INSPIRE radical theory of non-violent resistance,
using subversive creative marketing and digital media.
Written By: Zach Champ
Connect with me on Instagram!
(Photos: Some are AI Generated, some we took with our team, and others are straight up pirated from the Internet 🏴☠️ !)
WARNING: This is one of my most controversial pieces of writing. What we discuss here is considered illegal and unlawful in many countries and jurisdictions. I discuss these topics as part of a broader, theoretical approach and understanding. I cannot stress enough that if you implement many of the concepts and ideas discussed here, you MAY BE BREAKING THE LAW. I do not accept responsibility for anyone who takes this information and uses it for unlawful, illegal, or ill intentioned purposes.
SOCIAL-MEDIA IS A BATTLESPACE
The first and most important concept that this blog covers and that we will be teaching you is as follows:
The internet and social-media is NOT for entertainment and pleasure (that’s normie behavior).
Instead, the internet is a warzone! Here keystrokes, comments, tweets, and posts are the equivalent of swords and arrows, bombs and bullets...
Social media platforms like Facebook, Instagram, YouTube, and Reddit are not mere distractions; they are active battlegrounds of a silent war!
In cyberwar, the tactics are sophisticated and multifaceted. Operations span from informational warfare to psychological manipulation, with disinformation campaigns playing a key role. The aim is to influence, control, and manipulate public opinion and perception.
In this battlespace, defining the operational environment is crucial. It involves understanding the digital landscape, recognizing the influence of various platforms, and identifying the key players and their strategies. From there we can coordinate and develop a course of action to respond to threats within this space.
Russian, Chinese, and Iranian troll farms exemplify state-sponsored efforts to manipulate public opinion. These entities, often linked to government or private military companies, engage in widespread propaganda campaigns.
The Internet Research Agency (IRA), for instance, has been a notable player in such operations, known for its attempts to influence political events like the U.S. presidential elections.
In 2022, the UK reported that the IRA was responsible for spreading Russian pro-war lies online and that the workers were actively employed and paid by the Russian government.
Furthermore, in 2023, Yevgeny Prigozhin, head of the Russian private military company Wagner (the same private military company that funds a mercenary army), admitted to founding the IRA. The US government has sanctioned the IRA for interfering in American elections.
****It should be noted that Wagner’s leader was assassinated by the Russian government in a helicopter crash after attempting a coup as part of a protest to the treatment of Russian soldiers on the frontlines of the war in Ukraine.
If our enemies use these tactics and methods against us, then obviously we should be utilizing similar (if not more advanced) forms of these very same methods against them!
The digital battleground is also home to various hacking collectives, each with its unique agenda and methods:
- Anonymous: Anonymous is a decentralized, international network of hackers and political activists. The group is known for its cyber-attacks on governments, corporations, and the Church of Scientology. Anonymous originated in 2003 on 4chan, an image-based forum where mostly male teenagers post pictures of anime. The group is known for its internet-driven protests, advocacy, and direct action. In 2022, an Anonymous Twitter account with 7.9 million followers declared a "cyber war" against Russia and its president, Vladimir Putin after Russia invaded Ukraine.
-
Chaos Computer Club: Chaos Computer Club (CCC) is Europe's largest hacking group, with 7,700 registered members. The CCC is based in Germany and is known for its focus on exposing security flaws through hacking to educate people. The CCC also advocates for government transparency and access to information and computers.
-
Lizard Squad: Lizard Squad is a hacking group that claims to be responsible for some of the biggest gaming hacks and DDoS attacks in history. They are known for disrupting game events, streamers, and studios.
-
Lapsus: Lapsus$ is a cybercriminal group that focuses on extortion. The group is known for its cyberattacks on companies and government agencies, including Uber and Okta. They are believed to operate out of South America and hack into the networks of large organizations to steal data and extort payments.
-
Lulzsec: LulzSec (a contraction for Lulz Security) was a black hat computer hacking group that claimed responsibility for several high profile attacks, including the compromise of user accounts from PlayStation Network in 2011. The group also claimed responsibility for taking the CIA website offline.
Many infamous hacking collectives actively avoid engaging in activities within CIS (Commonwealth of Independent States) countries, often labeled as the modern-day axis of evil in cyber terms.
While numerous hacking groups operate as independent collectives, often driven by individual ideologies or political agendas, the cyber battlespace also includes state-sponsored groups.
These state-backed hackers specifically aim to destabilize and target critical infrastructure and corporations in the United States and other Western nations. This dichotomy highlights the complex and varied motivations behind cyber activities in the global digital arena.
Their actions, whether driven by political motives, a desire for transparency, or outright criminal intent, continue to shape the evolving narrative of cybersecurity and digital engagement.
However, key to all these developments is the American influence on cyber culture, which is characterized by a 'gangster' attitude and a penchant for trolling, and which is deeply rooted in the nation's history of rebellion, innovation, and free speech.
This bold and assertive approach reflects a cultural narrative that values independence and challenging authority and the status quo.
These online attitudes originate from America's pioneering role in technological advancement, and embody an ‘American’ sense of ownership and familiarity with digital spaces.
For most Americans, the internet is considered to be the holy grail of free thought and free-speech… But our treasured information paradise is clearly under assault by the forces of authoritarianism and despotism!
MARKETING IS PROPAGANDA
What is Propaganda? In the modern media landscape, propaganda is the psychological art of the masterful and subtle manipulation of perception and belief. Propaganda forces truth to become fluid, and makes reality a canvas for those skilled in the art of persuasion.
The definition of propaganda is language, speech, or ideas designed to influence, persuade, or convince.
Propaganda aims to twist the truth, it forces biases and prejudices and misconceptions into reality and distorts our perspective of what is ‘true’.
Propaganda operates through various tactics and techniques designed to influence public opinion. These include:
-
Name-Calling: Attaching negative labels to opponents or opposing ideas to discredit them.
-
Band wagoning: Creating the impression that a particular viewpoint is the majority opinion or trend.
-
Fearmongering: Spreading fear to influence public perception or behavior.
- Alternative Facts: Presenting false information as if it were true to support a specific narrative. This is also known as “fake news”.
