This is a talk that I thought I would nev­er talk about. I was nev­er going to talk about this, because it was a lit­tle bit risky. But I think now that this is the best time to do this talk. Not because of all the elec­tions and all that sort of stuff that’s been hap­pen­ing now with the Clinton emails, for exam­ple, but there was an arti­cle that was released; I’ll show you the slide:

The US National Intelligence Director, James Clapper, said that cyber espi­onage came sec­ond. We came sec­ond to ISIS. Now, I don’t want to live in a world where ISIS is scari­er than hack­ers, espe­cial­ly in 2016. We pre­vi­ous­ly held the title in 2013, ’14, and ’15. And to be hon­est I was a lit­tle bit dis­ap­point­ed when I saw this result. So I thought I’m in my 40s now, there’s a lot of young hack­ers in the audi­ence, and I’m not going to pass the baton to you guys unless we have that num­ber one spot back in our pile.

So let’s have a quick look at ISIS. Bit of a no-brainer here. When you have an occu­pi­er of an occu­pied coun­try, you have a ter­ror­ist orga­ni­za­tion. Nothing has changed through­out his­to­ry. I know it’s a sim­plis­tic view, but it is an accu­rate view.

So the first thing we need to do is when we lose, and we did lose—we came sec­ond. We beat North Korea. That’s real­ly good. They’ve got nukes, they’re pret­ty scary. But we could hack any­thing we want. I know there’s a lot of peo­ple in this audi­ence could hack any­thing I asked them to hack; banks, gov­ern­ment, what­ev­er. We just need to put it all togeth­er.

So the first thing we need to do is work out why we came sec­ond, so let’s have a look at ISIS. Let’s see how they fight. Now this this gets a lit­tle bit vio­lent so if there is any any kids in the audi­ence that have come by r00tz, I apol­o­gize. But I showed it to my 8 year-old son and he was cool with it. If he’s cool with it, you guys will be cool with it. So let’s have a look at our com­pe­ti­tion.

https://​youtu​.be/​m​1​l​h​G​q​N​C​Z​l​A​?​t​=​221

Now I don’t know about you guys but I think that was pret­ty embar­rass­ing that we came sec­ond to that.

So now that we’ve ana­lyzed our ene­my, let’s have a look at our­selves. So, the Sony hack, that was a great hack. I love watch­ing those movies every week. The Ashley Madison hack. My wife and her lawyer real­ly loved that hack, see­ing my name up on that list. Now, the Pokémon GO hack—now I know why we came sec­ond with that shit, with that denial of ser­vice on Pokémon GO. Thank you, PoodleCorp. And even my talk about death did not impress James Clapper enough to give us posi­tion num­ber one.

So the rea­son I’m giv­ing this talk is to rec­ti­fy that. And to do that I need to escape away from our nor­mal hack­ing envi­ron­ment and we need to skill up a lit­tle bit. The rea­son we did come sec­ond is we’re too tun­nel focused. We had tun­nel vision. We didn’t look out­side. So I thought what I’ll need to do is I con­tact­ed a mer­ce­nary. He’ll be up to teach me some tac­tics in coups, rev­o­lu­tions, and then I’ll see if I can apply that, and see if I can do a coup or rev­o­lu­tion myself. So I con­tact­ed this guy. His name’s Simon Mann, and I’ll let him tell you about him­self.

https://​youtu​.be/​m​1​l​h​G​q​N​C​Z​l​A​?​t​=​354

Simon Mann: My name is Simon Mann, and I’m help­ing Chris Rock with his work to see if a coup d’etat, putsch, the over­throw of a regime, could be achieved by com­put­er hack­ing and by cyber war­fare meth­ods. My back­ground to that is that I led the 2004 attempt­ed coup against the regime of Equatorial Guinea. That attempt failed, I was arrest­ed, and I spent five and a half in years in prison for that.

Prior to that, in 1993, I was one of the found­ing peo­ple of Executive Outcomes, a South African pri­vate mil­i­tary con­trac­tor which is cred­it­ed with win­ning the ghast­ly civ­il wars, first in Angola against the rebels UNITA, and then in Sierra Leone against the rebels there. I served in the first Gulf War on the staff of Sir Peter de La Billiere. My ten years pri­or to all of that was as a British Army offi­cer. I served in the Special Air Service as a troop com­man­der and an anti-terrorist team com­man­der, as well as in the Scots Guards as a pla­toon com­man­der and did tours in Northern Ireland with both of those units.

