Agency International


Kanal geosi va tili: ko‘rsatilmagan, ko‘rsatilmagan
Toifa: ko‘rsatilmagan


AI - https://t.me/AgencyInt
AI-TRC - https://t.me/+t1axGuiUcDo0MDBh
AI-Chat - https://t.me/+RFmpP0chyzM0MTUx

Связанные каналы  |  Похожие каналы

Kanal geosi va tili
ko‘rsatilmagan, ko‘rsatilmagan
Toifa
ko‘rsatilmagan
Statistika
Postlar filtri


Happy SHUT THE FUCK UP Friday!

Friendly reminder:
Every day is STFU Friday!

Never talk to:
• System pigs
• Law enforcement
• Nigger cattle
• Anyone who isn't /us/


Say nothing:
➡️ At work
➡️ In public
➡️ Online


The enemy is listening!
Whatever you say, say nothing!


Critical thinking, in the form of detailed, disciplined analysis, offers a way to understand complex issues.

It requires practice: carefully listening to arguments and reading through the publications of think tanks, nonprofit institutes, and academia for background and a thorough understanding of issues. It requires considering the priorities and biases of the person or organization presenting an argument, and investing the time and effort to read their reports carefully.

Though critical thinking is developed through practice, there are some basic principles that apply.

• Approaching a problem or issue
Be open-minded and work to be well informed. Examine your own beliefs and values. Avoid looking at the problem, the issue, or the evidence from the viewpoint of your beliefs and values.

Defining the problem or issue
Analyze problems systematically. Develop a model of the problem.

Generating hypotheses
Formulate ideas succinctly and precisely. Define terms in a way appropriate for the context. Rank the relevance and importance of ideas. Understand the logical connections between ideas.

Testing hypotheses
Evaluate the evidence for and against a hypothesis. Judge the credibility of sources. Ask appropriate clarifying questions. Determine the quality of an argument, including the acceptability of its reasons, assumptions, and evidence. Identify inconsistencies and mistakes in reasoning.

Developing and defending your conclusions
Draw conclusions when warranted, but with caution. Identify and support your conclusions and assumptions.


Agency International is proud to support @treenix and the team at Sherlock Group.

Coordinating with other professionals improves our capabilities and helps better serve our clients.

We thank them for all their hard work and contributions to the OSINT and data communities. Please support them as well! Check out their Telegram OSINT bot (@Sherlockleaks_bot) and other projects. (@treenixwork / @bsherlock_ch).

As always, one of the most powerful resources available to you is by networking with actual people. That's why we look forward to this mutually prosperous friendship.


These are the key takeaways for those too busy to read Jacques Ellul.

For the serious propagandists who need maximum reach and effectiveness, the 'https://t.me/c/1921353700/388/8081' rel='nofollow'>book and 'https://t.me/c/1921353700/388/8082' rel='nofollow'>audiobook are available for free in the AI-TRC Library, along with many other resources you will find useful.


• Modern propaganda is based on the scientific research of psychology and sociology.

• The propagandist uses the knowledge gained from research to develop techniques on the basis of their knowledge of human tendencies, desires, needs, psychic mechanisms, conditioning, social psychology, and depth psychology.

• Modern propaganda mimics science in that all propagandists follow a set of rules.

• Propagandists must analyze the environment (milieu) and the individual subjected to propaganda.

• Scientific, psychological, and sociological aspects are considered.

• There is no "one size fits all" solution to deploy propaganda. Techniques and approaches are unique to each situation.

• Propaganda used in one situation may not be suitable or effective in another.

• Total propaganda is the effective use of all forms of media - TV, internet, radio, posters, meetings, etc., in order to influence individuals.

• Total propaganda seeks to short-circuit the individual from critical thinking in order to accept the propaganda's value system and morale.

➡️ Notice we say, "the propaganda's value system." The value system being pushed by the propaganda may differ significantly from that of the propagandist.

• The propagandist may use any means necessary to achieve an end.

• An end of any propaganda is the individual's submission—conformity.

• Orthopraxy is the goal of modern propaganda; to provoke action.

• The individual develops an active and mythical belief.

• The individual acts unconsciously on behalf of the propagandist.

• The individual's motives are not his own, but the propagandists.

• Orthopraxy short-circuits rational thought and behavior.

• Myth work can aid in the dissemination of propaganda.

• A myth is an all-encompassing, activating image.

