuclear missiles have been caught
twice this year leaving open a blast door that is intended to help prevent a terrorist or other intruder
from entering their underground command post, Air Force officials said, according to the Associated
Press.

“Government and utility companies have discussed in recent years how challenging it can be to
protect the power grid, which is involved in nearly all aspects of modern life. It is managed in large
part by a patchwork of regional and city authorities and privately owned firms.The grid is essential for
almost everything, but it is mostly controlled by investor-owned companies or municipal or regional
agencies. Ninety-nine percent of military facilities rely on commercial power, according to the White
House.

“Some utility-sector officials blame the government for not sharing intelligence about threats to the
power grid. In response, government leaders have recommended that some utility heads apply for
security clearances that would allow them access to classified information.”

Meanwhile, what we are seeing is government administration by dress rehearsal.

Some people call them false flag operations.

5 Comments

Copyright © Canada Free Press

RSS Feed for Judi McLeod

Judi McLeod is an award-winning journalist
with 30 years’ experience in the print media.
A former Toronto Sun columnist, she also
worked for the Kingston Whig Standard. Her
work has appeared on Rush Limbaugh,
Newsmax.com, Drudge Report,
Foxnews.com, and Glenn Beck.

Judi can be emailed at:
judi@canadafreepress.com

Older articles by Judi McLeod
http://canadafreepress.com/index.php/article/58909

   




Leave a message...




      Attach

Sign in with

   
   
   
   
      Sign up for Disqus

or pick a name

Disqus is a conversation network

      Disqus never moderates or censors. The rules on this community are its own.
      Your email is safe with us. It's only used for moderation and optional notifications.
      Don't be a jerk or do anything illegal. Everything is easier that way.

Read full terms and conditions
I'd rather post as guest

   Newest
       o Best
       o Newest
       o Oldest
   Community

       
       o     Login
       o     Send Feedback
   Share
       o     Share this discussion on
                 Twitter
                 Facebook






    Doreen Agostino

    •9 days ago•30

       o     −
       o     +
       o

    http://activistpost.com/2013/0...

    see more

       o
       o     30You must sign in to down-vote this post.
       o     •
       o     Reply
       o     •
       o     Share ›
                 Twitter
                 Facebook
                 Link


    gene1357

    •11 days ago•120

        o    −
        o    +
        o

    It's nothing less than a "Dress Rehearsal" of the regime's plan to take down the system.

    In other words, institutional preparation for martial law implementation proceeds as
    scheduled.
    Thanks to Judi for alertly discovering the scheme.

    see more

        o
        o    120You must sign in to down-vote this post.
        o    •
        o    Reply
        o    •
        o    Share ›
                 Twitter
                 Facebook
                 Link






    Sick of it

    •11 days ago•90

        o    −
        o    +
        o
    This could be the government's initial assault against the American people. If they take
    down the grid and those Google boats are floating C&C centers, they could coordinate
    the military and other federal forces when striking against us (including drones), while
    we'd have access to little in the way of communication. We'd be completely left in the
    dark.

    see more

       o
       o   90You must sign in to down-vote this post.
       o   •
       o   Reply
       o   •
       o   Share ›
               Twitter
               Facebook
               Link






    LibertyWriter

    •11 days ago•80

       o   −
       o   +
       o

    Just how do they practice turning the electrical service off? Just what will they practice?
    Cruising down the street and confiscating food?

    see more

       o
       o   80You must sign in to down-vote this post.
       o   •
       o   Reply
       o   •
       o   Share ›
               Twitter
               Facebook
               Link


    amongoose

    •11 days ago•90

       o   −
       o   +
       o

    It is simply an exercise --- one that would prepare for the securing of vital resources, food
    supplies, power generation, fuel distribution in an atmosphere where communication was
    limited. It is an exercise to make sure this can be done quickly, securely, and efficiently
    by your trusted federal government.
    Now doesn't that give you confidence and a warn fuzzy feeling knowing that in the event
    of a catastrophe the federal government will immediately have control of everything you
    need to survive.
    Makes me feel secure, secure in knowing I have prepared for me and mine. Because I'm
    quite certain they are going to take care of theirs.
    And you ain't included you useless eater, your a serf, and your no longer needed in the
    numbers you now are.

