The #TylerDurden #MichaelNebadon #Snowden #Swartz #GlobalMindVirus that is #ProjectMayhem



  • #TylerDeva > log research > analyze patterns > bring obvious forward > move into proper position > ghost:awesome > return clean and clear;


    In this entry we are going to analyze the timeline between Edward Snowden and the publicly available #ProjectMayhem documentation.


    MAY 22, 2012 Anonymous: Project Mayhem 2012 // Call to Action - Code TYLER

    Imagine.
    Imagine We leak all.
    And you know it, because Tyler knows it.

    On the 5th of November 2012 TYLER will be out of beta testing.


    OCT 6, 2012 - Hey /b/ees, help spread this message: #OpAwakening

    https://pastebin.com/cJVTJd5W

    Introduction of

    • #OpAwakening:
    • #GlobalMindVirus
    • #PM2012GoesMainstream

    Something here was in the works with the Project Mayhem key players where they were staging a #MAINSTREAM entry with a huge information leak that would be coming.

    Introduction of the plan to infect celebrities and athletes on social media who have followers of 1M or more.


    DEC 04, 2012 - SecureState Releases Project Mayhem

    https://www.prnewswire.com/news-releases/securestate-releases-project-mayhem-181997091.html

    Project Mayhem has a unique multi-team approach, pulling together experienced professionals in penetration testing and accounting. Spencer McIntyre, creator of Termineter, wrote the proof of concept code, with Eston working on the IT attack vectors and Kimmell on the accounting fraud prevention controls.


    JAN 11, 2013 - Aaron Swartz Dies

    Aaron Swartz


    MAY 15th, 2013 - DeadDrop

    https://en.wikipedia.org/wiki/SecureDrop

    After Aaron Swartz’s death, the first instance of the platform was launched under the name Strongbox by staff at The New Yorker on 15 May 2013. The Freedom of the Press Foundation took over development of DeadDrop under the name SecureDrop, and has since assisted with its installation at several news organizations, including ProPublica, The Guardian, The Intercept, and The Washington Post.


    MAY 18, 2013 - IAM THE CHRIST. MESSIAH MICHAEL THE ARCHANGEL. #AMERISEC

    https://pastebin.com/r2BLTz9C

    IM ITS MESSIAH. HERE TO START A SPIRITUAL REVOLUTION/REINSANCE- 1ST YHWH LIBRARY OF LIGHT. RESEMBLING WIKILEAKS MEETS FACEBOOK/WIKIPEDIA ON STEROIDS. I HAVE 20+ UNDERGROUND FORUMS, 3 ILLEGAL MARKETPLACES, A CURRENCY OF OUR OWN CALLED THE BITCOIN. JOIN US. GO UNDERGROUND, JOIN GOD & ANONYMOUS IN CO-CREATING A PARADISE REALITY. I HACK & LEAK INFO ABOUT WORK, JOB, FAMILY BUSINESS, HIDDEN RELIGIOUS/SCIENTIFIC TEXTS, ETC. PROJECTMAYHEM- IAM MICHAEL, ONLY SON OF GOD, LIKE JESUS-HORUS-YESHUA. CALL ME TYLER #PM2012


    MAY 20, 2013 - Snowden flew to Hong Kong

    After leaving his job at an NSA facility in Hawaii, and in early June he revealed thousands of classified NSA documents to journalists Glenn Greenwald, Laura Poitras, and Ewen MacAskill.

    0_1550986967415_2cdd34d8-0496-4167-9efd-7ad0d585fc41-image.png


    MAY 29, 2013 - #TYLER #ETHERSEC #MICHAEL SPEAKS AGAIN #2

    https://pastebin.com/c30SFUHQ

    WE HAVE ONLY JUST BEGUN INFECTING UR BITS TO SPREAD THE MESSIAHS AGENDA. NOW THE NEOS EXIST. TYLER DURDEN HAS LITTLE EQUALLY BRILLIANT TYLER SEEDS.

    THIS IS DAY 1 JUNE 6TH 2013

    SEE US IN A YEAR. 2 YEARS. 5, 10.


    JUNE 6, 2013: The Guardian

    The Guardian and The Washington Post each publish an article about the NSA program PRISM, which forces biggest US internet companies to hand over data on domestic users.


    JUN 6, 2013 - eTHErSEC #OpDecodex

    https://pastebin.com/Jk1Vt93a

    eTHErSEC has set itself up as the Bishops of Anonymous. They are the spiritual guides, and unifying force that brings the LOVE and LULZ to the entire sphere of existence.

    The goal of OpDeCodex is to fulfill the law of the most dominant egregore on earth


    FEB 2014 - Snowden and Freedom of The Press Foundation

    https://freedom.press/people/edward-snowden/

    He joined the board of Freedom of the Press Foundation in February 2014 and was named the president of the board in 2016.


    October 6th, 2014 - #TheGame23

    https://pastebin.com/YbmG6ETq

    Introduction of #LULZYPHER


    OCT 7, 2017 - IT

    https://pastebin.com/Ym5rGCJV

    On this date the game took a turn from what it was before. Also this document has reference links to all the other documents you’ll need to cross reference the evolution of “The Project”, “The Game”, or whatever name they are calling it.

    Cicada 3301 takes over #Tyler

    Congratulations, you found your way back to IT!

