Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Project Vigilant Is a Fraud
#1
Project Vigilant Is a Fraud

"The job of the Chief Scientist is to "call bullshit" when someone has an idea that will never work." Chet Uber, Project Vigilant
Based on this material retrieved from Google cache, Project Vigilant is a fraud. The recent stories about Chet Uber recruiting volunteer Internet spies at Defcon, bragging about having 600 volunteers and advising Adrian Lamo to inform on Bradley Manning have been based on public relations hyperbole.
This material shows:
1. It has no physical address, no proof of legal existence, no assets, no evidence it is governmentally authorized to steal personal and business data, and to train and criminally direct volunteers to steal personal and business data around the world for ostensible government use.
2. No evidence that the stolen personal and business data is provided to governments in compliance with law governing such data.
3. Personal information on volunteers is being harvested for undisclosed purposes by offering a pretentious training and vetting process to ostensibly assure protection of national security secrets around the globe, with claims that federal agencies like the State Deparment will be involved. No qualifications to train in or handle national security secrets are offered.
4. Unpaid services by volunteers are being solicited under guise of patriotism to avoid or minimize financial accounting, salaries, insurance and health benefits, taxation and government oversight.
5. Notable persons have been induced to legitimate Project Vigilant by allowing their names to be used, or used without their permission or knowledge.
6. A plan to enlist children as spies.
7. In January 2010 there were no "fully vetted" volunteers.
8. Most of the project's officer and advisory positions remain unfilled; the positions appear to be bogus.
9. Mission statements and categories of activities are empty boilerplate.

[URL="http://webcache.googleusercontent.com/search?q=cache:aKGY8a0e_LoJ:projectvigilant.us/securedrupal/%3Fq%3Dnode/24+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/24%22&cd=4&hl=en&ct=clnk&gl=us&client=firefox-a"]http://webcache.googleusercontent.com/search?q=cache:aKGY8a0e_LoJ:projectvigilant.us/securedrupal
/%3Fq%3Dnode/24+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/24%22&cd=4&hl=en&ct=
clnk&gl=us&client=firefox-a[/URL]
PROJECT VIGILANT Public Relations Site
"Red Tape Will Not Defeat Terrorism." - Kevin Manson
Staff

Submitted by chet.uber on Sun, 01/24/2010 - 23:58
All of the Divisions are managed by the Command Staff, which is described in detail under staff but includes the Director of VIGILANT, Deputy Director of VIGILANT, and the Assistant Deputy Director. Not in the Chain of Command but in charge of access to the Command Staff and managing the Directors Administrative Assistants, Research Associates and Protocol Officers.
In Support of the Command Staff are the Office of the General Counsel, Office of Public Affairs, and multiple high level Advisory panels Strategic Advsiors, Ethics Advisors, and Legal Adivsors.
The final position that rounds out the Command Staff is the Chief Scientist. This position is not in competition with the Director of Science & Technology (S&T). The Chief Scientist is an advisor to the Director and has no staff or position directly related to S&T, and most importantly the Chief Scientist is not focused specifically on issues of information theory, but rather is intended to be a classically trained scientist with a diverse background in the hard and soft sciences. An example of a person qualified for this position could be an MD, or PhD in Genetics or Astrophycis. The idea is that this person is someone that has the skills from math to lanuguages to advise the Director on the theoretic possibilites that are proposed for all the Directorates and as importantly from our clients and partners. The job of the Chief Scientist is to "call bullshit" when someone has an idea that will never work.
As a list Staff Includes:
*Chief of Staff
*Director's Ethics Advisors
*Director's Strategic Advisors
*Directors
*Directors Executive Staff
*General Counsel's Office
*Public Affairs Office
/.. more to come .. /

[URL="http://webcache.googleusercontent.com/search?q=cache:8qce9_-JEUcJ:projectvigilant.us/securedrupal/%3Fq%3Dnode/26+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/26%22&cd=1&hl=en&ct=clnk&gl=us&client=firefox-a"]http://webcache.googleusercontent.com/search?q=cache:8qce9_-JEUcJ:projectvigilant.us/securedrupal
/%3Fq%3Dnode/26+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/26%22&cd=1&hl=en&ct=
clnk&gl=us&client=firefox-a[/URL]
Chief of Staff

Submitted by chet.uber on Mon, 01/25/2010 - 04:16
The Chief of Staff's position is currently opened. If you are interested please contact us.

