[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]

/8diamonds/ - /pol/ Intelligence Agency

Ordos Imagos Affinis

Catalog

Email
Comment *
File
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Embed
(replaces files and can be used instead)
Options
Password (For file and post deletion.)

Allowed file types:jpg, jpeg, gif, png, webm, mp4, pdf
Max filesize is 8 MB.
Max image dimensions are 10000 x 10000.
You may upload 3 per post.


File: 1442906405159.jpg (24.97 KB, 1024x640, 8:5, techno.jpg)

c179de No.607

Greetings, /8d/. I posted a while back about making a tradecraft thread; well here it is! Delayed for a bit for security reasons, and of course with no infographics because I cannot into shoops. But here's an info dump anyway!

Topic One: Building An Independent Intelligence Cell

This should be the most important part; and is really the most dangerous part of any intelligence operation. Anyone who comes into your cell could potentially be a double agent; but there are ways to mitigate this risk. First: You should always leave yourself a space of deniability. This is a meeting place where no digital devices are allowed and any incoming and outgoing traffic/surrounding area traffic can be monitored by physical observation. Innawoods is obviously a good idea; but infrastructure is important too. (Faraday Cages work wonders in this as well. https://en.wikipedia.org/wiki/Faraday_cage for the kikepedo article on it. This principle can be used to build a Faraday Cage in your Central Area of Operations Management aka CONTROL.) This is paramount: no one should know about the location of this space but high level agents in the cell, and CONTROL itself.

If you're building a cell; make yourself CONTROL; if you're getting into a cell, make sure you follow the directives of CONTROL. Be forewarned; operational security on CONTROL is paramount to a cell's success. CONTROL *must* have management skills and keep abreast of ALL operations engaged by that cell. So, if your CONTROL is a shit; you may just get boned. (It should come with an understanding that you're engaging in espionage; things will eventually go bad, plan accordingly.) In theory; this would allow several anons to form cells, those cells to communicate with each other through cut outs/dead drops and potentially begin to rival our suited friends in at least organization and secrecy.

Okay; so you've got yourself a base of operations that no one else knows about, and maybe a few agents to help you do something. Now to gear up.

Cameras are the biggest thing, cameras of all sizes and shapes. For a small cell, I'd suggest getting at least one digital SLR type camera for hi-res shots of buildings, people and other things. These can be carried inconspicously by someone acting as a tourist if you live in a major city; or as a birdwatcher if you're in a national/state park. (Bear in mind; that with the new antiterrorism laws active in most places, you may be subject to a search for this kind of thing if you are shit at talking your way out of inquiry.) Keep two sd/CF/etc cards for this camera. One for operations relevent photos, one you can switch out that contains more mundane photos of touristy type shit. Everyone's broke right now; so tourism dollars will generally be left alone in order to not scare anyone off.

Get a few smaller hi-res cameras or other recording/surveilance devices as well.

(*Examples: http://www.spygadgets.com/power-adapter-hidden-camera/

Or: http://www.spygadgets.com/iphone-power-case-spy-camera-with-wide-angle-high-res-camera/

If you have an Iphone; you're set with this. Other than the tracking software already in place in said iphone… lol)

Once you have cameras and a CONTROL area confirmed; time to start looking at other operations tools. Weapons, ammunition, other intel gathering equipment. (keyloggers, pass-crackers, cellphone signal sweepers and other things)

c179de No.613

Second Topic: Gangstalking

OR How to into psyops against /pol/ enemies

(https://en.wikipedia.org/wiki/Stasi#Zersetzung)

From the WikiJew's mouth, even. This technique can be utilized by us against them; just as easily as it can be used against us.

This IS illegal as fuck; so any activity in ==this field is disavowed by OIA, we have ==no knowledge of any anon, anywhere ==using Zersetzung techniques against ==anyone Operate at your own risk.

The best use of this would be against any of the LW's or other semi-high profile enemies of /pol/. It would require a highly networked team, tight CONTROL group and above all else; locality to the enemy in question.

