★ CYBERGUERRILLA 🏴‍☠

Misinformation is false or inaccurate information. Examples include rumors, insults and pranks. Disinformation is deliberate and includes malicious content such as hoaxes, spear phishing and propaganda. It spreads fear and suspicion among the population.

Types/Kinds/Sort of Misinformation and Disinformation:

1. Fabricated Content: Completely false content;
2. Manipulated Content: Genuine information or imagery that has been distorted, e.g. a sensational headline or populist ‘click bait’;
3. Imposter Content: Impersonation of genuine sources, e.g. using the branding of an established agency;
4. Misleading Content: Misleading information, e.g. comment presented as fact;
5. False Context: Factually accurate content combined with false contextual information, e.g. when the headline of an article does not reflect the content;
6. Satire and Parody: Humorous but false stores passed off as true. There is no intention to harm but readers may be fooled;
7. False Connections: When headlines, visuals or captions do not support the content;
8. Sponsored Content: Advertising or PR disguised as editorial content;
9. Propaganda: Content used to manage attitudes, values and knowledge;
10. Error: A mistake made by established new agencies in their reporting.

The rise of Artificial Intelligence (AI) has also given birth to new forms of misinformation and disinformation. We call this Synthetic Media to indicate the artificial production, manipulation and modification of data and multimedia by automated means, especially AI algorithms, to mislead or change original meaning. There are fears that synthetic media could supercharge fake news, spread misinformation and distrust of reality and automate creative jobs.

• “Deep Fakes” are one type of synthetic media where a person in an existing image or video is replaced with someone else’s likeness. While the act of faking content is not new, deep fakes use powerful techniques from machine learning and AI to manipulate or generate visual and audio content with a high potential to deceive. Deep Fakes have garnered widespread attention for their use in revenge porn, fake news, hoaxes and financial fraud. Industry and governments are concerned to detect and limit their use.

Some countries already have a national response or national institutions are working on it.

• “Speech Synthesis” is another branch of synthetic media that can artificially produce human speech. A computer used for this purpose is called a “speech computer” or “speech synthesizer”. Synthesized speech concatenates pieces of recorded speech or it incorporates a model of the vocal tract and other human voice characteristics to create a completely “synthetic” voice. In addition to new and more sophisticated ways of manipulating content, there are also a growing number of ways in which Social Media can be used to manipulate conversations:

• A Sockpuppet is an online identity used to deceive. The term now extends to misleading uses of online identities to praise, defend or support a person or organization; to manipulate public opinion; or to circumvent restrictions, suspension or an outright ban from a website. The difference between a pseudonym and a sockpuppet is that the sockpuppet poses as an independent third party,
unaffiliated with the main account holder. This kind are unwelcome in many online communities and forums;

Sealioning is a type of trolling or harassment where people are pursued with persistent requests for evidence or repeated questions. A pretense of civility and sincerity is maintained with these incessant, bad-faith invitations to debate;

Astroturfing masks the sponsors of a message (e.g. political, religious, advertising or PR organizations) to make it appear as though it comes from grassroots participants. The practice aims to give organizations credibility by withholding information about their motives or financial connections;

Catfishing is a form of fraud where a person creates a sockpuppet or fake identity to target a particular victim on Social Media. It is common for romance scams on dating websites. It may be done for financial gain, to compromise a victim or as a form of trolling or wish fulfillment.

80009f80815307.5d3a3195476d1

★ THE CYBERGUERRILLA SERVICES, which are fundamental to the policy process for structuring and acting fully, in a strategic monitoring operation, to identify and qualify threats, to create a system of attack and defense in cases of image crises, and to control the impact of dissemination of fake news in the local scenario.

We generate all provision to give peace to the candidate and its campaign team, as well the staff of both public managers and representatives also governments and institutions, to have the total control of situations that involve the dissemination of FAKE NEWS, rumors and propagation of false notes by means of the traditional communication, independent press and normal people share on social media, in case of crisis management derived from personal or professional events, which demand rapid control of the communication, to contain damages to the public image.

– SIGNALS MONITOR
Recognize the initial indicators of suspicious activity.

– ARTIFICIAL INTELLIGENCE
Machine learning produce and discerns patterns that reveal emerging campaigns.

– SITUATIONAL AWARENESS
Identify Comprehensive visual and textual social media scanning.

– LIVE ALERTS
Instant updates and immediate alerts allow no attack to go unnoticed.

– REPORTING METHODOLOGY
Information is organized in dashboards unique to each political campaign.

– DEDICATED ANALYSTS
Political experts help decision makers determine the best course of action.

– COUNTER-MESSAGING
Partner with platforms and law enforcement to initiate punitive measures.

– PUBLIC DIALOGUE
Proactive press and CRM responses to inform the public and defend your brand.

– IDENTIFY OPPORTUNITIES and threats in the image of public managers, representatives of institutions and the institutions themselves.

. . . . . .

We DETECT, MONITOR and MITIGATE social media manipulation.