[URL="http://webcache.googleusercontent.com/search?q=cache:j_uB6B2R-EYJ:projectvigilant.us/securedrupal/%3Fq%3Dnode/31+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/31%22&cd=1&hl=en&ct=clnk&gl=us&client=firefox-a"]http://webcache.googleusercontent.com/search?q=cache:j_uB6B2R-EYJ:projectvigilant.us/securedrupal
/%3Fq%3Dnode/31+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/31%22&cd=1&hl=en&ct=
clnk&gl=us&client=firefox-a[/URL]
Director's Ethics Advisers

Submitted by chet.uber on Mon, 01/25/2010 - 04:45
[No entries]

[URL="http://webcache.googleusercontent.com/search?q=cache:O8wQwAL6rCAJ:projectvigilant.us/securedrupal/%3Fq%3Dnode/30+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/30%22&cd=2&hl=en&ct=clnk&gl=us&client=firefox-a"]http://webcache.googleusercontent.com/search?q=cache:O8wQwAL6rCAJ:projectvigilant.us/securedrupal
/%3Fq%3Dnode/30+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/30%22&cd=2&hl=en&ct=
clnk&gl=us&client=firefox-a[/URL]
Director's Strategic Advisers

Submitted by chet.uber on Mon, 01/25/2010 - 04:36
Fred Baker, [Chair] IETF/Cisco
Ed Appel, Inamecheck (retired-FBI counter-terrorism/counter-intelligence)
B.K. DeLong, IANS

Directors

A sends:
--------- http://projectvigilant.us/securedrupal/?q=node/25
Submitted by chet.uber on Mon, 01/25/2010 - 04:13.
The following individuals are the directors of Project VIGILANT for the years of 2010-2012.
Chet Uber, Director
Kevin Manson, ESQ. JD., Deputy Director
George Johnson, Assistant Deputy Director.

Directors Executive Staff

[No Google cache]

General Counsel's Office

A sends:
Retrieved from Google's "not cached" cache:
--------- http://projectvigilant.us/securedrupal/?q=node/26
General Counsel's Office.
Submitted by chet.uber on Mon, 01/25/2010 - 04:23.
Mark Rasch, ESQ, JD., General Counsel.
If you are interested in serving on the General Counsel's staff or as a legal assistant to this office please contact us

[URL="http://webcache.googleusercontent.com/search?q=cache:Dc2aSH3JSj0J:projectvigilant.us/securedrupal/%3Fq%3Dnode/13+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/13%22&cd=2&hl=en&ct=clnk&gl=us&client=firefox-a"]http://webcache.googleusercontent.com/search?q=cache:Dc2aSH3JSj0J:projectvigilant.us/securedrupal
/%3Fq%3Dnode/13+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/13%22&cd=2&hl=en&ct=
clnk&gl=us&client=firefox-a[/URL]
Divisions

Submitted by chet.uber on Sun, 01/24/2010 - 22:34
By 2006 we had formally created divisions, job postings, chain of command, a chain of succession and job descriptions for most of postions whether existing or for in the future. To be fully staffed the current estimate is approximately 1600 volunteers. As of January 1, 2010 we had refined the divisions of Project VIGILANT and we have just over 550 of the needed volunteers.
The Divisions are currently:
* Intelligence & Analysis
* Science & Technology
* Mission Support
* Liasons and Partnerships
Each Division is headed by a Director and has a Deputy Director.
All of the Divisions are managed by the Command Staff, which is described in detail under staff but includes the Director of VIGILANT, Deputy Director of VIGILANT, and the Assistant Deputy Director. There is a Chief of Staff, who is not in the Chain of Command but in charge of access to the Command Staff and managing the Directors Administrative Assistants, Research Associates and Protocol Officers.
In Support of the Command Staff are the Office of the General Counsel, Office of Public Affairs, and multiple high level Advisory panels - Strategic Advsiors, Ethics Advisors, and Legal Adivsors.
The final position that rounds out the Command Staff is the Chief Scientist. This position is not in competition with the Director of Science & Technology (S&T). The Chief Scientist is an advisor to the Director and has no staff or position directly related to S&T, and most importantly the Chief Scientist is not focused specifically on issues of information theory, but rather is intended to be a classically trained scientist with a diverse background in the hard and soft sciences. An example of a person qualified for this position could be an MD, or PhD in Genetics or Astrophycis. The idea is that this person is someone that has the skills from math to lanuguages to advise the Director on the theoretic possibilites that are proposed for all the Directorates and as importantly from our clients and partners. The job of the Chief Scientist is to "call bullshit" when someone has an idea that will never work.

