Featured Post

QAnon: The Q-Sort Personality Profile Builder

Gettin Billy with It QAnon is based on Q-Sort: A psychological technique of which there are many variations, resulting in 50 descript...

Wednesday, July 5, 2017

eSellerate - #TolerantLiberal Media and Company

Fraudulent Accounts Created by DHS eSellerate Script (Mac)
RAS Automator eSellerate Fraudulent Accounts
The US government, long since subverted by criminal elements beholden to corporate interests -- gangsters like any other, known for their murderous, strongarm tactics and devotion to money above all else -- has been on a tear when it comes to cybercrime. While earnest news outlets such as WikiLeaks have been doing a good job of exposing their many criminal methods, they have not done as good a job exposing the actual crimes perpetrated by such three-letter agencies as the FBI, DOJ, DOD, and DHS (to name only a few), as well as local and national "law enforcement" agencies, media corporations, and private prison companies.

Above is a graphic taken from an illegally surveiled, American citizen's computer -- mine, actually -- showing part of an illegal entrapment method using eSellerate, employed by law enforcement agencies with direct ties to private prisons. This is the "virus" which was later used to script the WannaCry ransomware. This one originated in California and was transmitted from Tennessee (Decatur County) over wifi provided by TDS Telecom out of Wisconsin -- not North Korea. It was written, at least in part, by Chinese programmers -- not North Koreans -- and is used by media outlets, state-level law enforcement, FBI, DOJ, DOD, DHS, and others.

One of the things eSellerate does is surreptitiously record users, exporting these recordings to iTunes. We'll get into that later. Right now, we're concerning ourselves with its propagation methods, which is primarily a scripting process which creates fake social media profiles across platforms including LinkedIn, Facebook, Twitter, and others. You can see this in the picture provided.

Another propagation method is the use of clear GIF technology. Many, if not all, of the fraudulent accounts and alleged holders of the aforementioned will be heavy sharers of memes, often politically-charged. Inspirational quotes, often vaguely threatening, are another favorite.

eSellerate is not detected by any known AV program, including AVG, MalwareBytes, et. al., as it is used by many legitimate companies. This is by design of the providing companies under order of the NSA, all of which are complicit in this invasion of privacy in violation of US Constitutional Law as established by the 3rd, 4th, 5th, 6th, 8th, and 9th Amendments (in addition to others) -- as well as innumerable laws at the state and local level, depending on jurisdiction. But this is also due to the fact that it alters critical system files these programs do not recognize as malicious.

The GrandSlam (Lil Snitch) script, appears to be products of the DHS and MI5, designed by contractors in the European Theater working in concert with the DOD, exploiting Chinese technology and OS flaws known to the NSA. It is in heavy use in Tennessee, California, Wisconsin, New York, Arizona, Texas, and elsewhere in the US. Its primary use domestically (US) is Entrapment to meet contractual obligations to private prisons in these states, and others. As Snopes.com notes (in an attempt to minimize), US Attorney General Jeff Sessions has "shares in two funds that include holdings in two leading private prisons companies." I do not know what the scripts were originally created for outside of this, nor how they are used or spread internationally.

Criminal charges for domestic (US) operatives of these corrupt "legal" agencies should include Terrorism, Illegal Wiretap, Illegal Gains, Criminal Fraud, Conspiracy to Defraud, Entrapment, Human Trafficking, Kidnapping, Illegal Search and Seizure, Color of Law, Conspiracy to Commit, and multiple War Crimes. International crimes should include equivalents. Don't expect any of these terrorist cells to be charged and, even if any are, you'll never hear about it, as their terrorist counterparts in the Western Press will dutifully suppress those reports -- the way they have the DNC's trial in Florida -- and launch terrorist attacks on those who do report it, the way they have preyed upon Julian Assange, The Intercept, and myself.

As a warning, these organizations -- and the actors involved -- are incredibly dangerous terrorists on an international scale. Take extra precaution when being pulled over by Tennessee State Troopers not in the customary black and gold cruisers -- specifically along the I-40 corridor between Nashville and Jackson, well into Memphis.

Anyone actually investigating these ransomware attacks, and not merely using them to political advantage, should start in Decatur County, TN and surrounding (high traffic) areas. Some of these outbreaks were initiated not for ransom, but to cover the tracks of Entrapment professionals who orchestrated the Silk Road and its imitators to meet private prison contracts. These include high-ranking DOJ officials, prosecutors, prison officials, and others.

You've been served.

© Copyright 2017, The Cyberculturalist

No comments: