Here’s A Look at Leaked Passports from MI6 Agents

Unfortunately, you will not find James Bond on here or any other 007’s, but interestingly enough a hacker by the name of “neptuneX3c,” the same hacker behind a leak of MOSSAD emails earlier this year, has released another batch of leaks, this time exposing agents known to have worked with MI6 – England’s version of the Central Intelligence Agency. For those of you whom might not be aware, MI5 refers to any agents of England’s Government working on National Intelligence, on the island. On the other hand, MI6 refers to a group of “private” or “secret” agents working in the field of international intelligence gathering and espionage. Trust me, as someone whom has worked with many international intelligence agencies and offices over the years through the Anonymous Intelligence Agency, I’ve found MI6 to be by far the most impenetrable – or least responsive to any outside assistance.

As for the back drop to the story, there really isn’t much to tell, so I’ll just get on then with the leaks – enjoy!

Download File: https://roguemedia.co/wp-content/uploads/2019/10/mi6-passports.pdf

Browse Leaks (9 Pages):

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/10/mi6-passports.pdf”%5D

 

** If you cant browse the documents, hover you mouse over the pdf (above) and look at the bottom left where you will see up and down arrows, this will help you navigate the document **

Here’s A Look At an Active Freedom of Information Act Lawsuit Against The US Government In Live Time

Sometimes I wonder why the US Government is so afraid of me? I mean, I applied for Clandestine work with the CIA, openly worked with the CIA on different occasions for various DarkNet operations, sent maybe 5 dozen+ reports to the FBI, worked with countless intelligence contractors and pieces off my old website were read to the US Senate Intelligence Committee. I just don’t get it, how did I become the bad guy all of a sudden?

I mean, is it the fact that I was trained/paid by German intelligence? They are “allies” – right? Is it the fact that I left the country, defected my citizen ship and became a political refugee in the Bahamas? Is it that I’ve been inside the Russian consulate and Visa centers three different times, each – the first time as a political refugee? Is it the fact that I uncovered a Russian staff member secretly working for the US while in there, and then sold them out to the FSB to show my worth? Is it the fact I’ve been in the French consulate twice and embassy once? Is it the fact that I can become a Russian citizen any day I want? Is it the fact that I’ve published about 100 leaks globally in the last 9 months alone? I mean, all of that is totally normal – right? Who hasn’t done that? 🤔

All humor aside for a moment, it literally can’t be any of those things. Well, at least the defecting, refugee stuff and political asylum parts that is – because I did all of that “ex post facto.” Unfortunately, the sad reality of my situation is that the US Government is quite literally spending millions observing me and sabotaging everything I do, chasing me from country to country, state to state, instead of just paying me thousands to work for them in the first place! Makes complete sense – right? I guess that would just be too simple a solution for them. But what do I know?

Well, after more than a year and a half now, with no end in site, I decided to begin the process of filling a Freedom of Information Act (FOIA) lawsuit against the US National Security Agency (NSA) earlier this year. Of course, this began with a simple FOIA request which was expectedly denied – see below – and is currently in the appeals process. Once that appeal gets denied a second time, as I’m certain it will, I will then file a FOIA lawsuit to one up the request and put some more heat on them. Please note that I’ve redacted some of my own personal statements to the NSA in the copies of their response provided below.

NSA FOIA Denial Page 1:

Image may contain: text

 

NSA FOIA Denial Page 2:

Image may contain: text

NSA Denail Page 3:

Image may contain: text

Any of this sounding familiar to you? Sort of sounds like Tom Cruise’s “Rogue Nation Mission Impossible” spin-off perhaps? 😂 I swear, you really can’t make this stuff up!

Once again however, all humor aside, this is actually a very serious matter. I bring all of that up because you have to read between the lines here. If the technology or program didn’t exist in the first place, they would’ve just flat out denied everything outright and probably try and ship me to a psych ward for 32 days – oh wait! The fact that they can neither “confirm nor deny” the existence of the program/technology and can not “confirm nor deny” any of the people(s) targeted by it is actually a defacto admission that the program does exist – which I already know. They just use classification guidelines to hide their violations of article’s 4 and 8 of the US Constitution from the public’s eye. I know, such Patriots – right? 😏

Quite frankly, I don’t care if it all fails. I just want to share intelligence with the world/US, and show people the truth about things they may not have ever been aware of or heard of before – funded by their own tax dollars. After-all, even I know there is a reason the Government is doing this to me, my mind is a weapon and I pledge my allegiance to no one! This country was just to stupid to hire me.