[URL="http://webcache.googleusercontent.com/search?q=cache:wM1guzkrg5cJ:projectvigilant.us/securedrupal/%3Fq%3Dnode/20+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/20%22&cd=1&hl=en&ct=clnk&gl=us&client=firefox-a"]http://webcache.googleusercontent.com/search?q=cache:wM1guzkrg5cJ:projectvigilant.us/securedrupal
/%3Fq%3Dnode/20+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/20%22&cd=1&hl=en&ct=
clnk&gl=us&client=firefox-a[/URL]
Intelligence & Analysis

Submitted by chet.uber on Sun, 01/24/2010 - 23:03
The Intelligence & Analysis (I&A) Division is responsible of using all legal means of monitoring the obversable activities around the globe, especially those that happen on the networks around the globe.
We monitor all countries in the globe, and this reporting is rolled up in the military designations for those portions of the the world. In the United States we monitor each state and roll those up into nine minor regions and four major regions. Again looking for patterns in the noise.
The other part of I&A focuses not on the collection of the way we analyze the observations. We use a wide variety of methods from correlation to bit-level comparisons of repeated observed events in an an attempt to find the pattern in the noise.
The patterns that we are looking for are those that reveal the 5% of the world that has no conscious. The people that will take a rifle to work and kill their entire office, the student that will do the same to their school mates, the extremist groups that will encourage lone wolfs to go into a church and kill another human being because they don't approve of their work, the domestic and foreign terrorists that the United States, United Kingdom and the other allies have identified as a threat to our way of life, or the facist groups that go beyond complaining about the blacks and the jews and actually curb them, burn them alive, and of their own free will go beyond free speech act in a way that deprives other human beings of their life.
It is hard to in one paragraph like I just wrote to describe what we look for because the the truth is we are really looking for "what hasn't yet ever happened, what is likely to happen based on what we believe indicates behaviors in the real world (digital or physical). The problem is as we currently see it is what Dr. Fred Cohen proved in his thesis and later mathematical work -- That you can always get punched in the nose once. Malware and "bad behavior" has been proven to suffer from the halting problem. So the best we can hope for is to have a mechanism driven by the best science possible that will provide those in Intelligence to spot the most likely bad things.
We look at attacks in three modes: what may happen (prediction), what is happening (incident response), and what has happened (digital forensic evidence examination). We pray for prediction, we learn from digital forensic evidence examination. I&A has the role to "constantly watch" and try to "Attribute Actions to Actors".
The current Director of Intelligence & Analysis is AJ Fardella, the Deputy Director is Andrew Hoyle.
/ .. more to come .. /

[URL="http://webcache.googleusercontent.com/search?q=cache:bbsQu-_GodwJ:projectvigilant.us/securedrupal/%3Fq%3Dnode/23+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/23%22&cd=3&hl=en&ct=clnk&gl=us&client=firefox-a"]http://webcache.googleusercontent.com/search?q=cache:bbsQu-_GodwJ:projectvigilant.us/securedrupal
/%3Fq%3Dnode/23+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/23%22&cd=3&hl=en&ct=
clnk&gl=us&client=firefox-a[/URL]
Liasons & Partnerships

Submitted by chet.uber on Sun, 01/24/2010 - 23:52
Liaisons and Partnerships (L&P) is a new Division that was created to remove some of the load off of Mission Support (MS) related to dealing with the absolutely necessary job of forming, handling, managing the relations with one our most important assets or clients and our corporate, academic, institutional, and governmental partners.
We have at this come down to a short list for the director of this division. We have offered the Directors job to one person who we are negotiating with to develop the roles, Standard Operation Procedures, and the goals for this Division.
I will keep it short. It is better to under-promise and over-deliver, than to do the reverse.
/ .. more to come .. /

