If you've been wondering what COINTELPRO looks like in the 21st century, then today's your day. PALANTIR allying with Clinton's campaign, information about Aaron Swartz, """Fake News""", get it while it's hot.
Excerpts from the WL/Greenwald deck if you don't want the whole attachment
Strengths
–Their strength is their global following and volunteer staff. This allows them to have a very loose organization. Little if any direction or coordination is actually passed it is just inferred as part of the cause.
Julien pronounces and the minions follow. Larger infrastructure is fairly pointless to attack because they have so many other >points and organizations that are willing to distribute the >information and help them get new hosting services.
Weaknesses
–Financial: They are under increasing financial pressure because authorities are blocking their funding sources.
–Security: Need to get to the Swedish document submission server. Need to create doubt about their security and increase awareness that interaction with WikiLeaks will expose you.
–Mission: There is a fracture among the followers because of a belief that Julienis going astray from the cause and has selected his own mission of attacking the US.
•Despite the publicity, WikiLeaks is NOT in a healthy position right now. Their weakness are causing great stress in the >organization which can be capitalized on.
Proactive Tactics
Feed the fuel between the feuding groups. Disinformation. Create messages around actions to sabotage or discredit the opposing >organization. Submit fake documents and then call out the error.
•Create concern over the security of the infrastructure. Create exposure stories. If the process is believed to not be secure they >are done.
•Cyber attacks against the infrastructure to get data on document submitters. This would kill the project. Since the >servers are now in Sweden and France putting a team together >to get access is more straightforward.
•Media campaign to push the radical and reckless nature of wikileaksactivities. Sustained pressure. Does nothing for the fanatics, but creates concern and doubt amongst moderates.
•Search for leaks. Use social media to profile and identify risky behavior of employees.
Zachary Powell
Have wikileaks not been compromised?
Jonathan Adams
I don't believe so.
Oliver Reyes
I hope so because the conspiracies I've been hearing surrounding Assange and wikileaks lately are pretty concerning.
Adam Wilson
Yeah, I know what you mean. I think all we can do at this point is just try to soberly examine what information we've been given and try to make of it what we can. I don't think it's been co-opted and is just another psy-op outlet, but you never know. Best to take everything with a grain of salt, especially since you can't really know who is on the other side of the screen.
Jackson Martin
Bump
Logan Gomez
I ain't got time to dig through this shit, what are the highlights that support this theory?
Cooper Bennett
Just save your Princess Maker 2 file. Your waifu will be there for you when you're done.
0001- Online Persona Management Service. 50 User Licenses, 10 Personas per user. Software will allow 10 personas per user, replete with background , history, supporting details, and cyber presences that are technically, culturally and geographacilly consistent. Individual applications will enable an operator to exercise a number of different online persons from the same workstation and without fear of being discovered by sophisticated adversaries. Personas must be able to appear to originate in nearly any part of the world and can interact through conventional online services and social media platforms. The service includes a user friendly application environment to maximize the user's situational awareness by displaying real-time local information.
0002- Secure Virtual Private Network (VPN). 1 each VPN provides the ability for users to daily and automatically obtain randomly selected IP addresses through which they can access the internet. The daily rotation of the user s IP address prevents compromise during observation of likely or targeted web sites or services, while hiding the existence of the operation. In addition, may provide traffic mixing, blending the user s traffic with traffic from multitudes of users from outside the organization. This traffic blending provides excellent cover and powerful deniability. Anonymizer Enterprise Chameleon or equal
0003- Static IP Address Management. 50 each Licence protects the identity of government agencies and enterprise organizations. Enables organizations to manage their persistent online personas by assigning static IP addresses to each persona. Individuals can perform static impersonations, which allow them to look like the same person over time. Also allows organizations that frequent same site/service often to easily switch IP addresses to look like ordinary users as opposed to one organization. Anonymizer IP Mapper License or equal
Luis Garcia
oh you mean a-crazy-rapists-playground.com?
Brayden Reed
Wikileaks has been compromised. Assange is dead. Take everything from that source with a grain of salt.
Julian Bell
>>>/reddit/
Luke Walker
0004- Virtual Private Servers, CONUS. 1 each Provides CONUS or OCONUS points of presence locations that are setup for each customer based on the geographic area of operations the customer is operating within and which allow a customer?s online persona(s) to appear to originate from. Ability to provide virtual private servers that are procured using commercial hosting centers around the world and which are established anonymously. Once procured, the geosite is incorporated into the network and integrated within the customers environment and ready for use by the customer. Unless specifically designated as shared, locations are dedicated for use by each customer and never shared among other customers. Anonymizer Annual Dedicated CONUS Light Geosite or equal
0005- Virtual Private Servers, OCONUS. 8 Each Provides CONUS or OCONUS points of presence locations that are setup for each customer based on the geographic area of operations the customer is operating within and which allow a customer?s online persona(s) to appear to originate from. Ability to provide virtual private servers that are procured using commercial hosting centers around the world and which are established anonymously. Once procured, the geosite is incorporated into the network and integrated within the customers environment and ready for use by the customer. Unless specifically designated as shared, locations are dedicated for use by each customer and never shared among other customers. Anonymizer Annual Dedicated OCONUS Light Geosite or equal
0006- Remote Access Secure Virtual Private Network. 1 each Secure Operating Environment provides a reliable and protected computing environment from which to stage and conduct operations. Every session uses a clean Virtual Machine (VM) image. The solution is accessed through sets of Virtual Private Network (VPN) devices located at each Customer facility. The fully-managed VDI (Virtual Desktop Infrastructure) is an environment that allows users remote access from their desktop into a VM. Upon session termination, the VM is deleted and any virus, worm, or malicious software that the user inadvertently downloaded is destroyed. Anonymizer Virtual Desktop Infrastructure (VDI) Solution or equal.
around ac6ons to sabotage or discredit the opposing organiza6on. Submit fake documents and then call out the error.
stories. If the process is believed to not be secure they are done.
This would kill the project. Since the servers are now in Sweden and France pupng a team together to get access is more straighqorward.
wikileaks ac6vi6es. Sustained pressure. Does nothing for the fana6cs, but creates concern and doubt amongst moderates.
employees. '''
It really is FBIbook
Alexander Wilson
Which conspiracies are you referring too? I'm out of the loop.
Jack Thompson
His internet connection at the Ecuadorian embassy got cut and apparently is still off. The current theory is that he's been black bagged and wikileaks' various social media accounts have been subverted and playing a Weekend at Bernie's in order to release bogus info and destroy wikileaks' credibility.
That or some variation of it.
Dominic Rodriguez
But haven't there been live interviews with him aired after the blackout?
Brandon Wright
Why is Assange's internet not restored now that the election is over?
Eli Diaz
Nah, see, those interviews were recorded BEFORE and are just made to look like they are recent. /conspiracy
Probably because wikileaks keeps dropping cables and leaks and emails and airing the US's dirty laundry all over the fucking place.