This page has been archived and commenting is disabled.

MeeT THe LaTeST BooGeY MoNSTeR

williambanzai7's picture




 

 

Meet the latest boogey monster...

CHINESE HACKERS

 

.
THE PEOPLE'S HACKER
.
MAOTRIX RELOADED

You may have noticed the chatter building up to today's MSM Chinese hacker frenzy. For example, Google's Schmidt said just a few weeks ago that Chinese hackers were the greatest threat to the internet.

Now suddenly, a cyber-security firm (Mandiant: Link) decides to release a very impressive report describing the results of its ongoing investigation of Chinese hacking activities involving a nefarious government building in Shanghai and data vampirism of intellectual property etc. Enter, the MSM propagandistas.

I have little doubt that China is engaged in some form cyber espionage enabled by technology sold to them by American tech companies. I doubt, however, they are trying to spy on each of you.

More importantly, I have no doubt who is.

Did the Chinese create virus called Stuxnet? Are they building a gigantic server farm in some dystopian data bunker deep in a mountain somewhere out west? Are they busy trying to create a data hologram of everything that happens online? Yadda, yadda.

Here is something else I know: 

Electronic Frontier Foundation via Boing Boing--

 

"Last year, Representatives Rogers and Ruppersberger introduced CISPA, which would create a gaping new exemption to existing privacy law. CISPA would grant companies more power to obtain “threat” information (such as from private communications of users) and to disclose that data to the government without a warrant -- including sending data to the National Security Agency.

 

This week, CISPA was reintroduced in the House of Representatives. EFF is joining groups like ACLU and Fight for the Future in combating this legislation.

 

Last year, tens of thousands of concerned individuals used the EFF action center to speak out against overbroad and ineffective cybersecurity proposals. Together, we substantially changed the debate around cybersecurity in the U.S., moving forward a range of privacy-protective amendments and ultimately helping to defeat the Senate bill.

 

Now we need your help again. Can you send a message to your Representatives asking them to oppose this bill?"

 

 

WB7: Coincidence?

"Those Chinese hackers are everywhere, we have to pass another new law for spying on American citizens ordering Chinese food!"

Hey, what do I know.  It's Copernicus' birthday and I'm just a tin hatted fringe low brow ZH moron.

 

cop

 

"I got this moron thing that I do, it's called thinking."--George Carlin

.
AMERIKAN REICH (HEIL CISPA)
.

 

CISPA SAM

 

.
STOP CISPA

 

- advertisements -

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
Wed, 02/20/2013 - 01:34 | 3258570 trichotil
trichotil's picture

kontrolled opposition komrade,

they will kick usa's ass while banksters profit and slaughter via ww3.

http://www.bibliotecapleyades.net/sociopolitica/codex_magica/codex_magic...

https://www.youtube.com/results?search_query=samsara&oq=samsara&gs_l=you...

Tue, 02/19/2013 - 23:27 | 3258370 monad
monad's picture

That's not what Steve Jobs said...

Tue, 02/19/2013 - 23:34 | 3258382 williambanzai7
williambanzai7's picture

PEOPLE'S JOBS

Wed, 02/20/2013 - 14:32 | 3260368 monad
monad's picture

Schmidt has competition.

Wed, 02/20/2013 - 02:46 | 3258652 Zero-risk bias
Zero-risk bias's picture

I see that the youth sporting the covert communications shirt is in possession of a copy of 'young hackers liberation weekly'.

(Free iPhone VPN trial app included)?

 

Tue, 02/19/2013 - 22:56 | 3258284 NoWayJose
NoWayJose's picture

And remember, this is the country that is building nearly all of the computers and electronic gadgets used throughout the world. I have little doubt that they have added some extra goodies to the chips they produce. They do not need to win a shooting war if they win the economic war.