• The individual finds all that is good, just, and true within this myth.

• Since man wants to achieve this good, he is moved to action in chasing this myth.

• He will do his part to help materialize this myth.

• Any material presented as fact should be accurate.

• If not, the propaganda will cease to be effective because the audience will be aware of the deception and reject it.

• However, the propagandist can insert falsehoods that have some basis in fact.

• For instance, Propaganda can effectively rest on a claim that some fact is untrue which may actually be true but is difficult to prove.

• The aim is to manipulate evidence to gain credibility.

• Propaganda must address itself simultaneously to the individual and to the masses.

• Propaganda must reach individuals enclosed in the masses and as participants in the mass, yet also aim at the crowd, but only as a body composed of individuals.

• That means the individual is never considered as an individual, but always in terms of what he has in common with others.

• However, propaganda must give the impression of being personal.

• Propaganda must attach itself to what already exists in the individual, meaning the propaganda must have a psychological connection to the person.

• The person begins to value the propaganda's ideas, myths, and opinions.

• Propaganda must express the fundamental currents of the society it seeks to influence.

• The propagandist must know the sentiments and opinions, the current tendencies and the stereotypes among the public he is trying to reach.

• By doing this, the propaganda has a better chance of reaching more people and having more people succumb to its message.

• Again, the propagandist must understand the people and environment through analysis then employ the appropriate measure to gain a result.

• The propagandist must never make a direct attack on an established, reasoned, durable opinion or an accepted cliche. By doing so, the propagandist wears himself to no avail. This is considered this to be a bad propagandist.

• Any attacks made against established, reasoned, durable opinion or accepted cliches must be indirect and subversive.


One of the most important texts on propaganda is "'https://t.me/c/1921353700/388/8080' rel='nofollow'>Propaganda: The Formation of Men's Attitudes" by Jacques Ellul.

Ellul's (1965) book falls into that category of propaganda literature focused on state propaganda and sociological propaganda.

While the text is seminal in propaganda studies, it does not account for the major revolutions in technology that have occurred since that era, and also has no discussion on non-state actors using propaganda within a nation state or across several nation-states.

However, where Ellul excels is in bringing the rigor of social science definitions and academic analysis to the act of propaganda.

This is a highly analytical text, well researched and defended.


Propaganda, in the most neutral sense, means to disseminate or promote particular ideas.

In Latin, it means “to propagate” or “to sow.”

In 1622, the Vatican established the Sacra Congregatio de Propaganda Fide, meaning the sacred congregation for propagating the faith of the Roman Catholic Church.

Because the propaganda of the Roman Catholic Church had as its intent spreading the faith to the New World, as well as opposing Protestantism, the word propaganda lost its neutrality, and subsequent usage has rendered the term pejorative.

To identify a message as propaganda is to suggest something negative and dishonest.

Words frequently used as synonyms for propaganda are lies, distortion, deceit, manipulation, mind control, psychological warfare, brainwashing, and palaver.


Deception must follow a careful path; it has to be subtle (too-obvious clues are likely to tip off the deception) but not so subtle that the opponent misses it. HUMINT is a commonly used channel for deception, but today it is seldom adequate on its own. An effective deception operation frequently has to be multi-INT or a “swarm” attack. Increasingly, carefully planned and elaborate multi-INT D&D is being used by various services.

First, consider the channels that produce literal information—information in a form that humans use for communication. These are open source (OSINT), communications intelligence (COMINT), and human intelligence (HUMINT). All three have long been used to feed opponents deceptive information. The information they provide requires no special exploitation after the processing step (language translation) to be understood. It literally speaks for itself.

Open source is an excellent way to plant misleading material. It has the advantage of near-certain transmission and it’s the only literal channel that the opposition is almost certain to receive.


Thou shalt not rest or be content, no matter what thy accomplishments. Thou must strive all the days of thy life. Thou must discover all things, know all things, master all things.