    see more

       o
       o   90You must sign in to down-vote this post.
       o   •
       o   Reply
       o   •
       o   Share ›
               Twitter
               Facebook
               Link






    Ron Winslow

    •11 days ago•90
           o     −
           o     +
           o

       we Americans need to wake up and put the real criminals in jail. the ones in DC who
       think they can violate the constitution when it gets in the way of them trying to control
       us. Long jail terms need to be given to all of them.

       see more

           o
           o     90You must sign in to down-vote this post.
           o     •
           o     Reply
           o     •
           o     Share ›
                     Twitter
                     Facebook
                     Link
   

   




Leave a message...




      Attach

Sign in with

   
   
   
   
      Sign up for Disqus

or pick a name

Disqus is a conversation network
      Disqus never moderates or censors. The rules on this community are its own.
      Your email is safe with us. It's only used for moderation and optional notifications.
      Don't be a jerk or do anything illegal. Everything is easier that way.

Read full terms and conditions




    I'd rather post as guest

      Newest
           oBest
           oNewest
           oOldest
      Community
   
           
           o    Login
           o    Send Feedback
      Share
           o    Share this discussion on
                    Twitter
                    Facebook




   

       Doreen Agostino

       •9 days ago•30

           o    −
           o    +
           o

       http://activistpost.com/2013/0...

       see more

           o
        o    30You must sign in to down-vote this post.
        o    •
        o    Reply
        o    •
        o    Share ›
                 Twitter
                 Facebook
                 Link






    gene1357

    •11 days ago•120

        o    −
        o    +
        o

    It's nothing less than a "Dress Rehearsal" of the regime's plan to take down the system.

    In other words, institutional preparation for martial law implementation proceeds as
    scheduled.
    Thanks to Judi for alertly discovering the scheme.

    see more

        o
        o    120You must sign in to down-vote this post.
        o    •
        o    Reply
        o    •
        o    Share ›
                 Twitter
                 Facebook
                 Link






    Sick of it
    •11 days ago•90

       o   −
       o   +
       o

    This could be the government's initial assault against the American people. If they take
    down the grid and those Google boats are floating C&C centers, they could coordinate
    the military and other federal forces when striking against us (including drones), while
    we'd have access to little in the way of communication. We'd be completely left in the
    dark.

    see more

       o
       o   90You must sign in to down-vote this post.
       o   •
       o   Reply
       o   •
       o   Share ›
               Twitter
               Facebook
               Link






    LibertyWriter

    •11 days ago•80

       o   −
       o   +
       o

    Just how do they practice turning the electrical service off? Just what will they practice?
    Cruising down the street and confiscating food?

    see more

       o
       o   80You must sign in to down-vote this post.
       o   •
       o   Reply
       o   •
       o   Share ›
                    Twitter
                    Facebook
                    Link






    amongoose

    •11 days ago•90

       o   −
       o   +
       o

    It is simply an exercise --- one that would prepare for the securing of vital resources, food
    supplies, power generation, fuel distribution in an atmosphere where communication was
    limited. It is an exercise to make sure this can be done quickly, securely, and efficiently
    by your trusted federal government.
    Now doesn't that give you confidence and a warn fuzzy feeling knowing that in the event
    of a catastrophe the federal government will immediately have control of everything you
    need to survive.
    Makes me feel secure, secure in knowing I have prepared for me and mine. Because I'm
    quite certain they are going to take care of theirs.
    And you ain't included you useless eater, your a serf, and your no longer needed in the
    numbers you now are.

    see more

       o
       o   90You must sign in to down-vote this post.
       o   •
       o   Reply
       o   •
       o   Share ›
               Twitter
               Facebook
               Link


