Krypt3ia

(Greek: κρυπτεία / krupteía, from κρυπτός / kruptós, “hidden, secret things”)

A Real Cardinal of the Kremlin: An Asset In The Kremlin Exfiltrated and Blown By Russia and MSNBC

leave a comment »

Breathlessly and with great hyperbole the MSNBC report came across my iPad as I sipped my morning coffee. The reporter eagerly reporting on their “scoop” of locating, potentially, the Russian source inside the Kremlin’s whereabouts in Washington DC. As I sat agog at their reporting, a mix of “OMG OMG OMG LOOK AT US!” and “Sorry, I can’t report the details because two guys in an SUV came at us after we rang a doorbell!” as the bile rose inside of me. I then took to Twitter and began to get information that surprised me and made it all the worse. It turns out that MSNBC buried the real lede in their reporting. It seems their “tip” on the possible asset that was exfiltrated in 2017 was in fact from the Russian government by proxy of a news site called Kommersant.ru.

The Kommersant article, posted yesterday before MSNBC made their rush to the address of the alleged Russian asset in DC, gives the name plainly, which I will not do here, and links to earlier stories of the missing official who went on vacation in 2017 and “disappeared without a trace”… Of course the Russians would have readily known who the asset was after the EXFIL, but, to post it online was an interesting move. Originally “The Storm”, another Russian news outlet posted in October 2017 of the missing Russian official but no one in the media took note it seems. The updated story in Kommersant though was prompted by the stories in the media about how Trump could not be trusted with intel much like (think Lavrov and Kislyak in the Oval) where Trump released code word intel to them and blew an Israeli operation. As the stories swirled from CNN quoting that the exfil had happened because Trump, the Russians I am sure began to ponder how they could stick a finger in the eye of the US and the CIA.

What they did was just remind everyone that the name of the asset in their opinion was <REDACTED> and that his new address was <REDACTED> in Virginia USA. They actually gave the address in the article. MSNBC got the tip somehow (likely monitoring sites like Kommersant) and immediately dispatched a crew to go to the address and knock on the door Geraldo style and get the scoopy scoop and win the news day! Pay no mind to the potential intelligence disaster it may cause to someone who did a great service to this country.

…But hey HEADLINES! CLICKS! ADS! BYLINES!

Anyway, the asset has been moved I am sure but a lot still needs to be discussed here about this whole thing. I mean, why would they re-settle this guy and his family under his own name? Why would they allow them to purchase a rather large house under their names? I mean, once upon a time when you were exfiltrated from Russia (SOV Bloc) you got a new name and you got some money and lived quietly as you are consistently debriefed. Has the CIA lost it’s collective mind? Is this even the guy? What the hell is going on here? With that question upon my mind I will give this a bit of thought.

Is this the asset in question? … Given the details of their disappearance in 2017, and his role in the Kremlin, I am going to lean toward yes.

Why was this guy allowed to buy property and live in the open under his real name? … I honestly have a few theories:

  • The CIA wanted the Kremlin to know as a poke in the eye and a challenge. If this guy gets a polonium enema in the US, shit is gonna go plaid.
  • Also, the assets new life in a free country with considerable assets would perhaps entice others.
  • His EXFIL was pretty out in the open once he went RED RABBIT, so, perhaps there just was no need for an elaborate re-settlement and name change.
  • Lastly, perhaps there is some incompetence going on? Who knows, maybe the asset demanded they live free and under their own name?

What is going to happen now? … Well, if this asset has been moved as I suspect, then they likely will get that name change because they are spectacularly blown because of Kommersant and now MSNBC and all the other services. I mean, I did not name the guy here but Kommersant did and with just the name I tracked them down to the house through sales records online!

Jeez!

All in all, this whole affair just makes me scratch my head. I mean, we are really through the looking glass in 2019 with everything that has been going on since 2016 but wow. This whole thing at least moved me to post, something I have been uninterested in doing for a long while now, so there is that. I will watch the game unfold and see what plays out. I gotta say though, recent events regarding losses for the CIA in China and Iran have me worried that we have lost some of our skill sets in HUMINT. I would love to find out that this whole debacle was really a play at something larger by the CIA, but, I fear it wasn’t.

Interesting times…

K.

Written by Krypt3ia

2019/09/10 at 12:58

SyTech’s FSB Document Dump: Owning The Information Space and Disconnecting It

leave a comment »

 

Since the dump of the FSB’s contractor data from SyTech, I have spent some time looking at the files that the hacker group 0v1ru$ and their import. The files mostly consist of program statements and agreements between SyTech (SiTech) and the FSB (Unit 71330) for varying programs all tailored to information operations and control. Included as well are documents for programs for other units within the Russian government concerning the legal units and an information operations/communications unit as well. Overall, the documents are from the early 2000 up until 2019 and are for the most part mildly interesting.

