Evidence of Enforcement Workers Portraying Activists as Criminal

I found this google drive folder that shows how basic activities are being cast as suspicious to others. This was recently posted to a cryptography list by possibly a set of undercover operatives. No offence is meant to the people looking like operatives, I am just very confused. The drive contains a spreadsheet titled "Suspicious Hacktivist Software Project OSINT" . This document enumerates the projects developed by a specific set of cryptography workers, casting them all as suspicious. Each open source cryptography software project by the social group is enumerated under a heading of "Suspicious Software Project." No reason for suspicion is provided: it is simply assumed. Similarly each developer is enumerated in a list titled "Suspicious Authors" . Again, no reason for suspicion is provided. Then, three websites are enumerated with names similar to the projects and people, under a heading of "Suspicious Domains". Some small notes are available to the side indicating that, although they are listed, the domains do not strongly relate to the people and projects. A special section is set aside for the individual who was the public face of the social group. Each time they attempted to talk about the group's work, a line is provided under the heading "Infiltration actions", and a separate column labeled "Proof" directly links to their attempt to talk about the group's work. Some of the listed items have additional content added to make them appear more suspicious. For example, a project which integrates tor with web browsing and bears the name "torbrowser" has description stating "Clone of Tor Website, Tor Project asked for removal." The link provided is to a SourceForge project page, which of course cannot be a website clone because it can only have the SourceForge set project layout. The concept of "clone of tor website" when the project has the name "torbrowser", a name also used on the tor website, is misleading to the cursory viewer, evading detection of the attack on the community while heightening suspicion. We're this not authorised law enforcement work, the statement and document would likely be slander! The instigating and first event in the document happened in 2013, so there is a good chance this document has been circulating for 8 years now, with people sadly acting on the portrayals it contains. This hilarious and tragic document is poignant, confusing, misleading, dangerous, terrifying, and wonderful. I don't know what to do with it.

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 hello Karl! my replies below, as usual, ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐ On Saturday, June 12, 2021 12:18 PM, Karl <gmkarl@gmail.com> wrote:
I found this google drive folder that shows how basic activities are being cast as suspicious to others....
This hilarious and tragic document is poignant, confusing, misleading, dangerous, terrifying, and wonderful.
I don't know what to do with it.
i took a look at these, and they're just weird. the author names don't mean anything; things seem transposed across columns, the mailing list conversations boring. this feels like some junior OSINT lackey trying to read malfeasance where there is ignorance, and construing conspiracy where there is simply confusion... just ignore it :) best regards, and take care of yourself! -----BEGIN PGP SIGNATURE----- iNUEAREKAH0WIQRBwSuMMH1+IZiqV4FlqEfnwrk4DAUCYMlXGF8UgAAAAAAuAChp c3N1ZXItZnByQG5vdGF0aW9ucy5vcGVucGdwLmZpZnRoaG9yc2VtYW4ubmV0NDFD MTJCOEMzMDdEN0UyMTk4QUE1NzgxNjVBODQ3RTdDMkI5MzgwQwAKCRBlqEfnwrk4 DPt1AP0WqjK7K3Owfc2+M1UYo/jWuaUn4gsrEFq9l5TOLX28VAD+LywtPz1Ut0vc l7kLJScr4P972IIrCAEEhyMEIoSJZYo= =/ycB -----END PGP SIGNATURE-----

On Tue, Jun 15, 2021, 9:43 PM coderman <coderman@protonmail.com> wrote:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
hello Karl!
my replies below, as usual,
‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐ On Saturday, June 12, 2021 12:18 PM, Karl <gmkarl@gmail.com> wrote:
I found this google drive folder that shows how basic activities are being cast as suspicious to others....
This hilarious and tragic document is poignant, confusing, misleading, dangerous, terrifying, and wonderful.
I don't know what to do with it.
i took a look at these, and they're just weird.
the author names don't mean anything; things seem transposed across columns, the mailing list conversations boring.
I received description from you that does not make sense to me and almost does not sound to me like you could have written it. I heard you express note of author names not meaning something, without a reason for them to mean anything. I heard you express transposition of content across columns in a document I reviewed where I noticed no transposition. I heard you express value of the interestingness and boringness of mailing list conversations without expression of why this would be relevant, or what conversations you might be referring to. I don't know why you are saying these things. this feels like some junior OSINT lackey trying to read malfeasance
where there is ignorance, and construing conspiracy where there is simply confusion...
just ignore it :)
Why would you suggest to ignore such an important thing as what you describe? best regards, and take care of yourself!
Be well, kind coderman.
-----BEGIN PGP SIGNATURE-----
iNUEAREKAH0WIQRBwSuMMH1+IZiqV4FlqEfnwrk4DAUCYMlXGF8UgAAAAAAuAChp c3N1ZXItZnByQG5vdGF0aW9ucy5vcGVucGdwLmZpZnRoaG9yc2VtYW4ubmV0NDFD MTJCOEMzMDdEN0UyMTk4QUE1NzgxNjVBODQ3RTdDMkI5MzgwQwAKCRBlqEfnwrk4 DPt1AP0WqjK7K3Owfc2+M1UYo/jWuaUn4gsrEFq9l5TOLX28VAD+LywtPz1Ut0vc l7kLJScr4P972IIrCAEEhyMEIoSJZYo= =/ycB -----END PGP SIGNATURE-----

Here's another incriminating document to give you power over me. 19:20:18 The investigator asks as to the nationality of the devs and to meet up personally. [19:20:18] < gamambel> | Guest100: i would have to know more about it. some of the main devs are german, right? maybe we can meet up and discuss it? 19:20:18 The party under suspicion asks to exchange keys and the investigator completely ignores the request, continuing the conversation without exchanging keys. [19:21:44] < Guest100> | tell me when you have time and are ready and how to send you a key. we need to swap keys Later 9:16:06 The investigator again asks for physical location and attempts to plan to physically meet. [9/21/13 9:16:06 AM] Fabio Pietrosanti (naif): where are you based? As we can organize an "Hackaton" and bring there some other groups for training of advocate? 9:17:31 The suspect again expresses the need to exchange keys and is ignored by the investigator. 9/21/13 9:17:31 AM] cartoonhero: we need to exchanges keys 9:29:17 The investigator begins trying to convince the suspect that the project could be managed by a company. [9/21/13 9:29:17 AM] Fabio Pietrosanti (naif): to make a funding agreement for translation support, the project need to be managed by a legal entity, tipically a non-profit association or foundation 9:30:18 The investigator again attempts to physically meet and track the suspect. [9/21/13 9:30:18 AM] Fabio Pietrosanti (naif): are you coming to the OpenITP Circumvention Summit in Berlin next week? Throughout the conversation the investigator continually talks as if the suspect is a member of the development team, despite the suspect repeatedly clarifying that they are not. That probably helped simplify the situation for everybody.
participants (2)
-
coderman
-
Karl