Monday, November 20, 2017

eSellerate Profiles

eSellerate Personae
eSellerate Personae


Locate EWS on your Apple computer in the Frameworks folder.  eSellerate is used by legitimate software companies, but those registration numbers, keychains, and passwords are later sold by third parties on sites such as Fuckbookhacked dot Com.  The money is routed through numerous world banks to BitCoin.  A folder called "Strings" then sends that money through Apple Pay, converted into other currencies along the way, to locales such as Warsaw, Poland (allegedly).

All of this activity is 100% US Federally-funded through such Acts as the NDAA and front organizations; there are no foreign actors involved who are not receiving US funds (or there weren't prior to the FBI/ISraeli jailbreak).  Most of this originated out of Nevada, Texas, and the UK.  Much of this activity can now be traced back to university-based STEM programs.  This money is generally funneled into Black Ops programs for the US military, such as drones and plastics (used to make drones).

© Copyright 2017, The Cyberculturalist

Monday, November 13, 2017

UNIX to UNIX Copy - Mac



UNIX to UNIX
UNIX to UNIX

All illegal activity on or through this network has been facilitated and committed by local and Federal agents working directly for, or with, the US government in one capacity or another.  While their cover story remains such as "national security" or "open investigation," they are actually collecting information for the purposes of extortion, and stealing intellectual property.

Just as they work clandestinely through a byzantine network of front organizations, "dummy" and "zombie" corporations, and governmental agencies, they employ informants (CI, colloquially known as "snitches") to gather information -- usually bogus.  

This is known as COINTELPRO.

My guess is that this configuration is being used to pose as me, but Identity Theft is only the tip of the iceberg, as I've no idea what crimes they've committed under my name (or PC, as it were).

© Copyright 2017, The Cyberculturalist

Monday, November 6, 2017

ghost-riding-the-whip2 and Holly Bobo

Mulberry Bush
Mulberry Bush
I understand Rose McGowan was issued an arrest warrant last night out of Virginia -- near Baltimore (Washington, DC).  It's interesting because I went to bed about an hour before that started circulating through the trades and, when I woke up about two hours after that had been reported, I found that my Internet connection was enabled.  That is interesting because I disable it before I go to bed.

Here are some more interesting items: 

I purchased a new third-party app, and it used our friend, eSellerate, for its registration.  A new "ProductionBag" had been installed just minutes before Ms. McGowan's story hit the trades with the following (full script available upon request):

  <key>libraryAdamIdLink</key>
<string>https://itunes.apple.com/WebObjects/MZStoreServices.woa/wa/libraryAdamIdLink</string>
  <key>maxComputers</key><string>5</string>
  <key>trustedDomains</key>
  <array>
    <string>.apple.com.edgesuite.net</string>
    <string>.asia.apple.com</string>
    <string>.corp.apple.com</string>
    <string>.euro.apple.com</string>
    <string>.itunes.apple.com</string>
    <string>.itunes.com</string>
    <string>.mzstatic.com</string>
    <string>.phobos.apple.com</string>
    <string>.rtlcdn.apple.com</string>
    <string>*.ips.apple.com</string>
    <string>ab2-so.apple.com</string>
    <string>aiusw.apple.com</string>
    <string>albert-so.apple.com</string>
    <string>albert.apple.com</string>
    <string>appsto.re</string>
    <string>buyiphone.apple.com</string>
    <string>buyiphone1.apple.com</string>
    <string>buyiphone2.apple.com</string>
    <string>buyiphone3.apple.com</string>
    <string>buyiphone4.apple.com</string>
    <string>buyiphone5.apple.com</string>
    <string>buyiphone6.apple.com</string>
    <string>deimos.apple.com</string>
    <string>deimos2.apple.com</string>
    <string>deimos3.apple.com</string>
    <string>indigo-edge.apple.com</string>
    <string>indigo01.apple.com</string>
    <string>istdev1.apple.com</string>
    <string>istweb.apple.com</string>
    <string>istwebdev1.apple.com</string>
    <string>itunes.apple.com</string>
    <string>itunes.com</string>
    <string>itunesconnect.apple.com</string>
    <string>itunesu.itunes.apple.com</string>

    <string>activateiphone.apple.com</string>
    <string>activateiphone1.apple.com</string>
    <string>activateiphone2.apple.com</string>
    <string>activateiphone3.apple.com</string>
    <string>activateiphone4.apple.com</string>
    <string>activateiphone5.apple.com</string>
    <string>activateiphone6.apple.com</string>
    <string>activateiphone7.apple.com</string>
    <string>activateiphone8.apple.com</string>

  <key>appletv-youtube-auth-url</key><string>https://www.google.com/</string>
  <key>appletv-youtube-url</key><string>https://gdata.youtube.com/</string>
  <key>available-storefronts</key><string>https://itunes.apple.com/WebObjects/MZStore.woa/wa/availableStoreFronts</string>
  <key>appletv-view-top-url</key><string>https://itunes.apple.com/WebObjects/MZStore.woa/wa/viewTop</string>
  <key>appletv-use-personalized-menu-content</key><string>NO</string>
  <key>Ghostrider</key><string>YES</string>