STEMPLES+

These factors or driving forces are critical to understanding the dynamics that spur disruptive change:

💬 Social—Social cohesion, diversity, cohabitation

🖥 Technological—Role of digitization, internet of things, industry 4.0

📈 Economic—Macro-economic performance, jobs, education and training

🛡 Military—External threats, power projection

🗑 Political—Political culture, political climate, political debate, mainstreaming

🤡 Legal—Legislation, constitutional issues (i.e., asylum, citizenship)

☀️ Environmental—Global commons, natural resources, sustainability

🔒 Security—Internal stability, securitization of migration debate

Plus Other
➡️ Psychological (xenophobia, perceptions, stereotypes)
➡️ Cultural (values, religion, habits, traditions)
➡️ Demographics (population growth, youth bulge)


Saul Alinsky's Rules for Radicals [Tactics]

1. Power is not only what you have, but what the enemy thinks you have.

2. Never go outside the expertise of your people. When an action or tactic is outside the experience of the people, the result is confusion, fear and retreat.... [and] the collapse of communication.

3. Whenever possible, go outside the expertise of the enemy. Look for ways to increase insecurity, anxiety and uncertainty. (This happens all the time. Watch how many organizations under attack are blind-sided by seemingly irrelevant arguments that they are then forced to address.)

4. Make the enemy live up to its own book of rules. You can kill them with this, for they can no more obey their own rules than the Christian church can live up to Christianity.

5. Ridicule is man's most potent weapon. It is almost impossible to counteract ridicule. Also it infuriates the opposition, which then reacts to your advantage.

6. A good tactic is one your people enjoy.

7. A tactic that drags on too long becomes a drag. Man can sustain militant interest in any issue for only a limited time....

8. Keep the pressure on, with different tactics and actions, and utilize all events of the period for your purpose.

9. The threat is usually more terrifying than the thing itself.

10. The major premise for tactics is the development of operations that will maintain a constant pressure upon the opposition. It is this unceasing pressure that results in the reactions from the opposition that are essential for the success of the campaign.

11. If you push a negative hard and deep enough, it will break through into its counterside... every positive has its negative.

12. The price of a successful attack is a constructive alternative.

13. Pick the target, freeze it, personalize it, and polarize it.


Examples of Elicitation Techniques:

Assumed Knowledge:
• Pretend to have knowledge or associations in common with a person. “According to the computer network guys I used to work with…”

Bracketing:
• Provide a high and low estimate in order to entice a more specific number. “I assume rates will have to go up soon. I’d guess between five and 15 dollars.” Response: “Probably around seven dollars.”

Can you top this?
• Tell an extreme story in hopes the person will want to top it. “I heard Company M is developing an amazing new product that is capable of …”

Confidential Bait:
• Pretend to divulge confidential information in hopes of receiving confidential information in return. “Just between you and me…” “Off the record…”

Feigned Ignorance:
• Pretend to be ignorant of a topic in order to exploit the person’s tendency to educate. “I’m new to this field and could use all the help I can get.” “How does this thing work?”

Flattery:
• Use praise to coax a person into providing information. “I bet you were the key person in designing this new product.”

Good Listener:
• Exploit the instinct to complain or brag, by listening patiently and validating the person’s feelings (whether positive or negative). If a person feels they have someone to confide in, he/she may share more information.

The Leading Question:
• Ask a question to which the answer is “yes” or “no,” but which contains at least one presumption. “Did you work with integrated systems testing before you left that company?” (As opposed to: “What were your responsibilities at your prior job?”)

Criticism:
• Criticize an individual or organization in which the person has an interest in hopes the person will disclose information during a defense. “How did your company get that contract? Everybody knows Company B has better engineers for that type of work.

Macro to Micro:
• Start a conversation on the macro level, and then gradually guide the person toward the topic of actual interest. Start talking about the economy, then government spending, then potential defense budget cuts, then “what will happen to your X program if there are budget cuts?” A good elicitor will then reverse the process taking the conversation back to macro topics.

Deliberate False Statements / Denial of the Obvious:
• Say something wrong in the hopes that the person will correct your statement with true information. “Everybody knows that process won’t work—it’s just a DARPA dream project that will never get off the ground.”

Mutual Interest:
• Suggest you are similar to a person based on shared interests, hobbies, or experiences, as a way to obtain information or build a rapport before soliciting information. “Your brother served in the Iraq war? So did mine. Which unit was your brother with?”

Oblique Reference:
• Discuss one topic that may provide insight into a different topic. A question about the catering of a work party may actually be an attempt to understand the type of access outside vendors have to the facility.