I say mildly interesting because there are not a lot of technical documents included here. Now, the 0v1ru$ collective claims they hacked about 7.5 tb of data but they weeded that out to only dump about 177mb of the data on MEGA, so there is that. The media made hay about this information in their special way so I thought it prudent to look through it as well. For the most part the best stuff is around the programs where the Russians are looking to sift the whole of the internet using AI and algo’s to look at data and contextualize it all visually as well as pull pertinent information from mass unstructured data.

These programs not only seek to pull data out of metadata, visual data, etc, but also there is a program within the programs to edit that data (metadata specifically) on the fly to use in an information warfare aspect. I found this little tidbit interesting and think that this plays well with what the Russians were up to during 2016 and now moving on to 2020. The other program that is of note is a Tor de-anonymization effort using router nodes and heuristics to uncloak anyone using those Tor routers. It is much the same attack as that posited and used in the past where you own the exit notes and watch the flows.

Another little tidbit was a part of the overall program that also delved into the field of media including mass media and video. This also touched on facial recognition software and operations that could be used internally to control/watch internal protests and such. I see this as something along what China has been doing and likely they took cues from the Chinese state on this one. Lastly, there was a program in there as well that centered on hacking using distributed networking such as bittorrent. There wasn’t much in the way of backup data on what the tech was going to be but it seemed oriented toward having harder to track hacking via these programs.

Overall, I am kinda meh on the whole deal. The media tried to make it a thing, but really it was half a thing. I personally would like all 7tb of the data dropped on bittorrent by the hackers and have messaged them about that… Nothing back.

Oh well….

Here are the program/code names on the folders and descriptions translated from Cyrillic.

K.

Program Code Names and Their Operation:

ARION: Program for collection of data from many source types with the ability to categorize and sort July 26 2006

BUFFALO: Only file in this folder was a certificate

CUSTOMIZATION: Search customization’s to the overall product to search for and categorize/contextualize data from the whole internet to include geolocation and ability to sift by parameters set by client.

ENOT: Infrastructure needed for these applications and framework and its implementation

EVERY SHIT: Use cases that include everything from terorrism to internal unrest using pattern recognition including visual content using “deep learning” algorithms (Facial Recognition through GOSNIAAS

EXPERT-MPI: Creation of a set of software and hardware for legal support of the state system of legal information”

FORK: Code OKR-2 – “Tuning fork” Distributed Secure Computing System (Possibly Quantum Computing) Units 71330 and 43753 due in 2021

GAMBIT: Contract codes and prices in this folder

HOPE: “Study of the possibility of developing ATP, providing the accumulation, processing and visualization of technical information
on cross-border Internet traffic transfer routes ”

INFLUX: “Investigation of the possibility of creating a situational awareness center in a secure execution” Cipher NIR – “Infusion-2” due 2021 Study of existing and development of new methods for the distributed collection, processing, presentation and dissemination of information about objects of interest.

KNOCKOUT-S: Metadata engine/software for context searches for the whole of the internet. This will be used to contextualize threats (Including video/Visual mediums)

MENTOR: The purpose of research is to study the feasibility of developing an integrated automated system for collecting information by special methods and means.

MOSQUITO: “Investigation of the possibility of creating a software and hardware complex that implements the search and collection of information materials on the Internet, taking into account the anonymity and concealment of informational interest” (Cipher – “Mosquito”) Anonymous search collection to collect data without a trace

NAUTILUS-S: De-anonymization of TOR

Using clustering methods will allow you to go to a different level of analysis of the network traffic of the Tor network, including encrypted. Using signature and heuristic analysis of Tor sessions will provide tools for extracting Tor traffic from a stream.


2.Investigation of the possibility of creating a “trusted” output APC node to intercept traffic (using the Tor network as an example).
In addition to the problem solved in the mid-range research work, it is advisable to continue the study of creating trusted input and intermediate nodes in combination with methods such as active detection of TOR using trap hosts. The combination of methods will expand the possibilities for the study of constructed chains of Tor-nodes and the ability to intercept authentication data.
It is also advisable to develop methods for analyzing the parameters of Tor network nodes to assess their suitability for use as “trusted” ones.

ONSLAUGHT-2: Malware Research and Analysis Tool The purpose of the work is to create a software product based on the Open Source software suite that provides the ability to manage tasks from a single user interface by:

1) research and analysis of malware;
2) control and analysis of network traffic;
3) control the integrity of the code OS, OPO, STR.
Debian implementation environment (current version), LXDE desktop.

