Tim Boucher

Questionable content, possibly linked

Category: Example (Page 1 of 2)

Orchard wassailing

“The orchard-visiting wassail refers to the ancient custom of visiting orchards in cider-producing regions of England, reciting incantations and singing to the trees to promote a good harvest for the coming year.”

Video examples:

“In English folklore, the Apple Tree Man is the name given to the spirit of the oldest apple tree in an orchard,[1] and in whom the fertility of the orchard is thought to reside.[2] Tales about the Apple Tree Man were collected by the folklorist Ruth Tongue in the cider producing county of Somerset.”

Seeker Application (at a kiosk)

Welcome to Provider Station Alpha Kilo Bravo 7
--
"Your struggles are over."
--
>request help
Request for Providership

You, the Supplicant or Seeker, beseech us as Provider to enter into a service agreement, the terms of which are outlined in the Terms of Service. By completing this application, you agree to the Terms and all other linked policies. 

Any data entered here will be saved and associated with your public Gestalt keys.
Continue? (y/n)
>y
--APPLICATION ACCEPTANCE PROVISIONAL ON SUCCESSFUL COMPLETION OF BIOGENETIC SCANS AND SAMPLING--
What are you seeking?

[1] Stationing
[2] Provisions
[3] Medical
[4] Comms

>1,2

What do you offer in exchange?

[1] Credits
[2] Goods
[3] Sharing
[4] Other

>4

Please define:

>information

Seconds pass…

An agent will be with you shortly.

OpenQNL: Spin.cast(test)

DO.TEST

FROM SPIN-CAST SYS

MESSAGE Hello.World;

Spintax (example)

The [[entity]] was {huddled|slumped|slouched} by the {fire|toilet|window} in the [[place]] and vomited {words|cereal|light} into a porticle connected to [[ai]], an AI for [[provider]].

Insult generator

One of many out there, I’m sure. Sample output: pimple licking tree sucker.

Open Source Intel Analyst – New York (Storyful)

I’ve only just begun getting my feet wet with open source investigation techniques and citizen journalism, but this job ad from Storyful sounds like something to grow into:

Open Source Intel Analyst – New York

Since 2010, Storyful’s newsroom has been working at the intersection of social media, news and technology to help media partners tell the stories that matter most. Our heritage lies in the discovery, verification, acquisition and contextualization of eyewitness video – but now we do so much more.

We are seeking a skilled researcher whose instincts are equal parts investigative journalist, intelligence analyst and social media junkie. This person should be comfortable studying and moving within online communities – some with fairly unsavory or extreme ideologies – for the purpose of detecting patterns, discerning plans and identifying the players operating outside the trending topics of the day.

I’m not really looking for a job, so much as a model for how the future will likely work, with regards to media, truth and transmission of information…

Homeland (tv series) sock-puppet clip

Office of Policy Coordination:

HB Gary leaks

HBGary company description on Wikipedia. (Current November 2017)

“It has been reported that HBGary Federal was contracted by the US government to develop astroturfing software which could create an “army” of multiple fake social media profiles.[38][39]

Later it was reported that while data security firm HBGary Federal was among the “Persona Management Software” contract’s bidders listed on a government website, the job was ultimately awarded to a firm that did not appear on the FedBizOpps.gov page of interested vendors. “This contract was awarded to a firm called Ntrepid,” Speaks wrote to Raw Story.[40]”

[Link to technical spec and project overview from Federal project site above]

Ars Technica, February 2011 article on Anonymous hack:

“HBGary Federal CEO Aaron Barr thought he had unmasked the hacker hordes of Anonymous and was preparing to name and shame those responsible for co-ordinating the group’s actions, including the denial-of-service attacks that hit MasterCard, Visa, and other perceived enemies of WikiLeaks late last year.

When Barr told one of those he believed to be an Anonymous ringleader about his forthcoming exposé, the Anonymous response was swift and humiliating. HBGary’s servers were broken into, its e-mails pillaged and published to the world, its data destroyed, and its website defaced.”

SQL injection through their custom third party content management system, apparently. Above article is mainly technical description of how Anonymous perpetrated attack.

Wired, February 2011 focused on HBGary side of the tale:

“Barr would do things like correlate timestamps; a user in IRC would post something, and then a Twitter post on the same topic might appear a second later. Find a few of these links and you might conclude that the IRC user and the Twitter user were the same person.”