Wed, 02/20/2013 - 01:29 | 3258563 williambanzai7
williambanzai7's picture

I'm not a code freak, but I have an imagination. If they are smart enough to track the source of this, I can think of all kinds of things involving Trojan horses and nasty viruses, that could be deployed to counter it.

The question is why have they disclosed this instead of taking the necessary countermeasures. The answer is a combination of they don't want to, they don't want it to blow back on them since they are also in everyone's data underpants and they like boogeymonstering the Proles.

Tue, 02/19/2013 - 22:56 | 3258247 williambanzai7
williambanzai7's picture

Oops, now the Boogeyman is Eastern European: http://www.bloomberg.com/news/2013-02-19/apple-says-a-small-number-of-ma...

It is only a matter of time before a verified online ID becomes mandatory.

Tue, 02/19/2013 - 23:35 | 3258384 Phoenix_Rising
Phoenix_Rising's picture

Hammer nail head

 

Tue, 02/19/2013 - 23:02 | 3258299 Dewey Cheatum Howe
Dewey Cheatum Howe's picture

Reality is it isn't. This shit has been going on for awhile now. Just they allowing more of it to be publicized to make it look like an escalating problem to push the cyber-security agenda.

Tue, 02/19/2013 - 23:13 | 3258329 Phoenix_Rising
Phoenix_Rising's picture

You think the obvious idiot false flags to crucify assault weapons were an assault on your critical thinking skills?

Just wait

They are going to make you so scared to even turn on your computer you will awake with sweat running down your face

Full force frontal lobotomy for the O'dumfucks

Obama--It only works on stupid shits

Wed, 02/20/2013 - 11:03 | 3258990 Dewey Cheatum Howe
Dewey Cheatum Howe's picture

The Eastern Europeans especially ones tied to the Russian mob have been at it for years doing industrial espionage hacking, stealing credit card numbers and such. It is called earning money....... Chinese have been in the industrial espionage business to for years now. The cyber-security aspect is not paranoid tinfoil hat stuff. The world is getting ready to erupt and they are woefully behind on securing the systems like the electrical grid for example. They are just making more noise about it so they can try for the most draconian security measures possible. The more noise you make the more they will back off (assuming cooler rational heads prevail) until you quiet down. Free speech and influence of public opinion are different issues, ones frankly are more important for US. They are losing the attention of the distracted in the matrix via their control mechanism aka MSM and you can see the concern with the reactions.

Tue, 02/19/2013 - 22:32 | 3258216 Dewey Cheatum Howe
Dewey Cheatum Howe's picture

Looks like anonymous is still at it.

https://www.informationweek.com/security/attacks/anonymous-takes-on-stat...

"Our reasons for this attack are very simple. You've imprisoned or either censored our people. We will not tolerate things as such," according to a message included in the Anonymous data dump. "Aaron Swartz this is for you, this is for Operation Last Resort," it said.  A spokesman for the State Department didn't immediately return a call seeking a request for comment about the assertion by Anonymous that it had hacked into and released data from one of the agency's databases.

The Anonymous Operation Last Resort campaign was launched in the wake of the suicide of Internet activist Aaron Swartz, who had long suffered from depression, and who was facing a 35-year jail sentence after being arrested in 2011 on hacking charges. Those charges stemmed from Swartz allegedly downloading millions of articles from the JSTOR academic database, in part via a Massachusetts Institute of Technology server closet. In the wake of Swartz's death, many legal experts -- as well as Anonymous -- have called for a reform of the country's computer hacking laws. The Anonymous hacktivist collective announced that for President's Day, it hacked the U.S. State Department.

Under the flag of "Operation Last Resort," the group Monday claimed "we still have our warheads armed" and announced that for "round five" in its attack campaign, it was releasing information gleaned from a State Department database. The data dump -- or dox -- appeared to include work email addresses for over 170 U.S. State Department employees, as well as some biographical details, and to have been pulled from a database entitled "test_hrwg_careers_usa_ctc_com."