Political Cartoons: A political cartoon is a drawing or comic strip that expresses an artist's opinion on current events, politicians, or issues in politics. Political cartoons are also known as editorial cartoons. They can include caricatures of public figures, hyperbole, satire, symbolism, exaggeration, labeling, analogy, and irony. Political cartoons often include captions with text to explain the scene, such as speech bubbles, headings, and catchphrases used by politicians.
ADVERTISING AND COMMERCIALS:
PRINT ADVERTISING
Print advertising stands as a testament to the enduring power of traditional media.
Print advertising is a marketing strategy that uses printed media to reach customers. It's a form of mass communication that uses hard copy mediums like newspapers, magazines, brochures, direct mail, and billboards. It can also include logos, coupons, informational pieces, invitations to sales or events, and newsletters.
The goal of print advertising is to seize the audience's attention in their moments of leisure or routine…
Whether it's through an eye-catching billboard on a busy street or a personalized brochure in the mail, print advertising creates a physical connection with the consumer.
This medium excels in delivering detailed information, from intricate logos and designs to comprehensive product descriptions, making it an ideal platform for in-depth storytelling and brand building.
Billboard: A billboard is a large outdoor advertising structure, typically found in high-traffic areas such as alongside busy roads. Billboards present large advertisements to passing pedestrians and drivers. Typically brands use billboards to build their brands or to push for their new products.
Billboards are the giants of the advertising world, offering high visibility in high-traffic areas. They serve as silent communicators, conveying messages to a vast audience of pedestrians and drivers. Billboards are particularly effective for brand building and product launches, offering a canvas for creative, large-scale advertisements that capture the essence of a brand in a single, powerful visual statement.
SOCIAL-MEDIA ADVERTISING
Social media advertising, also known as social media marketing, is the use of social media platforms to promote a product or service. Social media ads can include placing ads, sponsoring posts, or using social media influencers.
Social media is one of the most influential channels for businesses to raise brand awareness, reach potential customers, and enhance the user experience. Social media marketing is generally less expensive than traditional marketing.
Social media's vast reach, with an estimated 5 billion users daily, presents an unparalleled opportunity for businesses to engage with a diverse audience. The versatility of social media advertising allows for various strategies, including placing ads, sponsoring posts, and collaborating with influencers. This approach is not only generally more affordable than traditional marketing but also offers the advantage of targeting specific demographics based on user behavior and preferences.
BROADCAST ADVERTISING:
Broadcast advertising, encompassing radio, television, and internet platforms like YouTube and Spotify, combines audio and visual elements to create a multi-sensory advertising experience.
Radio ads, for instance, connect with listeners during commutes, while television commercials integrate into household entertainment. Internet-based broadcast advertising offers targeted advertising options, reaching specific audiences more effectively. demographics based on user behavior and preferences.
Jingles: A jingle is a short, catchy tune that is often used in advertising and other commercial uses. Jingles are a form of sound branding that contain one or more hooks and meanings that promote a product or service. They can be used on radio or television, and often include vocals, speech, or a combination of the two.
GUERRILLA MARKETING: THE ART OF UNCONVENTIONAL PROMOTION
Guerrilla marketing is an advertising approach that borrows the concept of “guerrilla” warfare, or the element of surprise, to communicate with target audiences.
This form of marketing relies on unconventional and inventive displays to elicit wonder or shock and can be especially effective for driving publicity.
The goal of the guerrilla marketer is to use their creative powers to disrupt the mundane, and to create dialogue or conversation about the topic being marketed.
Effective guerrilla marketing requires tactical creativity and an in-depth understanding of the target audience.
It involves identifying unique opportunities for engagement, crafting messages that resonate on a deeper level, and utilizing the element of surprise to create a lasting impact.
This approach demands a blend of creativity, strategic thinking, and a deep understanding of the cultural and social landscape.
Good marketing is always about creating impactful, memorable experiences!
The idea of “Brainwashing”: Brainwashing is a term used to describe a variety of techniques that are designed to manipulate human thought or action. It can also refer to the act of forcing someone to believe something by continually telling them that it is true, and preventing them from thinking about it properly.
One of the key components of guerrilla marketing is the element of surprise. By presenting the audience with something unexpected, marketers can break through the noise of traditional advertising, making their message more memorable and impactful. This could range from flash mobs in public spaces to unexpected art installations or guerrilla projections in urban environments.
GRAFFITI/STREET ART:
Graffiti is typically word-based, a form of artistic expression primarily aimed at other graffiti artists. It's a conversation within a specific community, often revolving around stylistic innovations and personal signatures.
Street art, in contrast, is more image-based and directed towards a broader public audience. This form includes a variety of mediums like paintings, stickers, posters, and sculptures, each serving as a canvas to convey messages or artistic visions.
Graffiti and street art epitomize this approach, speaking a language of dissent, nonconformity, and political discourse, capturing the attention and imagination of a diverse audience.
Street art has become a powerful tool for sparking political conversations. Artists like Banksy have mastered the art of using street installations to create provocative and thought-provoking pieces. Often situated in unexpected places and sometimes crossing the boundaries of legality, these works challenge viewers to engage with social and political issues, igniting public discourse.
Sticker art, a subset of street art, utilizes stickers to display images or messages in public spaces. This form of art can range from promoting a political agenda to commenting on societal issues.
Sticker bombing, where stickers are placed en masse in public areas, serves as a method to proliferate an idea, cause, or artistic style..
Tagging is a type of graffiti that involves creating a signature or symbol, usually using an artist's name or pseudonym. Tags are usually drawn, carved, painted, or sprayed quickly, and typically use only one color.
In the 1990s, a new form of graffiti emerged called tagging, which involves repeatedly using a single symbol or series of symbols to mark territory. Tags are often thought of as the simplest form of graffiti art, and are usually the form of graffiti that most artists start with.
Tagging is democratic, and is instantly accessible to anyone with a pen or a can of spray paint. It's considered disrespectful to write a tag over another's artist's tag or work.