Rawstory, February 2011:

“HBGary, which conspired with Bank of America and the Chamber of Commerce to attack WikiLeaks, spy on progressive writers and use malware against progressive organizations, was also revealed to have constructed software eerily similar to what the Air Force sought. “

Paragraph above links out to another February 2011 Rawstory piece with more details about the Chamber of Commerce story.

Cory Doctorow BoingBoing piece from February 2011 about the persona management proposal. Quotes from one of the leaked emails:

“For this purpose we custom developed either virtual machines or thumb drives for each persona. This allowed the human actor to open a virtual machine or thumb drive with an associated persona and have all the appropriate email accounts, associations, web pages, social media accounts, etc. pre-established and configured with visual cues to remind the actor which persona he/she is using so as not to accidentally cross-contaminate personas during use…”

Tracking the source email on Wikileaks for the above, but this is referenced on an archive.is page as being another PDF related to persona management and development system. (email ID 359)

Quote from email 359 PDF attachment:

“These accounts are maintained and updated automatically through RSS feeds, retweets, and linking together social media commenting between platforms. With a pool of these accounts to choose from, once you have a real name persona you create a Facebook and LinkedIn account using the given name, lock those accounts down and link these accounts to a selected # of previously created social media accounts, automatically pre-aging the real accounts.”

Okay, so it looks like the BoingBoing quote comes from the Word document attached to email 2142, some kind of white paper/project proposal for a new client.

Section of interest: “Persona and Content Development”. Text on Wikileaks’ docx file seems to agree with the text here at Archive.is.

Excerpted quotes from the section about “Character levels”:

Level 0 Character: Used mostly for quick and temporal communication. No persona description required. These characters have specific user accounts or email addresses that are used for quick communications or to satisfy very specific mission requirements that do not require any more in-depth use. […]

Level 1 Character: These accounts have slightly more depth with created generic names that generate significant hits when the name is queried on search engine and other social media platforms. These accounts are meant to provide slightly more depth for use in establishing contact with individuals and at a glance appearing to be real. Any accounts established for this type of a character would have the most strict privacy settings so as to hide the lack of detail associated with these accounts. As an example, an established level 1 persona might have an associated gmail address with a Facebook, twitter, and or linkedin account. All of the associated social media accounts would be set to the highest privacy settings so no details would be visible other than an account exists and may or may not be associated with a specific email address. […]

Level 2 Character: Level 2 characters are similar to level 1 characters except they provide slightly more detail on the personas background and may require some paid services to set up creative content pages for more in-depth exercise engagements. This requires more upfront character development so as to make a persona that will be viewed as plausible throughout the engagement. […] This means automated content generation mixed with human generated content related to the persona at a frequency that would be consistent with the personas background. […] HBGary Federal has devised a set of techniques that can make personas appear real, such as manipulating GPS coordinates and using location based services to checkin to specific locations, or using twitter hashtags and specific tweets to make it appear as if a persona is attending a specific conference. […]

Level 3 Character: The most detailed character. These personas are required to conduct human-to-human direct contact likely in-person to satisfy some more advanced exercise requirements. This character must look, smell, and feel 100% real at the most detailed level. […] Using some of our micro-blogging techniques for auto-generating content we can manage many of these types of accounts automatically and age them. Then when a real persona is created for a particular exercise we can associate a twitter, YouTube, and blog account that has been aging and link it to a LinkedIn and Facebook profile that was just created. This gives the perception that this person has been around in this space for a while. HBGary Federal also has experience in developing LLCs, phone services, websites, etc. to establish the corporate bonafides. There are also other tricks we can use to build friends lists quickly so as to give the perception the persona is social or professionally active.”

Ars Technica, March 2012 follow-up:

“The HBGary hackers collectively called themselves Internet Feds. They then started working under the name LulzSec, rapidly achieving infamy for a series of high-profile break-ins (victims including PBS, Sony, and Nintendo) and denial-of-service attacks. But by late September 2011, everyone in LulzSec except one member, avunit, had been identified, and every identified member except pwnsauce had been arrested.”

 

Ladder purifier

Today I bought a folding and retractable ladder and I am super proud of myself. I also bought an air filter/purifier and it’s just so crazy that it works!

Page 1 of 2

Powered by WordPress & Theme by Anders Norén