Serious question
by BreachMono - Friday October 11, 2024 at 05:56 AM
#1
How would intelligence agencies or spooks obtain/acquire intelligence and knowledge of their "adversaries" if groups, individuals or entities actions/conduct is completely random, spontaneous, incoherent and doesn't happen with any rhyme or reason because they are geniuses but are schizophrenic?
Reply
#2
Although I didn't fully understand what you meant, intelligence agencies infiltrate their enemies to gather information. As the saying goes, 'What two people know is no longer a secret,' and intelligence agencies often use this to their advantage. At the same time, this saying is one of their biggest vulnerabilities. On the other hand, infiltrating critical systems and stealing information is also a common tactic. The best examples of this are the Stuxnet and Iraq Worm cyberattacks
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Dishes out second hand retardation | http://breached26tezcofqla4adzyn22notfqw...an-Appeals if you wish to be unbanned in the future.
Reply
#3
Plants probably, or something undercover.
"Universal appeal is poison masquerading as medicine. Horror is not meant to be universal. It's meant to be personal, private, animal"
Reply
#4
(10-11-2024, 06:23 AM)reflex Wrote: Although I didn't fully understand what you meant, intelligence agencies infiltrate their enemies to gather information. As the saying goes, 'What two people know is no longer a secret,' and intelligence agencies often use this to their advantage. At the same time, this saying is one of their biggest vulnerabilities. On the other hand, infiltrating critical systems and stealing information is also a common tactic. The best examples of this are the Stuxnet and Iraq Worm cyberattacks
Yeah I know about all this, but for example how would Mossad and the CIA collect or acquire data, intelligence and knowledge information on adversaries and enemies... If for example if Al Qaeda, ISIS, Talbian etc etc split up their entire organisation into little tribes groups of 10 only (with a total member count of 20 thousand soldiers). They don't communicate or coordinate or discuss anything with the leader of said terrorist organisation or with any of the other cells they all operated independently, secretly, spontaneously, sporadically and unpredictably all spread out all over the country with some on the far far North others on far far South side with no command and control centre...
Reply
#5
Usually either by using an agent - someone who's in good contact with you or follows you, or by wiring your devices.. Mobile, laptop, pagers (apparently) remotely controlled dildo..
Reply
#6
I don't even understand what you're trying to ask, but im also not in the luminosity
Reply
#7
(10-11-2024, 05:56 AM)BreachMono Wrote: How would intelligence agencies or spooks obtain/acquire intelligence and knowledge of their "adversaries" if groups, individuals or entities actions/conduct is completely random, spontaneous, incoherent and doesn't happen with any rhyme or reason because they are geniuses but are schizophrenic?

i assume your point is how does one organisation obtain info on seemingly guerilla operations, such as actors in BreachForums lets say.
1. Infiltration. You see so many 1000 rep+ colorful accounts that have enough insight on behavioral patterns of the space. Let's say the shoutbox here, All the info is being scraped, then analyzed either via AI or manually and then it's extremely easy to mimic a BF user. Often these users are the first to jump on the "you're a fed" train too, or tactically dive into sheep mode when there's a pedo hunt or somebody gets targeted. Infiltration here is probably extremely easy and there's some weird ego around reputation and shininess of accounts that once you're considered quality user, you can get away with absolutely everything, even sniffing for the feds.

2. Scrape, scrape, scrape. Infiltration is based on human interaction so u need to hire a bunch of intelligent ... well intelligence workers who you prolly dont wanna pay either. So why not just crawl the shit out of said site and analyze it. Speech /writing patterns is another way OPSEC should be handled in order no to get found per the dictionary you use. Issue here is that you won't be able to get to the hidden groups where communication bubbles happen. Half of the actives in shoutbox have revealed languages they know even which feeds a picture of an individual.

3. These agencies are often reactive, so when you do something big, they might decide to expend a lot of resource into recon, access, targeting vulns and other operations. Half of the 16 yolds using Telegram to sell Valorant accounts hanging out in chat might be invited sooner or later to some chat space, or even become a mod cuz they have a good vibe. All of them are impromptu sleeper cells that can blow up operations because Mr Black writes on your tg with an offer you cannot refuse. I've seen this happen. This might be the case with Sangierro too

The biggest bane of such spaces, imho, is the oversharing and ego, because these kids dont have habits & therapy so the hacking cybercrime semi-anon is all they have. And if you fuck up, you just rebrand. All these banned individuals like pongo, emo, that 0x0-something scammer with the elasticsearch or whoever the fuck, are still here a day after their ban.

Best way to stay covered and safe - be smart, don't get too much out, lay low, create a fake persona like i dunno, a Serbian nationalist, and care for hygiene information. And when you sell, like really sell something of great importance keep your wits about it and think twice if you're going to sell it through an account that generated GBs of digital traces. I assume most of us are not in Russia so we're not in pink paradise of debauchery and degeneracy, fucking the easiest women on Earth in Moscow, like the XSS and Exploit cunts. We will be hunted by resourceful and Fucking relentless agencies.

OPSEC is key to guerilla spaces. Lay the fuck low
Reply
#8
It's a long text, but all of your questions are answered in it

Now I understand what you meant, although I don't have much knowledge about this subject, I'll share all the information I have with you. First of all, all phone, radio, satellite, and internet networks are monopolized under the control and supervision of certain large corporations and companies. For instance, the company that controls the entire internet, including the Tor network, is called the Internet Corporation for Assigned Names and Numbers (ICANN). This organization can track you, me, and anyone connected to the internet because they assign the IP addresses we use. So, the entity that gave you your IP address is them. How are they tracking us? Let me explain. The internet cannot function without DNS services because when you send a packet to an IP address on the internet, it first goes to a DNS server and then to the destination.

Now, let’s say you typed breachforums.hn in your browser, and your browser requested the IP address of breachforums.hn using your IP to the DNS server. The DNS server directed you to the IP address of breachforums.hn. Then, you entered the site, entered your credentials, hit enter, and once again, your browser sent your information to the DNS server before letting you access the site. You created a topic, wrote your post, and when you shared it, your browser sent the information to the DNS server again. The owner of the DNS server now knows your breachforums.hn username, password, what category and topic you posted under, and every sentence, word, and letter you wrote. They are aware of it all. And when you typed ISIS here, I don’t mean to scare you, but if you’re not using encrypted internet right now, you are already under surveillance as a potential terrorist sympathizer. Not just you, but your entire environment, including everyone connected to you in the third degree, will be under technical surveillance for six months. If your suspicious behavior continues, this surveillance period will be extended.

How do they track millions of people? As I mentioned earlier, all communication technologies, including social media and search engines, are centralized and connected to DNS servers or similar systems. The programs in these central systems constantly analyze incoming and outgoing data. For example, if you search for 'Allahu Akbar ISIS execution videos' in your browser, the software or program in the central system sees this and without taking any action immediately, begins tracking you. The program will alert the authorities that you made such a search on Google. Simultaneously, these analysis programs have access to many places. While tracking you online, they also start digging into your social media accounts, checking your private messages, and monitoring those who follow and interact with you. These programs even have the authority to access your phone and computer because once it perceives you as a terrorist, it uses its extensive powers for security purposes. It will monitor everyone in your phone contacts, and their contacts too, analyzing your messages and conversations. If deemed necessary, it will report and initiate a six-month surveillance.

During this surveillance, the program tracks everything you do: phone conversations, purchases, social media likes, messages, and daily routines, not just yours but also those of anyone connected to you. If the system deems it necessary, it will extend the surveillance beyond six months. Otherwise, it will stop. But, if during this period you try to purchase a weapon for terrorist activity, the system will immediately report you, and you’ll be arrested. It's not just the internet; phone calls are also constantly monitored, and the system works the same way. For example, words like 'terrorism, murder, gun, drugs, assassination' are blacklisted. If, in a phone call, you say, 'I’m planning an armed attack on the university,' the word 'gun' in your sentence will instantly trigger the monitoring system. Within seconds, the system finds all information about you and reports you.

These systems are not available to the police or FBI; only intelligence agencies like NSA, CIA, MI6, Mossad, MIT, BND, and KGB have them, and they are only used for international espionage, surveillance, terrorism, and cybercrime. These billion-dollar systems are not used to catch common street criminals. Another feature of these systems is that they have access to phones, tablets, modems, and security cameras in the country they’re based in. So, when you typed ISIS above, if you're not using encrypted internet but regular internet, your entire family is now under surveillance, and there’s no way to know. The system is highly secretive and clever. Right now, they might be watching you through your computer's camera. The light isn’t on, right? Don’t worry, the program prevents any indicators like the camera light from showing, so you won’t realize you're being watched.

No technological devices around? No problem; they can even see your eye color from satellites. But don’t worry, you’re being watched by an automatic software, not a human. Stay calm, don’t do anything suspicious, and wait for the six-month surveillance to end. Of course, unless someone in your circle or family does something suspicious... Remember, if you used encrypted internet, you're safe. So, how can we bypass these surveillance systems? It’s simple—use encrypted internet or the Tor network, don’t exhibit suspicious behavior. For example, instead of saying 'gun' on the phone, say 'iron,' instead of 'drugs,' say 'powdered sugar,' instead of 'murder,' say 'end of the road,' and instead of 'prime minister,' say 'the jacket on top.' By using such methods, you can bypass these billion-dollar programs. Also, remember, using Zoom to talk in sign language won’t work either, because these programs can analyze visuals and know all sign languages. They can even read your mental state from your facial expressions.

You might ask, 'If they have everything, why haven’t they stopped all criminals?' First of all, no, they don’t have everything. You can avoid these billion-dollar programs with the methods I’ve explained. Another reason is that more than half of the people these systems monitor are innocent or only have the potential to commit crimes. It’s better to keep criminals under surveillance and eliminate entire criminal networks rather than catching individual offenders. For more information on this, you can check the documents leaked by Edward Snowden
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Dishes out second hand retardation | http://breached26tezcofqla4adzyn22notfqw...an-Appeals if you wish to be unbanned in the future.
Reply
#9
A schizophrenic person still has TTPs they're called mental health problems/symptoms.

"completely random, spontaneous, incoherent and doesn't happen with any rhyme or reason because they are geniuses but are schizophrenic".

I understand what you're trying to get out but I can tell you have some sort of incorrect supervillian fantasy kinda thing going on here, maybe you watched too much Gotham.

Plus you can also anticipate the actions of someone who is random because you already know they're a person to do something unexpected or out of the blue, which however is expected for them because they're used to acting in this random manner.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  QUESTION ABOUT WEBSITES LEAKED DB Hallow 1 197 04-14-2025, 06:30 PM
Last Post: Shuu
  I have a question Vincentteam 36 1,451 04-05-2025, 02:20 PM
Last Post: Vincentteam
  How is this possible? - Database question ST_13 12 731 03-17-2025, 07:41 AM
Last Post: termit
  Quick Question CraftyD 7 372 02-25-2025, 02:19 PM
Last Post: DredgenSun
  A Question relating to emailing in bulk. JamesBond505050 6 674 02-20-2025, 02:46 PM
Last Post: Bluke23

Forum Jump:


 Users browsing this thread: 1 Guest(s)