🎆Merry 4th of July America! Damn Those British Sons of Bitches!!🎆

🇺🇸

Russia Publishes Strategy Guide On How To Destabilize Itself, Documents Taken from US Army Research Affiliate

So, here’s an interesting bit of research I managed to stumble upon last night. Produced by the Rand Corporation for the United States Army and entitled “Over Extending and Unbalancing Russia,” the 12 page document details various strategies the US military could partake in to undermine, sabatoge and/or destabilize the Russian Government and its military – both within Russian borders and abroad. Interestingly enough, the documents were first published in Russia, not the United States, and it’s not exactly clear how they go them – but it’s actually kind of funny/ironic, especially given the subject matter.

For example, the Rand Corporation essentially ranks the likelihood of how successful a particular strategy may be. This includes theoretical options like increasing US troop presence in Syria to counter-act Russia’s military presence there, increasing foreign aid to Ukraine, manipulating China to be less receptive to Russian business in Asia, investing more heavily in space-based weapon systems – so on and so forth. Honestly, it’s an interesting look inside some of the private dealings of the US military, and provides an excellent example highlighting how the US Government outsources intelligence to contractors before ultimately making decisions. In a way, it is kind of a rare look behind the headlines – perhaps revealing details/insights into future US military decisions/strategies before they happen.

I could summarize more of the report for you, but why? I would rather just have you waste your time reading the intelligence documents for yourself – enjoy!

Download Document: https://roguemedia.co/wp-content/uploads/2019/05/411164498-RAND-Russia.pdf

Browse 12 Page Release:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/05/411164498-RAND-Russia.pdf”%5D

For The 3rd Time In Less Than 2 Years, an Intercept Source Has Been Arrested for Leaking Classified Information

As if you need any more reason to stop reading The Intercept, yesterday morning, May 9th 2019, the US Department of Justice (DoJ) arrested 31 years old Daniel Hale, a former United States Air Force Intelligence Analyst and National Security Agency (NSA) contractor for supplying the New York based news outlet with classified Government information. According to an indictment released by the Department of Justice yesterday morning, Hale is being charged with “illegally obtaining classified national defense information and disclosing it to a reporter” – Jeremy Scahill, editor of The Intercept. More specifically, “Hale is charged with obtaining national defense information, retention and transmission of national defense information, causing the communication of national defense information, disclosure of classified communications intelligence information, and theft of government property. Each charge carries a maximum penalty of 10 years,” meaning he is essentially facing life in prison.

The arrest comes on conclusion to a 6 year long counter-intelligence investigation into the matter, during which the Justice Department found that “beginning in April 2013, while enlisted in the U.S. Air Force and assigned to the NSA, Hale began communicating with a reporter” – Mr. Scahill. Explaining how, from there, “while employed as a cleared defense contractor, Hale printed from his Top Secret computer 36 documents, including 23 documents unrelated to his work at NGA. Of the 23 documents unrelated to his work at NGA, Hale provided at least 17 to the reporter and/or the reporter’s online news outlet, which published the documents in whole or in part. Eleven of the published documents were classified as Top Secret or Secret and marked as such.

Interestingly and stupidly enough, even as Hale was secretly/illegally leaking these documents to Jeremy Scahill in private, the two were still appearing together with one another in public – such as you can see below in a 2013 book release during which Scahill was joined in person, on stage, with then contractor Hale.

For those of you keeping track at home, the arrest of Hale yesterday marks the third such time a source of The Intercept has been arrested in the last two years – adding to the arrests Reality Winner in 2017 and Terry Albury in 2018. As someone whom publishes leaked/classified information myself, I would just like to point out the fact that not a single one of my sources has ever been arrested – and never will. While The Intercept has slowly been declining/failing dating back to 2016, for all the reasons just described, I for one am calling on a complete boycott of The Intercept for failing to protect the very sources that made them famous in the first place. Such a same.

