- 1 Cyber Stalking
- 2 The Motive for Engaging in this Influence Operation (Intimidation Operation)
- 3 Christian Duke’s Cell Phone September 9, 2020
- 4 Sinaloa Risk Mitigation Team OTA Hack and Real Time Threats to Deploy PERT Personnel
- 5 Deception and Plausible Deniability via a Double Entendre
- 6 Targeted at Certified Fraud Examiner (CFE)
- 7 The Meaning and Significance of PERT
- 8 The Alamo: The Mexicans Surround Americans
- 9 Ongoing Information Warfare (Intimidation Campaign)
- 10 Who is Behind These Influence Operations
- 11 Information Warfare / Influence Operations
This is the blueprint for covert harassment and intimidation by United States special operations members. The deception title is a bit of deception within itself. It is a primary component of the these operations but I would say is not central for what his manual is really articulating.
The GCHQ is the United Kingdom’s National Security Agency (NSA) so this here would be activities presumably somehow conducted by the NSA. I can only say that it is special operations division personnel. Perhaps it is the NSA, support personnel tied into JSOC, or perhaps the Army or Airforce’s cyberwarfare teams. Whomever it is, they are tasked with working on dirty operations and probably tied to what I believe would a special mission unit.
Cyber Stalking
Remember COINTEL pro in the 1960s. The Federal government engaged in illegal activities targeting numerous individuals including Martin Luther King Jr. Malcolm X, and others. Well, what I am describing is the modern version of it that is going on today using technology to obfuscate the origins of the attacks, and to provide plausible deniability so that without a careful review it is difficult to even discern but by the person targeted.
These same techniques are utilized to communicate covertly as well as to engage in highly targeted intimidation and harassment campaigns. Who are cooking up these methods? Intelligence agencies. The crafters must first get inside the mind of the target (so a target profile) is required for the campaign to be properly. This requires 24/7 eavesdropping, going through the target background (email accounts), records, anything that will add to the profile, and this is supplemented with physical surveillance.
Once the profile is crafted they move into creating a campaign. Cognitive anchors are established crafted to facilitate target acceptance. This is done via ensuring the target will view (i.e. placement) of the cognitive anchor and the message (fear mongering, threats, etc or direction).
The Motive for Engaging in this Influence Operation (Intimidation Operation)
Again the pretext or motive for all this intimidation is because I was a law enforcement official who was attempting to get a case before FBI Cyber and preserve evidence. It would have taken down an active ransomware and data theft gang engaged in operations at government entities, hospitals, and targeting individuals. The Sinaloa back groups wanted to silence me and engaged in a variety of intimidation tactics. The below is one of them. What you do not see in that screenshot are a few sprinter vans spread around my neighborhood perimeter. This is a working draft.
Christian Duke’s Cell Phone September 9, 2020
Below you are looking at a static screenshot of one of my cellphone screens while gathering some forensic evidence for FBI Cyber. This is an image of a hacked OTA Update being pushed to my cell phone by the attack team. The narco risk mitigation team had intruded the cell phones and access points of all my communications lines: phones and internet. This is a fact. Soon after I snapped these screen shots of my phone logs, I was unable to call out.
Stay with me on this one. This is in part of what the cartel does to high risk targets. it is an extremely paranoid group of individuals who go to great lengths to protect their secrets. Any other credible expert will tell you the same.
Sinaloa Risk Mitigation Team OTA Hack and Real Time Threats to Deploy PERT Personnel
I was running tests on my cell phone to collect logs because I was aware of their tactics and the use of man-in-the-middle techniques, including active interception of cell phone calls. This is what was going on when I received the attacker pushed OTA update. The attackers were in the area and I was plugged into the them instead of the real cellular tower. They then pushed the selected update to my phone.
Deception and Plausible Deniability via a Double Entendre
Looking at the image below, you can see this is my Verizon line on September 9, 2020 and below is a snapshot relating to an attacker modified OTA update. Look at the firmware override on the bottom of the image. OTA is very vulnerable to attack and again this image is of a modified update being pushed to my phone by the Sinaloa partner attack team.
The OTA updates contained threats directed at me. Look at the terms CFE, PERT (OS) and Alamo.