 

As noted by Operation Last Resort, the State Department dox was the fifth round of its attacks made in Swartz's memory. For those keeping score, the group executed three rounds of hacks against U.S. government websites and databases, as well as other entities involved in Swartz's case. That included leaking credentials for 4,000 U.S. banking executives that had been obtained from the Federal Reserve System, hacking and defacing the U.S. Sentencing Commission website, and hacking MIT. The group appeared to fail in its fourth bid, however, which was to interrupt the live stream of President Obama's State of the Union address last week.

Are the Anonymous attacks just publicity for the reform of computer crime laws that the group has been demanding? In fact, the attacks appear to have been more damaging than simple defacements or database dumps. Indeed, more than a month after Anonymous launched its attack against the U.S. Sentencing Commission's website, the site appears to remain hobbled, and features only a single "under construction" page, which displays key agency phone numbers, a "save the date" note for a national training seminar, and a link to an external U.S. government website for comment on "Federal Register Notice of Proposed 2013 Amendments to Federal Sentencing Guidelines and Request for Public Comment."

Furthermore, when the agency needed to distribute a major new report on federal sentencing practices that stretched to thousands of pages, it had to find someone else to distribute the report online, reported The Wall Street Journal. The agency reached out to Ohio State University law professor Douglas A. Berman, who posted it on his website.

"I would like to believe our government is functional enough to find some other way to get this out officially," Berman told the Journal. "I don't want to be the only reporter of record for all this material." Currently, however, the commission's single website page currently says that anyone inquiring into the report should contact the agency's office of public affairs, by telephone.

Anonymous, in a separate effort, also claimed Monday to have doxed the investment banking firm George K. Baum & Company by releasing copies of some customer records via ZeroBin. That information appears to include email addresses and account numbers for over 150 customers. Why hack that firm? Via Twitter, Anonymous claimed that the investment bank had ties to private intelligence firm Strategic Forecasting Inc., better known as Stratfor, which was reportedly hacked in 2011 by members of LulzSec and Anonymous. Authorities have accused alleged LulzSec participant Jeremy Hammond of masterminding the Stratfor hack, among other crimes. If convicted of all charges, Hammond faces life in prison. Anonymous also defaced the George K. Burn website, uploading a page that read: "We also know about your finances here Government of the United States ... Are u sure you want to continue this game?" The page was removed from the website by Tuesday.

Of course, Anonymous isn't the only hacktivist group with designs on American institutions. Notably, the Izz ad-Din al-Qassam Cyber Fighters have also threatened to resume their campaign of U.S. banking website disruptions. "We had warned formerly in the event that the offensive films wouldn't remove, we will be forced to resume Operation Ababil," said a Pastebin post uploaded Tuesday.

The Muslim group's distributed denial-of-service (DDoS) attacks against banks were launched last year, supposedly in retaliation for the uploading to YouTube of a copy of a film that mocks the founder of Islam. To date, various copies of the film have amassed tens of millions of hits on YouTube, although the originally uploaded film was removed from the site last month, apparently by the filmmaker. At the time, the al-Qassam Cyber Fighters claimed partial victory in their campaign to rid the Internet of the film, but said it was still holding the U.S. government responsible for excising the other copies.

The group repeated those demands in its Tuesday missive. "We now warn you seriously that remove the copies of the film and don't make much more trouble for yourselves and online users of the banks, there is not much time remaining," it said.

Tue, 02/19/2013 - 22:52 | 3258224 Dewey Cheatum Howe
Dewey Cheatum Howe's picture

And as I said in the past Obama don't negotiate when he gets his nose tweeked.

https://rt.com/usa/news/anonymous-hacks-state-department-617/

In his State of the Union address, Obama announced that he had signed an Executive Order on cyber security. He cited the “growing threat from cyber-attacks” as the reason behind the signing, adding that America must face the rapidly growing threat.

According to the order, “cyber threats” will be defined as “website defacement, espionage, theft of intellectual property, denial of service attacks, and destructive malware,” the White House told The Verge.