Posters, strategically placed in public spaces, serve as compelling tools for propaganda and advertising. Their physical presence demands attention, often sparking curiosity or engagement even from those initially uninterested. The integration of QR codes into graffiti and street art adds a digital dimension, transforming each piece into a potential gateway to further information, ideas, or online platforms.
This blend of traditional and digital mediums expands the reach and impact of these art forms, offering new ways to connect and communicate with a wider audience.
With Graffiti and Street Art every sticker, tag, or QR code is a potential gateway to new ideas and perspectives!
THE ART OF SYMBOLISM
The art of symbolism is ancient and magical, playing an integral part in human communication. Symbols serve as bridges across time and space, allowing for the transmission of ideas, stories, thoughts, and emotions. They are potent tools for visual communication, transcending language barriers and bringing people together across cultures.
The most influential pioneer in the study of symbols and symbolism was the Swiss psychologist Carl Jung.
Carl Jung believed that symbols are images or language that convey something hidden or unknown through concrete reality. Jung saw symbols as representations of archetypes, which are collective images or patterns of behavior that developed over time during the course of human evolution.
According to Jung, symbols can be visual, auditory, or kinesthetic. They can be expressed in geometric forms, humans, semi-humans, gods and goddesses, animals, and plants. Jung believed that symbols consist of conscious and unconscious contents.
TECHNOLOGICAL AND PSYCHOLOGICAL WARFARE:
You must understand and comprehend fully the following fact: We have access to one of history's most powerful inventions ever made- THE INTERNET. This won’t last forever!
We can forge destinies and build empires using the power of the web!
The internet has redefined the landscape of wealth and power, with the world's most affluent CEOs and founders predominantly emerging from the tech and internet sectors.
Figures like Bill Gates, Jeff Bezos, and Elon Musk exemplify this trend.
The economic impact is monumental; the internet economy contributes a staggering 22% to the total GDP of the United States, amounting to $2.45 trillion.
In 2022 alone, Google's array of services – Search, Play, Cloud, YouTube, and advertising tools – generated an impressive $701 billion in economic activity.
MONEY IS POWER. But so is knowledge!
In the context of digital warfare, technology, computers, and artificial intelligence are not just tools; they are weapons of strategic superiority. The belief in investing heavily and using such tools as a primary means of cultivating power is known as Technological Super Advantage.
Embracing Technological Super Advantage is a cornerstone of modern strategy, offering a competitive edge against our opposition in a world where traditional forms of conflict have evolved into complex, multi-dimensional battlespaces.
Asymmetrical warfare, characterized by conflicts between forces of varying military strengths and organizational structures, has found a new expression in the digital world. This type of warfare is marked by the clash of conventional military forces against unorganized, often non-state actors.
Some examples of asymmetric warfare include: Guerrilla warfare, Terrorist attacks, Insurgency, Counterinsurgency, Rebellion, Counterterrorism.
In digital, asymmetrical warfare the weaker force, often unorganized and unconventional, leverages the power of technology to counteract the might of stronger, traditional military powers. In this way, the internet becomes a tool for “David against Goliath”, enabling smaller groups to conduct impactful cyber operations against larger, more established forces.
MEMES AND MEMETIC WARFARE
What are Memes? A meme is a piece of content that spreads quickly online, often through social media. Memes can be images, videos, text, phrases, or hashtags. They are often humorous, satirical, or convey a cultural reference. Memes can also be remixed and transformed over time. In a broader sense, a meme can also be an idea, behavior, or style that spreads from person to person within a culture. Memes can carry symbolic meaning that represents a particular phenomenon or theme.
Some examples of memes include: An inside or online joke, An advertising jingle, A chain letter, A conspiracy theory
The origin of the word meme comes from the 1976 book The Selfish Gene, Richard Dawkins coined the term ‘meme’ for a cultural product that can replicate and spread. In many ways, memes serve as the basic building block of human cultures.
As a cyber warrior trained in the art of propaganda and influence, you should understand that information is an element of combat power. The applied use of information in a strategic setting is what we know as Intelligence Operations.
Psychological operations (PSYOP) are military actions that aim to influence the attitudes and perceptions of individuals, groups, and foreign governments. PSYOPs are planned and programmed uses of communication media and other actions to influence the emotions, attitudes, and behaviors of selected target audiences.
The use of art or digital media as part of a larger intelligence or psychological operation is known as memetic warfare.
“Memes are a natural tool of insurgency or subversion”
The potency of memes in memetic warfare lies in their ability to resonate with a wide audience. By leveraging humor and relatability, memes can simplify and spread complex ideas, tapping into the collective consciousness. This form of digital media can be a subtle yet impactful weapon in intelligence operations, capable of swaying public sentiment and even challenging political structures. Memes can effectively convey narratives, spread fake news, and create or exacerbate divisions within societies.
“Can jokes bring down governments?” YES!
Effective memetic warfare involves crafting narratives that resonate with a wide audience, leveraging humor, satire, and relatability to spread ideas. This requires a keen understanding of the zeitgeist, the ability to tap into the collective consciousness, and the skill to distill complex concepts into easily digestible and shareable forms.
The Twelve Techniques of Memetic Warfare
Effective memetic warfare involves various techniques, each serving a specific purpose in shaping public perception and opinion:
-
Assertion: Presenting a statement as fact without evidence.
-
Bandwagon: Encouraging actions because they are popular or trending.
-
Card Stacking: Highlighting one side of an argument while ignoring the other.
-
Glittering Generalities: Using vague, emotionally appealing language.
-
False Dilemma: Presenting limited options as the only possibilities.
-
The Lesser of Two Evils: Framing a choice as the preferable of two bad options.
-
Name Calling: Employing derogatory language to attack an opponent.
-
Pinpointing the Enemy: Identifying and targeting a specific adversary.
-
Plain Folks: Appealing to common values and experiences.
-
Testimonial: Leveraging endorsements from third parties.
-
Transfer: Associating a product or idea with positive symbols or images.
- Desires and Fears: Appealing to basic wants or anxieties.
Memes, in the context of memetic warfare, are more than just internet humor; they are a sophisticated tool for shaping and influencing public discourse.
Their ability to encapsulate complex ideas into easily digestible and shareable content makes them a powerful weapon in the digital age.
