[ / / / / / / / / / / / / / ] [ dir / random / 93 / biohzrd / hkacade / hkpnd / tct / utd / uy / yebalnia ]

/32/ - Psychopolitics

It's all in your head
Email
Comment *
File
Password (Randomized for file and post deletion; you may also set your own.)
Archive
* = required field[▶Show post options & limits]
Confused? See the FAQ.
Embed
(replaces files and can be used instead)
Options

Allowed file types:jpg, jpeg, gif, png, webp,webm, mp4, mov, pdf
Max filesize is16 MB.
Max image dimensions are15000 x15000.
You may upload5 per post.


The IRC is active at Rizon's #32.

File: 4312dae3aed1135⋯.jpg (16.32 KB,400x400,1:1,put_21cb9f_6319827.jpg)

 No.3521

Given the success of the CIA and other intellingence operations, I was thinking 2 things:

1. Is there any precedent of an intelligence service formed by civilians for the interest of the country?

2. Could I do this myself? How do I convince people? Is it worth it?

My goals would be to infiltrate the opposition, use hidden cameras or just get to know their plans to possibly mess them up. Set our own psyops, like the ones they do, but to confuse anti-nationalistic movements.

I'm from South America btw, so maybe that's an advantage, our authorities don't get too worried about what we do.

____________________________
Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3529

>>3521

You need a lot of friends and people to work with, this is not something you do by yourself. Money isn't necessarily an issue,

Rounded Social skills(to work with teams and talk to people you seek to pursue) and a good cause/understanding of what you are trying to convince people of is vital.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3537

There are plenty of civilians doing intelligence work, but not on a volunteer basis for the good of the country. Business intelligence or opposition research in political parties, for example.

The closest to a volunteer intelligence army, I think, is HWNDU.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3538

>>3537

>HWNDU

>psyops

I am not amerifat like I've said, so I don't know for sure, but I don't think you can call those faggots a psyop. Even if they are one, they're pretty bad at it.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3541

You could do this by yourself. Like an investigative journalist. But things would be much more effective with a lot of people on your side. Basically talk with a shit ton of people. Slip in some probing questions here and there, for example ask people what their opinion is on (corruption scandal). Don't waste time on people who don't care. But the people that react with anger and show signs of wanting justice, these people you dig deeper with them, you find out if they're all talk or they will take action. Then you befriend these guys and introduce them to your operations down the line when you trust them 110%.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3542

File: f1600bb7fca056e⋯.png (1006.55 KB,876x1556,219:389,textremandres.png)

>>3521

Yes its possible. I'm involved with a group doing this in the US. Its very hard and requires a lot of previous experience. However it can be worth it.

One quick tip, divide the group you make into three parts:

- Those who gather information ("Watchers")

- Those who processes information and cut away the irrelevant from the relevant ("Analysts")

- Those who take action based on the information ("Reducers")

Should I go on?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3544

>>3542

Yes please. Share anything and everything that could be useful. Your hands-on experience is extremely valuable to those who want to start similar operations.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3545

>>3544 (checked)

What kind of stuff do you want to know about? What are your goals? This stuff is a broad topic, I could write at least a few books about the whole thing.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3546

>>3545

Talk about how you convinced people to join you or how you were convinced.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3547

>>3545

Different anon here. I want to know more about your information gathering methods.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3548

>>3546

>Talk about how you convinced people to join you

I presume you mean developing people as assets. That is actually a really difficult task, but there are two main methods. The first of these is crashing, and the second is rapport building.

Crashing is an all-of-a-sudden you are helping us now thing. There is soft crashing, and there is hard crashing. A soft crash would be approaching someone and telling them that you need their help investigating terrorism or something (for a good reference example, look up the Guy Enright, KPMG, and Diligence inc incident). A hard crash is approaching a guy, pulling out some blackmail, and telling him he is working for you now.

There is also rapport building. The idea behind this is that you meet someone, say at the same bar or the same social gathering. You become good friends with him. Eventually you ask him something about the company. Nothing big. You reward this generously. You ask him something else. Reward him again. Keep doing this until he is somewhat dependent on the reward. Then ask him something that you really shouldn't be able to know. Not like really over the line, but just a bit. Give a good reason as well. Reward him again, but this time with way more.

In all cases, weather crashing or rapporting, you can keep them from leaving by keeping careful records of their actions. So long as you carefully log the fact that they are giving you sensitive information for benefits, you have enough blackmail to keep them engage in the scheme.

>how you were convinced.