Under those guidelines, all of Operation Last Resort’s actions would be considered “cyber threats.”

 

 

Along with the attack, the group warned that it still has possession of “warheads” – key codes to unlock encrypted files named after the nine Supreme Court justices, which allegedly contain highly sensitive government information. The files were widely distributed January 25 when Anonymous hacked the US Sentencing Commission website.

This “round five” of “Operation Last Resort” refers to three previous #OpLastResort hacks on the property and databases of the US government, as well as one recently failed threat to interrupt the web broadcast of President Barack Obama’s State of the Union address last week.

 

You better have some good shit in those files, or else the torture ain't gonna be worth it for all the effort. I also hope you got those keys well distributed just in case.

Tue, 02/19/2013 - 23:01 | 3258297 steveo77
steveo77's picture

thats pretty weak

Tue, 02/19/2013 - 21:44 | 3258072 williambanzai7
williambanzai7's picture

No teaser?

Is this the best you can do?

Tue, 02/19/2013 - 22:26 | 3258196 Creepy Lurker
Creepy Lurker's picture

It's the first blog of this type I've seen in Ingrish. (But then, I don't get out much.) LOL

Tue, 02/19/2013 - 19:33 | 3257776 nmewn
nmewn's picture

Sorry, totaly OT...but its Biden so you know it has to be good...lol.

"He said he has advised wife Jill that if she needs to protect herself, “put that double-barrel shotgun and fire two blasts outside the house. I promise you, whoever is coming in is not going to.”

http://go.bloomberg.com/political-capital/2013-02-19/biden-double-barrel-shotgun-will-do-it/

So, what our super smart-power Vice President is advising his wife to do is, empty the gun into the air, preferrably out on the balcony or sumpin. You know, instead of into the chest of whoever is trying to enter the house after killing off the Secret Service detail guarding the house.

Fucking brilliant Joe.

Tue, 02/19/2013 - 23:04 | 3258305 steveo77
steveo77's picture

Yep I saw that too, and laughed at the absurdity.

Or if you hear a noise outside, do you just fire through the door, assuming you dont got no balcony.     I guess if you are elite you got balcony, and baloney

Wed, 02/20/2013 - 07:58 | 3258785 nmewn
nmewn's picture

I did too...LMAO!...almost had to pull to the side of the road I was laughing so hard.

The hysterical thing about it is, he was trying to make a case for why no one needs the UglyEvilBlackGun™ with a large capacity ammo mag...and in the process of doing it, made THE strongest case yet FOR owning one...if Jill has a UglyEvilBlackGun™ and follows his stupid advice, firing "two shots outside" into the air...and it doesn't work, she's still got 28 left to use on the people who just broke in ;-)

It was an incredible display of ole Joe's double barrel mind rambling in search of a logical thought or cogent argument...lol.

Tue, 02/19/2013 - 18:00 | 3257558 besnook
besnook's picture

with all due irony...all hail red china! savior(and second coming) of the west!

Tue, 02/19/2013 - 17:48 | 3257534 inevitablecollapse
inevitablecollapse's picture

89 56 82 59 01 05 60 57 36 75 12 42 17 75 00 10 88 06 65 49 48 92 62 04

Tue, 02/19/2013 - 17:34 | 3257488 kaiserhoff
kaiserhoff's picture

Ve need deeversions, Commander Cody..., deeversions.  Ya?

Tue, 02/19/2013 - 17:16 | 3257435 Fix It Again Timmy
Fix It Again Timmy's picture

In Vietnam, I got presented a bunch of medals during a ceremony; when it was done, I walked over to the nearest 55-gal. trash container and threw them in... Couldn't buy me then [it was the army or prison], can't buy be now....

Tue, 02/19/2013 - 16:44 | 3257328 Careless Whisper
Careless Whisper's picture

Of course the Chinese Army is hacking in to large Corpoations' computers to steal proprietary information, why wouldn't they?