PEDANT: “Development of application software for a set of software and hardware tools of a dedicated segment of the legal information system of the State Legal Administration of the President of the Russian Federation”

REALITY: The purpose of research is to study existing and develop new methods and tools for the automated modification of attributes and metadata of information materials. (Military Unit 71330: Special Communications Services)

REWARD: “Investigation of the possibility of developing ATP penetration and covert use of peer-to-peer and hybrid network resources.”
code “Reward”. The aim of the work is to study the possibility of developing a complex of penetration and covert use of peer-to-peer and hybrid network resources.

Explore the features of the construction and implementation of peer-to-peer (decentralized) and hybrid (not using a tracker) networks (for example, networks like ED2K, BitTorrent, OpenFT, Jabber, etc.).
2.2.3. To develop a set of software and hardware penetration into existing (peer-to-peer and hybrid) networks.
2.2.4. To create an experimental model of a hardware-software complex (hereinafter referred to as EO PAK “Reward”) to study peer-to-peer and hybrid networks and to test it.

SATELLITE: SATELLITE Search API being created by SPUTNIK and SyTech

 

Written by Krypt3ia

2019/08/03 at 17:03

Posted in FSB

Existential Angst

leave a comment »

In the face of the daily news from all sources, the Twitter-sphere, and the rest of the internet, it seems that we all are facing numerous existential issues. In the news cycle alone lately we have more and more proofs with data that anthropogenic climate change (ok ok destruction) leaves us with an expiration date for life on the planet of 2050. Meanwhile, the Trump administration (if one calls it that and not shit show) is busily destroying Democracy and seemingly trying to move that 2050 deadline to, oh, next year. No wonder why generally the populace, and in particular the youth today (Millennials and Z’s) seem to be losing their collective minds and more often infantilizing themselves into a stupor.

Yes yes, of course the parents of those millennials also sculpted, wait, bulldozed, their psyche’s into this mess but after that, I cannot blame them looking at the world and just wanting to check the fuck out. I mean, look at all this shit today? How the fuck did we get here? No, it wasn’t just Russia either! No, we did this to ourselves and it’s only gonna get worse I fear. It will be a combination of fucked up elders and dysfunctional governments (mostly the US in this post) just spinning the cylinder on the .38 snub and hold it to our collective heads like that famous Vietnam war photo…. At least it can feel that way at times. We just have no control do we?

All of this and likely future fuckery that is to come makes me just postulate that we are in for a worse time down the line and that many of you out there will just go all YOLO and give up. I for one often think about this on a grander scale and since I am in my later years, I often just have to settle with; “well, at least I did not have any kids” because fuuuuuuck are they going to have to deal with all this shit when the bill comes due!

Which brings me to my next topic, as we move through all this and still do not do anything to really address the more existential issues that we all must deal with or die, I suspect more and more people will just resign themselves to it all and let apathy take them away. Some will be cognizant of it all and steadily lose their minds, showing many manifestations of mental maladies and perhaps take up behaviors like drugs, or other hobbies to just not deal with reality. It’s easy to get lost in the cyber now right?

Game away your pains and dull your senses with some drug or whatnot right?

Lately I have wondered and pondered at the people in this hacking/infosec community as well and why they seem so fixated on all this or that shit, lacking any broader ability to converse about things or experience things. Perhaps they already feel this, perhaps they are all spectrum…

Who knows.

Ugh, whatever… Just deal with your mortality kids.

K.

Written by Krypt3ia

2019/06/12 at 17:39

Posted in Uncategorized

No More LinkedIN

leave a comment »

It seems that after posting about an alleged sale of Iranian spy data on the darknet, I find myself no longer able to log into LinedIN. I believe someone reported me for that post and perhaps some of the other oddities posts I have found in the darknet and shared on my LI page. Upon trying to log in since then I get the following demand for my personal data, either my passport, my drivers license or some other identity card scanned or photographed to prove I am who I am to their site so I can log in again.

I have a couple words for you LinkedIN; Fuck you.

That’s right, fuck you. I remember when you got hacked and all your passwords were not encrypted. I sincerely doubt that you will handle even more sensitive data of mine like an image of my national ID, Passport, or my drivers license with any more delicacy. This also feels like just another means to gather even more data about me that you could potentially sell to others or provide to any law enforcement agency that asks in future. In fact, how do I know that this is not an attempt to harvest more personal data to do that now?

No, I have nothing to hide, but fuck this kind of shit to allegedly authenticate me after finding “strange activity” on my account. This smells like a corpse flower in the dead heat of the Amazon basin.

So yeah, I know LinkedIN was seeing all my traffic, and they kept trying to get me to sign up to a full account but this is no way to go about it, nor is it a security check that is valid either. I am not giving you my ID’s

Buh bye.