Understanding and harnessing this power is essential for anyone involved in the fields of communication, marketing, and information warfare.
For more information please visit:
https://densitydesign.github.io/teaching-dd15/course-results/es03/group03/index.html
PROGRAMMING AND MIND CONTROL
Social Engineering: Social engineering is the practice of using human emotions, trust, and behavior to obtain unauthorized access to systems or confidential information, or to manipulate individuals behavior. It takes advantage of natural human tendencies, such as fear of consequences, curiosity, and the desire to help others.
Social engineering attacks are when a person is tricked into doing something dangerous or against their best interests by an attacker employing social-engineering techniques.
Neuro Linguistic Programming: Neuro-linguistic programming (NLP) is a psychological approach that involves analyzing strategies used by successful individuals and applying them to reach a personal goal. NLP can be understood in terms of three broad components: subjectivity, consciousness, and learning.
Social engineers use NLP as a psychological tool to manipulate people. NLP can be used to layer subtle meaning into spoken or written language so that you can implant suggestions into a person's unconscious mind without them knowing what you're doing.
DISINFORMATION CAMPAIGNS:
A disinformation campaign is a targeted, organized information attack on a company, a party, an institution or an individual, whereby a large amount of demonstrably false or misleading information (disinformation) is published, which serves the purpose of manipulation and is deliberately disseminated on a large scale.
The advent of AI technology and software has made the process of disinformation easier than ever before.
USING AI ART TOOLS:
ChatGPT:
ChatGPT, a sophisticated language model developed by OpenAI, has become a game-changer in content creation. It can assist in writing scripts, speeches, social media posts, blogs, and more, offering a blend of creativity and analytical prowess.
For a deeper understanding, you can refer to our "ChatGPT Basics 101" blog.
This tool leverages advanced AI to understand and generate human-like text, making it an invaluable asset for writers, marketers, and content creators who need to produce high-quality written content efficiently.
DALL-E:
DALL-E, another groundbreaking AI model from OpenAI, specializes in creating images from text descriptions.
Since its inception in 2021, DALL-E has evolved, with DALL-E 3 offering higher resolution and more realistic images. This tool uses deep learning to interpret natural language prompts and generate corresponding visual content.
It's particularly useful for artists, designers, and marketers who require quick, high-quality visual content. DALL-E 3 is even accessible for free within Microsoft Bing, providing users with weekly credits for image generation.
MIDJOURNEY:
Midjourney stands as a notable generative AI program that creates images from natural language descriptions. It's a versatile tool capable of producing a wide range of artistic outputs, from realistic to abstract. Whether it's creating imagery for Facebook ads or product mock-ups, Midjourney offers a unique blend of creativity and precision, making it a valuable tool for digital artists and marketers.
STABLE DIFFUSION:
Stable Diffusion is a deep learning model known for its ability to generate photorealistic images from text prompts.
It operates on a latent diffusion model, compressing images into a latent space for faster and more efficient processing. This model is particularly adept at text-to-image generation, offering users the ability to adjust seed numbers and denoising schedules for varied effects.
While it includes a safety filter, there's potential for generating images that bypass this feature.
Stable Diffusion is available both as an installable version and as an online/mobile app, catering to a wide range of user preferences.
SYNTHESIA AI:
Synthesia AI revolutionizes video creation by eliminating the need for traditional equipment like cameras, microphones, and studios. It uses machine learning to generate videos with human presenters simply from typed text.
This platform is equipped with natural language processing, image and video analysis, and automatic voice-over generation, offering over 85 AI avatars for diverse video presentations.
Synthesia is ideal for creating everything from educational content to fake news reports, providing a versatile and efficient solution for video production.
The advent of AI-driven tools like ChatGPT, DALL-E, Midjourney, Stable Diffusion, and Synthesia AI marks a new era in digital creativity. These tools are not just augmenting traditional content creation processes but are redefining them, offering creators unprecedented levels of efficiency, flexibility, and creative freedom.
DEEP FAKES
What are Deep Fakes? A deep fake is a video, audio, or photo recording that has been manipulated with AI to appear real. Deep fakes can replace faces, alter facial expressions, and synthesize speech and faces. They can make someone appear to say or do something they didn't. Deep fakes use machine learning, digital software, and face swapping to create new footage that can be quite convincing.
BULLY THE OPPS
Creating content that challenges and undermines the influence of authority figures or established powers is a tactic often used in digital activism. This approach involves crafting messages or narratives that expose, embarrass, or question the legitimacy of those in power.
The key is to be relentless and unyielding, using the power of digital media to disseminate these messages widely.
While challenging authority can be a form of legitimate protest, it's important to consider the ethical implications. Content that is defamatory, untrue, or incites violence can have legal consequences and may harm innocent parties.
It's crucial to balance the desire to challenge authority with a commitment to truth and ethical conduct.
(REMEMBER: WITH GREAT POWER COMES GREAT RESPONSIBILITY!)
The internet often provides a false sense of security and anonymity, leading some to engage in aggressive or unethical behavior, known colloquially as "keyboard warriors."
This perceived anonymity can embolden individuals to take actions they might not consider in real life. Because of this people will reveal and act on secretive and hidden aspects of their personality and life on the internet.
The key to pressuring and intimidating folks online lies in peeling back the false sense of security provided by anonymity.
How do we determine who we are interacting with online? We use OSINT techniques.
Doxxing: Doxxing refers to the practice of revealing someone's personal information online without their consent. This often includes sensitive details like real names, home addresses, workplaces, phone numbers, and financial information. The intent is typically to intimidate, harass, or shame the individual.
Doxxing is a serious invasion of privacy and can lead to real-world harm. It's considered unethical and is illegal in many jurisdictions. The act of doxxing not only violates individual privacy but can also lead to harassment, threats, and physical danger to the persons doxxed.
HOW DO WE DOX THE OPPS?
Start with an IP Address: An IP address is a unique string of numbers that identifies a device or network connected to the internet. An internet service provider (ISP) typically assigns an IP address. IP addresses allow devices to communicate with each other on local-area networks (LANs) and over the internet.