The alphabet soupers can operate like this from a distance because they have the funding to do so; we don't have that luxury. Local operatives to begin with are a must.

Finally; having a secure area in CONTROL for holding and interrogations should be used in these techniques.


255fa5 No.618

Aww shit, are you teaching us how to go full CIA?


c179de No.625

>>618

That's the idea; and you get to bring friends!

Even the Anti-Semitic, the one they call the Walking Holocaust.


c179de No.626

>>613

Zersetzung techniques are tried and true; but what about an enemy you cannot get to in this manner? The keyboard warrior might not have any dox that will lead you to their physical location. Or they may live so far out of the operations area that there is no available CONTROL location. This is not the end of the clambake though; using the SJWLLuminatti's techniques of cyber-Zersetzung will still be effective. Especially against easily triggered keyboard warriors!

Use sockpuppets and self-retweets to get into the enemy's feed. Stay stealthed for about two months to three; much like the traitor scum Joshua Goldberg. His efforts expose a weakness in digital gatherings that is unprecedented in communities right now. Both on our side and theirs:

There Seems to be no real vetting process.

Get comprimised persons to vet you into these groups in efforts to get dox. Building a double agent is extremely risky; due to the psychological stresses involved, but if you can get the group to detonate and disband, that is enough.


6cdb69 No.629

I actually learned a lot with this. The Faraday Cage thing is especially cool

>>626

>cyber-Zersetzung

Now this is getting interesting


c179de No.630

>>629

Much like regular gangstalking; this involves not only getting into the online life of the enemy, but also using their weaknesses/past against them.

SJW's use rape threats against dissenters in this way; but it can be flipped to our advantage. Especially if we can get one of the ones on the outs to help vet us in a double agent type scenario.

Hack into their file system and move things around. Change documents and add lines while remoting in through a backdoor.

Spam their emails with life insurance offers.

Find out their skype and kik and spam these with gore from sockpuppets.

And if you can find it; use bad online history against an enemy to cause a falling out between them and the SJW collective. Then; using that vulnerability, make them a Double Agent. Revenge against former compatriots is just as strong a motivator as blackmail.


c179de No.634

>>630

(https://en.wikipedia.org/wiki/Double_agent)

So; the basics have been covered in how to make a Double Nigger for the /pol/ collective, but what about other techniques to use against the enemy?

(https://en.wikipedia.org/wiki/Double-Cross_System)

This system was used by the British to feed the Nazis misinformation; so in the digital realm, sockpupets and Double Niggers can be used to feed false info to the SJW leadership. Fake plans about what we're about to do; false hashtags that can later be hijacked to backfire on them when they hijack the tag to begin with (as to make it trend before it gets hijacked. Shipjacking a shipjacked ship that's being ship jacked. You get the idea. Say, we get a hashtag going that says #YesAllUndocumented that WE want to have represent the way that illegals are wrecking our shit. But get the SJW's to hijack it before we even post anything so that it trends before we reclaim the tag.)

(https://en.wikipedia.org/wiki/Dangle_(espionage)

Watch for Lt. Dangles. Lt. Dangles are SJW's who are only pretending to turn to the /pol/ ideology; but are secretly still spying and posting for them. We can use this to our advantage by potentially making new recruits into cells damn themselves in the eyes of all SJWs or by using the dangle technique against them as well.

My next post will cover different kinds of agents.


c179de No.635

>>634

(https://en.wikipedia.org/wiki/Agent_of_influence)

We have nearly none of these; and building a few would be for the best! Ben Garrison and a few others are close; but their real motivations are doubtful and their commitment unsure.

(https://en.wikipedia.org/wiki/Mozhno_girl)

The KGB used these sluts to seduce and corrupt many men in the west; and while I know that we have No Girls on the Internet; this position is VERY useful for any Cell operating IRL. A good Mozhno agent could compromise locally and statewide powerful people. A well placed backpage ad can be an in to a senator's mansion better than compromising his driver.

However; these must be dedicated agents and unrepentant sluts. Many Mozhno girls married the men they were supposed to be spying on. (While deep cover is a great tool; women may have difficulty if they begin to develop genuine feelings for the enemy.)