This could be a regular log to a software update, but it is a double entendre: meaning it has two meanings: one to obfuscate for plausible deniability and the other to send a target information in this case threats. This is a fine example of information warfare and deception.
I have to give it to the narco team. The example is pretty genius. This has plausible deniability, deception and targeted messaging. This something the Army Knights would create or someone working with them who had the needed skills to deliver. A brazen and clever group. Again, like their other threat note, this message is highly targeted at the intended audience (me), obfuscated and delivered anonymously. Full plausible deniability unless someone dug into my phone and looked at the overall context of events like having a PERT Team officer intimidate me the next week when I went to file a report. Again, like the threat note, the message is a bit meaningless to anyone but the targeted individual (me) unless you dig in below or are an intrusion analyst.
The Innocuous Meaning (Plausible Deniability): A General Reference to firmware, etc.
Common Firmware Environment (CFE), sometimes pronounced as ‘cafe is a firmware interface and bootloader developed by Broadcom for 32-bit and 64-bit system-on-a-chip systems. Its main responsibility is to initialize CPUs, caches, memory controllers, and peripherals required early on in the power on stage. You can look up the other meaning for PERTOS and Alamo if you want.
The Targeted Messaging (Information Warfare) Meaning: Targeted Threats and Fear Mongering
However, this is an attacker pushed update to my phone and meant as taunts directed at me and to threaten to deploy corrupted PERT officers. No I am not off my rocker and never have been in my life. This is information warfare and a discredit operation. The genius of this piece of information warfare is the target (I) could feed the discredit narrative in the course of attempting to expose it, unless these seemingly fantastic claims are investigated and considered with the required depth by competent authorities and experts.
It was not a coincidence the following week a corrupted San Diego Sheriff PERT Team Latino Deputy came to my location (and should not have been there) when I was attempting to file a route police report and attempted me and threatened me with arrest and more. It’s not coincidence I had a threat not place on my windshield stating I would be placed in a mental institution prior to this going down. This is organized crime in San Diego attempting to silence via intimidation and discredit me.
OTA Update Threats via Christian Duke’s Cell Phone when Surrounded House which was sent several days before corrupt San Diego PERT Sheriff’s Deputy Ochoa intimidated me with Laffoon to obstruct the filing of a report which would have led to eventual task force involvement.
Targeted at Certified Fraud Examiner (CFE)
The attackers knew I held a CFE which is how they had been referring to me in the prior weeks in other communications along with calling me “survivor” after surviving the El Paso-Juarez corridor (more on that in other posts). They also referred to me as ACE (my former unit). This reference again is to CFE in the hacked OTA Firmware Update. It is arbitrary text they inserted to intimidate me via the OTA update. Again its fear mongering to show they know things about me and to target the message. Information warfare.
The Meaning and Significance of PERT
Cartel Threats to Deploy Corrupted PERT Personnel at Me
Take careful note because as promised in the threat note they had previously placed on my windshield, the cartel partners continued to attempt to fulfill their promise of having me placed in a mental institution (and had claimed to do the same to others who refused to obey them).
The cartel did everything it could to have me placed in a mental institution using a variety of corrupted law enforcement personnel and other partners. The cartel deployed corrupt PERT deputies at me over the following six weeks in San Diego County following this threat. First the as you can see, the San Diego County Sheriff’s corrupted Latino deputy on September 16, 2020. This corrupted PERT team deputy was not even supposed to be present at what should have been a routine filing of a “police” report. Next was a young corrupt San Diego Latina officer in the Northwestern Division on approximately October 20, 2020 as you can see here the SDPD vehicle lying in wait as part of the cartel setup. The purpose at each encounter was to fuel the discredit narrative, obstruct justice and intimidate me. I left San Diego that day and started my trip out of California and have never returned.
In the United States. Specifically in San Diego County, those involved in these criminal operations operate with impunity relying on corruption to protect them. They have well orchestrated discredit campaigns to evade indictments. Imagine a criminal organization that has a team in place to attempt to silence targets by having them placed in mental institutions to protect its secrets. This is pretty fucked up, but what you would expect from an organization that has no concern for human life. Now accept the fact, this exists and involves corrupted officers and other law enforcement personnel. You read the threat note. That was exactly the promise in its threat note to me – that the cartel partners would have me placed in a mental institution. This was one of the vehicles they were trying to use to do it: corrupted law enforcement PERT teams. Pretty sick stuff.