An IP address can change when a device is connected to Wi-Fi, cellular, or wired internet because each type of connection uses a different type of network. When you connect to an alternative internet connection outside your home, you'll be assigned a new IP address based on your location and the devices you're using.
Your IP address does not give away your exact location, like your street or house address, but it can pinpoint your approximate location. By pulling and analyzing IP addresses we can gain valuable insight and data into determining the physical location of devices and computers on a network.
Pulling and analyzing IP addresses can offer insights into the physical location of devices, which can be used for various purposes, from marketing to surveillance.
DoxBin & ‘Pastebins’
Originally, Doxbin was an onion service on the darknet. It functioned as a pastebin, primarily used for posting personal data (often referred to as doxing) of various individuals.
This included sensitive information like social security numbers, bank routing information, and credit card details, all in plain text.
Due to the illegal nature of much of the information it published, Doxbin was seized during Operation Onymous, a multinational police initiative, in November 2014.
The site was established by an individual known as "nachash" and was involved in several controversial activities, including attacks on Symantec and the hijacking of The Hidden Wiki's Tor hidden service.
Email Lists
Email lists represent a critical intersection of communication strategy and cybersecurity. These lists, often containing sensitive personal information, are not only vital tools for marketing and direct engagement but also potential targets for cyber threats.
Email lists are highly valued, and protecting them from unauthorized access and breaches is of the utmost importance. Email lists are one of the key forms of data that companies collect, sell, and invest in.
They form the basis of privacy laws like GDPR, and many large platforms and companies rely on the trust of subscribers and customers with this data. They often fail miserably.
The risk of exploitation by phishing attacks and other forms of cybercrime necessitates robust security measures, including encrypted email services, strong authentication protocols, and regular software updates.
OSINT & Social-Media
Open Source Intelligence (OSINT) techniques can also be utilized to determine the identities of individuals behind online profiles.
This involves analyzing social media, cell phone data, LinkedIn accounts, and other publicly available information to gather insights about a person's identity, occupation, and location.
Examples of the type of information OSINT techniques can gather include:
- Social-Media Analysis: (Provides most the information you need, photos that can be used as source material for deep fakes and scams, etc)
- Cell-Phones: (contact information and used to override username and passwords for accounts)
- LinkedIn accounts: (their jobs and residence)
There is only one way to prevent being doxxed, and that is to implement and practice cyber security protocols to protect your information!
NETWORK SECURITY: Network security is the protection of a network's infrastructure from unauthorized access, theft, or misuse. It involves creating a secure infrastructure for devices, applications, and users.
VPN: A VPN, or virtual private network, is a service that encrypts your internet traffic and hides your IP address. VPNs are like digital bodyguards that protect your privacy online, whether you're at home, at work, or on public Wi-Fi. VPNs are especially important if you or your organization handles sensitive information. VPNs use highly secure protocols with a level of encryption that has never been cracked.
HACKERZZZ
Becoming a cyber warrior involves gaining a deep understanding of cyber strategy. This includes knowledge of network security, data analysis, and the ability to anticipate and counter digital threats. It requires a blend of technical expertise and strategic foresight, as well as the ability to see beyond the immediate and envision the broader implications of digital actions.
In the world of hacking and digital strategy, anonymity is not just a preference; it's a necessity.
Anonymity serves as a protective layer, shielding the identity and location of individuals involved in various cyber operations. This protection is vital for a range of activities, from ethical hacking and security research to more controversial practices like digital activism or whistleblowing.
Anonymity ensures that individuals can conduct their operations without the risk of personal exposure, which could lead to legal repercussions or retaliatory actions.
One fundamental method of maintaining anonymity online is through the use of sock puppet accounts.
A sock puppet account is an online identity created for deception. Sock Puppets are typically created by a single person or group in large numbers.
Why do we use sock puppets? Sock puppets play a significant role in the digital operations strategy playbook.
They serve various purposes, including evading blocks on social media platforms, creating false majority opinions, vote stacking, and circumventing viewing restrictions.
The strategic use of sock puppets can significantly impact public discourse and perception, making them a powerful tool in the arsenal of digital tacticians.
The Role of Bots in Digital Strategy
Bots, or robots, are software programs that perform automated, repetitive tasks, often imitating or replacing human user behavior.
They operate much faster than human users and can be used for a variety of purposes:
-
Marketing or Political Purposes: Social bots can spread content on specific topics on social media, mostly to influence public opinion.
-
Comment Spam: Bots can flood blog comments with links to increase page rank.
-
Financial Motivations: Bots, especially follower bots, can be bought and sold on the black market, with more convincing bots fetching higher prices.
- Boosting Popularity: Social media bots can be used to artificially boost engagement and reach metrics for accounts. This includes increasing likes, comments, and followers to create an illusion of popularity or consensus.
Key Python Libraries for Social Media Bots
Python, with its versatility and rich library ecosystem, is an invaluable tool for creating social media bots. These bots can automate interactions on various social media platforms, enhancing engagement and reach metrics.
-
InstagramAPI: For automating interactions on Instagram.
-
Tweepy: A Python library for accessing the Twitter API.
-
Praw: A Python wrapper for the Reddit API.
-
PyAutoGUI: Allows Python scripts to control the mouse and keyboard for automation.
-
ChatterBot: Useful for creating automated responses or chatbots.
- iaBot: A library for automating various internet activities.
Python is an invaluable tool for social media analysis-the process of gathering and analyzing data from social media platforms. This can include sentiment analysis, trend tracking, and understanding user behavior.
WEB-SCRAPING AND WEB-CRAWLING
You may have heard us discuss Web Scraping and Web Crawling before.
Web scraping is about extracting data from one or more websites. While crawling is about finding or discovering URLs or links on the web. This has many uses ranging from research and data collection to website and content SEO.
We need large data sets to work with to be effective in marketing/advertising/propaganda campaigns.
You literally have to collect individual data points about your audience that reflects their behavior, interests, and personality because this is the information you will use to craft your campaigns and ultimately create influence!
To collect large datasets quickly and efficiently from online resources such as websites, pdfs, databases, etc. we use tools like web scrapers and web crawlers.