    <key>track-count-limit</key><integer>5000</integer>
  </dict>
  <key>podcast-get-episode</key><string>https://itunes.apple.com/metrics/podcast/getEpisode</string>
  <key>podcast-play-episode</key><string>https://itunes.apple.com/metrics/podcast/playEpisode</string>
  <key>download-speedtest-post-results-url</key><string>https://itunes.apple.com/upload/diag/atv/</string>
  <key>download-speedtest-urls</key>
  <array>
    <string>http://a568.phobos.apple.com/us/r1000/000/Diag/test_8MB.m4v?no-store=true</string>
    <string>http://a568.phobos.apple.com/us/r1000/000/Diag/test_8MB.m4v</string>
    <string>http://a568.phobos.apple.com/us/r1000/000/Diag/test_8MB.m4v</string>
  </array>
  <key>download-movie-speedtest-urls</key>
  <array>
    <string>http://a1.v.phobos.apple.com/us/r1000/000/Diag/STEM_hd.m4v?no-store=true</string>
    <string>http://a1.v.phobos.apple.com/us/r1000/000/Diag/STEM_hd.m4v</string>
    <string>http://a1.v.phobos.apple.com/us/r1000/000/Diag/STEM_hd.m4v</string>
  </array>
  <key>tgt</key><string>1</string>
  <key>end-of-book-upsell-enabled</key><string>YES</string>
  <key>end-of-picture-book-upsell-enabled</key><string>YES</string>
  <key>book-upsell</key><string>https://itunes.apple.com/WebObjects/MZStore.woa/wa/bookUpsell</string>
  <key>book-library-title</key><string>Library</string>
  <key>allow-citations</key><true/>
  <key>allowing-citations</key>
  <array>
    <integer>143441</integer>
  </array>
  <key>ibooks</key><string>https://itunes.apple.com/us/app/id364709193</string>
  <key>fin-posts</key><string>1</string>
  <key>p2-panda-appRecommendations</key><string>https://myapp.itunes.apple.com/WebObjects/MZAppPersonalizer.woa/wa/appRecommendations?mt=8</string>
  <key>adkit-product-url</key><string>https://itunes.apple.com/WebObjects/MZStore.woa/wa/adkitProduct</string>
  <key>cross-merchandising-url</key><string>https://itunes.apple.com/WebObjects/MZStore.woa/wa/viewCrossMerchandising</string>
  <key>ghost-riding-the-whip</key><string>YES</string>
  <key>netflix-top-shelf</key><string>https://itunes.apple.com/netflix-generic-shelf.xml?country=US</string>
  <key>ghost-riding-the-whip2</key><string>YES</string>
  <key>is-ping-enabled</key><false/>
  <key>da-soon</key><string>https://s.mzstatic.com/static/pages/app_store_coming_soon.html</string>
  <key>atvMetricsTopics</key>
  <array>
    <string>atv_av_connectivity</string>
    <string>atv_ota_update</string>
    <string>atv_qos_beacon</string>
  </array>
  <key>userxp-url</key><string>https://metrics.mzstatic.com/</string>
  <key>userxp-punt-ratio</key><integer>1000</integer>

Later in this script, we find "Da Do Not Update List."  Now, while "da" may well have some kind of script meaning, I think it's being used in slang form here for some reason that's over my pretty little head:

 <key>da-sp-open-url</key><string>https://itunes.apple.com/us/store/df</string>
  <key>ds-appleid-lookup</key><string>https://buy.itunes.apple.com/WebObjects/MZDSService.woa/mac/appleID</string>
  <key>da-doctype-lookup</key><string>https://search.itunes.apple.com/WebObjects/MZSearch.woa/wa/docTypeLookup</string>
  <key>da-do-not-update-list</key>
  <array>
    <string>com.apple.InstallAssistant.HighSierra</string>
    <string>com.apple.InstallAssistant.Sierra</string>
    <string>com.apple.InstallAssistant.ElCapitan</string>
    <string>com.apple.InstallAssistant.Yosemite</string>
    <string>com.apple.InstallAssistant.OSX10PublicSeed1</string>
    <string>com.apple.InstallAssistant.OSX12Seed1</string>
    <string>com.apple.InstallAssistant.OSX12CustomerSeed1</string>
    <string>com.apple.InstallAssistant.OSX12PublicSeed1</string>
    <string>com.apple.InstallAssistant.Mavericks</string>
    <string>com.apple.InstallAssistant.MountainLion</string>
    <string>com.apple.InstallAssistant.Lion</string>
    <string>422352214</string>
    <string>com.apple.InstallAssistant.Seed.macOS1013Seed1</string>
    <string>com.apple.InstallAssistant.macOS1013Seed1</string>
    <string>com.apple.InstallAssistant.macOS1013CustomerSeed1</string>
    <string>com.apple.InstallAssistant.macOS1013PublicSeed1</string>
  </array>

Apparently, this "Panda" network is an adult entertainment (prostitution, hardcore pornography) podcast that has something to do with shake joint music, Flickr, and hacking cameras and microphones to record and broadcast people surreptitiously.  While finding this out, I also found that it is directly tied to something having to do with the Washington Officials Association, and opioids.  