Anonymous CyberGuerrilla Releases Integrity Initiative & Institute for Statecraft Leaks Part 6

Yesterday, February 8th 2019, Anonymous CyberGuerrilla published their sixth round of Integrity Initiative and Institute for Statecraft leaks. The leaks primarily focus on Christopher Donnelly’s dealings with various UK intelligence contractors and other Statecraftfellows,” detailing how the Institute for Statecraft and UK Government allocated millions of pounds towards the creation of public relations campaigns and other propagandist strategies throughout Eastern Europe – though primarily in the Baltic’s, which is prone to higher levels of Russian influence. Today’s leaks also document Christopher Donnelly’s long term visions for what he wants Baltic nations to think, feel or believe about the United Kingdom, as well as what the UK could do make Baltic nations feel worse about those ‘big bad meanie heads‘ in Russia over the same time period.

At least in my opinion, today’s leaks are particularly interesting because they really nail down various tactics used by “Clandestine” intelligence agencies to manipulate public opinion on certain issues. For example, in the leaked documents provided below you can learn how it was the UK’s intent to “use commerce as a tool of influence over public opinion,” essentially leveraging economies to make people feel better or worse, happier or angrier, about what’s happening inside their own country’s, as well as how Government agencies utilize “Corruption As A Weapon of War” – using extreme ideological approaches to smear elected officials and therefore manipulate public opinion about them, much like what we are currently seeing in Venezuela with President Maduro.

The leaks also chronicle the UK’s dealings with contractors at Edelman Intelligence, the self proclaimedlargest public relations company in the world,” detailing how the UK allocated millions of pounds of taxpayer money to Edelman Intelligence to produce P.R. campaigns designed to manipulate public opinion on/over various matters, as well as to counter-act Russian influence inside the region. Rogue Media Labs has backed up all of the documents and contracts below, hosted locally so that they can be browsed by the international public. If you would like to own all the documents for yourself, the entire leak is also backed up via an AnonFile located at the very bottom of this page – Happy Clicking!

In a message attached to the leak, CyberGuerrilla stated:

Greetings! We are Anonymous.

While the UK Government keeps on defying our demands for an honest and unbiased investigation into the Institute for Statecraft and the Integrity Initiative’s meddling in domestic affairs of sovereign European states, Chris Donnelly’s team awkwardly try to justify their illegal activity paid for by the British taxpayers.

The Integrity Initiative’s German cluster held a meeting in Berlin on the 31st of January 2019. A well-known British intelligence officer Harold Elletson and the cluster’s chief Dr Hannes Adomeit co-chaired the event. They again made an effort to divert people’s attention from the organisation’s wrongful activity in the European Union. However their pathetic attempt has been shattered to pieces by irrefutable evidence that we have been and will continue to share with you.

Today we are talking about the way Chris Donnelly used his agents in the FCO to obtain millions of British taxpayers’ pounds through grant foundations: Conflict, Stability and Security Fund and Counter Disinformation and Media Development Programme (ex Russian Language Strategic Communications Programme). We demand that the organisations’ spending of budget money be subject to public control and their activity be absolutely transparent!

Here is the next part of the documents that show to the people of Europe how Donnelly intended to use the capacity of clusters that he had created in allied countries. People of Western Balkans would be especially fascinated to learn how he defended their democracy against disinformation in the 1990s-2000s.

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/02/cnd-proposal-to-fco.pdf”%5D

Donnelly wrote the letter when he was preparing one of his bids for the FCO to allocate 5.5 million of British taxpayers’ pounds to the Institute for Statecraft and Edelman Intelligence.

It is quite obvious that the choice made by the people of former Yugoslavia was as far away from free expression of their will as in fact the UK government is from being transparent to the UK citizens.

By the way, Donnelly-the-puppet-master returns in 2019 to again defend the people of Western Balkans this time from corruption rather than disinformation:

His New Project:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/02/Edelman.pdf”%5D

Draft Plan:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/02/ii-balkans-ac-effort-draft-140818.pdf” title=”ii—balkans-ac-effort-draft—140818″]

Edelman Intelligence Planning To Contribute To The Integrity Initiative:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/02/edelman_Intell.pdf”%5D

Alongside with Donnelly’s Balkans plans we publish the reports of the Institute for Statecraft’s Euan Grant working under the Integrity Initiative project.

His Key Performance Indicators:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/02/euan-grant-kpis-etc.pdf”%5D

In the following documents you can identify people who are one way or another directly connected to the Integrity Initiative. Their names should be very well familiar to you:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/02/euan_combine.pdf”%5D

This is not the final part of the Integrity Initiative documentation we have at our disposal. In conclusion we would like to directly address members of the Integrity Initiative clusters for the first time. Some of you have proudly admitted being part of the project. Well, are you really that sure now about what you are doing under the slogan ‘Defend democracy against disinformation’?