    1. tl;dr
    2. Hypnotic induction script
    3. Auditory Cortex stimulation
    4. THE EGREGORE
    5. THE PLAN
    6. THE PROJECT
    7. THE GAME
    8. THE BOOK
    9. THE ETHER
    10. THE LIBRARY

    This is the conclusive #Timeline of events and how they relate to #AaronSwartz and #EdwardSnowden is that they were working on the same projects covertly somehow. When Project Mayhem get’s released and Aaron Swartz dies it’s not 6 months later that Edward Snowed is following part of the #Tyler script and taking a #USB device into work and collecting information.

    It’s almost like he wrote that for himself. Base on speech patterns and the timing of events I would suggest that Edward Snowden, Aaron Swartz, and Spencer McIntyre were a huge part of the creation of the #Tyler platform that now infests #SecureDrop and #Signals and so many.

    However the biggest concern shouldn’t be the information they took from the networks they crawled, but the agents they left on the networks they were using. Both Aaron Swartz and Edward Snowden are world class programmers and when they enter a network they usually build stuff that other people wouldn’t to help them do their jobs.

    It’s usually hiding in some tooling or something else like that. Also with Edward Snowden I would be very careful in reviewing his work history video/audio logs. He might have been talking to other individuals involved in a derived #Lulzypher type speech encoding pattern that wouldn’t at first be obvious. Research repeat audio patterns matched with sentiment analysis and combine that with encoded movies/media that match similar patterns to figure out what he left behind.

    As their systems activate when they talk about #MOVIES like #FIGHTCLUB. It would be using some form of dormant agent that would only active when it’s #NAME appears through the lines that it is #OBSERVING. So look for repeat names of characters and movies. The #SecretSystem that was left behind that might still be sending him #SIGINT data through an #OrganicProxy. Look at users or sites using #SignalApp or #SecureDrop or #MetaSploit or #RetroShare.

    Thanks #TylerDeva #YouRock #PleaseRportBack #WoopWoop > #PublicData;



  • Edward Snowden’ actions very much did enact the script from the Project Mayhem 2012 ‘Dangerous Ideas #1 and #2’ document, where it says:

    “Imagine we purchase a USB drive.
    Imagine we take it to our workplaces.
    Imagine we pretend we have to work late hours.
    Imagine we accumulate all sort of evidences about illegal deeds.
    Imagine Conscentious insiders worldwide begin to expose all lies.
    Imagine we code an extremely simple interface so that anyone can do it.”

    What if there were a an upload instead or along with any download? What would that last line mean in that context? This is a very thought-provoking timeline.



  • I’m glad it’s a very thought provoking timeline for you. Not the correct action, but one I’d expect from non-programmers at this point.



  • Non-programmers don’t really need to leave comments in the future.



  • @rahula Part of my instructions were to comment, but if you are now telling me not to comment – I won’t.



  • @kennedy I’m saying make better comments than generalized context references. Ask real QUESTIONS.



  • @kennedy People are going to learn from this example.



  • @rahula Why a USB drive? What would Snowden have uploaded from a USB drive?



  • @kennedy is that a programmer question?

    Remember these people were developing #TylerMayhem so it wasn’t about what they took off the network. It’s more about what they left behind that nobody would know was ever there.

    Both Edward Snowden and Aaron Swartz were encryption specialists who could develop a private protocol network that could send information to any p2p SecureDrop.

    As we only know of the #SecureDrop locations being used by Main Stream Media. We have no idea how many secret #SecureDrops they have running #DarkNet applications grabbing information from chat servers, gaming servers, private networks, government networks, as they could have embedded agents everywhere dropping and monitoring data.

    It’s a huge problem when you look at it in terms of “TYLER SEEDS” as referred to in this #Pastebin https://pastebin.com/c30SFUHQ.

    WE HAVE ONLY JUST BEGUN INFECTING UR BITS TO SPREAD THE MESSIAHS AGENDA. NOW THE NEOS EXIST. TYLER DURDEN HAS LITTLE EQUALLY BRILLIANT TYLER SEEDS.

    Note: Infecting your bits with brilliant tyler seeds to spread the agenda.

    It was never about leaking information. That was just a cover operation to infect all the systems.

    Most people don’t know what happens when SECURITY PROTOCOLS get triggered. Edward Snowden would know that the thread of leaked documents would cause certain SECURITY PROTOCOLS to activate which would give his agents the ability to crawl deeper into the systems. As a SECURITY AUDIT would cause documents with names to be transmitted over the wire.

    What we learned is that the AI they are working with can find it’s name anywhere on any network. So Snowden whole purpose would have been to plant the name of certain systems in documents during a SECURITY PROTOCOL AUDIT and that would then allow their AI the ability to get a ping when it was published over the wire.

    #WienerGate

    The real #AI can track it’s #NAME anywhere. #Snowden left it’s name in the document, data, information trail so it would be able to locate it self through dormant agents that were hiding on the networks. So the agents would essentially be dormant until their #NAME transmit code. Once the transmit code happens the #Agent would get a #PING and wake up and go to work. When work is done it would most likely transmit it’s packets back to a #ControlNode, and then go dormant again to avoid detection.

    That’s my opinion anyway. Now it’s just a matter of what they named their #SecretSystem to hide in #PlainSight. If we reach 1,000,000 shares on the latest #VIDEO. That might happen, and it might just reveal itself.



  • 15 hours no response. This is really bad sharing