    Ron Winslow

    •11 days ago•90

       o   −
       o   +
       o

    we Americans need to wake up and put the real criminals in jail. the ones in DC who
    think they can violate the constitution when it gets in the way of them trying to control
    us. Long jail terms need to be given to all of them.

    see more

       o
       o   90You must sign in to down-vote this post.
       o   •
       o   Reply
       o   •
       o   Share ›
               Twitter
               Facebook
               Link

       o   imissAB tsigili

           •11 days ago•20

                  −
                  +
               

           It's a shark bump.

           see more

               
                  20You must sign in to down-vote this post.
                  •
                  Reply
                           •
                           Share



                                                            
Objectivity In Contemporary Politics: How To Use Anonymous As
A Platform Of Espionage, Subversion, and Revolution
     (0 rating, 0 votes, rated)

You need to be a registered member to rate this post.



June 6, 2013 in Resistance

by Poemander

Thursday, June 6, 2013

Conspiracy theorists often earn their title by theorizing potential conclusions off of the facts embedded
deep within their consciousness. Groups which objectively research and prove their conclusions are called
“think tanks”, and are generally regarded as people who are seriously trying to bring light to truths
amongst society. The contrast between both groups is obvious, but their similarities are often overlooked.
In this article, I will be theorizing some conclusions based off of my research, which is a daily undertaking,
and presenting facts which you can reference later (Or during reading, as is often preferred). I do not offer
this article as a method to attempt espionage, subversion, or revolution; I instead offer the article as a
research paper, and title it to satisfy a sort of passive-aggressive humour which I thought was relative to
how others use Anonymous as their platform of choice to commit these acts.

For a long time, Anonymous was a group of anarchists based off of the image-sharing platform “4-Chan”
(http://www.4chan.org). Before this, they were a group of hackers, who at that time were beginning to
emerge into a new age of technology, known as the “~el8” or the “pHC” (Which stands for Phrackian High
Council), I am not really sure which. At any rate, Anonymous became a culture which was literally created
through subversion. This was easy because of the average tendency to be a part of “The Lulz” on the
internet, a fad created by loneliness and alienation to the external environment. “The Lulz”, which is not
an official term used by anyone to describe the object, is the concept of having a humour that is essentially
limited to social trends. By technicality, The Lulz is actually dissociative paranoia of reality, and is derived
by having an established concept of peer acceptance.

What I mean is that by creating the perception of The Lulz, through either honest or other means, it is
easy to establish a culture in which other objects may thrive.
When it came time for what were called “raids”, the atmosphere of 4chan was increasingly becoming
political. For this reason, many of the original Anonymous members did not approve of such “srs bsnss”,
or “Serious Business”, because the culture by default was not oriented towards the political atmosphere of
the world, but the environment which they were in. This eventuality became the rift which we can see in
Anonymous today, which is the division between the old and the new Anonymous. People continued to
believe that Anonymous was an anarchic idealism rather than a group aiming to target specific people,
both situations were created for “The Lulz”. Anonymous soon titled itself, due to its many achievements
(Though the context of those achievements is not authenticated and is still a topic to be investigate) “The
Final Boss of the Internet”.

It is likely that many of the key players who were involved in creating that rift are now responsible for
maintaining the current status quo of Anonymous. While 4-Chan remains, and will remain, a place of
discussion, sharing, and anonymity, it has been marred by the subversive work which, I believe, were one
of the new seeds of social interaction. Since the popularity of Anonymous as a hacker group, for instance,
the world has become enamored by “The Lulz”, and while meme’s were once a part of the image sharing
culture almost exclusively, they are now a large part of the fabric of youth media. This transformation, as
was discussed above, leads only to more paranoia of reality, and with each passing day, the strong
mentality which all humans are endowed with at birth is slowly being eroded. Most Anonymous members
are not familiar with psychology enough to understand how meme’s can devastate a consciousness over
time, whether it is targeted to demonize another person’s life or not. This secret has been kept secret right
in the open, and is a telling sign of the coming society we will be faced with in our future.