Spot & Assess
Recruiters spot and assess individuals for potential recruitment. Recruiters are not necessarily looking for someone with a high level of access; sometimes the potential for future access or the ability of the recruit to lead to other high value targets is enough to generate recruiter interest. Spotting and Assessing can take place anywhere, but is always approached in a non-threatening and natural manner. Trade shows, business contacts, social events, or online venues such as chat rooms and social media, are used for this process. During this phase, the recruiter will often explore potential exploitable weaknesses which may be used as a lever against the recruit. These could include: Drugs or Alcohol, Gambling, Adultery, Financial Problems, or other weaknesses.

Develop
Once a potential recruit has been identified, recruiters begin to cultivate a relationship with that individual. In the “Development Phase,” meetings with the recruit become more private and less likely to be observable or reportable. By the time the “recruitment and handling phase” is initiated, the individual is likely emotionally tied to the recruiter.

Recruit
The actual recruitment may involve appeals to ideological leanings, financial gain, blackmail or coercion, or any other of a number of motivators unique to that recruit. Some of these may manifest as observable and reportable behaviors.

And/Or Elicit
Not all targeting ends in recruitment. Sophisticated social engineering efforts including personal elicitation of information and targeted online phishing campaigns can be used to gather information from an unwitting source.


Not sure who HexHunter is or which forum he's referring to but also don't care. Everyone has a moral obligation to call out informants and traitors willing to cooperate with the enemy.

That's all 🙃


Our name is Agency International.
But we're just not that kind of agency.

Informants- get fucked.


⚠️ INFORMANT ALERT ⚠️

He says he's not a rat but offers to collaborate presumably with law enforcement investigators...

Username: @xHexHunter
User ID: 7225092080


Fuckster dan repost
Hi community,

I have left. The owner is basically crazy. He wants to implement Python, and for that He needs Django to have Python support and it doesn't have native support for Php. They want to make private tools for subscriptions (basically more work for developers) and a roulette like a casino in Python; It's just more work, unnecessary shit, and more vulnerabilities.

This looks like a children's forum, not a serious forum dedicated to cybercriminals. I have fixed the theme, I have made the sections, the role effects, I have created the cloudflare account. A total of 8 hours to hell for the decisions of that shitty autistic person. Then he has the nerve to say "we are just debating/talking" when he is literally making decisions that are not typical of a forum.

For my own mental health, I am going to get out of this project that is not going to last. The admin commits too many opsecs, if the fbi or any other agency is looking to arrest the owner, let me say it's too easy. I have access to cloudflare, emails and a lot of things; but I'm not a rat, so I'm not going to do anything.

Honestly, my dream was always to be a developer/admin of a forum dedicated to cybercriminals, and it seemed to be fulfilled, but His decisions they are shit and they make the forum shit. My motivation was not money, just managing a forum and helping; but never with those decisions. Since I've already done everything essential, that autistic rat no longer needs me, so I'm leaving for my own mental health.

They were laughing in the group as soon as they left, so maybe I deleted the cloudflare account and the emails. It is not my problem what happens with the forum, nor my responsibility. If any investigative agency wants information in the future, I am willing to collaborate.
Also, I have deleted his administration in this group because he has tried to censor this message, but the truth always comes to light and cannot be avoided.

- With love, ExDev, HexHunter


Former deputy undersecretary of the US Army Thaddeus Holt's key commandments of misleading (M-type) deception:

• Your goal is not to make the opponent think something; it is to make the opponent do something.

• You want your opponent not only to do something—but do something specific.

• It is not always necessary to make the decision maker in your target network believe in the false state of affairs that you want to project; but it is enough to make him so concerned over its likelihood that he feels that he must provide for it.

• Non-action is a form of action; the decision to do nothing is still a decision.


During Rhodesia’s war against insurgents (1964–1979), military authorities within the Rhodesian Security Forces realized the need for accurate and timely intelligence. A secret unit therefore was created in 1973 to acquire this intelligence. The unit was the Selous Scouts, comprising intelligence experts from the police and military, soldiers, and turned guerrillas. Eventually this small unit expanded to a formidable counterinsurgency force of close to 1,000. The Scout operations put heavy psychological pressure on insurgents; the insurgents began to constantly fear deception, betrayal, and surprise attacks. Scouts would often stage elaborate scenarios in which black members of the unit would pretend to be guerrillas leading captured white soldiers into a guerrilla camp. At the last moment all weaponry would be returned to the apparent captives, allowing the Scouts to catch the entire camp by surprise.


THE ENEMY IS LISTENING

20 ta oxirgi post ko‘rsatilgan.

290

obunachilar
Kanal statistikasi