Web Crawlers:
Web crawlers, also known as spiders or bots, play a crucial role in how the internet functions, particularly in the realm of search engine optimization (SEO) and web scraping. One of their key functions is to utilize and create sitemaps, which are integral to understanding and navigating the structure of websites.
A sitemap is a file that lists a website's URLs, videos, files, and relationships. Sitemaps are used by search engines and crawlers to navigate a website and improve its visibility. They are basically the blueprint for a website and can be displayed in plaintext format for simplicity and use in programming applications.
Sitemaps are an essential tool for webmasters and web scrapers. They help search engines understand and index websites efficiently. Sitemaps also provide a valuable resource for web scrapers as they present a structured layout of a website's content.
A sitemap is an important part of SEO. It helps search engines understand the structure of a website, and it tells them which pages on a site are most important.
A sitemap is a basic HTML file that lists all the important pages on a site when it is intended for users. It should also include meta data about each link including its importance to the site and the last time it was updated.
You'll normally find a sitemap in a website's footer, where everyone can access it. Each item in the sitemap links to the relevant page. Search engines like Google read this file to crawl your site more efficiently.
Example Tools:
Scrapy: Scrapy is an open-source Python framework designed for web crawling and scraping, particularly suited for large-scale projects. It's a robust tool that provides a comprehensive suite of features for efficient data extraction, processing, and storage. It allows for the efficient extraction of data from websites, and provides customizable methods for processing and storing extracted data in your preferred structure and format.
Key Features of Scrapy
-
Data Extraction: Scrapy can navigate web pages and extract structured data from HTML content.
-
Data Processing: Offers tools to process and manipulate the extracted data as needed.
- Data Storage: Allows storing the scraped data in various formats, including CSV, JSON, and XML.
Octoparse: (IF YOU DON’T LIKE CODING 😥) Octoparse is a visual web scraping tool that doesn't require coding skills, making it accessible for both experienced and inexperienced users. It's ideal for turning semi-structured or unstructured data from websites into structured datasets. Users can build their scrapers in a customized way by clicking on elements on the pages, and create the workflow easily.
Octoparse offers a free version that can meet basic scraping needs, or users can upgrade to advanced plans.
Octoparse has many features, including:
-
AI-powered algorithms: Automatically detect data from a web page
-
Scheduled data acquisition: Near real-time data monitoring and retrieval
-
Advanced cloud computing technology: For secure and robust scraping processes
-
Multi-role access: Helps your team work together and become more efficient
- API integration: Automates the data acquisition process
ScraperAPI: ScraperAPI is a proxy solution tailored for web scraping at an enterprise level. It's designed for developers who need to manage enterprise-level large-scale scraping operations with ease.
“Having built many web scrapers, we repeatedly went through the tiresome process of finding proxies, setting up headless browsers, and handling CAPTCHAs”
ScraperAPI is proxy solution for web scraping. It is designed to make scraping the web at scale as simple as possible by removing the hassle of finding high quality proxies, rotating proxy pools, detecting bans, solving CAPTCHAs, managing geotargeting and rendering JavaScript.
Advantages of ScraperAPI
-
Proxy Rotation: Ensures uninterrupted scraping by rotating proxies and avoiding blocks.
-
CAPTCHA Handling: Automates the process of solving CAPTCHAs.
-
Geotargeting and Rendering JavaScript: Manages complex scraping requirements.
- Scalability: Built to handle large-scale scraping projects efficiently.
Choosing the right web scraping tool depends on the specific requirements of your project, your technical expertise, and the scale of data collection needed.
Each tool offers unique features and capabilities, making web scraping more accessible and efficient for various applications.
SOCIAL-MEDIA TACTICS:
For artists and influencers, having a Instagram Professional Account is crucial.
This upgrade provides access to an enhanced and in-depth analytics dashboard, offering valuable insights into audience demographics, engagement rates, and content performance. These metrics are essential for tailoring content strategies and maximizing reach and impact.
Even better- become a Meta Developer and gain access to the Instagram Graph API for more data and statistics.
The Instagram Graph API gives users of an app access to data in their Instagram creator and business accounts. It's intended for influencers or brands who want to have full control over and insight into their social media interactions.
The key to success with these social-media tools is implementing the knowledge and insights gained from data analysis into your marketing funnel.
A marketing funnel is a strategy to focus and guide user attention through a series of stages, from initial awareness to eventual conversion (like following, purchasing, or endorsing). For artists and influencers, this can mean directing followers from a post or story to other resources, such as a website, online store, or other social media platforms.
Social-Engineering + Social Media Techniques:
Social-Media provides us endless possibilities when it comes to social engineering attacks and exploits. The core of social engineering is manipulating communication and trust. Social-media platforms provide us a false sense of trust and communication with our friends, family, and loved ones.
The reality is social-media provides a blueprint and route of attack for actors looking to exploit our weakness. Social engineering is always easier than using brute force or expensive and exotic hacking techniques.
It is easier for me to trick or convince you to give me your credit card number versus hacking it!
Some of the most commonly used social engineering methods used on social media include:
-
Honey Trap: With a honey trap attack, the social engineer assumes the identity of an attractive person. They then engage in a relationship with the victim online to try to get sensitive information from them.
-
Phishing: Tricking users into revealing their personal or confidential information.
-
Cat Fishing: Catfishing is a type of social engineering attack that involves creating a fake identity to trick a victim. The goal of cat fishing is often to scam, harass, or steal the victim's identity. How to tell if you are being catfished: refusing to video chat, inability to communicate directly when needed, inability to mention mutual friends or recall shared experiences accurately.
-
Honey Trap: With a honey trap attack, the social engineer assumes the identity of an attractive person. They then engage in a relationship with the victim online to try to get sensitive information from them.
-
Whaling: Whaling is a type of social engineering attack that targets senior executives, important figures or celebrities, politicians, etc. with the goal of stealing money or information. Whaling attacks are also known as whaling phishing attacks. The idea is that the whale is a target of high interest and value in comparison to a regular Joe Smoe.
- Pretexting: An attacker creates a fake scenario to persuade the victim to give out information.