Around the same time that the user “Sabu” was forced to be a spy for the FBI, and this requires
verification, a user named “JackalAnon” had been a rising star within Anonymous, and was apparently
taken in under the tutelage of Sabu himself. Though this is only based off of an article on the website
“Encyclopaedia Dramatica”, which is mainly a joke website to document the jokes of the internet, and
meme’s in general, it adds to theory that JackalAnon was chosen as the one to succeed Sabu as “leader” of
a leaderless group. He would accomplish this by creating a massive social environment, which would
eventually span the entire array of social networking sites, in which the principles and objectives of
Anonymous would be given the spotlight. On The Twitter alone, he alone has created over a dozen social
media accounts, and has affiliated his account, “@YourAnonNews” (Which is actually an account run
almost exclusively by the group “Anonops”, more on that further), with many offshoots of the now-
popular “Hacktivist” culture. While Hacktivism has been around for some time, never before has it been
popularized to this degree, and this is largely due to new technologies being brought forth, as well as the
numerous vulnerabilities which make SQL (Structured Query Language) injection, spoofing (A form of
trickery, similar to “rustling”, intended as a tactic of espionage, google “HBGary”), and other forms of
manipulation easy. It is often, within the rift of Anonymous, that you will see other Anonymous users call
the new Anonymous sect “Script Kiddies”, or “Skiddies” for short.
Another member of Anonymous who is worth mentioning is Kayla. Kayla was a user directly responsible
for increasing the acts of Anonymous in terms of economic and political espionage. Kayla claimed to be a
16 year old girl, but there is no evidence to support this. She was acting as an espionage agent within
Anonymous, and wielded critical subversive powers within the main hierarchy of the group. Because of
how this user interacted with her environment, it has lead me to believe that “she” was not actually a 16
year old American, though may have been a girl, but was actually a member of the Chinese PLA. This is
largely due to her technical expertise and ability to deliver when it came to being tasked with something.
It is always possible she was not Chinese PLA, but she was definitely not a true component of the
Anonymous Collective. She acted as critically supplementary to whatever damage Anonymous would
actually do, and while I cannot confirm this, it is possible this user now holds the title “KyAnonymous”,
which is backed up by this user’s tactic, along with The Twitter user “@PLF2012”, to release the
Steubenville “rape video” and photograph. As I said, this is not proof, it just merely establishes the
correlation between the tactics of KyAnonymous and Kayla. PLF2012 was also responsible for causing the
perceived divide between Anonymous and Wikileaks, an apparent message that Anonymous no longer
needed Wikileaks, which should slowly burn to the ground in the coming years.

In 2011, during the period of the so-called “Arab Spring”, the movie “We Are Legion: The Story of the
Hacktivists” mentioned that under the guidance of CommanderX, Anonymous (Most likely through
Anonops) was responsible for providing the “people” of Egypt with a platform of success through social
media. What went on in those conversations we may never know, but because Anonymous is not exactly
connected directly with federal intelligence databases, it would have been impossible to confirm any
identity who appeared before the Anonymous members during that time. Instead, what was required to
harness the power of Anonymous as their personal army was to discuss supposed human rights violations.
While this may have been ideal for Anonymous to undertake as a political idealism, which it did
eventually, it became a point where Anonymous became a hypocrite. For instance, these people who were
supposedly being persecuted in Egypt were political dissidents, and were being punished by their
government for doing so.