I was shocked, you guys -- shocked!

Part of this octopus is coming out of Tennessee, but specifically routed through Texas, and likely has everything to do with why the banks and credit card companies decided you can no longer file class action lawsuits against them.  Almost as interesting is the SESTA bill social media sites suddenly decided to back -- one traditional media companies had been backing from the start. -- which allows state and Federal prosecutors to track users' activities (because they haven't been doing that before now, you guys -- pinky swear).

We'll get into that later.

See, Texas often gives others the impression that it is part of the greater United States (Washington, D.C., Texas' greatest supporter, pretends this as well), but it is not.  It asserts its independence from the Union at odd times, such as when it allows certain "corporations" to patent podcasts and troll others or it requests Federal funds.  On a related note, I've noticed that the incoming Google secondary authorization call no longer comes from Zone 1... it's back to the old Washington DC.  Seems so plain after I'd gotten used to the Pentagon/DOD extension...

It reminds me of something Holly Bobo's mother told the Press about what she did with all the money the Bobo family raked-in from T-shirt sales: "I'm saving it so that when this is all over, Holly can take a vacation."  Huh.

I wonder if she'll be flying a private charter out of Beech River Regional Airport on a Wednesday around 10:15am?  I wonder if she'll be headed to Clearwater, FL... or Los Angeles to visit her cousin, reality TV and country music star, Whitney Duncan?  I wonder whose body they allegedly found days before they arrested those boys, despite not having found it for the previous five years after all those intensive ground and air searches in that very area?  I wonder why her family brought her doppelgänger cousin up from Florida, dyed her hair blonde, and had her slinging ass out of the strip club at Exit 26 just weeks after Holly Bobo went missing?  

To be clear, I am not saying that Holly Bobo's alleged disappearance and murder was a quarter-million-plus dollar grift used for political gain...

Speaking of Florida and Washington, DC, whatever became of Debbie Wasserman-Schulz?

In all of these cases, I -- just like the FBI -- don't know.

Now, what in the world does this have to do with Harvey Weinstein, Rose McGowan, Sexual Predators (or "SP," for short), October (Surprise!)... ahem, O.C.T., Snippy the Horse, eSellerate, and all this silly-assed Antifa bullshit?  The wheels on the bus go round and round is all anyone seems to be able to make of it at the State, local, or Federal level.  But they did manage to garner support for their SESTA bill, avoid "investigating" all of those pesky rape allegations against Weinstein, or bringing charges against anyone in the DNC.

Whatever is going on, the only thing I know is that it absolutely does not have anything to do with the gigantic, new Jesus billboard at Exit 26, or the burning of the Adult Superstore which used to be there, nor multiple shooters in Las Vegas -- nuh-uh, no way.  The only other thing I know is that the FBI is sure to cover it all up before anyone else can get to the bottom of it, because they are very clearly not involved in any way -- nuh-uh, no way.  

And they'll certainly never be able to make heads nor tails out of any of it.

© Copyright 2017, The Cyberculturalist

Friday, November 3, 2017

Not Suicidal

JIC Post
Missing or Dead


© Copyright 2017, The Cyberculturalist

Tuesday, October 31, 2017

Happy Halloween 2017

Happy Halloween
Happy Halloween


Happy Halloween from The Cyberculturalist and The Weirding (.NET).

Image lifted from Heavy.com.

© Copyright 2017, The Cyberculturalist

Monday, October 30, 2017

Fort Worth, TX - Sept. 23, 2017

Charter Communications
Charter Comm

The important thing to keep in mind is that these perpetrators are the very people who are supposed to protect us from shitbags like themselves.  These are not just CI -- confidential informants (snitches) -- these are literally Federal agents, military personnel, defense contractors, and their friends and family members.

These are extremely dangerous "people" who are starting to get very nervous, and they are not exactly bright.  Kidnapping, violence, and murder are their default responses because they'll get away with it.  Alphabet Soup claims to be hacking private citizens' devices, and demanding private information, to catch a hacker they claim has been pestering them and their pedophiliac, drug-dealing, arms-trading clique, the CIA.  Their approach, as always, is one of antagonism, escalation, and using innocents as bait and human shields.  In this case, they targeted me out of spite -- with malice aforethought -- because the FBI is too clever by half and is trying to cover their trail.

This is what lead to Operation: Credible Threat -- the Las Vegas Massacre.

© Copyright 2017, The Cyberculturalist