🕵️‍♂️ Emoji Investigator ™

questionable content, possibly linked 🔎 👣 💡

Category: Example

HB Gary leaks

HBGary company description on Wikipedia. (Current November 2017)

“It has been reported that HBGary Federal was contracted by the US government to develop astroturfing software which could create an “army” of multiple fake social media profiles.[38][39]

Later it was reported that while data security firm HBGary Federal was among the “Persona Management Software” contract’s bidders listed on a government website, the job was ultimately awarded to a firm that did not appear on the FedBizOpps.gov page of interested vendors. “This contract was awarded to a firm called Ntrepid,” Speaks wrote to Raw Story.[40]”

[Link to technical spec and project overview from Federal project site above]

Ars Technica, February 2011 article on Anonymous hack:

“HBGary Federal CEO Aaron Barr thought he had unmasked the hacker hordes of Anonymous and was preparing to name and shame those responsible for co-ordinating the group’s actions, including the denial-of-service attacks that hit MasterCard, Visa, and other perceived enemies of WikiLeaks late last year.

When Barr told one of those he believed to be an Anonymous ringleader about his forthcoming exposé, the Anonymous response was swift and humiliating. HBGary’s servers were broken into, its e-mails pillaged and published to the world, its data destroyed, and its website defaced.”

SQL injection through their custom third party content management system, apparently. Above article is mainly technical description of how Anonymous perpetrated attack.

Wired, February 2011 focused on HBGary side of the tale:

“Barr would do things like correlate timestamps; a user in IRC would post something, and then a Twitter post on the same topic might appear a second later. Find a few of these links and you might conclude that the IRC user and the Twitter user were the same person.”

Rawstory, February 2011:

“HBGary, which conspired with Bank of America and the Chamber of Commerce to attack WikiLeaks, spy on progressive writers and use malware against progressive organizations, was also revealed to have constructed software eerily similar to what the Air Force sought. “

Paragraph above links out to another February 2011 Rawstory piece with more details about the Chamber of Commerce story.

Cory Doctorow BoingBoing piece from February 2011 about the persona management proposal. Quotes from one of the leaked emails:

“For this purpose we custom developed either virtual machines or thumb drives for each persona. This allowed the human actor to open a virtual machine or thumb drive with an associated persona and have all the appropriate email accounts, associations, web pages, social media accounts, etc. pre-established and configured with visual cues to remind the actor which persona he/she is using so as not to accidentally cross-contaminate personas during use…”

Tracking the source email on Wikileaks for the above, but this is referenced on an archive.is page as being another PDF related to persona management and development system. (email ID 359)

Quote from email 359 PDF attachment:

“These accounts are maintained and updated automatically through RSS feeds, retweets, and linking together social media commenting between platforms. With a pool of these accounts to choose from, once you have a real name persona you create a Facebook and LinkedIn account using the given name, lock those accounts down and link these accounts to a selected # of previously created social media accounts, automatically pre-aging the real accounts.”

Okay, so it looks like the BoingBoing quote comes from the Word document attached to email 2142, some kind of white paper/project proposal for a new client.

Section of interest: “Persona and Content Development”. Text on Wikileaks’ docx file seems to agree with the text here at Archive.is.

Excerpted quotes from the section about “Character levels”:

Level 0 Character: Used mostly for quick and temporal communication. No persona description required. These characters have specific user accounts or email addresses that are used for quick communications or to satisfy very specific mission requirements that do not require any more in-depth use. […]

Level 1 Character: These accounts have slightly more depth with created generic names that generate significant hits when the name is queried on search engine and other social media platforms. These accounts are meant to provide slightly more depth for use in establishing contact with individuals and at a glance appearing to be real. Any accounts established for this type of a character would have the most strict privacy settings so as to hide the lack of detail associated with these accounts. As an example, an established level 1 persona might have an associated gmail address with a Facebook, twitter, and or linkedin account. All of the associated social media accounts would be set to the highest privacy settings so no details would be visible other than an account exists and may or may not be associated with a specific email address. […]

Level 2 Character: Level 2 characters are similar to level 1 characters except they provide slightly more detail on the personas background and may require some paid services to set up creative content pages for more in-depth exercise engagements. This requires more upfront character development so as to make a persona that will be viewed as plausible throughout the engagement. […] This means automated content generation mixed with human generated content related to the persona at a frequency that would be consistent with the personas background. […] HBGary Federal has devised a set of techniques that can make personas appear real, such as manipulating GPS coordinates and using location based services to checkin to specific locations, or using twitter hashtags and specific tweets to make it appear as if a persona is attending a specific conference. […]

Level 3 Character: The most detailed character. These personas are required to conduct human-to-human direct contact likely in-person to satisfy some more advanced exercise requirements. This character must look, smell, and feel 100% real at the most detailed level. […] Using some of our micro-blogging techniques for auto-generating content we can manage many of these types of accounts automatically and age them. Then when a real persona is created for a particular exercise we can associate a twitter, YouTube, and blog account that has been aging and link it to a LinkedIn and Facebook profile that was just created. This gives the perception that this person has been around in this space for a while. HBGary Federal also has experience in developing LLCs, phone services, websites, etc. to establish the corporate bonafides. There are also other tricks we can use to build friends lists quickly so as to give the perception the persona is social or professionally active.”

Ars Technica, March 2012 follow-up:

“The HBGary hackers collectively called themselves Internet Feds. They then started working under the name LulzSec, rapidly achieving infamy for a series of high-profile break-ins (victims including PBS, Sony, and Nintendo) and denial-of-service attacks. But by late September 2011, everyone in LulzSec except one member, avunit, had been identified, and every identified member except pwnsauce had been arrested.”

 

Ladder purifier

Today I bought a folding and retractable ladder and I am super proud of myself. I also bought an air filter/purifier and it’s just so crazy that it works!

A fault in Segment 227641

When the TOTU Auditors came and examined our Records of Processing, they found a fault in Segment 227641.

It was determined that our, as people call it, “Blockchain of Blame” had been scrubbed following the Incident. As a result a lot of automated buck-passing had gone on among distributed autonomous sub-processes, and accountability had gone well beyond the ‘Cloud’ into that place beyond the clouds, where vapor meets Outer Space – the place where our prayers are either answered, terminated, re-routed, delayed, destroyed, aggregated or passed on. Where the Sorters divide everything into Channels, for the Sifters who pass it back down to us the Scanners, the Monitors, and the Watchers.

Which were we? Were we all three? All four? Five? Six? ALL-ONE like the soap the robots use. They are obsessed with it.

Either way, this was almost definitely why the dragons came. As a result of us having breached the protective planetary sphere with our cares and worries. Our complaints were flying out to the stars and beyond.

At first people couldn’t really see them floating in the skies above us. Until a few Spotters started catching and carefully holding mere skewed corner-eye glimpses out into “verified group dragon sightings” such that neuro-typicals were also learning to see them in broad daylight.

Amazon order

  • Practice chanter
  • CR2 batteries for laser pointer
  • Hand-held cassette recorder
  • Deep cycle solar battery

Playback routines (start-up)

Invoke Princeps.

CWQ.

Review incoming messages.

Example: Speech Acts

Speech acts are commonly taken to include such acts as promising, ordering, greeting, warning, inviting and congratulating.”

Powered by WordPress & Theme by Anders Norén