Chris Rock: So, he’s a mas­ter of his field and I’m a mas­ter of mine, so I thought it’d be good if we could com­bine the two togeth­er.

So why would we use mer­ce­nar­ies? Obviously, they’re clan­des­tine. There’s no gov­ern­ments that are linked to mer­ce­nar­ies. They’re loy­al, so as long as you pay them they’re yours. And it’s not a war if you use mer­ce­nar­ies.

So this is a tra­di­tion­al mer­ce­nary coup struc­ture. The impor­tant posi­tion there is the archi­tect, and you can see a pic­ture of of Simon Mann there with the gun. He’s the man that pulls the levers. So above him, for exam­ple, we have spe­cial inter­est groups. This is tra­di­tion­al orga­ni­za­tions such as the CIA or pri­vate com­pa­nies who’ve got oil inter­ests, and things like financiers.

Now, under his direct per­son­nel he has obvi­ous­ly advi­sors, and that’s an an impor­tant role, too. So when you guys are look­ing at doing this sort of stuff for real, you might decide that you’re an archi­tect or advi­sor; it real­ly depends on how you think. And you can see Simon would have ground, air, and he would also have sea. But now he’s devel­oped the dig­i­tal domain as well, which you’ll see in the future because let’s face it, the dig­i­tal domain in terms of intel­li­gence about what we can pull is very impor­tant. And again there’s the ground peo­ple as well. So we’ve got Rambo down there and Tom Cruise. But these are the ground. So in terms of a cyber per­spec­tive we’re talk­ing about hack­ers.

So for exam­ple in Simon Mann’s failed coup in 2004, his spe­cial inter­est groups were peo­ple like—who pro­vid­ed finance were the Spanish gov­ern­ment, there was also Sir Mark Thatcher, which is Margaret Thatcher’s son, who pro­vid­ed finance and an air­plane to move the mer­ce­nar­ies around.

So here’s some tra­di­tion­al mer­ce­nary com­pa­nies. You can see the CIA down in the bot­tom in the left-hand cor­ner. And you’ll see obvi­ous­ly Blackwater, you guys know Blackwater quite well. But you’ll see also in the mid­dle with the buf­fa­lo sign in the mid­dle, that’s—there was a 32 Battalion in the South African Defense Force that were guer­ril­la fight­ers. They fought in Angola and modern-day Namibia. And that was part of the South African Defense Force after Apartheid was abol­ished in ’93. These guys were out of a job, so they became mer­ce­nar­ies. So the com­pa­nies to the right of the buf­fa­lo such as Executive Outcomes, Aegis, and Sandline for exam­ple, are com­pa­nies that were set up by mer­ce­nar­ies who came out of that bat­tal­ion.

So, when you guys are look­ing at over­throw­ing a gov­ern­ment you real­ly have three options. We have the election—so rig­ging an elec­tion. Now, elec­tion is a legit­i­mate way of chang­ing gov­ern­ment every three or four years—not in every coun­try but most coun­tries. We can incite a rev­o­lu­tion. Or a coup.

So you guys are expe­ri­enc­ing this at the moment, the elec­tion. You’re already see­ing some email leaks with Trump and Hillary Clinton. I was watch­ing this morn­ing about some­one was talk­ing about the size of Trump’s hand, which I thought was fuck­ing ridicu­lous. I think what they’re doing, what WikiLeaks’ doing is…releasing this infor­ma­tion is great but it’s just not real­ly what I’d be look­ing for in terms of using an elec­tion to over­throw a gov­ern­ment. So I’d be look­ing at like a twelve days before Christmas or twelve days before an elec­tion tack. It doesn’t have to be real. We already own every­thing. We already own banks, invest­ment com­pa­nies. So we can use the items on the right-hand side just to fake what­ev­er we want. So when some­one goes towards an elec­tion, they can just use those things there on the right-hand side. You can actu­al­ly move mon­ey between the par­ties, and we’ll have a look at that in depth lat­er on.

In my coun­try Australia, we got an SMS just before we went to the polls. Medicare is a bit like your Obamacare, and it looked like the SMS was from Medicare. And it was pret­ty much to scare peo­ple into vot­ing for the oth­er par­ty. A tech­nique that you can use too to throw an elec­tion.

And again the email leaks. As I said, this one’s been going for too long. These things should be done in rapid suc­ces­sion to get into the voter’s mind just before they go to vote.