There are video, witnesses, and photographs of what occurred. Read the description of PERT below.
The Alamo: The Mexicans Surround Americans
This is a reference and threat or taunt directed at me. A few weeks ago, I was in Texas when they engaged me on the border. The Alamo is a reference to when the Mexicans surrounded some Americans at the Alamo in Texas and then slaughtered most of them. This placement in the OTA update is called “Fear Mongering” and (an attempt at plausible deniability). It is part of information warfare. The cartel had threatened me the prior month with sending the “Mexican Army” after me. This is a continuation of that theme.
Ongoing Information Warfare (Intimidation Campaign)
This a single example of a minute from a daily campaign since this started. I do not use the term campaign loosely because it involves a large number of corrupted Department of Defense personnel, current and former, who are trained in influence operations, or non-kinetic warfare, and are partners with the cartel engaged in risk mitigation operations, counter-intelligence and of course, ensuring loads come in via the Pacific Coast (maritime routes). I know a lot about Sinaloa Cartel operations that is why I am no longer in the United States. Due to corruption, I received no protection and the ransomware gang continues to perpetrate crimes and maritime loads coming into the San Diego coastline are at an all time high.
Who is Behind These Influence Operations
This is not some young marines engaged in acting as mules: bringing people and drugs across the border. These are the corrupted United States military elite special forces members who are often assigned to counter narcotics task forces. Those involved are corrupted United States Special Forces, current and former including United States Navy SEALs.
I have known about SEALs longstanding relationships with the cartel since at least 2005 because I have had longstanding ties to the SEAL community. This is pretty much an open secret within the Coronado community (where Navy Special Warfare is located). I have little doubts that despite these former SEALs in the previously linked news segment who are “risking” their lives to discuss generalities also know of the specific activities in which their brothers are engaged. No one wants to discuss it because they know the potential consequences.
Information Warfare / Influence Operations
Information warfare or influence operations are the present and future of United States Operations.
“Door kickers are out and cyber operators are in said the SOCOM chief.”
As goes SOCOM, so goes the Sinaloa Cartel United States corrupted SOCOM operators. It actually fits in quite well with the Sinaloa Cartel’s policy of keeping things calm -just harass the shit out of a cartel target threaten them and discredit them and try to get them locked up. Make the problem quietly go away. Yes, things are a bit more sophisticated in the United States than in Mexico where bullets reign supreme. Right now the Sinaloa Cartel’s policy of binary bullets ,and quiet killings, supersede outright direct action.
As to information warfare practices, “This avant-garde warfare frontier includes many sub-areas namely, operational security, [cyber warfare]. electronic warfare (EW), deception, physical attack on the information process, information attack on the information process and, in the end, the psychological operations (psyops).”
It is non-kinetic warfare. It is special warfare tactics, but serving the purpose of organized crime. Information warfare is the present and the future of United States Special Forces.
The Sinaloa Cartel loves to employ or partner with Special Forces. This is just another cell, a primary network, in the United States that has special forces team members working with it. And remember the PsyOp on the bookshelf when I was detained by the corrupt SDPD officers. Go back and view it here of the PsyOp. Again this is an information warfare campaign. All this will start to sink in. Its not quite on the level of Snowden but pretty big.
“In recent decades, behavioral sciences and mass communication have advanced, multiplying the capabilities and value of these operations; the US has achieved a leadership in this sector from all points of view (doctrinal, training, technical) and has offered training courses and ‘good advices’ to partner countries that are willing to form their own PSYOPS units.
In the end, in the so-called ‘Information Age’, the means of media communication have achieved sophisticated forms, close to ‘real time’ and it is evident that “give or deny information is a source of enormous power” (Ten. Col. Luca Fontana, Le Operazioni Psicologiche (PSYOPS) la “Conquista” delle Menti).” See https://www.alephas.org/2021/10/16/the-frontier-of-information-warfare-and-the-psyops/.