Written by Krypt3ia

2019/06/12 at 16:53

Posted in FUCKERY

shaqgegpbanuq24g.onion: Alleged Iranian Espionage Sale Site

leave a comment »

 

Tooling along the darknet last week I came across this little beauty and decided to play along. I collected the site first and took a look at the Persian text as well as tested the sites security with OnionScan. Here is what I found.

Original post from a pastebin on the darknet…

The Persian seems to have the right syntax for part of it but my Farsi is meh so if anyone wants to correct me there go right ahead.

ن از کارمندان سابق وزارت اطلاعات بودم و میخوام بگم که اگه کسی به اطلاعات دقیق نیاز داره یا خریدار اطلاعات است میتونه با من در تماس باشه از اونجایی که من خودم تو اون مملکت نیستم خیالم راحته و میخوام هرچی اطلاعات راجب کاراشون و افراد مخفی اون ها دارم رو در اختیار یک خریدار خوب قرار بدهم

Translation online:

I was a former employee of the Ministry of Intelligence, and I want to say that if someone needs accurate information or information purchaser can contact me, since I’m not in that country, I’m comfortable and I want all the information you need about them and their secret people. Give me a good buyer

Now all this tied to the imagery of Wikileaks and Anonymous kinda made me giggle but, it could still be legit (though not likely) so I decided to email the guy and see what I could get from him or them. The email address louferna@secmail.pro made me wonder if that was a name, I mean, Lou Ferna? Hmmm… A google of the name “Lou Ferna” got some hits but nothing that means anything really. The same goes for louferna straight up. I did go down the anagram rabbit hole for a bit but stopped myself before I started making murder maps with yarn in the office.

Anyway, in pondering the offering I had to wonder at the high bitcoin rate there. Seven bitcoins currently is worth about fifty four thousand dollars, which, I mean you gotta be a real player to pay this right? This kinda passed the smell test on this kind of data’s worth to the right people. Then there is the bit about giving proofs, which we shall cover further down in the post. I decided that this was worth playing with and used a cutout account to email the seller. Here is the results…

I emailed asking for proofs 

They responded first by saying they were working with someone else and brushed me off. I found that to be odd, so I pushed and emailed back saying that, that deal could fall through and what harm would there be if you gave me proofs? I mean, I could up the bitcoin amount if it was good stuff! They responded back with the text below….

With this email they had attached an image file. I checked that it wasn’t some malware etc and then opened it locally to inspect it. Once I took a look I emailed back to say that I would backstop what they had sent me and respond back confirming an offer. Of course I did not respond back but instead tried to do the backstopping as I had said I would.

The information that they sent is rather complete but useless in my opinion. I will admit that I did not spend a lot of cycles on the OSINT here (enough to translate names into Persian and then search) but I tried with all the ancillary data. So far, I was able to locate only one of these people and even that one had their name misspelled. Image searches for these guys proved fruitless as well because the engines kinda suck at this kind of thing. What became obvious to me is that this is all trying to play off of the leaks by the actors dropping APT34 data on the darknet as well as telegram, which I believe dropped even more tools etc this week if I remember correctly.

Anyway, if any of you come up with more solid data on these cats lemme know. I am not spending any more cycles on it really. Add to this the fact the the site is down now and was as of Monday when I checked again, so pretty much after I emailed them they went poof. I got no wallet to send money to etc. For all I know the other “client” paid up if there really ever was one. For myself, I am leaning on this being a fraud, an interesting one at that, but a fraud. The only other thing I can possibly think is that maybe I am just not seeing the right picture here and they did sell it and rolled up the carpet.

*shrug*

Some things to take from this though…

  • The site was clean, no security leaks at all. If you are gonna have a presence in the darknet it is really best to use the KISS method. These guys just used a simple HTML static page. Simple yet effective in keeping the security of where the site sat and not leaving a trace online to track back with. The only thing I could say is that the email address could be an Achilles heal because it is hosted by a company rather than their own hosting service.
  • The story had enough to keep one interested and to possibly think it is legit. It was a step above offering at the start to give proofs.
  • The brush off, if it was a ploy, was superb SE and they were playing the long game with that.
  • The 54K price tag also played into the thing being legit enough to at least talk to them.
  • The story that they used to be Iranian spooks and that they lived outside of Iran now played too, it also made for possible stale data in the offering, note they talked about Khomeini and agencies from the past.

Nothing ventured nothing gained huh? I of course reported the site to the right people in low places and forwarded a copy of the site in case it went poof (which it did) so they have it all.

An amusing story for you all.

Feel free to play the home game on those guys in the pics and lemme know what you find.

K.