We are Anonymous.
We are legion.
We do not forgive.
We do not forget.
Expect us.

Original Press Release: https://www.cyberguerrilla.org/blog/operation-integrity-initiative-british-informational-war-against-all-part-6/
Download Entire File Archive (2.95 MB): https://anonfiles.com/bbscf6t2ba/Integrity_Initiative_Docs_Part_6_rar
Backup Download of File Archive (2.8 MB): https://ufile.io/tpo9l


Image may contain: one or more people

36 Members of Ethiopian Intelligence Charged with Attempted Assassination

Earlier this week Ethiopia’s Attorney General, Berhanu Tsegaye, announced the arrest/indictment of 36 members of the countries national intelligence unit and more than 30 members of Ethiopians military for a terror attack following the election of Prime Minister Abiy Ahmed earlier this summer. The arrests come in conclusion to a 5 month investigation, now resulting in senior level officials of the National Intelligence and Security Services (NISS) being charged with attempted assassination.

As was reported by the Ethiopian Observer, the incident in question occurred on June 23rd 2018, when a previously unknown group of assailants threw grenades into a crowded rally being held in support of Prime Minister Abiy. Two people were killed in the attack. According to their report, “Oromo ethnic groups were deliberately recruited to carry out the attack, to give the impression that the Prime Minister was killed by his own ethnic group members,” Berhanu told a press conference. If you were unaware, the Oromo people have been at the forefront of Ethiopian political discussion and conflict dating back to 2015, when the Government run by then President Mulatu Teshome was known to have killed hundreds of Oromo protesters – essentially making them the perfect scapegoat for “political attacks” in 2018. Indubitably, this is why the Ethiopian Intelligence community tried to frame them.

However, as a separate report from Al-Arabia concludes, the attacks were specifically coordinated to sabotage Ahmed’s reformations of various state run agencies, as well the Grand Renaissance Dam Project, a highly controversial, but highly profitable, National project which has the potential to make Ethiopia the continents single largest energy exporter over the years to come. Though the dam promises to bring in untold amounts of new income into the country, the dam project has fallen significantly behind schedule and has come under fierce scrutiny from countries downstream – most namely Egypt. In fact, some have even speculated that the Grand Renaissance Dam project itself might one day spark War between Ethiopia and Egypt.

As it turns out, in the months following the foiled assassination attempt, Prime Minister Ahmed removed and replaced several construction teams developing the dam, and has procured new international partnerships with foreign investors totaling more than 2 billion dollars. The arrests announced this week come as part of a much broader national initiative to cut down on human right violators inside the country and clean up Ethiopia’s image with the international community. Prime Minister Abiy promises more crackdowns like this over the months and years to come.

France Issues Arrest Warrants for Senior Level Officials of Assad Regime In Syria

The other week when President Abdel Fattah al-Sisi of Egypt was visiting the United Nations Headquarters in New York City I called and sent messages to the International Criminal Court (ICC) and International Police (INTERPOL) in Lyon, France asking if there had ever been an arrest warrant issued in his name. I asked this because I was seriously considering taking matters into my own hands by placing Sisi under citizens arrest if I had ever managed to get close enough to him. It wasn’t necessarily a joke either, I even managed to get the United Nations to email the itinerary various speeches at the Nelson Mandela Summit on September 24th, 2018, and had been researching how to get a press pass in order to get inside the facility.

At this point in time it is an indisputable fact that President Sisi is guilty of various War Crimes and crimes against humanity, including genocide, torture, forced disappearances, murder or conspiracy to commit murder. To me it just didn’t make sense that anyone responsible for acts like this would be able to walk the streets of New York a free man, whilst simultaneous dinning/sleeping at 5 star hotels. I refuse to stand for that.

Image result for sisi wanted crimes against humanity

Now, I know full well that placing Sisi under citizens arrest would have never worked or sticked, and that I probably would have been shot dead by the NYPD or Sisi’s guard detail if I ever tried it – but that was never the point. What I did and said was a political gesture meant to get the worlds attention and force people to think differently about these types of situations headed into the future. My statements to INTERPOL and the ICC also weren’t even limited to Sisi either. For example, I also inquired about arrest warrants for Bashar al-Assad as well, asking what their policy was for dealing with men like him. How could men like this not have a single arrest warrant out in their name, how come they are not arrested the second they step outside their county and onto foreign soil I wondered? So I asked international authorities those very questions.