But, it's up to those Companies to defend themselves, without taxpayer assistance.

Tue, 02/19/2013 - 22:46 | 3258101 williambanzai7
williambanzai7's picture

This occurred to me. They all have flimsy firewalls and mobile gateways designed for idiot employees sitting in motel rooms.

How is the US Gov going to remediate that?

Tue, 02/19/2013 - 22:46 | 3258257 Phoenix_Rising
Phoenix_Rising's picture

Kind of like a 13 YO  harvesting credit card numbers in Target's parking lots....

This whole cyber crime thing is hilarious

 

 

Tue, 02/19/2013 - 20:03 | 3257838 Phoenix_Rising
Phoenix_Rising's picture

If Corporation's can't protect their data, they shouldn't have any data.

This whole thing is so overblown

They want your internet freedom and your guns

Hmmm wonder why?

Tue, 02/19/2013 - 23:16 | 3258335 steveo77
steveo77's picture

Yep, that was the first thought after that China story was prominently pimped out.

Tue, 02/19/2013 - 23:05 | 3258312 steveo77
steveo77's picture

Yep, that was the first thought after that China story was prominently pimped out.

Tue, 02/19/2013 - 16:09 | 3257162 Dewey Cheatum Howe
Dewey Cheatum Howe's picture

And in related news the desensitization of killing other human beings by law enforcement and military continues. First it is turning killing into a video game aka drones now this.

http://reason.com/blog/2013/02/19/is-your-local-police-department-using-pi

What if I told you police in your town could desensitize themselves to the idea of shooting an (armed) child, pregnant woman, or young mother, for just a couple of bucks? The "No More Hesitation" series from Law Enforcement Targets Inc. offers exactly that. For less than 99 cents per target, police can shoot at real-life images "designed to give officers the experience of dealing with deadly force shooting scenarios with subjects that are not the norm during training."

The series contains seven targets in all, titled Pregnant Woman, Older Man 1, Older Man 2, Older Woman, Young Mother, Young Girl, and Little Brother. Each of the depicted subjects is armed.

Now read the company's response

"The subjects in NMH targets were chosen in order to give officers the experience of dealing with deadly force shooting scenarios with subjects that are not the norm during training. I found while speaking with officers and trainers in the law enforcement community that there is a hesitation on the part of cops when deadly force is required on subjects with atypical age, frailty or condition (one officer explaining that he enlarged photos of his own kids to use as targets so that he would not be caught off guard with such a drastically new experience while on duty). This hesitation time may be only seconds but that is not acceptable when officers are losing their lives in these same situations. The goal of NMH is to break that stereotype on the range, regardless of how slim the chances are of encountering a real life scenario that involves a child, pregnant woman, etc. If that initial hesitation time can be cut down due to range experience, the officer and community are better served."

 

Tue, 02/19/2013 - 16:10 | 3257192 the grateful un...
the grateful unemployed's picture

The marines were training using live tissue exercises. They released a number of barnyard animals, then blew them up, and shot them up, and let the medics treat their wounds to get experience. The press got to them and they stopped [i think]...

Tue, 02/19/2013 - 16:21 | 3257240 Dewey Cheatum Howe
Dewey Cheatum Howe's picture

There is still a difference between shooting at animals and a person. That doesn't desensitize you from shooting another human being. This on the other hand is using pyschological reinforcement that it is okay to shoot children and pregnant women. It erodes at our basic morality in how we view people by treating them as threats. It is just fucking wrong simple as that.

Tue, 02/19/2013 - 16:30 | 3257275 the grateful un...
the grateful unemployed's picture

all serial killers have one thing in common, they tortured animals when they were children. not every kid who tortures an animal becomes a serial killer, but almost all of them have that trait. if you want to be desensitized watch The Walking Dead, which encourages to empathize with survivors who have to designate human beings as target practice. i see your point, the problem is way bigger

Tue, 02/19/2013 - 18:02 | 3257567 Conax
Conax's picture

That 'walking dead' show is the most horrific thing I've ever seen them put on tv in prime time.

