Posts Tagged ‘HUMINT’

Union square 2

Protective Intelligence can be described as the process of gathering and assessing information about entities that may have the intention and capability of harming you, and utilizing this information to protect your assets.

As more and more individuals and corporations have begun to realize that early preventative measures are preferable to emergency reactive ones, many organizations over the last decade or so have begun to adopt a more proactive approach towards security. And once you start down the positive path of proactive prevention, you’re likely to reach some form or another of protective intelligence.

View original post 771 more words

nato-ground-surveillance

The evening proceeded quietly. The dark drama I experienced earlier was like a strong dose of caffeine that began to wear off. At around 11:30 that evening I went to bed hoping to capture some of the sleep stolen from me the night before. All was quiet . . . but not for long. At exactly 12:00 midnight I was rudely awakened by a sudden eruption of clamor from the apartment above! They’re back! The Scowler (or his henchmen) had returned!

This assault was a perfect replica of what I endured the night before. The noise, stomping, and loud profane voices bounced off my bedroom walls. I now faced a second night of stolen sleep and harassment. What should I do? If law enforcement agents are my antagonists, what would happen if I called the police to complain? I did not want a confrontation, just a good night’s sleep.

Forced to lay awake for the second night in a row by this assault, I began to analyze my situation. This scheme was not the improvised efforts of a ragtag group of local police officers. I sensed that it was a well-crafted, thoroughly rehearsed technique that reflected expertise in psychology and surveillance. The participants knew their roles well and stuck to a script.

Rather than beat me physically, they were seeking to beat me by attacking my emotions and injuring my pride. I had been rudely deprived of sleep for over 36 hours. Also, I was subject to a series of actions designed to humiliate me and provoke an angered response. They had also provided a target for my anger . . . the “Scowler.”

This gang-stalking methodology falls under a system of psychological operations being developed and tested on American citizens by covert quasi-military law enforcement agencies. The basic process described above has been taught by the CIA (Central Intelligence Agency) since the 1950’s. “The purpose of all coercive techniques is to induce psychological regression in the subject by bringing a superior outside force to bear on his will to resist. Regression is basically . . . a reversion to an earlier behavioral level. As the subject regresses, his learned personality traits fall away in reverse chronological order. He begins to lose the capacity to carry out the highest creative activities, to deal with complex situations, to cope with stressful interpersonal relationships, or to cope with repeated frustrations.” – CIA Human Resource Exploitation Manual

Full Story @ [youarenotmybigbrother]

The above article is actually taken from a now defunct website that was captured by the Way Back Machine.

The author of a book once banned in America, Douglas Valentine, discusses how the American government is conducting covert warfare on its citizens via the CIA. The book, “The Phoenix Program”, details the nitty-gritty black ops that were conducted against the people of Vietnam. Mr. Valentine says the “Phoenix Program” is the blueprint for the covert warfare that the government is conducting on the American people today.

Americans can get the complete picture in combination with “Confessions of a Economic Hitman”.

Awake Radio
Douglas Valentine – The Phoenix Program
CIA Speaks: The Phoenix Files
Confessions of an Economic Hit Man: How America Really Took Over the World (2005)

A new government-sponsored report on America’s sex industry has revealed how pimps and escorts avoid detection by cops these days.

The report by the Urban Institute analyzes information on the trade in eight cities: Miami, Dallas, Washington, Denver, San Diego, Seattle, Atlanta, and Kansas City, Mo.

Owners of escort services (essentially high-end prostitution services) structure their business carefully, keeping meticulous books and investing in shell companies or real estate, according to the report.

“We filed taxes and opened a business account … It was an escort service that allowed for massage and strip tease, but it was the acts of prostitution that made it illegal. We had them sign contracts [that included prohibitions against prostitution], but we turned our heads,” one person affiliated with an escort service explained in the report.

Unlike any other street prostitutes, escort services actually use credit cards and often keep most of their money on the books, essentially hiding from law enforcement in plain sight. They also use sophisticated tactics to avoid police.

