Advertisement
Guest User

Robbing Aubrey Chernick

a guest
Jan 15th, 2013
1,390
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 14.63 KB | None | 0 0
  1. ##############################################################################################
  2. People: Aaron Barr, Tom Ryan, Robin Sage, Chet Uber, Mark Rasch, George Johnson, Andrew Breitbart, Neal Rauhauser, Mark Cuban, David Bossie, Stephen Bannon, th3j35t3r, Jennifer Emick, David Horowitz, Aubrey Chernick
  3.  
  4. Organizations: Provide Security, Project VIGILANT, HBGary, Team Themis, Occupy Wall Street, Anonymous, Citizens United, Magnet Releasing, Infragard, Booz Allen Hamilton, al-Qaeda, NC4
  5. ##############################################################################################
  6. Source: http://www.p2pnet.net/story/54246
  7.  
  8. While AARON BARR was owned by ANONYMOUS, TOM RYAN says he’s ready for any counterattack.
  9.  
  10. http://par-anoia.net/releases.html#jester
  11. ##############################################################################################
  12. Source: http://en.wikipedia.org/wiki/Robin_Sage
  13.  
  14. ROBIN SAGE is a fictional American cyber threat analyst. She was created in December 2009 by TOM RYAN, a security specialist and White hat hacker from New York. Her name was taken from a training exercise of United States Army Special Forces.[1]
  15.  
  16. Using those contacts, Ryan befriended men and women of all ages during a short time period between December 2009 and January 2010. Almost all of them were working for the United States military, government or companies (amongst the only organizations that did not befriend Sage were the CIA and the FBI[1]). Using these contacts, Ryan gained access to email addresses and bank accounts as well as learning the location of secret military units based on soldiers' Facebook photos and connections between different people and organizations.[2] She was also given private documents for review and was offered to speak at several conferences.[3]
  17.  
  18. ##############################################################################################
  19. Source: http://wiki.echelon2.org/wiki/Provide_Security_LLC
  20.  
  21. PROVIDE SECURITY associates are handpicked from the ranks of highly trained and experienced former agents of the US Secret Service, members of U.S. Special Forces, Global Intelligence Agencies and other premier law enforcement organizations. Our experts are Board Certified in multiple aspects of Security from leading Security Associations, including ASIS International, the Association of Certified Fraud Examiners and ISC2. Based upon their extensive training and experience in IT Security, Physical Security, Executive Protection and Investigations our professionals are uniquely skilled and well versed in the latest concepts of Convergence in the Security Field. Our approach has been used for tackling many security issues and providing solutions.
  22.  
  23. ##############################################################################################
  24. Source: http://emptywheel.firedoglake.com/2011/02/16/chet-uber-contacted-hbgary-before-he-publicized-his-role-in-turning-in-bradley-manning/
  25.  
  26. Sorry for the mystery but in my(CHET UBER) world we are careful about our actions and this is something interpreted as rudeness.
  27.  
  28. CHET UBER copies himself, MARK RASCH, GEORGE JOHNSON, and Mike Tomasiewicz, and sends links to two stories about PROJECT VIGILANT, which had been posted on the two proceeding days.
  29.  
  30. http://par-anoia.net/releases.html#jester
  31. ##############################################################################################
  32.  
  33. Source: http://projectvigilant.us/
  34.  
  35. "ProjectVIGILANT LLC (PV) serves to develop and enhance a multi-disciplinary research and development program into the underlying dynamics of attack attribution while facilitating technology transfer to partners that assist in enhancing 'the rule of law.' This effort is conducted in a manner allowing for publication and the sharing of results with the participants in the research. This collaboration and the resulting tools and methods are intended to enhance the national security and public safety of the United States and its allies. PV, besides its own R&D, scours the globe looking for any and all work done by external groups on attack attribution and attempts to replicate their experiments, provides feedback and enhancement ideas to published material to those groups, and ensures it is integrated into their own work as appropriate. We use commonly accepted methods of acknowledging these external contributions that are integrated, including but not limited to acquiring the rights to their discoveries with appropriate compensation. Beginning in 1996 as a club known to its members as "the project", PV lacked both the financial and legal means for moving such a massive effort forward. PV is formally a Limited Liability Company (LLC), and as such, a non-governmental organization (NGO). Continued growth will lead to filling the currently empty shoes as the "authoritative source on attack attribution."
  36.  
  37. ##############################################################################################
  38. Source: https://talesfromthelou.wordpress.com/2011/10/17/tom-ryan-the-moronic-class-traitor-leaks-thousands-of-occupy-wall-street-emails/
  39.  