[URL="http://webcache.googleusercontent.com/search?q=cache:Cef2OLfES8gJ:projectvigilant.us/securedrupal/%3Fq%3Dnode/22+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/23%22&cd=2&hl=en&ct=clnk&gl=us&client=firefox-a"]http://webcache.googleusercontent.com/search?q=cache:Cef2OLfES8gJ:projectvigilant.us/securedrupal
/%3Fq%3Dnode/22+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/23%22&cd=2&hl=en&ct=
clnk&gl=us&client=firefox-a[/URL]
Mission Support

Submitted by chet.uber on Sun, 01/24/2010 - 23:14
Mission Support is the Division where the rubber meats the road. Mission Support is responsible for:
* Recruiting
* Vetting
* Basic Training
* Advanced Training
* Mission Preparation and Support for I&A
* Information Technology
* Information Assurance
* Information Protection
* Securtity
* Human Relations
* Accounting and Auditing
* Officer of the Day
* Medical Officer of the Day
...
* and much more.
Mission Supports current Director of over a year now is Michael Karash, the former Fire Chief of Key West, Florida. The Deputy Director, who was moved from I&A recently to help out as we are growing quickly is Michael Tomasiewicz, CISSP.
/ .. more to come .. /

[URL="http://webcache.googleusercontent.com/search?q=cache:IeX1JOcFMpEJ:projectvigilant.us/securedrupal/%3Fq%3Dnode/21+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/21%22&cd=2&hl=en&ct=clnk&gl=us&client=firefox-a"]http://webcache.googleusercontent.com/search?q=cache:IeX1JOcFMpEJ:projectvigilant.us/securedrupal
/%3Fq%3Dnode/21+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/21%22&cd=2&hl=en&ct=
clnk&gl=us&client=firefox-a[/URL]
Science & Technology

Submitted by chet.uber on Sun, 01/24/2010 - 23:11
Science & Technology (S&T) is the oldest and my orginal home in Project VIGILANT. The current Director of S&T Dr. Doug Jacobson, Ph.D. currently on the faculy of Iowa State University in Ames. Dr. Jacobson brings new blood to what was a thriving department that had lapsed. We have a policy of nominating the Director and they are responsible of bringing into Project VIGILANT new blood as there Deputy. We ask them to find someone they know, trust and respect - because the Deputy is the Directors shadow and they must work together closely. By forcing the Director to choose, we strengthen Project VIGILANT. Dr. Jacobson chose well and selected Dr. Christophe Veltsos, Ph.D on the faculty of Minnesota State
The following are dormant, active or the planned sub-divisions of S&T.
* Information Theory
* Information Assurance
* Independent Validation & Verification, Dr. Blaine Burnham, Ph.D., Assistant Director of S&T.
* Adversay Characterization, Adrian Lamo, Assistant Director of S&T.
* Geo-Spatial Mapping and Related topics, Senior Scientist, AJ Fardella
* Digital Forensic Evidence & Examination
* Deception
* Information Operation and Warfare
* PSYOPS
* Cultural Antropology
* Linguistics
* Stochastics
* Natural Language Processing
* Pattern Recognition
* SPAM
* Denial of Service and DDOS
* Botnets
* Malware, including blended threats
* Threat Indentification
* False Personas
* Identity Theft
* Protection of SCADA sytems and other CIP
* Improvised Explosive Devices (IEDs)
/ .. more to come .. /

[URL="http://webcache.googleusercontent.com/search?q=cache:EG3M3BKplG8J:projectvigilant.us/securedrupal/%3Fq%3Dnode/33+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/33%22&cd=1&hl=en&ct=clnk&gl=us&client=firefox-a"]http://webcache.googleusercontent.com/search?q=cache:EG3M3BKplG8J:projectvigilant.us/securedrupal
/%3Fq%3Dnode/33+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/33%22&cd=1&hl=en&ct=
clnk&gl=us&client=firefox-a[/URL]
Volunteerism and Vetting

