Evidence of Enforcement Workers Portraying Activists as Criminal

Karl gmkarl at gmail.com
Sat Jun 12 12:18:00 PDT 2021


I found this google drive folder that shows how basic activities are being
cast as suspicious to others.

This was recently posted to a cryptography list by possibly a set of
undercover operatives.

No offence is meant to the people looking like operatives, I am just very
confused.

The drive contains a spreadsheet titled "Suspicious Hacktivist Software
Project OSINT" .

This document enumerates the projects developed by a specific set of
cryptography workers, casting them all as suspicious.

Each open source cryptography software project by the social group is
enumerated under a heading of "Suspicious Software Project."  No reason for
suspicion is provided: it is simply assumed.

Similarly each developer is enumerated in a list titled "Suspicious
Authors" .  Again, no reason for suspicion is provided.

Then, three websites are enumerated with names similar to the projects and
people, under a heading of "Suspicious Domains".  Some small notes are
available to the side indicating that, although they are listed, the
domains do not strongly relate to the people and projects.

A special section is set aside for the individual who was the public face
of the social group.  Each time they attempted to talk about the group's
work, a line is provided under the heading "Infiltration actions", and
a separate
column labeled "Proof" directly links to their attempt to talk about the
group's work.

Some of the listed items have additional content added to make them appear
more suspicious.  For example, a project which integrates tor with web
browsing and bears the name "torbrowser" has description stating "Clone of
Tor Website, Tor Project asked for removal."  The link provided is to a
SourceForge project page, which of course cannot be a website clone because
it can only have the SourceForge set project layout.

The concept of "clone of tor website" when the project has the name
"torbrowser", a name also used on the tor website, is misleading to the
cursory viewer, evading detection of the attack on the community while
heightening suspicion.  We're this not authorised law enforcement work, the
statement and document would likely be slander!

The instigating and first event in the document happened in 2013, so there
is a good chance this document has been circulating for 8 years now, with
people sadly acting on the portrayals it contains.

This hilarious and tragic document is poignant, confusing, misleading,
dangerous, terrifying, and wonderful.  I don't know what to do with it.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 3253 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20210612/1cc78d2d/attachment.txt>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: Suspicious Hacktivist Software Project OSINT Analysis.pdf
Type: application/pdf
Size: 93563 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20210612/1cc78d2d/attachment-0001.pdf>


More information about the cypherpunks mailing list