(https://en.wikipedia.org/wiki/Stay-behind)

WHAT WE SHOULD HAVE LEFT ON HALF-CHAN!!!!

Had Moot not cleaned out the Janitor staff; someone from /pol/ right now could be working over cuckchan and informing us of any goings on. A stay-behind agent should be designated in every cell; in case your CONTROL becomes compromised or the cell gets disbanded. This person will monitor all further goings on and establish a safe avenue of retreat for other agents.


3221ad No.666

>>635

>>634

>>630

>>626

>>613

This is awesome I'm looking into this stuff now


255fa5 No.668

>>635

crap, that last one is a good idea


c179de No.683

>>666

Look away, satan. Look away!


ca67f8 No.688

So who wants to start a cell? Can we have MGS style codenames?


1276b4 No.690

YouTube embed. Click thumbnail to play.

>>688

I'm game. I'm in northern Texas.

Is there anybody out there?


dd6dfd No.691

>>690

That's a shame, I'm in north eastern New Jersey (close to NYC).


255fa5 No.693

>>688

I'm in LA. Safe from one of the sources of cancer, but still relatively close to it (San Francisco)


c179de No.694

>>688

Nice hitler dubs; I'm in NE Alabama.

Codename: Inquisitor


6db080 No.698

We need more people in the board. We're too spread out.


c179de No.710

>>698

That could work; it will also inevitably begin to draw cointelpros and double niggers/Lt. Dangles to the Ordos as well.

Quadruple vet everyone; and then qunituple vet them if you're accepting them into a cell.


255fa5 No.743

>>698

but where from? we need competent people and we don't want to risk letting in double agents


c179de No.761

>>743

They'll filter in as they need to. As I said; vet someone four times and then vet them five times. Always keep the location of CONTROL a secret.

Blindfold and use earplugs on anyone you first induct into your cell. Make all agents who want to infiltrate play the long game. People mostly only talk to their direct recruiter and never meet CONTROL face to face.


000000 No.819

>>613

should also gain a basic understanding of intelligence analysis. Find Psychology of Intelligence Analysis, by Richards J. Heurer, Jr. ISBN: 978-1-907521-04-1 in it describes the method known as ACH or the analysis of competing hypotheses which is the basis of most analysis methods since he created it for the CIA.


c179de No.1256

>>819

Good idea.

I'll try to host a TOX chat wed or thursday to discuss techniques for cell formation.


c179de No.1257

File: 1445989089054.pdf (1.95 MB, PsychofIntelNew.pdf)

>>819

Funny enough; it was actually on CIA's site…

Are they trying to bring friends?


c179de No.1325

More stuff for potential cells; be careful when visiting this site.

Inquisitor (=][=)

http://murdercube.com/files/Spy%20Craft/

http://murdercube.com/files/


0e199f No.1337


9b8ad9 No.1356

I just found this board and am loving the concept. My only concern is either hillaries or trumps online marketing team (trumps would have the most success) come here and astroturf the strategy of the board away from ethics and justice and towards bland support of a candidate.

But i digress.

I am making this post to bring to your attention a primer you may find useful.

Resistance to Tyranny by col. Joseph p Martino.

Written as a starting point for learning about asymetrical warfare, its sections on encryption and intelegence i think the people of this board will enjoy.


9b8ad9 No.1357

File: 1447156055446.jpg (3.19 MB, 4128x2322, 16:9, 1447155934583.jpg)

>>1356

For written messege encryption i suggest a book cypher.