Submitted by chet.uber on Mon, 01/25/2010 - 05:23
Project VIGILANT is conducted by BBHC Global LLC, which characterizes itself as a Not-Just-For-Profit business in that a large portion of profits of the business are put in to make Project VIGILANT exist.
When people want to get involved with Project VIGILANT we make it clear that while there are potentially tangible monetary benefits to participating that the project was clear a 100% Volunteer effort. If you are thinking that getting involved as an individual, going through vetting and becoming a fully vested member please keep in mind that it is a volunteer effort.
Your participation as a volunteer depends on two things, your interest and the time that you have to commit. For some positions, like advisory committees, and domain experts you can by with as little as one (1) hour per month and fulfill your position.
For other positions like being involved as a Assistant or Associate Director you can expect to be putting in more like (one) 1 hour or more per week. These jobs require that you are able to meet scheduling conditions as well as things have to be completed on time and more meetings are involved; which means scheduled times for doing things are more necessary.
For positions like Principal Investigators, Senior Scientists, Scientists, Collection Officers, Collection Managers, and Research Associates you can expect to be putting putting in one (1) to two (2) or more hours per day. Whatever it takes for your job to be completed is the time you will be asked.
Directors, Deputy Directors, and members of the command staff outside of advisory positions are expected to put in one (1) to four (4) or more hours a day towards their goals. You have scheduled events, you are managing people, your are expected to have enough free time that you can commit a significant amount of your time to do your job.
In the areas or Liaisons and Partnership that hours are general very low, but the timing can be more erratic, you need to have freedom in your schedule so you can meet with Liaisons when this is need and partners when this is needed. These can be tried to run on a schedule but the reality is we never know when a corporate partner or government or other Liaison is going to be needed.
The position with the absolute lowest time but can come at any time are related to Domain Experts in both Intelligence & Analysis and Science & Technology. In general for domain experts we tend to look for the person or people who create a protocol or area in which we work. Because they know the area so well that one hour of their time is 50 of someone who only uses the protocol. We currently have people in the areas of IMAP and SPAM that may have been called on once a year. We only need them when working on a problem we need their help on an issue say on IMAP that only the person who designed it could be of use and we would send our a call for them with a very specific description of the problem ask them about designing it.
Time and availability are the functions to look at when selecting where you volunteer in. These are just some of the areas ad we will work on expanding and working on this area.
/.. more to come .. /

[URL="http://webcache.googleusercontent.com/search?q=cache:KoQN1NPL3sIJ:projectvigilant.us/securedrupal/%3Fq%3Dnode/32+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/11%22&cd=1&hl=en&ct=clnk&gl=us&client=firefox-a"]http://webcache.googleusercontent.com/search?q=cache:KoQN1NPL3sIJ:projectvigilant.us/securedrupal
/%3Fq%3Dnode/32+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/11%22&cd=1&hl=en&ct=
clnk&gl=us&client=firefox-a[/URL]
Volunteerism

Submitted by chet.uber on Mon, 01/25/2010 - 05:11
For the first time since 1996, we have opened up our project to "walk-ons." We knew by 2006 after the creation of the formal structure for the day-to-day operation of the project that we would have to grow an order of magnitude in six years. Despite our best efforts to use or existing methods to "court" those with skills we absolutely need, the process was talking one day/volunteer and at that rate we would never make our goal. Because of this we created a formal project within Mission Support to deal with recruiting recruiters; and have planned to go public with our needs for top of the line wet-ware.
So if you are very good at what you love to do. Please look for lists on this page of job titles and skill sets. The first official postings are slated for July 15, 2010.
Project VIGILANT (VIGILANT) is a division within the "Not Just for Profit" entity BBHC Global LLC (BBHC) It is supported by the profits of BBHC Global LLC. Currently Project VIGILANT gives away its intelligence to help aid in the protection of Public Safety and National Security; and has a long term goal of developing new technologies and methodologies that will be provided through Technology Transfer to non-governmental owners of Critical Infrastructure; as well as all elements of the U.S. Government, Federal, Tribal, State or Local. The inclusion of transfers to Five Eyes, NATO, and other countries with which the United States has Mutual Defense treaties is subject to approval by not only BBHC, but the State Department. Our tools are powerful, and we constantly work and will continue to work in a compartmentalized manner to prevent corporate and other espionage possibilities.
We are very particular about who we allow into our vetting program KILGORE. KILGORE is the compartment within VIGILANT in which non-vested members get their basic training. This includes participation in group chats, which help to determine whether the new volunteer has ability to work in an environment where 'Mission, Team, Self' is the focus. Also we have an extremely diverse staff and it is important for us to determine any potential problems related to prejudice as diversity is something we embrace, and we feel this is a factor that makes us strong.
A list of other typical things that occur in KILGORE are:
* You sign your first of many Non-Disclosure Agreement (NDA)
* Fill out an Exclusionary Document which is permission to run a credit check, background check and to validate your CV. It also has questions in it designed to weed out vigilantes, mentally unstable people, and those who are not truly joining for the right reasons.
The next part of the Exclusionary questions, asks if you have had any felonies in the last seven years, if you use drugs, if you are an United States Citizen, and if you have every been convicted of domestic abuse, child endangerment and a number of other items. Basically it is you baring your soul. To be up front if you lie to us, and we find that you have - you are automatically disqualified. Lying is not tolerated -- truthfulness is an essential part of vetting
Some things can be 'waived.' We are more interested in who you really are, who you want to become, and that you want to make the country a safer place to live. Who you were is important, but if truthful a significant number of 'weaknesses' can be dealt with. For example, things like experimental drugs use or even recreational use can be wavered depending on the type of drug, type of use and the time period in which you used drugs.
The final part of this document asks you to take an oath to defend the Constitution of the United States of America.
The time in KILGORE is generally from 30-90 days. If you already have a Federal S or TS clearance it waives the need for the background check, but the NDA and exclusionary questions portions of your volunteer application still must be filled out. We have had people go through vetting, in as quick short a period as a week.
Once you pass vetting you become a fully vested member of VIGILANT.