Okay, the sec­ond method we have is a rev­o­lu­tion. So here’s a cou­ple of rev­o­lu­tions in his­to­ry. You guys have had one. We had Egypt 2011, and Ukraine 2014. So for those that don’t know Ukraine 2014, the pres­i­dent of Ukraine was about to sign a deal with the EU. Gets $700 mil­lion dol­lars in loans, and then Putin stepped in and offered them $23 bil­lion dol­lars to get rid of that. So the peo­ple revolt­ed against that. And we’ll have a look at that a lit­tle bit lat­er on.

The oth­er option is the coup, the coup d’etat. You saw that recent­ly in Turkey, where a small por­tion of the army, or in our case mer­ce­nar­ies, try to over­throw the gov­ern­ment by force. And you’ll see there some exam­ples of coups, and American gov­ern­ment was involved in the first two of those.

So in terms of where we’d want to start in over­throw­ing a gov­ern­ment, we start down at the bot­tom. So we have what’s called Tactical Operations, or Low Intensity Operations. This is where you want to weak­en the gov­ern­ment with insur­gency, sanc­tions, or real­ly just telling them they’re doing a bad job. The exam­ple I put up there for the revolution—so if those fail, we have the rev­o­lu­tion which we saw in Ukraine. And the pic­ture there is the Deputy PM in 2013 before the rev­o­lu­tion, was com­plain­ing that the American gov­ern­ment were doing exer­cis­es called TechCamp and they’re actu­al­ly teach­ing the peo­ple of Ukraine on how to orga­nize protests via Twitter and Facebook. And he’s com­plain­ing the American gov­ern­ment are caus­ing the rev­o­lu­tion before it hap­pened.

If a rev­o­lu­tion is not going to work, then we look at the coup. So the Iran coup over ’51 to ’53 was done by the British gov­ern­ment and the US gov­ern­ment.

And if that fails, we look at inva­sion. So, before Panama was invad­ed, there were five failed coups before Manuel Noriega was replaced in 1999.

Things you need to watch out for when you’re doing a rev­o­lu­tion. These are the five things that will try to stop your rev­o­lu­tion. So, the gov­ern­ment in pow­er, for exam­ple, say­ing that they’re going to have new or fresh elec­tions. Something called strate­gic ham­let­ting, which is sep­a­rat­ing the insur­gents from the pop­u­la­tion, used in the Vietnam war. The third one, which we’ll talk about a bit lat­er, called cash grants—you’re pret­ty much brib­ing the peo­ple to shut them up. The third one is a mid­dle alter­na­tive; so we have a left par­ty, a right par­ty, and you offer a mid­dle par­ty. These are all tech­niques just to qui­et the pop­u­la­tion down. You just have to be aware of these because they may hap­pen if you’re going to try to set up a rev­o­lu­tion. And the last one is eco­nom­ic devel­op­ment orga­ni­za­tions and hos­pi­tal school build­ing.

So when you see the mil­i­tary invade a coun­try, for exam­ple like Iraq, and they’re build­ing schools and all that sort of crap it’s all just bull­shit. They’re just keep­ing an eye on the pop­u­la­tion to stop a rev­o­lu­tion hap­pen­ing, post that event. It’s good pub­lic­i­ty as well.

Some tech­niques for pre­vent­ing coups. So, the pri­vate army or the mer­ce­nary pri­vate mil­i­tary con­trac­tor. So, Colonel Gadhafi with his three thou­sand rev­o­lu­tion­ary guards. The Saudi Royal fam­i­ly with it’s 25,000 White Army. And you guys have your own National Guard, your pri­vate mil­i­tary force pro­tect­ing each state. That’s a great anti-coup mea­sure; you real­ly don’t have any cen­tral point to over­throw the gov­ern­ment of the US.

There’s also spies. So Assad, for Syria for exam­ple, has these spy agen­cies that spy on the mil­i­tary and spy on each oth­er to make sure that no over­throw takes place—there’s no coup. And that works quite well. They work so well that a civ­il war is now in play in Syria, as you guys know. And obvi­ous­ly you guys have a lot of intel­li­gence orga­ni­za­tions for this as well.