  40. Conservatives really have a hard-on for “infiltrating” OCCUPY WALL STREET in an effort to discredit it. Now a computer expert has leaked over nine thousand emails from OCCUPY WALL STREET organizers and told us he’s identified members of the hacktivist collective ANONYMOUS involved in the protest.
  41.  
  42. TOM RYAN is a New York-based computer security expert who runs a tiny New York-based outfit called PROVIDE SECURITY, which he boasts on his blog is a “team of the most-highly trained and capable physical, threat and cyber security professionals in the world.” He’s best known for using fake social media profiles of a pretty lady to compromise the security of high-level military and intelligence officials.
  43.  
  44. TOM RYAN and his computer buddies (AARON BARR) have been waging a months-long campaign to infiltrate and “map the ties” of the hacktivist collective ANONYMOUS, which has had a hand in organizing the protest.
  45.  
  46. Yesterday Ryan leaked what he said were more than 9,000 emails sent to an Occupy Wall Street mailing list called September17discuss. Now they’re being used by conservative blogger ANDREW BREITBART to smear the movement. The emails show that OCCUPY WALL STREET is a “conspiracy to ‘destabalize’ Global Markets,” Breitbart says! (You can see the email archive here.)In a phone interview, Ryan sounded similar notes of conspiracy. He claimed that members of the hacktivist collective ANONYMOUS are secretly calling the shots in the OCCUPY WALL STREET movement, provoking police violence and waging a concentrated effort to spread misinformation. He said that the supposedly peaceful organizers were secretly violent. And, because no right-wing smear is complete without a terrorism connection, Ryan adds in a blog post that he had seen OCCUPY WALL STREET posts on the AL QAEDA recruitment forum Shamuk and Al-Jahad.
  47.  
  48. ##############################################################################################
  49. Source: http://www.amazon.com/Occupy-Unmasked-Andrew-Breitbart/dp/B008H6GHKG
  50.  
  51. Occupy Unmasked takes viewers into the OCCUPY WALL STREET camps around the country from New York to Los Angeles providing a first-hand look at violence and intimidation occurring within them, as well as to expose those at the heart of the events and to reveal the highly orchestrated nature of the movement. Exclusive footage and eyewitness accounts document criminal activity and raw brutality in the camps the majority of these incidents have not been reported by the mainstream media, which has in contrast portrayed the Occupy movement as self-organizing and non-violent.
  52.  
  53. Occupy Unmasked features the conservative visionary ANDREW BREITBART and journalists Brandon Darby, DAVID HOROWITZ, Pam Keys, Anita MonCrief, Mandy Nagy, and Lee Stranahan. Written and directed by award-winning director, STEPHEN BANNON (The Undefeated, Generation Zero) and produced by DAVID BOSSIE (Border War, Perfect Valor), Occupy Unmasked is a shocking indictment of one of the most controversial movements in American history.
  54.  
  55. ##############################################################################################
  56. Source: http://webcache.googleusercontent.com/search?q=cache:QIvZ8Eb8fxIJ:nothingtoseeheremovealong2.wordpress.com/2012/10/30/the-occupy-unmasked-connection/+&cd=1&hl=en&ct=clnk&gl=us
  57.  
  58.  
  59. Fucking weird little dot that nobody knows? When CHET UBER and (NEAL RAUHAUSER) worked together during late 1997, we had a conference call with MARK CUBAN, who’s company released Occupy Unmasked.
  60.  
  61. ##############################################################################################
  62. Source: http://www.indiewire.com/article/mark-cubans-magnet-releasing-to-distribute-the-late-andrew-breitbart-doc-occupy-unmasked-before-the-presidential-election
  63.  
  64.  
  65. Magnet Releasing is diving into the pre-election political mix with an all-rights deal to distribute “Occupy Unmasked,” the latest documentary from CITIZENS UNITED Productions that features the late conservative firebrand ANDREW BREITBART. To maximize potential exposure for the politically contentious film, Magnet plans a day-and-date theatrical and VOD release in late September, just six weeks before the presidential election.
  66.  
  67. ##############################################################################################
  68. http://webcache.googleusercontent.com/search?q=cache:Nj8bFFSjgR0J:admin.infosecisland.com/blogview/22043-On-Trolling-and-Obsessions.html+&cd=1&hl=en&ct=clnk&gl=us
  69.  
  70. Okay, most of you are aware that for 12 months now I (TH3J35T3R) have been the subject of @asherahresearch (AKA JENNIFER EMICK’s) wild obsessions.
  71. I have tried to keep my responses to her stupid to a minimum, and this post, hopefully will mark the end of any communications from me with her name in them.
  72.  
  73.  