[URL="http://webcache.googleusercontent.com/search?q=cache:8XPUmx-A0LgJ:projectvigilant.us/securedrupal/%3Fq%3Dnode/38+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/38%22&cd=1&hl=en&ct=clnk&gl=us&client=firefox-a"]http://webcache.googleusercontent.com/search?q=cache:8XPUmx-A0LgJ:projectvigilant.us/securedrupal
/%3Fq%3Dnode/38+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/38%22&cd=1&hl=en&ct=
clnk&gl=us&client=firefox-a[/URL]
Explorers and Junior Volunteers

Submitted by chet.uber on Mon, 01/25/2010 - 20:57
In 2002 while working with Winn Schwartau and the concept for having a merit badge in Boy Scouts for "Computer Security Awareness" was put forth by the three of us. I was a Scout we were having long discussions about when and how ethics should be taught in the school system. We prepared the material based on Winn Schwartau's book, "Internet & Computer Ethics for Kids: (and Parents & Teachers Who Haven't Got a Clue.)", and we ran it through the Mid-America Council which represents Iowa, Nebraska, and South Dakota; and it was ran all the way through to the Top of the Boy Scout system. We were told that they were not adding any more merit badges for probably ten more years.
Currently Winn is using his critically acclaimed book online is is focused on Kid's Aged 7-12th grade. Our Ethics Committee is still discussing whether who a child is, their ethical make is hardened by 13 or is it at a higher age. If it is lower than one opinion is that we should be using his material at lower age levels and integrating into all curriculum's, not just being taught separately. For example, plagarism and stealing should be taught every time an assignment is given and the focus on these areas would be woven into the entire curriculum at the lowest grade possible (as low as fourth) in order to make sure that the issues of Ethics can take hold while their being is formed.
Additionally we are looking at a situation similar to Explorer posts, where we work we work with kids in high school and college from ages 17-21 to participate as Junior Volunteers in our programs. We have areas in Science & Technology and Intelligence & Analysis in which youths this age with proper supervision can and will be included into Project VIGILANT.
This project will be going through review of both our Legal Advisers and Ethics Advisers to determine the viability of such a proposition, and are hoping to have a decision by Q2 2010.

[URL="http://webcache.googleusercontent.com/search?q=cache:W9RO2aJetNgJ:projectvigilant.us/securedrupal/%3Fq%3Dnode/35+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/35%22&cd=1&hl=en&ct=clnk&gl=us&client=firefox-a"]http://webcache.googleusercontent.com/search?q=cache:W9RO2aJetNgJ:projectvigilant.us/securedrupal
/%3Fq%3Dnode/35+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/35%22&cd=1&hl=en&ct=
clnk&gl=us&client=firefox-a[/URL]
Fully Vetted Active-Duty LEO Volunteers

Submitted by chet.uber on Mon, 01/25/2010 - 05:29
[No entries]