 

Written by Krypt3ia

2019/06/05 at 17:15

Posted in Cyber, DARKNET, INTEL

The 2020 Disinformation and Election Meddling Melee Playbook.

leave a comment »

The Game:

 

“There is no objective truth, there is only subjective truth”

The upcoming 2020 Election cycle will be an all out melee I suspect for a few reasons. The first reason I am making this claim is that the US has done pretty much nothing under Trump to secure the next election because Trump cannot bear to discuss what happened in 2016 and has rebuffed Homeland Security and others ovations to talk about 2020’s security. Additionally, even not talking about the subject, Trump has seen fit to do absolutely nothing about the problem because, hey, it’s how he won the last time right? The big difference in the next election cycle’s attacks will be that the field has opened up much more since the playbook was used by the GRU and SVR in 2016. Now we will have a slew of other nation states as well as internal players (Republicans, Dems, and private groups with interests) who now can spin up campaigns of their own using the Russian active measures playbook.

The Players:

Russia

Russia will undoubtedly has already spun up operations tempo on the 2020 election cycle. We have seen an uptick already in GRU style action in disinformation stories being published by the likes of Sputnik and RT. Of course these entities are always at this, but, it seems the online game has also been at work with fake accounts on Facebook, Twitter, and other places online. The real question now is how will the GRU and the Kremlin innovate to counter the paltry efforts of Facebook and Twitter and get their message out.

Of course Russia already has the in with Trump in office to begin with and it seems that play for play Trump emulates or communicated what the Kremlin wants, in effect Trump is Putin’s puppet even if he doesn’t really understand that fact. The reality though is this; the Russians have moved in on all fronts and are using proxies to effect the overall fractured nature of the political landscape today not only in the US but all over the world. Remember, Putin’s goal is to cause chaos, division, and a malaise that will leave their perceived enemies unable to function as a nation/government/force that could threaten them.

To that end, we even have been seeing more incursions lately into US air space by BEAR-FOXTROT bombers with SU-35’s. This is also a means of pressure to keep the US off balance and garner news cycles. Russia will continue overtly and covertly to influence the US in myriad ways to keep us off balance and continue the division that makes us unable to act on the world stage with decisive action. The most insidious actions though will be to continue to use money and power to further their goals internally within the US along with kompromat to keep a hold on those in power that they can use.

Trump & Surrogates

We have been seeing what Trump and his surrogates have been doing these last two years already if you have been paying attention. Trump’s use of the constant rallies, constant lies, and “iniquity signalling” will only crescendo as he leads up to the 2020 vote. Trump’s current actions against the IC are also a means of control and division as well. I am sure that Trump will use any and all TS/TSCI information that Barr might declassify to leak or blatantly beat the media and his perceived enemies with it. Let’s just say that a person like Trump with this kind of power will use anything and everything he can get his hands on to distort and destroy in furtherance of his own power.

I would be looking for more disinformation operations being created and played out by not only Trump’s internal teams but also any others who may feel a kinship to his world view. You will likely see more home grown operations like Jacob Wohl’s though some might actually not be as easily stopped as has last few attempts. I would also say that Trump himself, with his patterns of lies, half truths, and confabulation, is a main player in this because he has the multiple stages of media that include the internet via Twitter at his disposal. Of course now that Trump and Barr are in a position to declassify TS/SCI information and weaponize it, we are likely to see much more come from the candidate/president than we have ever seen before as a nation. As I am writing this as well, the debate cycle for the Democratic party starts this evening, so buckle up kids, it is all starting in earnest. It will be interesting though to watch the President and his minions to see exactly what operations they try. Perhaps I will take notes and have a follow up list of attacks that he and his minions carry out.

China:

China has always had an interest in our politics and more specifically, our economy for a long time now. In that the shackles of information warfare have been removed by Russia, the Chinese are likely to be more aggressive in this arena as well. China is currently in an economic war with the whole of the world and it is their hegemony alone that they seek to effect. Of course now Trump has begun a trade war with China so there is even more inclination for China to play a part in effecting a change in our leadership with an eye toward a more accommodating trade policy from a more friendly candidate. The question there is who among the Democrats, Republicans (if any run) and or third party candidates suits their goals. I also wonder if maybe China might make the same calculus about American politics and dysfunction as the Russians do and just seek to cause more chaos. This would mean that the US as a global power would be that much more diminished and would give China a more free hand to assert their power along with Russia globally.

Hmmm….

Frankly, China has more to lose were the US to go up in flames financially than in trying to stabilize things here though. My gut tells me that they will attempt to get Trump out and place a more friendly face in the office with any means that they can (probably dark money to candidate of their choice) to stop the Trump trade war…

Iran:

Well, this will be the new and youthful player in the space this election cycle. Iran is presently on the edge of forever war with Bolton and Trump it seems and their delusions are getting stronger by the day that Iran is an existential threat. Iran will have to play catch up with regard to disinformation and information operations before they can be a real player like Russia or even China but I am sure they will be playing the game as well. In fact, there have been more moves on the internet of late that seem to be leading toward psyops and disinfo ops for the upcoming elections so keep an eye on them.