Protecting Yourself from Social Engineering Attacks
Being aware of these tactics is the first step in safeguarding against them. Here are some strategies to protect yourself:
-
Verify Identities: Always confirm the identity of individuals you interact with online, especially if they are new connections.
- Be Cautious with Personal Information: Be wary of sharing sensitive information, even with known contacts, unless you're sure of the context.
-
Recognize Suspicious Behavior: Inconsistencies in communication, reluctance to meet in person or video chat, and requests for confidential information are red flags.
-
Educate Yourself and Others: Awareness is a powerful tool. Understanding the nature of these attacks can help you and your network stay protected.
- Use Strong, Unique Passwords: This reduces the risk of unauthorized access to your accounts.
- Enable Two-Factor Authentication: This adds an extra layer of security to your accounts.
ART, WEAPONIZED:
This fusion of art, technology, and activism marks a new era in social engagement. It's a call to arms for artists, technologists, and activists to collaborate and innovate, using their skills to inspire change and make a tangible impact on their communities and the environment.
Art, in its traditional form, has always had the power to alter perception, to make the unseen seen and the seen unseen.
However, when intertwined with modern technology, art transcends its conventional boundaries, becoming a form of magic that can cast powerful illusions and reshape reality.
CASTING ILLUSIONS:
Hallucinations, Apparitions, and Mirages:
Modern technology allows artists to create digital hallucinations, apparitions, and mirages that challenge viewers' perceptions.
These creations can be surreal, evoking a sense of wonder and questioning, or they can be hyper-realistic, making viewers question the very nature of reality.
This form of art can be a potent tool for raising awareness about various social issues, creating an immersive experience that leaves a lasting impression on the audience.
Unauthorized use of technology and art in public spaces, including projection mapping on buildings, can draw attention to social issues.
Projection mapping transcends traditional art forms, turning buildings and urban landscapes into dynamic canvases. This technique allows artists to broadcast powerful social messages, transforming passive structures into active participants in social dialogue. This form of art can be particularly effective in reaching a wide audience and sparking public discussion.
Holographic protests utilize the cutting-edge technology of holograms to project messages and images in public spaces. This form of protest offers a novel way to engage in activism without the need for physical presence, significantly reducing the risk of confrontation. It's a peaceful yet impactful method of making a statement, allowing activists to convey their messages in a visually striking and attention-grabbing manner.
Deep Fakes, which involve using AI to create hyper-realistic but entirely fabricated videos or audio recordings, have garnered attention for their potential misuse in identity theft and misinformation campaigns. The ability of deep fakes to convincingly replicate individuals saying or doing things they never did poses a serious threat to personal privacy and the integrity of information.
One of the most significant dangers of deep fakes is their potential to spread false information. In an era where the authenticity of digital content is increasingly questioned, deep fakes can exacerbate the challenge of distinguishing fact from fiction, potentially leading to widespread misinformation and manipulation of public opinion.
Despite these concerns, deep fakes also hold potential for positive use, particularly in raising awareness about social issues and challenging perceptions.
Ethically used, deep fake technology can be a powerful tool for dramatizing social problems or envisioning potential future scenarios. By creating compelling, fictionalized video content, activists and storytellers can highlight important issues, provoke thought, and stimulate discussion. This approach can be particularly effective in drawing attention to issues that may be overlooked or misunderstood, providing a vivid and engaging way to convey complex messages.
A great example of this is the movie Avatar by James Cameron.
SHAPING THE ENVIRONMENT:
Art and technology can also directly impact the local environment and community.
Street art especially is a powerful medium that influences society by changing opinions, instilling values, and translating common human experiences across space and time. It plays a significant role in shaping local culture in various ways:
Expressing Opinions and Spreading Awareness:
Street art serves as a dynamic platform for expressing opinions and challenging the status quo. It can address critical issues like inequality, social justice, and environmental concerns, amplifying movements and sparking societal change.
Creating a Sense of Identity:
Murals and graffiti often reflect the identity of a community. Portraits of respected local figures or depictions of cultural symbols can instill a sense of pride and belonging among residents.
Beautifying and Regenerating Urban Spaces:
Transforming city walls into visual narratives, street art contributes to the beautification of urban areas. It turns mundane spaces into cultural landmarks, aiding in urban regeneration and fostering community pride.
Sparking Conversations:
Street art acts as a voice for marginalized communities, initiating dialogues and challenging societal norms. It demands visibility for those often silenced, highlighting their struggles and stories.
Methods & Applications:
Sidewalk chalk art offers a unique way to convey messages about critical issues like climate change. Artists can create designs that evolve with different weather conditions, revealing powerful messages that interact with the elements.
LED Message Boards for Community Voices: Public LED boards provide a platform for residents to share messages and art. Controlled via an app, these boards can become a digital canvas for community expression, reflecting the diverse voices and creativity of the neighborhood.
Alternatively, the same LED message boards can be utilized as a digital graffiti wall that allows for the creation of virtual graffiti, offering a dynamic and ever-changing art space. This installation not only adds aesthetic value to public areas but also engages the community in digital art creation.
Art installations equipped with movement or sound sensors can interact with passersby, creating an engaging and playful experience. These installations invite public participation, making art accessible and experiential.
Biofeedback installations represent a symbiosis of art and science. These interactive exhibits use biofeedback technology, like heart rate or brainwave sensors, to change the art based on the viewer's physical or emotional state.
By responding to physiological signals, these installations create a dialogue between the art and its audience, making each interaction unique.
This not only personalizes the experience but also makes viewers acutely aware of their own emotional and physical presence, fostering a deeper connection with the artwork and its message.
Environment Engineering:
Small-scale environmental projects, such as urban greenhouses or pollution-absorbing sculptures, can significantly improve local environmental conditions. These initiatives demonstrate how art and technology can directly contribute to environmental health.
Benches with interactive features and artistically designed recycling bins not only beautify public spaces but also promote environmental consciousness and community interaction.
Organizing community solar power initiatives and developing tech-enabled urban farming solutions like hydroponics and AI to optimize growth and yield, selling produce to local markets and restaurants. These are practical ways to harness technology for environmental benefits. These projects can provide renewable energy and fresh produce to local communities, demonstrating a sustainable model of urban living.