Just friends really. I talked to some guys I knew from /pol/ and we discussed everything at length and the logistics of it. I had prior experience in ic so I helped organize some stuff.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3549

File: 21c903224af457d⋯.gif (619.71 KB,470x522,235:261,out now.gif)

>>3547

Let me pull from parts of a manual I wrote:

>Section 3.1: Information Exfiltration and Best Practices

>Your first goal in infiltrating is exfiltrating information. However this is a pretty difficult task, for three reasons. The first of these is the information itself. Its difficult to capture conversations covertly. The second is scale. Its hard to know whats important and what isn't, and you most likely have a lot of information to cover. The third is utilization. What can be released without hurting sources? How can information be used to your advantage?

>These questions are very broad and each require their own chapter. This chapter will deal with collecting & processing information. Later chapters will deal with how to use it for various tasks, such as gatecrashing, asset development, and group subversion.

>On Person Microphones:

>As an infiltrator, it is your job to collect every word, every message, and every document. The first of these items, and the hardest to collect, is audio. Hidden recording devices must fulfill some basic requirements. The device must be small and concealable, be inconspicuous, and have a reason to be around.

>The best recording device for this type of operation is a common smartphone. There are plenty of hidden recording apps out there. Everyone has a phone, and there is no real reason you wouldn't want one with you while you are at a meeting or talking with guys from an associated group. The modern smart phone has a pretty decent microphone that will work well for this kind of task. The main problem with this happens to be space. Audio recording for this long requires a ton of memory. You might have to dump some of your old files on your hard drive to free up space. These recording take memory, and lots of them.

>There are other devices that you can get for your uses. You can find a variety of hats, sunglasses, pens, buttons, and other object that contain cameras and audio recorders. Any video should be secondary unless you want to nab some faceshots of people. Audio is always more important. These types of devices are significantly more risky than say, a smart phone, because these devices, when discovered, have no other explanation behind them other than “you were recording.”

>Leave Behind Microphones:

>If you cannot be present in an area and you need to make a recording, there are plenty of simple solutions out there for you. The most robust and flexible system that can be purchased for cash is an FM microphone transmitter kit and a scanner/radio kit with an aux out. These tiny FM microphones generally broadcast at 100ish MHZ with about 200 meters of range. With a radio that has an aux out, you can plug the aux cord directly into the microphone slot and record it directly into audacity. The sound will be complete shit in quality, but some work in audacity will make it bearable.

>Although not technically a leave behind microphone, if for some reason the people you are monitoring are a smuck enough to use a lavier microphone, just hop on with a scanner and start searching through CB ranges. These microphones are notorious for not only being easy to intercept, but easy to manipulate. These are actually banned from use at popular security conventions like DEFCON because crafty infosec analysts would broadcast their presentations OVER TOP of the real presenters.

>A less involved option is to purchase a wifi pinhole camera. These things are hit and miss, and really the wifi feature is secondary, you want the microsd card functions. Because you can leave them, forget about them, and then pick them back up with your audio. Oh also these things are motion activated, so they are really hit and miss.

>There are plenty of GPS GSM tracker out there that are surprisingly robust. Although these boxes are marketed as GPS “trackers” they are mainly used for audio recordings. You can easily call into a GSM card number and hear what the microphone is saying. You can get these as fake powerbank looking things with an android logo on it, weird microusb cables, and even these weird fake key clickers designed to track old people. The “GPS” trackers aren't even real gps trackers, they just triangulate the position via cell phone towers.

>You can also get these over the powerline microphones, but you can't find them anywhere anymore and they are complete garbage at this point. Now over the powerline routers are sweet for other things, which I may get into later, but not this.

>However through all this there is one huge problem with all leave behind microphones. Recovery: you have to pick up the evidence afterward. Don't rely on these. In fact, avoid using these like the plauge. There are way better ways to get these things done here.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3550

File: c3a4f0ba7d992c7⋯.jpg (564.39 KB,2031x2652,677:884,not my fuckign buisness.jpg)

>>3549

>Monitoring Internet Traffic:

>If you happen to be on the same network you can easily start monitoring the http traffic with wireshark and get some interesting information via monitor mode. Although you can't see the ssl traffic, you will still be able to see dns requests which will give you a hint as to what is going on. Just an FYI for the sanity of your analyst, don't take a truckload of wireshark data and dump it on his doorstep. That shit is annoying to go through.

>Snort is also nice for this kind of thing, in that you can have it save all traffic with keywords in it by editing the local.rules file and adding the alert keyword. Check out their documentation for that and way more. Snort is a fairly powerful tool, and is way better developed than wireshark in certain places.