I bring this up because I’m finding one headline in the news this morning particularly interesting. This would be the news that, on November 5th 2018, French authorities have officially issued international arrest warrants out in the name of various high ranking officials serving the Assad regime in Syria, including Syria’s National Security Bureau director Ali Mamluk,  as well as Jamil Hassan, head of the Syrian air force’s intelligence agency, and Abdel Salam Mahmoud, head of Syria’s air force intelligence’s investigative branch.

According to reports, they are being charged with “complicity in acts of torture, complicity in crimes against humanity and complicity in war crimes” – literally the exact the same charges I first brought up in my original emails to French authorities. Moreover, even through the warrants were first released to the public today, November 5th 2018, they were actually issued on October 8th 2018 – two weeks after my initial emails and phone calls. Coincidence? You tell me….  #VigilanteLife 😉

 

Artificial Intelligence To Crawl DeepWeb To Find Cyber Attacks Before They Happen

A new joint operation undertaken by military contractor Lockheed Martin, along with Cyber Reconnaissance, Universidad Nacional del Sur and the Universities of Arizona and Southern California aims to revolutionize cyber intelligence going forward throughout the future. The conception is not dissimilar to the ‘Web Bot” project, which attempts to index/collect, analyze and interpret key words and searches sent across the internet in live time as they are happening in order to predict future trends.

The project is officially called DARKMENTION, “a deployed system to predict enterprise-targeted external cyber attacks.” It was developed under the Cyberattack Automated Unconventional Sensor Environment (CAUSE) program for the Intelligence Advanced Research Projects Activity (IARPA), and attached to a database belonging to CYR3CON, a threat intelligence firm, which has cataloged various successful cyber attacks/attack styles pulled off throughout the past.

Together along with this database, DARKMENTION aims to crawl both the “Surface Web” and “Deep Web” in hopes of finding, recording and indexing various hacking forums, website and chats, in order to pick up on key issues or talking points within them. In doing so, researchers hope to uncover potential targets before hackers can organize enough to launch attacks against them, and/or uncover new information about how attacks are are actually set up/pulled off. The project could theoretically revolutionize intelligence gathering, while also drastically cutting down on Governmental/military operational budgets.

If this seems impossible to you, you might remember a 2016 study by Intelliagg and Darksum, which managed to crawl, index and catalog approximately 29,532 websites hosted on the “DarkNet” – roughly 54% of the entire estimated size of the DarkNet. I bring this up because Darksum‘s project didn’t have nearly the budget or resources as Lockheed Martin‘s now does, and the Surface Web and Deep Web are inherently much easier to navigate than the DarkNet.

Full Research Project: 

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2018/11/darkmention.pdf”%5D

US Department of Justice Indicts Chinese Aviation Spies & Their Team of Hackers

In a press release made available to the public on October 30th, 2018, the United States Department of Justice announced the indictment of various members of Chinese Intelligence and their team of hackers. The indictment officially names two Chinese officers; Zha Rong and Chai Meng, 5 of their co-conspirators; Zhang Zhang-Gui, Liu Chunliang, Gao Hong Kun, Zhuang Xiaowei, and Ma Zhiqi – alleged to have carried out hacking operations on behalf of them, along with three others; Tian Xi, Gu Gen and Li Xiao.

From January 2010 to May 2015, the team is alleged to have carried out repeated hacking operations against various US and internationally based businesses with the intention of obtaining,”among other data, intellectual property and confidential business information, including information related to a turbofan engine used in commercial airliners.” Their actions are primarily tied to active hacking attempts against and intellectual property theft of several European and US based aviation companies and parts manufacturers, 13 in total. Included in the US states effected by the theft/breach are Arizona, Massachusetts, California and Oregon.

According to the official indictment filed in the Southern District of California provided below, working under the direction of Zha Rong and Chai Meng, the Chinese hackers listed above “attempted a series of intrusions in order to facilitate intrusions and steal non-public commercial and other data.” Alleging that, to do this, “the hackers used a range of techniques, including spear phishing, sowing multiple different strains of malware into company computer systems, using the victim companies own websites as ‘watering holes’ to compromise website visitors’ computers, and domain hijacking through the compromise of domain registrars.” Perhaps most importantly, these hacks were successful.

View Full Indictment from DOJ:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2018/11/indictment_zhang_et_al_0.pdf”%5D