The CONTROL and associated agents all own the same book (make sure it holds a large vocabulary) and you transmit a messege using numbers

For example (128/17/6/) is (page 128/17th line from top/ 6th word from the left)

It would be near impossible to compromise this providing the commander has a seperate bool for each agent and the agents arent aware of each others books


9b8ad9 No.1358

>>1357

>>1357

STRATEGIC INTELEGENCE

First off we need a strategy. From what i can gather this is determined independently according to operation (ie an op posts a thread with a few leads say fir example an anon posts some fishy shit to do with shillary's campaign organisers, the established operatives derive a plan to extract infomation then when enough intel is gather a second strategy is derived on what action is to be taken)

Now. During the investigation you will need to flesh out several factors that will give /pol/ and this intelegence agency a greater veiw of the situation

You need to catalogue the organizations involved in the incident your operational jurisdiction is investigating. So to use shillary again, you would be investigating the Council on Foriegn Relations which hillary is a member, you would be investigating Luke Montgomery her PAC and his associated organizations FKH8 and DeportRacism2016. You want all angles covered.

When you have a basic outline if the players, you then want a picture of these players. You need to perfom a detailed analysis of…

>Their stated purpose (cross referance this with theor associations)

>organizational structure (probe for human security weaknesses where a person could be turned in your favour)

>membership (dossiers on prominant people, list of all kmown members and employees)

>leadership (a detailed anaylisis if their command structure and the ambitions and personalities of these leaders and their juridictions)

>sources of funds (the creditor is the one that dictates their goals)


58b376 No.1359

>>1358

Sorry for spelling errors, im on my phone amd half asleep

STRATEGIC INTELEGENCE: PEOPLE

Organizations are not machines, it is the people in them that take action and make them function, knowing as much as possible about the people can help you formulate and refine your strategy.

>place of origin/ethinic affiliation

I think this goes without saying for /pol/ given jews, but knowing an individuals origin will allow you to infer what biases brings with him to his present position and therefore what angles would allow you to apply pressure. What does he consider normal or appropriate

>Education

Where did they go to school, what did they study? Who were their teachers, what was the atmosphere of the school, were they a member of any student groups.

>career history

What jobs did they hold, were amy specific connections instrumental in them attaining that position? Who were their superiors/coworkers/friends/.

>spouse

Are they married? To whom? What is the spouses backround? To what extent does the spouse influence them?

>religion

As with ethnicity this indicates the targets biases. Do they follow a predictable route to their place of worship?


58b376 No.1360

STRATEGIC INTELEGENCE: INFORMATION GATHERING

There are two classes of information:

>Open

>Clandestine

The majority of the time you will be using open sources, and with the advent of social media this has never been easier. Clandestine sources are used when you need to penetrate a well guarded secret, thats where the cloak and dagger really begins.

>open sources

A general rule of thumb is that 80 percent of strategic intelegence is gathered from the open without illegal or clandestine methods and /pol/s previous investigations into false flags and gamer gate have proven this adahe to continue to be true. Your open sources include but aernt limited too…

>newspapers or magazine articles about an individual

>Tv or news documentaries mentioning a person

>mention in books about politics, industry or finance

>Directories, organization charts, phone books

>high school and college year books or alumni publications

>essays, articles, college theses, speeches, ect by the target

>public records such as property ownership records, loans on property, property tax assessments, car registrations, court judgments, birth and marriage certificates

>


58b376 No.1361

>>1360

About to fall asleep, will continue roughlu 20 hours from now


1276b4 No.1367

Keep going anon. I'm loving this book idea.


392f14 No.1371

>>1360

im back

now for the interesting shit. this is where i think this board should be pursuing. see, /pol/ by itself has shown a mastery of researching open sources. from the sandy hook case they were able to discern that the fathers of many of the school shooters all had ties to HSBC, or the trayvon martin case where they were able to discern his father was a practicing freemason (and hilariously depicted a decade ago on those NWO playing cards)

what this board should be focusing on is the recruitment and/or training of people who are able to act in the physical world to correlate and expand the leads brought in by those acting from a keyboard and in extreme cases possibly even act on that infomation.

and with that i offer my next topic

STRATEGIC INTELEGENCE: CLANDESTINE SOURCES

These are sources within the government or organization you are investigating, likely the most important to the whole shitshow of an inident and the creditor the the smaller groups (ie Gawker funding the leftist subversion in gamer gate or to go further, microsoft and the connection to common core). these sources become usefull after being persuaded or coerced by one of our agents to leak information.