Heads coming apart, casual murders with no more thought than swatting a fly. Sure, they're supposed to be zombies, but the visuals speak for themselves.

A very evil thing to show juveniles and children every night.  There is an agenda behind it.

Tue, 02/19/2013 - 19:11 | 3257734 bilejones
bilejones's picture

The themes in current TV shows illustrate just what the agenda is.

1. A plethora of cop shows, the CSI's, Criminal Minds, Castle, Mentalist etc, where the unfailing message is how the astonishingly bright morally superior hero's of the State sacrifice themselves for the unworthy peasants who'd all be slaughtered otherwise.

2. Reality shows where the goal is the normalization of deviant of criminal behavior.

3. The supernaturals, Zombies, vampires werewolves: There are forces out there that are beyond your comprehension or control and can do with you what they will. You are helpless.

You are being prepped, and not for something good.

 

Tue, 02/19/2013 - 22:26 | 3258197 williambanzai7
williambanzai7's picture

Don't forget the talent shows.

Wed, 02/20/2013 - 00:41 | 3258499 the grateful un...
the grateful unemployed's picture

can you name one?

Tue, 02/19/2013 - 16:39 | 3257303 Dewey Cheatum Howe
Dewey Cheatum Howe's picture

Maybe I am wrong on the animal thing, I'm no psychologist, that animal thing at least to me seems more about medics being able to operate on damaged live tissue in a combat scenario than reinforcing killing of other human beings. Some of those training scenarios can be quite gruesome with actors faking being soldiers with missing limbs due to real time fake bombs going off and such. But the scenarios are more about medics being able to save lives in a scenario like that.

Wed, 02/20/2013 - 00:38 | 3258493 the grateful un...
the grateful unemployed's picture

you can always rationalize this behavior in the cause of progress. liberte fraternite egalite, and lets all go down to the square and watch them put a few heads through the guillotine. so i've come to doubt progress and the potus who recommends it...

Tue, 02/19/2013 - 16:05 | 3257161 the grateful un...
the grateful unemployed's picture

Bill Clinton caught a lot of grief after US warplanes bombed the Chinese embassy in Belgrade during the Bosnian conflict. China and Russia vetoed the NATO action in the UN. Then Bin Ladens training camp in Afghanistan wasn't too far from Bejing. More insidiious than American tech companies helping the Chinese jail dissidents who use the internet, is not data spying, but scrubbing. Information is routinely scrubbed to present a santized view of events. Even Wikipedia isn't above it, what you read today, might not be there tomorrow. The government doesn't need to imprison dissidents, it just wipes out all traces they ever existed. In the print age they made copies of things, so historians could dig around and find the truth. The consumer audience has two responses to government policy directed through an entertainment system (MSM). One is to cheer loudly the other is to ignore. No one ever draws a boo, or a protest (Bush used to put them in Free Speech Zones, miles away from where he was going to speak). This is the price you pay for access to free information, the information is disguised, altered, and tossed aside. Bon apetite.. 

Tue, 02/19/2013 - 16:00 | 3257111 tip e. canoe
tip e. canoe's picture

Obamao

http://armstrongeconomics.files.wordpress.com/2012/10/obama-mao-tshirt-r...

excellent work Bill.   saw the headline on PuffHo this morning & immediately thought the same.   this shit's becoming so obvious, it's beginning not even to be funny any longer.

just sad.   very sad.

Tue, 02/19/2013 - 15:53 | 3257102 shovelhead
shovelhead's picture

We need all your data to keep it safe from the Chinese.

Tell your Congressmen to support CISPA.

FORWARD.