Containing an attack is easier, safer and less costly than recovering from one. We protect political carrers from the negative impact of false narratives.

– DETECT

To identify influence operations early and accurately, we’ve developed algorithms informed by our team’s experience combating terrorist political propaganda. It’s the first stage of an end-to-end disinformation solution that we provides.

– MONITOR

In real time, our technology tracks every disinformation campaigns designed to manipulate conversations on social media. Instant alerts give decision makers the intelligence they need to take action and safeguard their political brand.

– MITIGATE

Based on data from our monitoring system, we analysts provide the tools and support that political project need to disrupt manipulative online campaigns and maintain brand integrity. No system integration required. No private data collected.

. . . . . .

“The best form of defense is attack”…

Every person, institution or brand is subject to “HATERS”, also qualified as “DETRACTORS”, in digital environment, being able to generate wear on the image and real damages to the targets of the guerilla. Along with this, the proliferation of false news, also promoted by citizens mainly in social networks and messaging applications.

. . . ★ . . .

D0xing = Criminal harassment or stalking. Virtually any direct or indirect unwanted contact causing someone to fear for their safety or the safety or anyone they know or engaging in threatening conduct directed at the other person or any member of their family.

– DDoS = Unlawful use of computer.

– Opers = Parties to offense. Hate speech. Identifiable group: any section of the public distinguished by color, race, religion, ethnic origin or sexual orientation. Communicate statements in public, which incites hatred against any identifiable group and is likely to lead to a breach of the peace. You’re ok if any of the following is true: 1) The statements are proven as true and are shared in good faith. 2) The statements are relevant to any subject of public interest and the discussion was for the public benefit. Restricting speech. Public incitement of hatred.

– Trolling = Invasion of privacy. An individual who unlawfully intrudes into his or her private affairs discloses his or her private information, publicizes him or her in a false light or appropriates his or her name for personal gain. Collecting, keep, edit, share and publish personal information without proper authorization.

– Deface = Unlawful use of computer. Mischief in relation to data.

– Ops Unlawful use of computer. Doing anything that isn’t allowed by a “valid” authority while using a computer device. Possession of device to obtain telecommunication facility or service. Create, alter, possess, sell or offer any device or instruments to gain non-permitted access or gain access to telecoms with unlawful intentions.

– Hack Interception and disclosure of communications. Willfully intercept a private communication, including between devices, without permissions, with any device, even a paper cup against a door. Of course, if you’re any law agency or security firm you have “reasonable” rights to do what you want. Unlawful access to stored communications. Access any electronic service you’re not supposed to.

– Leak = Mischief in relation to data. Fraud with identification documents, authentication features, and information. Produce authentication documents (such as fake login, like rootkits, authentication keys, etc.), possess, download or transfer such documents. Alter, destroys or render useless any data. If you endanger someone’s life in doing so you can go to prison for life, else it depends on how much the data is worth.

★ DISCLAIMER

negativecampaignricardocalvao

ABOUT US

Here we have a group consisting of highly skilled hackers at different area of expertise, capable of bypassing several cyber rules and protocol to get the expected result of any assigned task. Our hackers are technically efficient enough with finishing up any job prior deadline, providing you with access and proofs of whatever it is that you need. Professionals who have learned diverse skills in simple, complex and critical hacking jobs. Our crew are experts at what they do and thus handle tasks efficiently maintaining a clean and clear job with no trace leaving behind. Utmostly, we respect the interest of our people. They need us. In the service of the common good. Always…

YOU SHOULD READ THIS BEFORE CONTACTING ME

I’m not one of those cheap ass hackers from deepweb who are trying to raise peanuts money. I’m good with some skills and knowledgeable with what I do. I can get job as an ethical hacker from most of the organizations who are looking for hackers with the skills and experience. I have and, so if you are interested in my services you should also be ready to bring a reasonable task and cooperate with my term.

You need to know that I’m am not just looking for customers here, we are looking for serious minded politically actors who need any of our hacking jobs to be done.

No matter how hard or complicated thee job might be, I will bleed through it and make sure we deliver to you on or before the expected day we promised.

SPECIAL HACKING SERVICES

These services are in care of the most advance team in my cyber department, specialized in dealing with highly classified and complicated crisis situations. My value are high because I am completely committed with what I do. Daily, I’m still learning new skills and finding methods in solving problems that might seems impossible and applying them to any specific tasks. 


MY FIRST POLITICAL COUNSELING 🏴‍☠

Know that I will investigate your profile. Willfully incite, order, solicit or give any form of advice to anyone committing a crime, everyone evolved are as equally guilty. If you intentionally work with someone who has committed a crime, you also commit it too. And if solely you plans to commit a crime, you will be equally guilty as if you had committed such a crime (even though the person didn’t commit it).

It’s important to know what charges can be held against people for doing specific activities to be aware of what information you can or cannot give in the PR specific context. I do not act or recommend actions offside the laws.

. . . . . .