One thing I want­ed to bring up is the fake coup—you’ve got to be aware of the fake coup. So, on the screen you’ll see some dif­fer­ent coup types, and you’re wel­come to study those and there’s some mate­r­i­al on your CDs which talk about dif­fer­ent types of coups. But when you’re oppo­si­tion is get­ting close, you want to arrest them and just say that they’re caus­ing a coup. This worked well in Turkey in ear­ly 2000, where the AKP par­ty arrest­ed gen­er­als and jour­nal­ists to say that they were cre­at­ing a coup. Now, this actu­al­ly didn’t real­ly hap­pen. There was dig­i­tal evi­dence that had been mod­i­fied and these guys were cleared. And then obvi­ous­ly there was anoth­er just coup recent­ly. We don’t know whether it was fake or not yet.

This is a lit­tle bit of the­o­ry to get you start­ed. And I want­ed to talk to you—I’m not real­ly much of a the­o­ry guy. I need to know how to cre­ate a coup or a rev­o­lu­tion, but now I want to apply it to a real coun­try. Operation Nanny Goat, 2011.

You guys would’ve heard of Kuwait. Small oil pro­duc­ing coun­try nes­tled between Iraq and Saudi Arabia. About three or four mil­lion peo­ple. That’s a pic­ture of Kuwait. [audi­ence laugh­ter]

Actually it looks like this, so it’s pret­ty close.

No seri­ous­ly, this is what Kuwait—it’s a beau­ti­ful city.

So what we’ll do is let’s have a look at Kuwait City. This is the gov­ern­ment and also fam­i­ly tree. They’re pret­ty much exact­ly the same thing. We have the Emir at top. You might see a com­mon link in the last names, Al-Sabah all the way through. So we have the Emir, Crown Prince, the Prime Minister—whose name is Nasser Al-Sabah, and then you can see the for­eign affairs and defense min­istries. Now, what we want to do here is we want to over­throw Prime Minister Nasser. And for those who know the Unaoil scan­dal, the bribery scan­dal, they referred to him as the big cheese.”

So, this is the stan­dard intel­li­gence that mer­ce­nar­ies or mil­i­taries will use. You guys prob­a­bly will know this sort of stuff, like the NSA and also embassy spies and Five Eyes. What can we use?

We can also we can use pri­vate intel­li­gence agen­cies, WikiLeaks for exam­ple. And I don’t know if you guys can read that, but they referred to Sheikh Nasser Al-Sabah as a polit­i­cal­ly incom­pe­tent pro­to­col wonk whose record is tar­nished by his fail­ure to con­struct and effec­tive­ly man­age his cab­i­net.

But I believe the best intel­li­gence is the one you hack your­self, and I want to hack all the gov­ern­ment, to find out what he’s up to.

So look­ing at the intel­li­gence, we think cor­rup­tion is going to be the big point in this one. Here’s a map of Kuwait, and you can see the green which is the oil fields of Kuwait. And uh the peo­ple are not hap­py that the gov­ern­ment are rich and the peo­ple feel real­ly poor. Now corruption’s not going to work in every coun­try. You’re going to have to find the weak­ness in each coun­try. For exam­ple Anonymous thought they would attack Nigeria on their cor­rup­tion, which is pret­ty fuck­ing point­less because that is Nigeria’s biggest export. It won’t work there.

So what are our options for over­throw? Elections? Nah. There’s no real elec­tions. Those three top par­ties there, the Emir, Crown Prince, and the Prime Minister? There’s no elec­tions for those guys. The elec­tions are for the guys below that. So we’re not going to look at the elec­tion.

Coup d’etat? No, it’s too hot. Here’s a map of Kuwait. The white dots is the US mil­i­tary bases, the green is the Kuwait Army, and the pur­ple is the Air Force. They also have 7,00 sol­diers pro­tect­ing the roy­al fam­i­ly. So coup, I’m not a big fan of rac­ing against those forces. So it looks like rev­o­lu­tion is our only option.

So in 2011, you guys all prob­a­bly remem­ber this was the Arab Spring. So, on the left-hand side you’ll see the coun­tries that recent­ly fell. And on the right-hand side you’ll see a time­line of the coun­tries in that region that either fell by rev­o­lu­tion, coup, assas­si­na­tion, or just protests. And you can see Kuwait down the bot­tom in light blue: cab­i­net resigns.