Tue, 02/19/2013 - 19:57 | 3257828 OpenThePodBayDoorHAL
OpenThePodBayDoorHAL's picture

All of your base...base...base

Are belong to us...Us...Us

All of your base are belong to us

Tue, 02/19/2013 - 15:44 | 3257072 Klazy Plick
Klazy Plick's picture

Ha Ha, I'm committing a thought crime.  Come and get me coppers. Top of the world, ma!

Tue, 02/19/2013 - 15:38 | 3257042 Dewey Cheatum Howe
Dewey Cheatum Howe's picture

Next up on cyber warfare. Trolling message boards and facebook.

http://worldtruth.tv/cia-admits-full-monitoring-of-facebook-and-other-so...

One use that's confirmed, however, is the manipulation of social media through the use of fake online "personas" managed by the military. Recently the US Air Force had solicited private sector vendors for something called "persona management software." Such a technology would allow single individuals to command virtual armies of fake, digital "people" across numerous social media portals.

These "personas" were to have detailed, fictionalized backgrounds, to make them believable to outside observers, and a sophisticated identity protection service was to back them up, preventing suspicious readers from uncovering the real person behind the account. They even worked out ways to game geolocating services, so these "personas" could be virtually inserted anywhere in the world, providing ostensibly live commentary on real events, even while the operator was not really present.


When Raw Story first reported on the contract for this software, it was unclear what the Air Force wanted with it or even if it had been acquired. The potential for misuse, however, was abundantly clear.

A fake virtual army of people could be used to help create the impression of consensus opinion in online comment threads, or manipulate social media to the point where valuable stories are suppressed.

Ultimately, this can have the effect of causing a net change to the public's opinions and understanding of key world events.

Tue, 02/19/2013 - 23:54 | 3258424 monad
monad's picture

Congrats you just outed AnAnonymous as a closet global nazi.

Tue, 02/19/2013 - 20:11 | 3257858 Phoenix_Rising
Phoenix_Rising's picture

Joke or not????

 

RB: First of all, two days after the inauguration, at exactly 7:00 a.m. on January 23, something called “the Cyber-Warriors for Obama Project” was activated. I heard about this the week after the election, but only saw a hardcopy draft in late December. From what I was told, I believe this is a project that is being paid for through funds from Obama’s political corporation, the 501(c)4 Organizing for Obama, I believe it’s called. I can’t be sure, but that’s what I was told.

At that time, I was shown a white, three-ring binder with Obama’s circular campaign logo imprinted on the outside of the binder with the name “Cyber-Warriors for Obama” printed in blue across the top. Inside were the names and e-mail addresses of 3,575 “cyber assets,” or “warriors,” listed in alphabetical order under about a dozen or so “team leaders.” From a separate sheet I was shown, most of these “assets” are being paid just over minimum wage, but as I understand it, they work from home and have no overhead. I believe there are about two dozen supervisors who make substantially more.

Now I only had the binder for a minute, and could not take it from the room I was in, so this is strictly from memory.

It was tabbed, and one section with the word “targets” had a list of religious web sites, web sites I recognized as Christian. Another section was a listing of conservative Internet sites. There was another tab with the label “problem sites” that seemed quite extensive. I looked at that section, and it was broken down further into “birther” sites, “pro-gun” sites, “anti-abortion” sites, just to name a few.

There was also a section of the usual news sites, like CNN, ABC, you know. Numerous e-mail addresses were conspicuous under each news organization, which also included Fox… [unintelligible]. I figured you were going to ask.

The first page of the binder had bullet points labeled “objectives” and instructions for the cyber-assets. There was also a very detailed non-disclosure agreement with the word “DRAFT” typed in big, light grey letters across the body of the two-page agreement. The agreement and the instructions were typed on white paper with a warning, printed in red on each page, that the document was not to be copied or disseminated.

Tue, 02/19/2013 - 21:59 | 3258106 tip e. canoe
tip e. canoe's picture

wouldn't be surprised.

got a link tho?

Do NOT follow this link or you will be banned from the site!