The acronym for this process that you should remember is MICE

M: Money

I: Ideaology

C: Compromise

E: Ego

these are the weaknesses of an intelegence target which can be exploited to recruit them. We are unlikely to have enough money for bribes, however ideology may be one way to gain the support of some in an organization, those that secretly sympathize with us, either in general or on specfic points which our agent can emphasize. Compromising people, by getting some information that may discredit them, bring shame or disgrace, get them fired or bring retribution from the government may be an effective means of gaining their co-operation. Appealing to Ego may be an effective way of getting individuals in one organization to provide infomation on indiciduals on another organization

regardless of the method employed the important thing is to find someone with the information desired, these need not be high ranking people. people such as secretaries, typists, copy machine operators, reports and publications clerks, mailroom clerks, document couriers, librarians, archivists and organizational historians all may have access to the infomation needed by us.

the object is to find the right person and apply the right pressure.


392f14 No.1372

>>1371

TRADECRAFT

Finding the person with the desired information and recruiting is but a small effort. the real job is enabling that person to pass on that infomation to you. making an extra copy of the document or media in question is not sufficiant. It is neccessary to get the document out of the building or organizations hands despite provisions against such a removal and without their knowledge.

there a number of books i will list for you guys that should be required reading (especially since "tradecraft" is the main topic of this thread) that deal with this issue. however it is critical to uderstand that no book can teach tradecraft. First of all the tricks keep changing. what worked 5 years ago may no longer be feasible. the "brush pass" and exchanging identical briefcases are by now well known to government counter intelegence agents or their private corporate security equivelants. you will have to draw on descriptions in the tradecraft books and expand on them according to your individual conditions.

part of the value of the books i'm about to list is that they provide ideas you may not have considered. How to tell if your being followed, how to use or make a dead drop, how to send clandestine messeges, ect are not part of the average persons thinking. even if the specific methods are too old to be trusted by the time of reading they will suggest alternatives that our organization may employ in specific circumstances. They should be read with this thought in mind.

STRATEGIC INTELEGENCE: SUMMARY

as discussed in >>1358 you need a strategy. Strategic Intelegence is intended to gather the infomation you need to create and refine a strategy by which you intend to effect political change either by force of arms or political manouvering. it is one of the most crucial activities we of /pol/ can egage in to fight both this war on our culture and the greater war on our liberty and should be given as much in the way of effort and resources as can be spared

REFERANCE BOOKS/REQUIRED READING

>Anonymous, "Principles of Tradecraft", Kansas City, MO, Militia Free Press, 1995

>Balor, Paul, "Manual of the Mercenary Soldier", Boulder, CO, Paladin Press, 1995

>Dulles, Allen M., "The Craft of Intelligence", The Lyons Press, 2006

>George, Whillis, "Surreptitious Entry", Boulder, CO, Paladin Press

>Harry, M,. "The Muckrackers Manual", Port Townsend, WA, Loopmatics Unlimited, 1984 (tells how to optain information about organizations mostly from public sources)

>Heidenrichh, John G., "The State of Startegic Intelligence"

(available here: www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/the-state-of-strategic-intelligence.html)

>Keegan, John, "Intelegence in War", New York, Alfred A. Knopf, 2003.

>Levechenko, Stanislav, "On the Wrong Side: My Life in the KGB", Mclean, VA, Pergamon-Brassey's, 1988

>Ludwig, Allen, "The Little Black Book of Email Viruses", American Eagle Publications, Show Low, AZ, 2002

>Mack, Jefferson, "Running a Ring of Spies", Boulder, CO, Paladin Press, 1996

Thats all for tonight i think, tommorow i will cover Tactical Intelligence


255fa5 No.1550

>>1372

Subterfuge to influence attitudes?

M8 it's genius


c179de No.1569

>>1357

Nice Idea, Agent. This will be considered.

INQUISITOR (=][=)


ca758a No.1838

>>1357

That's hardly encryption. Good attempt, mate. Encoded information shouldn't reveal its got gaudy encrypted data.

If you reuse the page/line/word combinations then cryptanalysis will eventually reveal your messages.