[URL="http://webcache.googleusercontent.com/search?q=cache:cyN5DFSMYcgJ:projectvigilant.us/securedrupal/%3Fq%3Dnode/34+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/34%22&cd=1&hl=en&ct=clnk&gl=us&client=firefox-a"]http://webcache.googleusercontent.com/search?q=cache:cyN5DFSMYcgJ:projectvigilant.us/securedrupal
/%3Fq%3Dnode/34+%22http://projectvigilant.us/securedrupal/%3Fq%3Dnode/34%22&cd=1&hl=en&ct=
clnk&gl=us&client=firefox-a[/URL]
Fully Vetted Volunteers

Submitted by chet.uber on Mon, 01/25/2010 - 05:27
[No entries]






http://cryptome.org/0002/vigilant-fraud.htm
"The philosophers have only interpreted the world, in various ways. The point, however, is to change it." Karl Marx

"He would, wouldn't he?" Mandy Rice-Davies. When asked in court whether she knew that Lord Astor had denied having sex with her.

“I think it would be a good idea” Ghandi, when asked about Western Civilisation.
Reply
#2
Horrible, weird, and needs more research, watching....whatever it is or is not. ALL of the url's are 'not available' now....

...it is well known that Google [and other such] give or allow the 'taking' of user browser habits and who looks where, when to the intelligence community. Humans are NOT necessary for this, or very few...it is all automated. Automated neo-Fascism and TIA on everyone.....HitlerHitler
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
#3
From Anon.
http://www.pgpboard.com/viewtopic.php?f=...556cb29977
This memo exposes the sordid connections between Wikileaks, the Tor Project, and a hacker spy collective known as Project Vigilant. The common thread between these entities is a single hacker named Jacob Appelbaum. We examine Appelbaum's relationships with each organisation.

Adrian Lamo is a ``hacker,'' convicted felon, and the person who informed on Private Bradley Manning (a Wikileaks source) to the FBI and US Army CID. [1] When not informing to the FBI or abusing Xanax [2] Lamo is involved as a ``volunteer'' with a collective of hackers whose common purpose is to data mine the activities of Americans on the Internet and provide any information obtained to the US government. This group calls themselves ``Project Vigilant'' -- see Glenn Greenwald's expose on the subject for more information. [3] In sum, Lamo is not only a (proud) snitch, but a spy.

Appelbaum is a hacker employed by the University of Washington as a ``Research Scientist,'' [4] despite holding no degree (he dropped out of high school). Appelbaum is also employed by the Tor Project as a ``Developer,'' with a salary of $66,000, [5] despite being openly criticized by fellow hackers as ``someone who doesn't know how to program.'' [6] Another critic goes even further: [7]

``According to Wikipedia, he's also a member of the Cult of The Dead Cow (cDc) (since 2008), a hacker organization that was famous for doing a lot of great work... in the 1990s. A pattern emerges.''

Back to Tor. In an interview with The Epoch Times, Lamo points out that Appelbaum was responsible for a constellation of Tor nodes under the domain of ``lostinthenoise.net.'' [8] Lamo goes so far as to imply that these nodes were being used by Appelbaum to mine the Tor network for documents which were then passed on to Wikileaks. How did Lamo know about this network of nodes? What made Lamo so convinced that this network of nodes was being used to harvest documents for Wikileaks? It turns out Lamo knew Appelbaum in and around 2002, and was involved with Appelbaum's ``lostinthenoise.net'' network. We know this, inter alia, because Lamo's PGP keys were cryptographically signed by Appelbaum in 2002: [9]

pub 2048R/B9E571B9 1996-05-13 2004-04-21
Fingerprint=D6 93 12 4F 19 B3 3F A6 A1 5D D4 42 1E 0D B1 8B

uid Adrian Lamo <adrian@adrian.org>
sig sig B9E571B9 1996-05-13 __________ __________ [selfsig]
sig sig E42F9CA0 2002-01-14 __________ __________ Kevin L. Poulsen <klp@well.com>
sig sig 479D8BB8 2002-07-24 __________ __________ error (Call to confirm fingerprint) <error@lostinthenoise.net>

The handle ``error'' in the address ``error@lostinthenoise.net'' belonged to Appelbaum. Appelbaum, today known as ``ioerror,'' also once went by the handle ``error'': [10]

@iameltonjohn I've been io and ioerror and error for a lot longer! :-)
6:40 PM Jan 31st via web in reply to iameltonjohn

Note that key signing is typically done between trusted persons at ``key signing parties,'' [11] meaning Lamo and Appelbaum were close personal friends at the time. Lamo, in a retort to a piece by Greenwald titled ``Blinded by Contempt,'' [12] admits he once ``socialized'' with Appelbaum at around the same time we see Appelbaum was crytographically signing his PGP keys:

``... I hadn't socialized with [Appelbaum] for the better part of a decade ...''