Here’s an extract from Edward Luttwak. If you guys want to to do these sort of coups and rev­o­lu­tions, you’re need going to have to study up on this guy. He’s pret­ty much a mas­ter for strat­e­gy. And this illus­tra­tion shows what the intel­li­gence agen­cies need to go through to find out whether there’s a coup tak­ing place. So on the Y axis we have all the data the intel­li­gence agen­cies are going to go through. On the A in coup plan­ning leakage—that is, when I’m plan­ning a coup oper­a­tion of what’s going to leak out when I talk to my advi­sors and the hack­ers. The blue line above is noise all lev­els. And the green line, here coup + noise data” is all the intel­li­gence that has come through. And the lit­tle X point is when the coup is uncov­ered. Obviously you want to keep your OPSEC quite low so you don’t get detect­ed.

So, with our cyber­merce­nary struc­ture, same as the tra­di­tion­al mer­ce­nary we’re going to use things such as Denial of Service attacks, social engi­neer­ing, and all our nor­mal hack­ing stuff. And it’s your job as the archi­tect to employ the advi­sors to get the peo­ple on the ground such as hack­ers from your coun­try or over­seas coun­tries.

You’ll need to map out all the tar­gets of the coun­try that you want to hack. So we’re talk­ing about gov­ern­ment, media, elec­tric­i­ty, oil, gas, all those sort of agen­cies. And you want to map out what you want to hack. Now, I’m not real­ly much of a strate­gic in terms of what items I want to hack, so I just hack them all. At least then I have the options of what lever I want to pull.

So, as a hack­er we know what sort of tools we use on a nor­mal day-to-day basis. You’re going to have to learn some new tech­niques and tools. Not hard; you just need to do a bit of research. I’ve just got a cou­ple of them up there. A lot of them have to do with mis­in­for­ma­tion. So when we’re hack­ing into banks we want to move mon­ey around, to make it look real­ly dodgy. And also things like pro­fes­sion­al agi­ta­tion; so we want to employ peo­ple to do protests, like union mem­bers and also uni­ver­si­ty stu­dents.

Now, you’re going to have to finance this oper­a­tion. I prob­a­bly wouldn’t rec­om­mend this method. We near­ly got our goal. But by using the chart below, you see that it didn’t take long before we got uncov­ered.

So I’m a big fan of rob­bing banks; they’ve got lots of mon­ey. So we’ll use the bank’s mon­ey. You can also use the banks for deposit­ing fake cor­rup­tion pay­ments (and I’ll share that in a sec­ond), ter­ror­ism pay­ments, or break­ing into the banks such as remov­ing all the mon­ey from the banks.

And then Hillary Clinton pret­ty much said here that we’ve got the green light to attack these coun­tries here; Saudis, Qataris, and Kuwaitis need to stop their cit­i­zens from fund­ing extrem­ist orga­ni­za­tions.

Another tac­tic you can use is move mon­ey between pri­vate accounts from these ter­ror­ists into pri­vate accounts such as Hillary Clinton, and use that evi­dence to paint a bad pic­ture of her. Or Trump—I don’t care who wins. They’re both lunatics.

So let’s get into the real world. Here’s the Central Bank of Kuwait. That’s what it looks like in 2011 on the left-hand side. And that’s what it looks like now in 2016. Obviously if you can’t hack in through the front door, use the stuff that you’ve got around. We don’t have to use a zero day; we’ve got a thou­sand tar­gets to hack. Don’t get all fan­cy pants on me and use zero days, just use what­ev­er you can. So, whether it be a LAN tur­tle or Raspberry Pi… You can see that lit­tle box, I don’t know if you guys know what that is. The fourth pic­ture along, that’s an NSLU slug. It’s a NAS box which we’ll use as a PC or rat—so a phys­i­cal RAT with­in an orga­ni­za­tion.

Or what we did is we just hacked in the front door. If you can’t hack in through the front door, just pay a clean­er and they’ll put one of these implants in for you. Average clean­ing salary in Kuwait is about $150 dol­lars a week. So you give them two grand, which you’ll use from rob­bing the banks, they’ll plant them in there for you.

So what we want to do for cor­rup­tion is we want to steal mon­ey from the gov­ern­ment and put it in pri­vate bank accounts of the gov­ern­ment. So there’s a pic­ture of Nasser, and there’s a cou­ple of banks in Kuwait. And an off­shore bank.

So now that we own the cen­tral bank, we need to hack pri­vate banks. Now, we didn’t know from our intel­li­gence which banks he had bank accounts with so we just hacked them all. If we’re hack­ing them all, we can then move mon­ey between those bank accounts. So we used gov­ern­ment mon­ey and fund­ed the pri­vate bank accounts. By doing this too, we could also cre­ate bribe pay­ments as well.