This is not dissimilar with the situation surrounding HBGary, where the founder had released a form of
political dissidence against Anonymous, and Anonymous retaliated. At any rate, now the technology has
an excuse to be everywhere within the region, and is a big tool for people who want to claim that they are
real revolutionaries, whether they are or not, and draw real support, whether they deserve it or not. Since
Egypt, I have no doubt that the creation of the “Syrian Electronic Army”, which claimed much
responsibility for assaulting Israel during the Anonymous Operation “OpIsrael”. While this lead to many
arrests in the Gaza Strip and West Bank, and elsewhere, it is easy to see how the tools of destruction
afforded by hacktivists can become the feed in a pipeline to actual terrorists, and can encourage terrorism
because of how “easy” information warfare is. Information warfare itself has been known to level the
playing field in international conflicts, such as Somalia, and is a weapon of warfare, never to be mistaken
for hacktivism in ANY sense of the word.
My belief is that a large number of things are possible with Anonymous. I myself have created
“OpTorchLight”, the objectives of which were accomplished some time ago. Through this operation, I
wanted to establish the Intel Cartel, which is a name for a group of people that wish to cause global
subversion from consensus reality to intentionally implement the Violet Flame, a transcendentalist
concept dealing with transmutation. The secondary objective was to find the association between the Intel
Cartel and the Knights of Malta, which is not exactly concrete, but still valid (Based on facts surrounding
their tactics, their origins, their motives, etc.). Others who use the group merely wish to be a part of
something larger, and these people I have called “Ambiganons”, a sub-class of Anonymous which
accomplishes zero hacking, but participates in political activism through Anonymous (I am part of the
Ambiganon culture by default). Other still only wish to see suffering in people’s lives, and it is for this
reason which I remain a part of Anonymous, so that through Anonymous, which was their tool of
destruction, they are entirely defeated. This is not easy, but the future will hold many potential scenario’s
in which we may see the end of such an implementation.

Call me IA, mother******’s         Until next time…

http://planet.infowars.com/resistance/objectivity-in-contemporary-politics-how-to-use-anonymous-as-
a-platform-of-espionage-subversion-and-revolution




                                                            
How to better identify members of Anonymous, et al.
     (+1 rating, 1 votes, rated)

You need to be a registered member to rate this post.



September 20, 2012 in Resistance

by Poemander

Wednesday, September 19, 2012

For those of you unfamiliar with Anonymous, allow me to fill you in. Anonymous is a decentralized
network of hackers which works in solidarity with the OccupyTogether agenda. This article is primarily
here to help researchers gain fact-based knowledge on the various Anonymous sociotypes which can be
used to verify the true identity of Anonymous members.

————————–

1. The “Ambiganons”.
Ambiganon is a contraction of the two words Ambiguous and Anonymous. I created the term because it
was the most accurate and simple way to describe a member of the so-called “Liberal” community having
undergone the conversion process of becoming an Anon.

The ultimate goal of an Ambiganon is to reveal leaks of infornation in any way possible. This can be in the
form of a tweet, a blog post, or other form of sharing through social media.

Most commonly, an Ambiganon can be seen in marches, at Occupy rallies, or any other public event
(Sporadically at best) wearing the trademark Guy Fawkes mask, which is representative of the entire
collective, and it is believed that the mask brings a form of mental confidence.

This confidence, combined with the traditional wearing of the mask and the touting of traditional
conspiracy theorist rhetoric, provides the Ambiganon with a powerful method of acquiring new members
for the collective to share. As the Ambigabon does not hack himself, he is reliant upon the work of others
to settle his claims of superiority over the given topic.

In theory, the Ambiganon would appear unable to think for himself, not much unlike the common Liberal,
but unlike the Liberal, the will of the Ambiganon is diminished by the fact of his dedication to the
perspective of the collective. The media also plays a large role in the knowledge base of the Ambiganon.

To the Ambiganon, the media that he has learned to draw away from is mostly lies, so he draws toward
alternative media, which he believes to be true and, in some extreme cases, politically relevant. By
harnessing this alternative media, he is able to be happy within himself by propagating the knowledge in
that media and sharing it with others, commonly using the knowledge to form perspective and win
political debates as vaguely as possible.

Though the Ambiganon is completely unaware of the damage he may be causing by promoting lewd and
uninspired propaganda, it is a sign that he is indefinitely in service to mankind by engaging himself in the
total work of the collective.