DPRK:

DPRK is a dark horse here and I am sure they will be taking part as well in the great games of 2020. History has shown that Un and his forces are a little more kinetic than most of the others in their operations online and off. Actually, in the arena they are second to Russia so I would be looking for some hacks and perhaps dumps akin to what Russia pulled off in 2016 to muddy the waters further. Of course in the case of Un and DPRK it is also in their interest to keep Donny in office. Donny is a weak president that Un can lie to and manipulate in order to further his own ends no matter what Donny says about their great relationship. I think if we watch for DPRK activity we will see some hacks, dumps, and more likely than those dark monies being funneled to campaigns to further their ends.

Saudi Arabia:

Saudi… What’s more to say right? Money, more money, more influence, and perhaps some disinformation as an appetizer? My bet would be that Saudi will go full in on Trump and perhaps be passing him dirt on candidates as well as funneling large sums to the Trump campaign to keep him in there. With the Kashoggi killing and the total air cover by Trump for that killing, I am sure that Saudi is a lock in support for Trump. With the alleged hack and dump on Bezos’ phone, we can see that if it was indeed Saudi who carried that out in retaliation for the WashPo, well, then they are certainly capable of much more. The question for me is just how much they will care to try and obfuscate where it’s all emanating from.

Scenarios

Disinformation:

What we have seen in disinformation operations since 2016 is just the tip of the iceberg. With the advent of social media and now computing power, we will likely see even more forgery of information or distortion of data that will cause people to believe all kinds of things in this election cycle. Remember, the point is to cause friction and sow chaos so the media does not have to be air tight, it only has to feed the cognitive dissonance of the target audience that they target. Even with information being proven to be false, we have seen people’s inability to get past their own beliefs to see the truth of things. So by dropping video, audio, articles, etc the damage is done and the momentum is carried. Look for the following types of disinformation operations:

  • Fake video (DeepFake) of individuals in the election cycle (even if they are easily found to be false)
  • Tampered video (Pelosi is slurring words)
  • Faked or tampered audio files
  • False information being leaked or posted (including forged email spools, documents, etc)
  • False or misleading stories being amplified on media
  • Leaking false information to news outlets (Leaked forged or tampered with databases)
  • Leaking false information in the form of oppo (opposition research) to opponents (Think Steele dossier on steroids created whole cloth)
  • YouTube and other video documentaries or clips with totally fictional content offered as “the truth” like flat earth videos
  • Insertion and operation of accounts on Twitter, Facebook, Telegram, Discord, Redit, basically any feed available with an audience to spill disinformation on
Propaganda:

Propaganda and Disinformation are kissing cousins really. Basically all of the above being pumped out by the likes of RT, FOX News, and other outlets. The ubiquity of the advertising and the news feeds that have become wholly about propaganda has made this hard to miss and or be affected by today.

  • Meme’s
  • Television/Internet/Radio news and advertising
  • YouTube videos and ads (lately they have been buying up interstitial space as well as before and after videos)
  • Whatabout-ism
Dirty Tricks:

Dirty tricks have been a long standing go to in our political system and now it is getting a re-assessment and revitalization since 2016. I would wholly attribute this to Roger Stone and his machinations along with the Trump/Russia collusion that took place. Incidents can be clearly outlined in 2016 like the actions of Cambridge Analytica that were caught on tape. Cambridge was looking to sell services of not only analytics but also dirty tricks by capturing people on tape with hookers etc to destroy them. Stone is famously known as being a dirty trickster and worked as such in the Nixon campaign. So yeah, we are likely to see this play out in 2020 as well. I would hasten to add that the recent Giuliani attempts in Ukraine to get dirt on Joe Biden are exactly this type of activity albeit totally and nakedly open to us all to see. You see, even the whiff of this dirt feeds the cognitive dissonance of the avid Trumper.

  • Setup’s like ACORN or Cambridge Analytica offerings of secret videos
  • Sex stings with video/audio/pictures
  • National Enquirer-esque leaks of dirt
  • Blog posts, tweets, etc that can be forged and said to be from a candidate
  • Fake claims made against candidates etc
  • Theft and release of information that is not flattering to a candidate (honestly, this is what happened to Clinton in 2016, what was really revelatory in those email dumps?)
Direct Action:

Russia really set the bar here for direct action. The hacking and leaking of information, even data that like the Clinton emails was a big “meh” was enough to feed the base of Trump and perhaps change minds of those who were on the fence about voting for her. Then again, the idea of hacking the election systems and the systems that tally the rolls has not been totally elucidated upon by the FBI and others. The fact of the matter is this, we now know that the GRU hacked those systems and had access, we just have no idea of what they actually did while on them. Did GRU put their thumb on the electoral scale and win Donny the election by the smallest of margins via the electoral system?