Also, there’s a lot of mon­ey in stocks and finance, too. So you want to hack those as well, even to crash the stock mar­ket. And again we went through the front door.

So you want to know what your government’s up to. Whether they’re on to you. Or you just want to see what weak­ness­es there are in the gov­ern­ment. So you’ll need to hack into the gov­ern­ment, to lis­ten to their emails, their phone calls. The inte­ri­or min­istry, the judges, every­thing. These are live shots of of hacked gov­ern­ment depart­ments.

One thing you want to hack, too, is the tel­co. So, tel­cos are not just phone calls these days. Telcos are media, tel­cos are Internet… You want to siphon their Internet or you want to squish the Internet, for exam­ple. This is a prime case where you want to kill the Internet at the right time, or keep it open if they try and close it.

So obvi­ous­ly, MPLS, point-of-presence (POPS), you want to hack into those. You want to be able to stream your own media, to get the peo­ple angry. Obviously com­pa­nies now are using tel­cos for cloud ser­vices, secu­ri­ty ser­vices. So, Zajil is the biggest com­pa­ny in Kuwait, who also pro­vide secu­ri­ty ser­vices for these com­pa­nies. So you want to hack in, just like what we did. That way you can con­trol the flow of infor­ma­tion. You own the ISP, you own the coun­try.

Which brings us to glob­al warm­ing. You might think, Why are we talk­ing about glob­al warm­ing?” So, obvi­ous­ly they want­ed to make sure they reduce emis­sions by 2050. And the G8 and the EU came togeth­er and said what we need to do is map out the cur­rent infra­struc­ture such as oil, gas, and find out what’s going on with glob­al warm­ing. So we can use web­sites like Enipedia to find out where things are such as pow­er, oil, and nuclear plants.

So you just plug in your coun­try and it’ll show you all the maps. Now, why would you want to cut these ser­vices? It’s a no-brainer. When you want to do a rev­o­lu­tion or coup, you want to cut the pow­er at spe­cif­ic times, or cut the water to piss peo­ple off. And that does piss peo­ple off when they live in the desert.

And also your ener­gy sec­tor, as well. For exam­ple, the study’s online if you want to have a look at that. Higher volt­age trans­former units make up less than 3% of trans­form­ers in the US, but car­ry 60% of the pow­er.” So how do you map those out?

You guys have web sites that do that for you. So what you do is just take high volt­age trans­former lines, and it’ll just tell you where the all pow­er comes from, if you want to dis­rupt pow­er.

So, you’re going to need to study what a pow­er sta­tion looks like to dis­rupt it. So when I was talk­ing to Simon Mann he said to me, Just blow it up.” [audi­ence laugh­ter]

I said, I’m not Zoz, I don’t have C-4 I’m just going to chuck on the bloody thing.”

So he said, What you need to do is dis­rupt pow­er.”

Okay, no wor­ries. So I thought well, I can hack into pow­er, so why don’t I just shut it off that way?

So here we have a trans­former. This is not an American pic­ture, so this is not your crit­i­cal infrastructure…your hon­or. This is an Australian trans­former. So the transformer’s down below, and at the top we have what we call min­er­al oil that keeps it cool. And when a trans­former doesn’t have oil, it doesn’t work. So there’s no pow­er. In 2014 in California, some­one was shoot­ing at these things, drained the oil, and then you guys were out of pow­er for twenty-seven days and they just had to reroute pow­er from anoth­er sub­sta­tion. So Simon’s sug­ges­tion, if you want to get hands-on you can shoot them, drill them, or angle grind them to drain that oil.

And I thought well, I’m not going to do that. And I’ve failed to hack in. I fucked up. I couldn’t do it. So, you guys have prob­a­bly seen these before. They’re these spin­ning blades that they put on a heli­copter that chop trees away from pow­er lines. For those that haven’t seen it, just a just a quick look. [plays brief clip from fol­low­ing video]

https://​www​.youtube​.com/​w​a​t​c​h​?​v​=​5​t​06​L​b​v​E​3CI

Pretty cool. And it chopped trees from pow­er lines. Now I thought that’s pret­ty cool but I actu­al­ly want to chop pow­er lines myself. I don’t have a heli­copter, but why don’t I use a drone? So I thought, I’ll make my own.”

