Thursday, March 9, 2023

U.S. Military Withdrawal and Taliban Takeover in Afghanistan: Frequently Asked Questions

 



https://crsreports.congress.gov/product/pdf/R/R46879

Types of Cryptography


 

GAIA / NASA / Toni Sharpless

Some members who are part of GAIA / NASA ransomware trafficking group:

Missing Toni Sharpless (She showed me a new identify she'd purchased January 2021 in Texas. Prior to that, she had been arrested numerous times under Caanan Pate. Other names include Angelini, and Ranee. She is the only perpetrator I met, who I was confused about whether she was a trafficking victim, or an antagonist. I believe she deserves help getting out, and likely leniency for her forced crimes. She seemed almost normal, and very sad, when sober. She was frequently drugged, and forced to commit crime, by her pimp, which she didn't realize he was a pimp. She called him her boyfriend, and wanted to get married. She was deeply emotionally devastated, after each crime, yet kept doing what he said.)

Monissa Pirie, a drug dealer, who took credit for the MeetMindful Breach.

Michael Holmes, a convicted child sex offender, lifelong registration, who is prohibited from using computers.

Travis Brooks, a group member who Toni paid to commit a crime for her, where the crime, was a personal vendetta, against a woman who had abused her when she was young.

Jonathan Hernandez, a Threat Actor from San Diego California, who I previously posted a photograph of two cars in a heist, with the door open, tossing loot to each other. The Police Detective in that report, told me who he was.

All of these Actors, have felonies, and are involved in Identity Theft.
They all are involved in drug & human trafficking.
It's possible that some of the White Collar criminals, do not realize the extent of the human trafficking.

The core group that Toni Sharpless is affiliated with, they're Killer Nurses, and I have a handful of their photographs and testimonies, which I cannot post here. They utilize their RN, to access drugs, for pleasure, for sale, and for revenge.

Toni, told me that she felt attacked by a family member who was supposed to be helping her with her child, and found comfort in a man she met online. She said she went to visit him, and the story get's blurry after that.

I turned in one member of their hacking group to PD, which at first stated they would file charges as a Chapter 22 Felony. Then, the detective, said he wasn't going to proceed. I asked him why, and I was stonewalled. I believe, that it is because, that felon, is a prostitute, and I hypothesize, that she was servicing, one of his associates who has authority. Over the last two years, I've been researching law enforcement failure, and why. This is a major problem, where when evidence is collected correctly by the victim, with help of advocates and lawyers, they are able to file significant civil suits. Those end up helping innocent victims, as Public Servants are forced to clean house. I personally, wanted to find out who was corrupt, and why, as well as how to increase protection & change.













CAPTCHA Trojan & V-NSA (NASA)

BitDefender discovered this, in this article dated September 8, 2015, yet this technology is presently being used today. Attackers keep using what works, even if they have to re-brand.

This app, the Actor's appear to be utilizing Web3 & Browser Extensions that Impersonate "Google Drive Docs". NOT Google when you do forensics on what the package contains. This means, that it is also illegal trademark infringement, as it's not counterfeit, it's just stealing Google's name and presentation, which they've labeled over their Trojan.

The Threat Actors I've met, which have come up to me ever since The Attorney General approved my report, wear NASA T-Shirts. They're smug. They instigate. They seem to want me to give them my attention. I take a photograph and keep my head down, refusing to feed into their misplaced narcissistic glory. They're criminals. They steal from others through their computer crimes.

They're NOT activists (which I'm also not into, but some activists abide by the law). They're Violent Non State Actors; malicious organized ransomware group, that is involved in trafficking.

They steal from others through their computer crimes.  I actually interviewed one, last year in April, Eleven Before Twelve.  He told me horrible stories about his childhood, and how he felt being in a gang was his only option, and how he admired the tech stolen from the ransomware group calling themselves NASA (from the technology stolen from NSA, and adapted to their purposes). He lied to me about several things, but I traced his comments that stood out to me, and found out who he really is, from his YouTube channel. He teaches hackers, how to exploit with Xbox. He said they're in the gang for life. He mentioned profit sharing pools. There was a sexual component to their crimes beyond the tech. They all seemed to have been sexually exploited, and sought targets, to steal from financially, and sexually exploit as well. 

I asked him if he thought what he was doing was wrong. He said "no". That means, that he is anti-social and out-of-touch with reality, with the millions of people his gang hurts, and with how his actions affect others, as well as himself. 

No one can do this type of work, and have healthy self-esteem nor integrity. Self-worth, comes from alignment, and doing the right thing, because it's the right thing.

"The Trojan relies on a Command and Control (C&C) infrastructure to receive configuration settings about desired subscription services and relay received SMS messages. The subscription procedure involves the following steps:"

  • Loading a target website received from the C&C server;
  • Extracting CAPTCHA image and sending it for image-to-text recognition;
  • Loading the CATPCHA code on the targeted website;
  • Parsing SMS code for code or activation link;
  • Loading activation link;
  • Sending confirmation SMS;
  • Loading website with SMS code.

Joseph, a Social Engineering Threat Actor, Impersonating Tech Support + Calculator App Malware

I spoke with a representative named Joseph, from tech support, this week. He never gained access to my computer, nor asked for remote troubleshooting capacities (which I would have denied him). Even though I was just asking general questions for confirmation, he asked for my computer's serial number, which I declined. He asked out of the blue. When I said "no", he said "hum". With my serial number, he can enroll my device in Google Workspace access.

Because he did that, I asked him a different question, that I wasn't planning on, it wasn't on my list, but I asked anyways, because he triggered a Social Engineering flag: his question combined with two other factors at play, that seemed off from what I would expect. When digging, (a) always trust your intuition, and (b) clinically and diagnostically, specific flags lead to clusters which lead to what may be going on, and where to probe.

The different question, was about malware in Calculator Apps.

He was smug. He did his best not to laugh at me. He said they don't exist, and he'd never heard of them. BINGO. I caught him.

Being overconfident, and rude to others, is an anti-social feature. This man, either was attempting to illegally steal information from his company's clients, which would be against his contract, or he was an impersonator. I called the company, got a weird recording, then he called me back. I did a little digging, and found a US company that has an API, which predicts user actions, and uploads the victim's data to their B2B client's custom app. This data, can tell the developer which website to copy, and where to set-up his impersonation trap, for profit.

You can read the Forbes article about Calculator App below, and FTC's Impersonation Reports, here: FTC Imposter Scams

Forbes Calculator App Malware