…. I kinda think they did but no proof means no certainty.

With that, consider what may happen this go round in 2020.

  • Hacking and dumping of data as we saw in 2016
  • Hacking and destruction of systems in an effort to make systems seem insecure/not trustworthy
  • Hacking and placing disinformation into data then leaking for effect
  • Hacking election systems and tampering with them secretly for vote control
  • Hacking systems not to actually damage them or change the vote but only to sow FUD on their security
  • Hacking and use of data in blackmail
  • Hacking and using ransomware etc to lock up systems and cause chaos and inaction
TRUMP:

Donny has been hard at work since taking office by having the constant rallies for his base. He has been feeding them a steady mixture of lies, distortions, and promises of “winning” since the start. Faced now with another election cycle where he could potentially be beat, he will go into overdrive with his antics to keep his base active as well as make all opponents look bad. What Trump will double down on though will be the same things as he has previously, e.g. “rigged elections, fake news, and whatever the Kremlin line is being put out there currently” I would add though, these bullet points of what he will likely try in 2020 pre and post election.

  • Begins to call election system into question pre-election
  • Leverages National Guard and or Active MIL to “guard” polling stations nationally (pressure on people to not vote through intimidation)
  • Calls the election “rigged” and challenges the result
  • Makes calls for his term to be extended
  • Calls a national emergency if he loses and attempts to go to court over the election results
  • Calls for a re-call election due to tampering
  • His usual disinformation road show will go full steam during the election cycle
  • Trump will amp up the discord by doing more outrageous things
  • Lastly, the Trump/Barr IC war will be leveraged against his perceived enemies using secret data to dump or distort to attack if not actually attempt to arrest his enemies.
Conclusions:

Well, here we are at what kind of feels like the end of Democracy. Trump is the catalyst for so much that is a detriment to the values of the United States that it is hard to even to attempt to prognosticate what he will try to keep his place in the White House. Of course, as I said before in this piece, the norms have all been broken now and the US and other countries still have not made any inroads and how to respond to these kinds of attacks. This means that we are all just unable to stop these things from happening and without solid responses when they do. This will all just escalate and get worse I fear with a specific scenario that Trump, by hook or by crook, wins in 2020 and is allowed to destroy how the countries government is supposed to work.

This is a key fact, we do not have a means of stopping the disinformation propagation nor do we have a means to effectively counter its effects. without laws and norms around this as well as a means to counter it all, we are lost. I have been watching the think tank reports and have in fact taken part in some of these working groups and in every case, it comes back to “what does the government have as tools and techniques to counter this?” and the answer even more so now is “none” … In fact, Trump has cut funding as well as ignored calls to formulate plans to stop these attacks on Democracy.

The net effect is we are fucked.

So, sit back kids, grab a tasty beverage and watch the fires of what is left of our Democracy burn.

… That’s kinda Millennial huh?

K.

Written by Krypt3ia

2019/05/28 at 13:03

Posted in 2020, Disinformation, Russia

Anders Brievik and Brenton Tarrant: Parallels of Manifesto’s, Actions and Psychology

leave a comment »

I recently began to consider the parallels between the Christchurch and the Norwegian mass shooters which was sparked by watching a special on Anders Breivik. In the documentary on Breivik, they delve into the manifesto and his history a bit and these two things seemed to track a bit with Brenton Tarrant’s actions. In fact, it seems that Tarrant was directly influenced by Anders and his actions as well as his manifesto. So much so, that Tarrant say’s in his manifesto that he idolized Anders and in fact reached out to the “knights Justiciar” online and had communication with Breivik; “Receiving a blessing for my mission after contacting his brother knights”  in his own manifesto placed online minutes before the attacks.

Digging in further, I located several copies of the full video that Tarrant was live streaming on Facebook on the darknet. I watched this and took notes on parallels between what Breivik’s and Tarrant’s actions methods and actions. It quickly became clear just how much Tarrant had taken from Breivik’s attacks and methodology. From this, I then sought out each of their writings online and their manifesto’s. I then began to map out just how much one had imitated the other and started to ponder if they are both suffering from the same mental maladies and to what extent. I began to see the parallels quite clearly and this is something the media really has not delved into. First, let’s look at the planning stages of their actions.