So what we have here is two eight-inch cir­cu­lar blades attached to part of a bike frame, and those just spin real­ly fast, attached to a cord­less drill. And you’ll see that on the sec­ond pic­ture I’ve actu­al­ly removed the bat­tery and I’ve actu­al­ly removed the bat­tery from the pack, only because the bat­tery kept get­ting caught on the pow­er lines, so I removed it. So how does it work? I’ll show you.

https://​youtu​.be/​m​1​l​h​G​q​N​C​Z​l​A​?​t​=​1893

So that’s a great device for cut­ting pow­er lines. That’s the £5 mod­el. And you could actu­al­ly reduce it and we could get it under £3 so you can do it to the weak­er drones. So you just use a series of drones, put the coor­di­nates in, and it’ll just run straight through the pow­er lines. The cables I used there were cop­per. The ones that are on pow­er lines are alu­mini­um, so it’ll go straight through those. If you’re going to make one of these be real­ly fuck­ing care­ful. There is no safe­ty shit involved.

If you’re a bit of a tigh­tass and you’ve got a small drone, just hook a ten-meter hose to your drone with a piece of wire and run it over the pow­er line, and once it hooks onto the pow­er line, it will drag it across and drop it over the pow­er lines and just arc them. So that’s the cheap ver­sion.

So now that we own every­thing and we can hack every­thing includ­ing the banks, we need to under­stand how the media works. So we need to reverse engi­neer them. And that’s what we do for a liv­ing, so why don’t we do it with the media? So what we do is we apply what’s called the two-source rule. The media need two sources to use as a sto­ry, and I’ve got the sources on the right-hand side, and types of sources. So you’re going to need at least two sources to fool the media. Or you can actu­al­ly pwn a few media out­lets that we did from the tel­co, pub­lish infor­ma­tion, and then just release it.

You want to release the infor­ma­tion to the news agency that will release that infor­ma­tion with­out even ques­tion­ing it. So for exam­ple Fox News, you want to use the Hillary Clinton information—they’ll pub­lish it and they won’t even give a shit. You don’t want to do it in reverse because then they’re not going to pub­lish it. They’ve got no inter­est in doing that.

So what we did is in 2011 we used Kuwait Central Bank—we already owned them. So we used unnamed gov­ern­ment offi­cials to trans­fer mil­lions of dol­lars out­side the accounts into their pri­vate bank accounts. And we used the New York Times to do the same thing, using that two-source rule.

Now one of my idiot advi­sors thought this would be a great idea. He thought using a Kuwaiti prince convert[ing] to Christianity would be a good idea, and went with it. He did get the pub­lic­i­ty he was after—we got a hun­dred media out­lets that went with that. But it was just a stu­pid idea.

You need to use the peo­ple in this. When the CIA are plan­ning a coup or rev­o­lu­tion you need to get the peo­ple on side. You’ve got mon­ey in your hands. You need to use bribes. So use this sort of mon­ey to pay peo­ple to put implants with­in com­pa­nies, pro­fes­sion­al agi­ta­tion, mis­in­for­ma­tion. Or get cor­po­rate peo­ple to do stuff for you. You’ve got to heat the pop­u­la­tion up enough to give a shit to over­throw the gov­ern­ment.

So for exam­ple the pro­fes­sion­al agi­ta­tors, you would have a group of peo­ple that you would pay to cause a protest. And then you would get anoth­er group of pro­test­ers dressed in police uni­forms to bash them up. And then you get that on the news. And if they weren’t pub­lished on the news, you pub­lish your own news—you own the tel­co.

When you’re plan­ning the oper­a­tion, you need to plan it down to the absolute detail, and you need to be flex­i­ble because shit just won’t go right. You might lose a RAT. You just need to have to plan for changes in your oper­a­tion.

So I’ve talked a lot, and I want to show you how it works in the real world. So I’ve put a video togeth­er just to show how it works.

https://​youtu​.be/​m​1​l​h​G​q​N​C​Z​l​A​?​t​=​2134

Okay, guys. What I want to leave you with now is for the new hack­ers in the new gen­er­a­tion is just think big­ger. So don’t try and hack big­ger tar­gets, but com­bine mul­ti­ple tar­gets and look out­side of your indus­try to com­bine mul­ti­ple things togeth­er. That’s it, guys, and then we’ll be num­ber one again.


Help Support Open Transcripts

If you found this useful or interesting, please consider supporting the project monthly at Patreon or once via Square Cash, or even just sharing the link. Thanks.