Since your messages already appear to be encrypted data it would be better to use the book as a one time pad instead. Using a pre-arranged key schedule for which pages to use, then each letter of your message is encrypted using the corresponding letters of a section from the book.

As noted in the Book Cipher, having a codebook would be suspicious. Yes, but no more suspicious than having an encrypted message full of gibberish. You could destroy the message after decoding it, but it still existed and in transit it could be easily identified as a suspicious block of data. This is true of both One Time Pad and the Book Cipher.

As I first implied, a better system of encoding would also employ Stenography.

Now, go re-read the first letter of each word of the first paragraph of this post.


ca758a No.1892

>>1838

The topic of Stenography is not so much about hiding data in plain sight, but primarily with plausible deniability. To focus only on the hiding of the encoded data is to risk failing at the purpose of Stenography: To be able to deny the fact that any encoded data exists.

Let us consider, for instance, a purely hypothetical encryption system (which I have not programmed… but I could). First you would input the data that you wanted to transmit, the number of "padding" words before each code bearing word, and which letter of each word will bear the code character. It the first paragraph of the prior post the padding would be Zero, and the 1st letter of each word has the encoded text. One may want to select the 3rd or 2nd letter (but beware Q and Z is hard to get as a 2nd char). Perhaps you could also select the last char of the word, or the 2nd or 3rd from last char of the code bearing word (making Z and Y easier to place). Having no padding makes it difficult to construct sentences that bear the encoded data and also make sense… Thus, each Nth word will bear an encoded letter in a given position. These would have to be pre-determined or arranged in advance.

One way of pre-arrangement is a key schedule. Another is to select a changing but agreed upon daily number, such as the temperature of a city, or a headline from a published newspaper on a given day.

Let's say we decided that the three least significant digits of the day's opening Dow Jones Industrial Average will be our synchronization key. We pick a page from a book based on this number. Todays opening was 17,535.66, so page 566 (if we have fewer pages we can do a modulo, so a 150 page book would be: 566 / 150 == 3 remainder 116 (page 116 is selected). Next this book page is copy and pasted into the program and it uses the book page as a one time pad to encode our secret message (otherwise we must perform the encryption by hand, which is possible and a cipher tool can be constructed with only a piece of paper and pen).

Our secret message is thus turned into gibberish. This gibberish is then spaced out to display in its position every Nth words.

Then you would fill in the padding words manually, as a normal correspondence. When you got to a code bearing word you would have to select a word that matched the constraint given. A thesaurus may also be handy to have. The program would prevent you from placing non conforming words and thus garbling your response, but this could also be done by hand if need be.

The final result would be a mundane looking letter or posting, but which carried encoded data.

Just by looking, no one would be able to tell there was encoded data present…

…unless they knew there was encoded data present. And this is where the key selection bites us in the ass. It destroys our plausible deniability if a message is intercepted and our code book is captured and the page selection system is known – at worse case, a recipient or sender is detained and divulges those parameters when interrogated. This is because the enemy can verify that when those methods are followed and the decryption / encryption applied, a secret message appears where otherwise one would expect only gibberish. The fact that the secret message can be verified destroys all our efforts at stenography because it reveals that an encoded message was, in fact, hidden.

The system itself is actually not the problem. The problem was in our pre-arrangement of the key and non-randomness of the data on the book page.

Even if we used a pseudo random number generator, the key used to seed the generator would then be the weakness, as the key space is smaller than the message space.

One aspect of the One Time Pad when used with a random, message-length, key is that there exists every possible message of the same length within the encoded data. Two separate keys can produce two separate messages from the encipher text, thus just by guessing alone, you can not prove that you've decoded the message.

A similar system can be utilized to completely hide the encoded data. The essential property is to maintain plausible deniability: When interrogated one could not verify that the key given decoded a message, because you could give any number of keys which would decode into valid messages…


000663 No.2537

Dayton Ohio cell.

Codename: LunaHMSap


3a2d09 No.2550

>>625

Ben?




[Return][Go to top][Catalog][Post a Reply]
Delete Post [ ]
[]
[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]