  • Breivik planned his attacks meticulously for eleven years
  • Tarrant planned for two years

 

  • Breivik wrote extensively about certain regions and histories around clashes of cultures
  • Tarrant seems to have traveled to those countries and regions that Breivik wrote about as a means to understand what Breivik had been writing about

 

  • Breivik researched and wrote quite a bit on his plan and his mission to include a manifesto over one thousand pages long
  • Tarrant wrote a seventy six page manifesto and his research was haphazard and minimal as to targeting

It seems that Tarrant lacked the concentration or perhaps the methodical nature that Breivik shows. By looking at the manifesto’s side by side, you can see that Tarrant pretty much just cribbed Breivik’s style and format as seen below. The imagery and the motive seem to be pretty parallel but once again, the diversion is on Tarrant’s side where he could not muster the longer and more convoluted writings as well as the complex ideas that Breivik is trying to get across in his writings. Of course the writings that Breivik put out also are cribbed as well from many sources and are mostly overly complex, the machinations of a disturbed mind. Actually, they remind me a lot of the writings of Ted Kaczinsky.

 

 

Breivik

Tarrant

Breivik Manifesto

Tarrant Manifesto

Formatting is not the only similarity that these two documents hold though. Tarrant actually copies Breivik’s style as well. In the much longer Breivik manifesto he drones on and on but finally toward the end has a Q&A with himself as a Justiciar Knight to describe what and why he is doing what he is doing. This is a direct attempt at self justification as well as a narcissistic pastiche about seeking others to emulate him as a warrior for the cause. In both cases they show the same pathology of attention seeking and self aggrandizement as rationalization for their actions and a call to others of like mind.

  • Both saw themselves as warriors in a greater war
  • Both have a need to be seen as a great actor in history
  • Both uploaded the manifesto just before actions
  • Both expected that these actions would be the lynch pin in causing a race war or cause great social changes

In addition to the manifesto’s and desires to be “great men” both actors had very specific needs to look and play the part of the warrior. What I mean here is that both nationalistically needed to be seen as well as heard. In this way, Breivik made the mold that Tarrant re-used and added to in his attacks. While Breivik did not live stream his attack, he did plan it and carry it out in a way that made him look and feel the part. Tarrant as well followed these visual and audio cues in his own way.

  • Breivik created/bought military uniforms to include full regalia
  • Tarrant created/bought a military uniform with added Neo Nazi black sun logo
  • Both use imagery and language concerning knights (Neo Nazi black sun in Tarrant’s equates to Wewelsburg and SS knights)

I would be interested to see if more of Tarrant’s writings and or images come out during his trial. This would add context to the comparison between the two actors actions and psyche’s. It seems that both planned for acquiring weapons and tactics much the same way, but, it is yet to be seen if Tarrant had any plans for bombs or had been working on or researching such things. My guess is that Tarrant lacked the patience for this and went for the quick hit instead. This is also visible in his shorter planning phase as well as his brevity in manifesto. It is also clear that Breivik’s hate was directed not only outwardly at Muslims or foreigners but also inward at his own country in his attacks and professions. Tarrant just went for the Muslims and the foreigner in a more spree killing modus.

Finally, I will cover the video that Tarrant live streamed. It is a hard thing to watch in total but it shows some cues that backstop this idea that Tarrant was really emulating Breivik down to some fine details.

  • Breivik wrote about using an iPod during the attacks to mute out the screams. This he said was to prevent him from losing his motivation
  • Tarrant played neo nazi music in the car and was dubbing this also over his video live feed
  • Breivik game-afied his attacks and played video games incessantly in preparation for the attacks
  • Tarrant did much the same making the video a “first person shooter” game with video as he gunned people down

It is pretty clear that Tarrant took Breivik’s model and upgraded it with the technology today of Facebook and a helmet cam. This I believe will not be the last time we see this kind of activity as the technology becomes even more ubiquitous. The question is then, how much amplification we will see with such attacks being footage that can be watched and re-watched online to activate others of like mind and mental states. It’s pretty clear that the motive of creating such videos is to activate others as well as get that 15 minutes of internet fame that the narcissist needs to sate them momentarily.

As a parting thought, I would also like to say that both of these men seem to have the same mental illnesses but I am afraid there isn’t enough evidence in the case of Tarrant as yet. Breivik clearly is a paranoid schizophrenic and I believe that was the diagnosis of him at trial. Tarrant’s history and a review of his mental status as yet to my knowledge has not been carried out and released to the public. I would be interested to see more of Tarrant’s history and biography to see if there are parallels as well. As of this date I know that Tarrant’s father died when he was ten years old but there seems not to be a similar history of mental illness as presented by Breivik even at an early age. Nature versus nurture is still a coin toss as far as I am concerned so there is still much to learn about Tarrant before we can make any pronouncements of mental illness. I will keep watching as more comes out but I thought this was an interesting set of circumstances to write about.

K.

Written by Krypt3ia

2019/05/24 at 13:37