The integration of art and technology in public spaces is creating new paradigms for community engagement and environmental activism.
These initiatives not only enhance the aesthetic and functional aspects of urban spaces but also foster a sense of community ownership and responsibility towards the environment. As artists and technologists continue to innovate, the potential for positive change in our communities and the environment grows exponentially.
RFIDS in Everything: Just do it! like Nike.
If we have RFID sensors built into a variety of important local infrastructure we can start building out tools and software to interact with this new “digital radio” network. This is also known as the Internet of Things, but it doesn’t have to be limited to 5G connections.
We can also use LoRa. LoRa technology complements RFID by providing long-range, low-power wireless communication. This technology is particularly suited for IoT applications where devices need to transmit small amounts of data over long distances.
By using spread spectrum modulation, LoRa ensures reliable communication even in challenging urban environments.
LoRa's ability to create 'built out' local networks of receivers and transponders offers a cost-effective solution for wide-area IoT applications.
This could include monitoring environmental conditions like air quality or noise levels, which are crucial for maintaining a healthy urban environment. LoRa's low-power requirement also makes it ideal for battery-operated sensors in remote or hard-to-reach areas of the city.
Incorporating RFID and LoRa technologies into city infrastructure lays the groundwork for a responsive, interactive urban environment. This "digital radio" network, part of the broader Internet of Things, can revolutionize how residents interact with their city, from improving waste management to easing traffic congestion.
Community-driven tech projects, like street art that interacts with these digital systems, can foster a sense of ownership and engagement among residents.
By expanding on and utilizing the Internet of Things, we can develop apps and devices that help solve urban problems like traffic congestion, waste management, or energy use. Not only can we address real issues in this manner, but we can also create economic opportunities for ourselves by developing apps and software tools for IoT and selling them to local governments or investors.
MERGING DIGITAL & PHYSICAL SPACES:
Geocaching, the outdoor treasure-hunting game using GPS coordinates, is a prime example of how technology can encourage exploration and learning about our surroundings.
Imagine taking this concept further by integrating RFID or other technological sensors into prominent landmarks. This integration could transform our environment into an interactive physical-digital network, where each location holds a story, a piece of history, or a unique interaction waiting to be discovered.
Augmented and Virtual Reality technologies offer new dimensions of experience, allowing people to engage with social issues in immersive ways or witness things they have never seen before.
For instance, AR apps can overlay virtual graffiti with social messages onto physical spaces, viewable only through smartphones.
This blend of the real and virtual worlds can make social messages more engaging and accessible.
Imagine combining real-life physical spaces with online apps and data. By creating a virtual ‘sense’ network of RFID’s throughout our city and suburban landscapes, and creating apps to interact with these sensors we can use the power of the internet and virtual reality to unlock new possibilities in the environment around us.
This would be the starting point for giving humans 'superpowers’ because we would essentially be adding a new invisible digital sensory layer to the human experience, one which we could interact with wirelessly and maybe even psychically with our thoughts and mind. This is the future!
Just think how much we use our smartphones and rely on them to communicate and navigate throughout our day to day lives. We are only a few steps away from the widespread adoption of new technologies that would elevate this experience to a new virtual/augmented reality complete with the same level of data input and consumption that we currently experience immersed in our phones and social-media.
People use smartphones more than they use computers to connect to the internet.
Utilizing smartphones for crowd sourced neighborhood mapping allows residents to contribute to a digital map, highlighting points of interest or local issues. Similarly, recording and sharing neighborhood soundscapes can capture the unique auditory essence of a place, adding another layer to our digital-physical interaction.
WORKING TOGETHER:
The power of collective action is immense in driving social change.
Organized public performances and gatherings are more than just events; they are potent platforms for social advocacy.
These organized efforts capture the public's attention, sparking conversations and bringing critical social issues to the forefront of community consciousness.
Whether it's a flash mob, a peaceful demonstration, or a public art installation, these events have the power to engage, educate, and inspire action among a wide audience.
Organized Social-Media Campaigns
Similarly, online platforms like community forums and social media groups provide spaces for dialogue and planning, strengthening community bonds and facilitating collective action.
Utilizing social media platforms such as Instagram, Twitter, and Facebook, artists and activists can launch viral campaigns that rapidly spread awareness about social causes. These platforms enable the rallying of community support for local initiatives. By building a strong social media presence focused on local issues, and employing strategies like sponsored content, affiliate marketing, or merchandise sales, these campaigns can also achieve financial sustainability.
Advanced data analytics plays a crucial role in understanding the psychology and demographics of local communities. This insight allows for the customization of social campaigns to resonate deeply with specific groups, ensuring that messages are not only heard but also felt on a personal level.
Social media challenges can be a fun and engaging way to encourage acts of kindness and community improvement. These challenges can tap into the creative gifts and skills of individuals, fostering a culture of service and value. The goal is to inspire as many people as possible to contribute positively to their communities.
Interacting Directly with the Community
Direct interaction with the community is a powerful way to build relationships, share knowledge, and inspire action.
One of the most enriching ways to interact with the community is by engaging with elders. Talking to elders allows us to understand how certain aspects of their lives mirror our own, despite the passage of time.
Their stories and experiences provide a unique perspective on the past, often revealing surprising parallels with contemporary life.
These conversations are not just about reminiscing; they are a bridge between generations, offering insights and lessons that are relevant today.
Another important way to interact directly with the community is by organizing events. Through participating in special demonstrations such as 'magic tricks' that showcase specific skills and concepts, you can effectively raise awareness towards important issues. These demonstrations should be designed to captivate and educate, rather than to disrupt or harass, as the aim is to win friends and spread the cause positively.
Such events can also be a means to identify and recruit talented individuals who are aligned with the cause or the mission of the organization. It's a way to bring together like-minded people who can contribute their skills and enthusiasm.
The primary goal of these demonstrations should be to educate and captivate the audience. By presenting information in an interactive and entertaining way, it's possible to leave a lasting impression that encourages people to learn more and get involved!
"The block of granite which was an obstacle in the path of the weak, becomes a stepping stone in the path of the strong".