Indeed, much like the Liberal, it is often an indicator of the Ambiganons moral capacity to do good,
however misplaced this intent may be.

2. The Intel Cartel

The Intel-Cartel is a joining of the abbreviated word “intelligence” and the word “cartel”. I have
constructed the term to loosely describe the hidden intelligence network which is comprised of a number
of configurations:

- Often you will see underground behaviour distributed amongst a small group of users. The function of
these pockets of activity is to be as public as possible. Since the political agenda is a hot topic, it is a
guaranteed asset to these groups to be in complete control of the content within the entire “approved”
information packages.

- Another type of underground cluster involves the heavy distribution of personality. Again, small groups
gather a network of followers around them and retweet the data packages given to them by their sources
approved by their superiors. By doing this, the Intel-Cartel has a unique advantage by gaining the ability
to shift the playing field on whim.

- Particularly on The Twiter, you can see how social media can be used as a great field of play for the Intel-
Cartel. Silent accounts randomly pop up and activate. On The Twitter you can change your twitter handle
and the name you want publicly displayed at any given moment. In a heartbeat, the aforementioned
groups in the Intel-Cartel have the advantage to “retweet” their sudden movement of activation.

The Intel-Cartel seeks to distribute personality at every opportiunity it can strategically use. Whoever they
are, they know the art of a psy-op like no other. Total NLP guru’s. Like all animals, the scent of a fresh kill
is seductive to say the least…

Moving on.

3. Law Enforcement

While I cannot speak for the intention of every law enforcement officer ever, what I know is that the Law
Enforcement officers on duty surrounding the case of Anonymous are just as hungry as the Intel-Cartel.
That’s not to say they don’t often hide in perspective, but I think deep down they want to catch the hidden
network behind Anonymous.

The methodology of officials on duty varies almost daily. It truly is like they wear those suits from A
Scanner Darkly, in that they distribute data that varies and keeps a “looped” perspective within the user.

Often it can be seen that a few of them might hold a popularity contest amongst them, but this is meant
only to draw attention to themselves and distract your reality with a newly “blended” one. This enables
personality to be generated, and the group may grow in size, ultimately harnessing more users to
incorporate more groups.

More popularity contests ensue.

And finally…

4. The Hackers

It definitely isn’t often you come across the random creations of some obscure clique of hackers, so when
you do, consider yourself lucky.
Anonymous hackers are the hardest to identify for a number of reasons:

- Firstly, their exploits are covered by a select few, who often inject this news rapidly to create personality.

- Secondly, a hacker works almost like a real ninja would. The art of being invisible is key, and
Anonymous provides that feeling of increased anonymity, notwithstanding the array of “cloaking” tools
the hacker may have.

- Thirdly, hacking is a crime, and not something to draw too much attention to in the wrong ways. In the
case of the collective’s end goals, however, news of these exploits are subject to assimilation by any of the
four Anonymous sociotypes described in this document as a form of personality.

From what I’ve gathered about the Lulzsec crew and all of those other crews that popped up randomly this
year, they still have their spheres of influence, and their motives may perhaps be agitated by the Liberal
media. It is true to say that many a lad became more Libertarian after witnessing the lies of Liberal media,
not to mention the countless leaks they have posted online at Wikileaks and elsewhere
*cough*pastebin*cough*

Who is holding the reigns of that sleigh, one can’t help but wonder.

———————

So for now I hope this article will help the reader understand what essentially is the byproduct of my
research on Anonymous. Take it into consideration on your travels, if you wish.




  88908              How to better ide
                                         Report site violation


← If the government is in fact a corporation, and we franchise.


The Alex Jones Show 2012-09-19 Wednesday interview with Gerald Celente – Mike Adams →


http://planet.infowars.com/resistance/how-to-better-identify-members-of-anonymos-et-al

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:24
posted:11/10/2013
language:English
pages:26