“In order to evade law enforcement detection, they run counter surveillance,” the report said.

According to one law enforcement officer quoted in that report, there is a website called “Rate a Cop” for escort services to keep tabs on police who might be trying to root out their operations.

UPDATE: Following complaints about police officer safety based on concerns that the policeman (policeperson?) rating site ratemycop.com (that’s Rate My Cop .com, get it?) posed a danger to law enforcement personnel because it outed the full roster, including names and badge numbers, of police officers at nearly 500 police departments around the country (to the tune of some 140,000 police officers), RateMyCop’s host – GoDaddy – unceremoniously and without warning pulled the plug on the site.

Johns are also using another site called CopsRCorrupt.com to learn where current stings are happening and how to detect and avoid sting operations.

Prostitutes are also trained to suss out possible sting operations by proactively attempting to identify law enforcement prior to committing incriminating transactions.

According to Business Insider the strategies include:

  • Watching customer’s body language, movement, and appearance for suspicious or nervous behavior
  • Describing all actions taken by customers aloud so that, should a police officer do something inappropriate during a sting operation, it is recorded and usable in court.
  • Actively catching and recording police during a sting doing something they aren’t supposed to do
  • Watching clients vehicles, according to CopsRCorrupt.com most clients using escort services, drive high end vehicles likes Lexus, BMWs while narcs drive mostly Fords

Source: [generalstrikeusa]

 

electronic-eye

JTRIG targets a range of individual, group and state actors across the globe who pose criminal, security and defense threats. JTRIG staff use a range of techniques to, for example, discredit, disrupt, delay, deny, degrade, and deter. The techniques include: uploading YouTube videos containing persuasive messages; establishing online aliases with Facebook and Twitter accounts, blogs and forum memberships for conducting HUMINT or encouraging discussion on specific issues; sending spoof emails and text messages as well as providing spoof online resources; and setting up spoof trade sites.

The main goal of the present report is to provide an assessment of JTRIG’s behavioural science support requirements for conducting effects and online HUMINT operations. Given that such support would need to occur within certain bounds, a secondary goal is to provide an assessment of some of JTRIG’s other (non-technical) operational planning and management requirements such as risk assessment and conduct guidelines.
(more…)

Hacker-Isloate

Some explanation is in order because the source article assumes its readership can read between the lines with Internet savvy. So, back in the first half of 2013 an Internet operative (shill) was exposed due to a bug in Windows Virtual Server remote clipboard management. Instead of copying and pasting some shill text, some remote clipboard error text was posted instead. An astute forum user quickly summarized what he was seeing in the post and took a screenshot before it was deleted. It was determined that the op was with the National Clandestine Service, a branch of the CIA, after some intense googling. Threads regarding the exposed shill were started on two separate forums, Above Top Secret and Godlikeproductions, but were quickly deleted by the administrators.

A Forum Shill gets busted. Something very interesting happened over at GLP March 24th [2013] at 9:28 pm. Something that did not go unnoticed by GLP posters and many others around the interwebz. On page 7 of a thread titled “Medical Type Says Sandy Hook is Total BS”, a user from “Kazakhstan” posted the following:

Re: Medical Type Says Sandy Hook is Total Bullshit

[0x1a970000, 0x1ab00000, 0x27570000>
[rdpclip.exe, “iostatZd15.1”]

you copied a large amount of data onto the clipboard …Do you want to save this data on the clipboard?

User ID: 35850666 Korea
User ID: 36689081 Korea
User ID: 33951304 Kazak
User ID: 36809983 Kazak

N.C.S. logo.jpg

//SECRET
C:\SharePoint012USNCSSAD_Wrkc9inet-N-7339.tx​t
**********************************
REMINDERS —— NOTES
**********************************
Sensitivity Level

Action Code

Team 5.A/
SITE
Location of official Agency folder
None NPRC
Team Contact
Sheila N******

CHECKLIST

Do any of the respondents display the urge to supply information that could be helpful to your mission?

Full Story @ [insanemedia]