Thus, Appelbaum and Lamo, both talentless ``hackers,'' once worked together on a network of Tor nodes that Lamo now alleges was used at the time to mine the Tor network for documents -- then passed on to Wikileaks. What evidence is Lamo keeping from the public?

Furthermore, Appelbaum's relationship with Wikileaks is certainly not a secret. Assange has admitted that Tor, and Appelbaum in particular, were instrumental in the operating of Wikileaks. [13] Leaked internal Wikileaks documents show, and Assange admits, that ``at least one'' document used to bootstrap Wikileaks' document database was obtained by mining (aka ``sniffing'') Tor and other peer-to-peer networks [14] -- exactly the allegation Lamo now levels against Appelbaum. What exactly is Appelbaum's relationship with Assange, who refer to each other by their first names?

At about the time when Bradley Manning was ``test leaking'' a single diplomatic cable from the US embassy in Iceland (the ``Reykjavik 13'' cable), Appelbaum was meeting with Assange in Iceland. The two are seen bathing together, in an Icelandic hot spring, in a photo accompanying Rolling Stone's surreal profile of Appelbaum as ``The Most Dangerous Man in Cyberspace'' (September 2, 2010). Endulging the typical hacker ego, Appelbaum tweeted a link to a complete scan of the magazine article (for which he provided the photos), hosted on a ``hidden'' Tor node: [15]

The full Rolling Stone article is now on a random Tor hidden service: http://gqc3mjjp5tdbbxui.onion/ http://gqc3mjjp5tdbbxui.tor2web.com/
1:44 PM Aug 20th, 2010 via web

This photo is archived at the link which follows.
< http://image.bayimg.com/jaefiaadg.jpg >

Appelbaum's position at the University of Washington (despite having no education whatsoever), his salaried position at the Tor Project (despite not knowing how to program), and his evidenced involvement in mining the Tor network for Wikileaks -- are all symptomatic of the revolving door mechanisms typically employed by intelligence services to move assets in and out of key circles of academia and non-profits.

For the sake of the Tor Project, Jacob Appelbaum must disclose the exact nature of his relationship with Adrian Lamo in 2002, and with Julian Assange today.


[1] < http://www.wired.com/threatlevel/2010/06/leak/ >
[2] < https://lamodrugs.wordpress.com/2010/07/...mentation/>
[3] < http://www.salon.com/news/opinion/glenn_...02/privacy >
[4] < http://www.cs.washington.edu/homes/io/ >
[5] < http://cryptome.org/0002/tor-2008.zip >
[6] <https://twitter.com/moxie__/statuses/24450592605 >
[7] < http://sneak.datavibe.net/20110113/wikileaks/ >
[8] < http://www.theepochtimes.com/n2/content/view/47274/ >
[9] < http://pgp.mit.edu:11371/pks/lookup?sear...erprint=on >
[10] < https://twitter.com/ioerror/status/32267087355318272 >
[11] < https://secure.wikimedia.org/wikipedia/e...ning_party>
[12] < http://cryptome.org/0001/lamo-greenwald.htm >
[13] < http://www.rollingstone.com/culture/news...201?page=2 >
[14] < http://www.wired.com/threatlevel/2011/01...s-and-p2p/ >
[15] <https://twitter.com/ioerror/status/21693514641 >
"The philosophers have only interpreted the world, in various ways. The point, however, is to change it." Karl Marx

"He would, wouldn't he?" Mandy Rice-Davies. When asked in court whether she knew that Lord Astor had denied having sex with her.

“I think it would be a good idea” Ghandi, when asked about Western Civilisation.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Break-in Reported at Project on Government Oversight Magda Hassan 2 2,913 22-02-2014, 02:42 AM
Last Post: Magda Hassan
  Mockingbird sub-Project named Agape? Peter Lemkin 10 8,027 31-01-2013, 10:08 PM
Last Post: Jan Klimkowski
  Project Camelot interviews Michael Schratt an aviation historian Susan Grant 1 3,527 01-04-2010, 05:17 PM
Last Post: David Guyatt

Forum Jump:


Users browsing this thread: 1 Guest(s)