  74. Possibly Related Articles:
  75. • WikiLeaks Suffers a Second More Powerful DoS Attack
  76. • UPDATE: Booz Allen Hamilton Issues Statement on Hack (<<<<<< Funded ROBIN SAGE)
  77. • Updates: Rumors of Anonymous Hacking th3j35t3r's Accounts Overblown
  78. • Anonymous and AntiSec: Mixing Metaphors Can Lead to Trouble
  79. • LulzSec Hackers Hit FBI Affiliate InfraGard
  80.  
  81.  
  82. ##############################################################################################
  83. http://www.forbes.com/sites/marcwebertobias/2011/05/01/names-you-need-to-know-nc4-situational-readiness/
  84.  
  85. NC4 has a staff of analysts that use sophisticated custom software and computer systems to mine thousands of data sources and connect the dots, literally, on a 24/7 basis. It is a very neat concept and requires input from private and open government sources throughout the world. They monitor news media, government agencies, airline Global Distribution System, corporate data bases, the Centers For Disease Control and foreign health organizations, police, fire and many foreign outlets. All of this data is collated and matched against client-employee information, GPS coordinates, detailed flight information for every aircraft that is part of an itinerary for each employee and a matrix of client operational rules and requirements. They even track certain medical data and requirements for specific employees.
  86. NC4 has established relationships with ALL MAJOR RESERVATION SYSTEMS, including Sabre, Apollo, Galileo and Amadeus. This means that the monitoring centers know the location of every tracked employee, where they are going, and can relate potential delays, threats, or interruptions to each client and alert them on an immediate basis. It is actionable intelligence at the granular level and can be extremely valuable.
  87.  
  88. ##############################################################################################
  89. http://wiki.echelon2.org/wiki/Aaron_Barr
  90.  
  91. Aaron Barr was the CEO of HBGary who instigated and oversaw the contracting firm's disastrous attempt to infiltrate ANONYMOUS, which resulted in ANONYMOUS hacking their servers and publishing over 70,000 emails - thereby revealing the Team Themis conspiracy. Prior to HBGARY, he was Technical Director at Northrop Grumman Information Systems, Chief Engineer at Northrop Grumman Corporation, Technical Director at Northrop Grumman Information Technology, Program Manager at Northrop Grumman Information Technology and a Petty Officer 1st Class in the U.S. Navy.
  92.  
  93. http://www.scribd.com/doc/106675096/P2C-Chamber-HB-Gary-Update-5-12-Anons-REDACTED (Author: NEAL RAUHAUSER)
  94.  
  95. HBGary CEO Aaron Barr in conjunction with NG executive Tom Conroy were attempting to strip the Romas/COIN business to the benefit of former NG subsidiary TASC. It should be noted that Conroy originally came to Northrop Grumman with the TASC acqusition.
  96.  
  97. ##############################################################################################
  98. Source: http://fcw.com/articles/2002/07/10/firm-builds-publicprivate-bridge.aspx
  99.  
  100.  
  101. He said Candle chief executive officer AUBREY CHERNICK is the driving force behind NC4, which is based in Reston, Va. The company helped the Los Angeles city and county "kind of pro bono" with the Year 2000 date-change issue, he said. Interest in working with the public sector surfaced again after Sept. 11.
  102.  
  103. ##############################################################################################
  104. Source: http://mondoweiss.net/2010/09/meet-the-chernicks.html
  105.  
  106. Though it was not listed on the public tax reports filed by DAVID HOROWITZ’s Freedom Center, POLITICO has confirmed that the lion’s share of the $920,000 it provided over the past three years to Jihad Watch came from Chernick, whose husband, AUBREY CHERNICK, has a net worth of $750 million, as a result of his 2004 sale to IBM of a software company he created, and a security consulting firm he now owns.
  107.  
  108. ##############################################################################################
  109.  
  110.  
  111. BOOZ ALLEN HAMILTON paid TOM RYAN to create ROBIN SAGE to infiltrate and discredit U.S. intelligence, then abandoned him when he was caught.
  112.  
  113. AARON BARR poached TEAM THEMIS employees from Northrop Grumman, failed to steal their Romas/COIN business, then tried to sell infiltration of ANONYMOUS to BOOZ ALLEN HAMILTON.
  114.  
  115. AARON BARR and TOM RYAN successfully infiltrate OCCUPY WALL STREET and ANONYMOUS. What they find is given to ANDREW BREITBART, STEPHEN BANNON, DAVID BOSSIE.
  116.  
  117. AARON BARR and TOM RYAN successfully infiltrates PROJECT VIGILANT, knowing they use NC4. Information release is done via ANONYMOUS to make it appear that TOM RYAN is a victim.
  118.  
  119. ##############################################################################################
  120. #
  121. # Which defense contractor is paying them to rob AUBREY CHERNICK?
  122. #
  123. ##############################################################################################
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement