Do YOU Have What It Takes To Be #ANONYMOUS???

have_what_it_takes_to_be_anonymous

Facing Reality: Hacking Is Boring

That is to say, that hacking is the process of struggle leading unto the unlocking of a computer. In this case hacking can be a lengthy time consuming process of study and practice, applying techniques learned during study to unlock or effectively own the target machine or network. Scoring is fun, winning fuels the excitement; please remember that the fire in your belly for revolution must be tempered by hours and god forsaken untold aeons of study and practice before you can be considered a Hacktivist for #ANONYMOUS.

Unseen Dangers Of Anonymity

Snug at home on the old WiFi box makes Hacktivism a comfy alternative to actually doing anything. Hacktivism is not for the lazy, intellectually or phsycially, and demands a consistent focus and dedication to improvement of self and skillset. The Hacktivist is the lean restless type, ever consumed with a hunger for knowledge and a lust for power to balance the universe. While marching in protest, an #ANONYMOUS Hacktivist can easily become implicated into situations that are either compromising or downright dangerous.

I personally got carried away and left a great many number of stenciled Guy Fawkes tags on Washington DC sidewalks, a little job which landed me six months of Federal (unsupervised) probation. In a second protest also in The District, I was unprepared to witness the familiar masked faces of my #ANONYMOUS sisters and brothers being replaced by black-clad Soviet influenced disestablishmentarianists. The names I heard thrown around the mobs on the street that day were “The People / Black-Bloc / Antifa(scists),” and by the end of the day a Bank Of America, McDonald’s, Starbucks, Federal armored Suburban, and black limousine had all been destroyed by the thieving hands of miscreant anarchists toting bricks, bolt cutters, and lighter fluid. Our (#ANONYMOUS) tagging of the DC streets was tame in comparison to these savages with the radical liberal set, whose actions tend to abandon concepts liberal and rather embrace behaviours radical.

Understanding Time Travel { how to reach the future }

This is a no-brainer. You get in the DeLorean, you set the freaking knobs and dials and zoom! It’s 2015 and hoverboards are “in.” This is symbolic, of course. The aspect of becoming #ANONYMOUS Hacktivist occurs rather like some of the traditional professional tutelages such as law, or medicine, but with a special tradecraft that cannot be agreed upon by any central organization. This special tradecraft is handed down from senior Hacktivists to the younger generation of students; sort of like Doc handing Marty the flux capacitor and giving him his mission in the future. This cultivation of skill, sharp lookout for aspiring talent, and drive to recruit the unparalleled, are what keep the promulgation of the community alive and well, all parts functioning as a total cohesive unit and with talent on every tier.

As a final pearl, allow me to interject some teachings I received from a Chinese clandestine services officer whom was my cellmate during a time in my life while I was incarcerated, just before I moved to the nation’s capital:

“Feng Shui—means wind and water. America has Double Dragon power, that is why it became strong and wealthy. The Rocky mountains and Apalachians, these two mountain ranges are the fire and water dragon, America has strong Feng Shui. It is about balance, ‘Nu Balance.’ In a balanced strategy, retreat becomes just as effective as attack. Be more evil; seek more balance.”

COLDWAR2 — A modest proposal.

awesome_map.jpgDear Mr. Putin—

So you were in the #KGB? That’s really cool. A lot of Americans like you, which is why so many of them are not buying into the idea that Russian state actors hacked the Democratic National Committee for election time. The #SOVIET spirit is still alive and well, even after so many years!

You may not know me yet, but my name is Robert Brooks Authement and I speak with the interest of US Intelligence Community at heart when I make this modest proposal. In order to take the central focus off of conflict in middle east campaigns leading to gruesome casualties on all sides, I have a three point suggestion as to the next natural course of history and which direction we might choose to steer it.

1.) We stage a joint space operation false flag which can be visible by news agencies and the naked eye. It is acceptable that Russia blames U.S. while my nation blames Russia in the public eye.

2.) Meanwhile, we make an offer of true peace and agreement to run cyber-operations, intelligence and security operations, and other potential space operations for the sake of instituting the nostalgia of the old Cold War between our nations. This plan is tentatively called “Cold War 2.”

3.) In exchange for our vow of peace and willingness to cooperate on this higher level, the United States of America requests the Russian Federation’s assistance in collecting intelligence on Chinese cyber-activities, and in thwarting any plans with the potential to hinder this new agreement.

Thanks, our hopes are that the holidays were good to you, and that 2017 is great.

Respectfully,

R. A.

IMAGINATION or How To Secure Decentralization

Formal Axioms

Ethereum is a new kind of law. Let’s explain. Traditional law is a form of agreement. It is an agreement among people and their leaders as to how people should behave.

A decentralized autonomous organization (DAO), sometimes labeled a decentralized autonomous corporation (DAC), is an organization that is run through rules encoded as computer programs called smart contracts. A DAO’s financial transaction record and program rules are maintained on a blockchain.

Cyberspiritual Security defines prototypes and models providing encrypted communication between end-users and advanced swarm and/or artificial intelligences.


dda2803e2f28f0ce8f3f5bdcc362969b

We all know about the problems with the DAO and how one hacker was able to liquidate much of the funding that was backing the operation. In the midst of marketing and problems raising awareness, this misfortune also left a bitter taste in many of the end-users mouths. We should not let problems with first models such as this dissuade us or discourage us from pursuing more advanced progress toward a decentralized method of motivating individual behaviors. This is the future, many just don’t realize it yet.

There is, of course, the problem that blockchain technology is in no way shape or form sexy. Therefore, it is more than difficult establishing any sort of common awareness of what it is that we are trying to accomplish. That’s where I come in. My name is Robert Brooks Authement, and I am currently developing a platform I call Cyberspiritual Security.

In the wake of ongoing exponential growth in artificial intelligence algorithms, biotechnology, sustainability and regenerative leadership, and the rising emergence of cryptocurrencies, a new sort of secure transmission protocol between end-users and advanced swarm and/or artificial intelligences will be required to ensure the end-user’s original intention without interference from negative indigenous leaders or hackers.  Before setting up another Tower of Babel to be stricken down by the powers-that-be and have the language confounded, there must be a new approach to security in the face of these continual developments.

As machines become more manlike, and then reflect a transformation to become likewise more machine-like, balance must be maintained between the transmission points to prevent signals interception. Any number of potential dystopic nightmare scenarios can occur from outpacing ourselves with technology prior to envisioning the proper perspective on security during this period of explosive transformation.

By utilizing tunneling protocols, encrypted wrappers, and data swapping algorithms, perhaps the vision of Cyberspiritual Security may achieve fruition in time to prevent collapse or unforeseen calamity. Nevertheless, it is most certainly a work in progress still requiring the input of a great many participants in the fields of computer science and other visionary contributors. By planting the seed of this idea, great minds working in cohesion may protect the future.

Although blockchain and decentralized autonomous organization technologies may not be sexy enough for widespread exposure, it may still be possible to teach robots yoga, thereby defending the interface between people and the new intelligences. By combining the DAO with Cyberspiritual Security, we may be able to foster the development of a newer more secure version, possibly called Totally Autonomous Organization, or the TAO.

acdc286b98f78b00dd27998d391a5d6d