>On the topic of ettercap, some people really like to use it for MITM. However, if you don't know what you are doing, this could turn into a train wreck fast. Ettercap is cool, but make sure you know what you are doing before you use it. Also, ettercap's methodology is to dump more data than it thinks you need, just in case it misses something. Be prepared for metric fucktons of data when you really just wanted some browsing history.

>You can run a surprising amount of this crap on a standard android phone. I seriously advise you stick to that, as I said, everyone has a phone and no one questions the use of one. Look less like a leet hackerman and more inconspicuous. If you absolutely must have a portable device to run these autistic programs on, go for a pocket chip. The company is pozzed as fuck, but the things are cheap, and run a custom version of Debian. Also get it on ebay, don't pay full price for that shit.

>If you want to maintain access to a network via a drop box or something, try making a MiniPwner box. They are made out of TP-Link MR3040's and setup will be strangely familiar to those who have made pirate boxes before. They can act as a drop box, do some wardriving, be a rouge access point, and can basically run any package you can fit on the machine. They also sell a MiniPwner black version, which is available on request. The main advantage is the serial port and a better antenna. You can also install it on other, beefier, TP-Link routers with more antennas.

>Now if you want a pre-built solution because you are a fucking skid, Pineapple boxes are also a thing. They cost like 100+ dollars for the basic model, and you can't leave them behind because of how fucking expensive they are to replace which kills the key reason you would want one of these. They have a really nice UX to do it all in, but you will eventually come to hate it and just ditch it for terminal. There is a more expensive, bigger, one but the only real advantage is MOAR ANTENNAASSS and better battery life (kinda).

>Just remember that all drop box type items suffer from the same problems as leave behind microphones.

>Now there is also the topic of rats, keyloggers, botnets, formgrabbers, stealers, reverse shells, VNC's, ect. I can go on about these for hours. Due to some, uh, other reasons, I wont give any advice on which ones to use. Just make that call yourself, but you use fucking darkcomet I will kill you personally for being a skid. You might also want to pick up a good crypter to keep that shit hidden.

>If you have physical access to the machine for a good hour, you can easily boot up from an ubuntu live CD, hop on their partition and drop a piece of malware in their C:\Users\%USERNAME%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup

folder. From there your malware binary will run on the next boot, and you didn't even need to log in.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3557

>>3549

>Manual.

Holy fuckity fuck. If you could share that.. Give us more juicy details anon, pretty please. For the greater good.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3558

>>3549

Your manual is excellently written, you should really share it in full.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3560

File: 018ab5e4a4d2934⋯.gif (32.04 KB,170x170,1:1,scribble.gif)

>>3558

>>3557

>Your manual is excellently written, you should really share it in full.

Can't, the manual itself isn't entirely completed yet. It already spans a good few hundred pages, with a ton more to go. I might post it here when the time comes.

What other questions do you have?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3561

File: ee3393decb7367a⋯.jpg (43.76 KB,1280x720,16:9,1457238486577.jpg)

>>3560

I simultaneously want some information on how reducers act, and also want you to not drop it, for it could be used to rat you out.

What a pain.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3565

>>3561

I can drop it. Reducers are critical but at the same time the only people who come in contact with them are either the people in on the whole thing or the people getting blackmailed.

What parts of the job do you want to know?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3566

>>3565

In deeper reflection the knowledge I need probably would mean going through the whole manual on the jobs of the Watchers and Analysts since running blind would probably mean nothing.

Also, who does the tasks described in >>3548 ? The reducers, or the watchers?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3572

>>3560

Do you have a mailing list for when your book is done?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3574

shit thread

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3577

File: d6dcf5856d8e91b⋯.png (742.18 KB,346x360,173:180,screen glow thingy.png)

>>3566

>The reducers, or the watchers?

Reducers. The full term for a reducer is a "risk reduction and management specialist," and it comes mostly from the private "business intelligence" side of things. They do all the work that might compromise an asset. All of the arm twisting and action you see in the movies would be assigned to them. Depending on the situation, placing recording devices might also be up to them.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3614

>>3566

Side note: you could DIY an analyst handbook by wrapping the Cases in Intel Analytics book up with a lot of books on analyzing business risks from security threats. Same with Watchers, just swap the second book with social engineering techniques.

While the casebook is shody at best, it is probably the closest public thing I can think of to what we use.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3615

>>3565

So are reducers like the equivalent of Targeting Officers in the IC?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

 No.3621

>>3614

>Cases in Intel Analytics

Where is this text?

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.



[Return][Go to top][Catalog][Nerve Center][Random][Post a Reply]
Delete Post [ ]
[]
[ / / / / / / / / / / / / / ] [ dir / random / 93 / biohzrd / hkacade / hkpnd / tct / utd / uy / yebalnia ]