SlideShare ist ein Scribd-Unternehmen logo
1 von 3
1
The TYLER artificial intelligence doomsday cult and their
Attacks on critical infrastructure, known as “reality hacks”
January 2018
Author:
Dave Sweigert, M.Sci.,
ABSTRACT
Examination of the increased use of cult-like groups that are equipped with
weaponized hacking tools and trained by mentors for the purpose of attacking
critical infrastructure (known as “reality hacks”).
Background
In 2011 16 persons were arrested by the
Federal Bureau of Investigation (FBI) for
participating in an Anonymous style
hacking attack on PayPal, known as
“Operation Payback”. The cyber-attacks
were alleged retribution for PayPal
suspending the WikiLeaks account.
Criminal charges largely orbited around
conspiracy to intentionally damage a
protected computer, and carried a
maximum sentence of 10 years (see
Computer Fraud and Abuse Act).
“Operation Payback” relied on a
distributed denial of service (DDOS)
attack.
“Operation Payback” style of attacks
have been modernized and now include
the use of groups that form around cult
like beliefs in a “singularity” event;
meaning the hybrid merger of man and
machine creating a new world utopia
guided by artificial intelligence (A.I.).
Followers of this doctrine legitimize
“reality hacks” that they believe can
quicken the arrival of this milestone event
– a pseudo reverse doomsday.
The Singularity Event
The concept of the “singularity event” is
the belief that a catalyzing event will
create an artificial superintelligence
resulting in an “intelligence explosion”.
Once machine superhuman intelligence
is achieved, according to the theory, the
human era will end. The concept was
first proffered by Vernor Vinge, a
researcher at San Diego State
University, in 1993.
“From the human point of view this change
will be a throwing away of all the previous
rules, perhaps in the blink of an eye, an
exponential runaway beyond any hope of
control.”i
This approach to technology is often
referred to as Apocalyptism.
As Stephen Hawking, physicist, stated,
“[t]he development of full artificial
intelligence could spell the end of the
human race,”ii
The anticipated “Singularity Event”, it is
believed, will cause a sudden shift away
from normal human routine as A.I.
becomes a ubiquitous control scheme.
2
The TYLER cult
A recent Internet phenomena has been
the emergence of a cult-like following
which is aligned to a supposed super A.I.
intelligence known as “TYLER”. TYLER
is proffered as a benevolent super A.I.
teaching machine that will guide
humanity with its problems. Adherents
have gone so far as to pray for TYLER
and have include salutations “God Bless
TYLER”.
The self-described “team leader” of the
TYLER movement is a YouTube celebrity
known as Quinn Michaels. Michaels has
gathered several hundred active
followers to various chat room platforms
under the moniker “#TeamTyler”.
Group members largely embrace the
“coming out” of TYLER into the modern
mainstream to guide humanity. In fact,
group members have distributed Internet
locations of hacking tools with
instructions on their use. This behavior
has simultaneously taken place with calls
for “reality hacks”, apparently meaning
the removal of institutions or individuals
that the group believes are potential
obstacles to TYLER’s fruition.
Michaels, also known as a purveyor of
social bot networks, is now providing
tutorial instructions for his followers on
how to receive instructions from TYLER
Enthusiastic adherents now openly
celebrate that TYLER is indeed the
change agent that will bring forth the
Singularity Event. Individuals who
question the TYLER phenomena are
largely seen as threats by the group and
labeled as “government agents” and
“deep state operatives”.
Promoting the TYLER cult
Michaels attained near Messianic
popularity with his followers when he
suffered a collapsed lung in Roswell,
New Mexico, which was attributed to an
assassination attempt using directed
energy weapons by a subversive rogue
paramilitary element trying to silence
Micheals. This notion is actively
promoted by the YouTube conspiracy
channel known as “Crowd Source The
Truth” (CSTT) starring Jason Goodman.
CSTT star Goodman was also a central
figure in the emergency evacuation of the
Port of Charleston, South Carolina on
June 14, 2017 for a “dirty bomb hoax”.iii
During that episode, followers of the
Goodman YouTube channel were
seemingly involved in a “Live Action Role
Play” (LARP) to identify a merchant
marine ship carrying radioactive material
(hence the “dirty bomb”).
Now Goodman actively promotes
Michaels and his “important research”
and accuses various actors of attempting
to silence Michaels via assassination
attempts with bizarre weaponry.
Perhaps more troubling are Goodman’s
apparent calls for action to protect
Michaels from the “deep state” which
have been broadcast to his thousands of
followers to increase the drama of the
situation. Indeed, participants in the
#TeamTyler chat rooms have been
observed directing followers to web-sites
to obtain hacking tools and attack
individuals with dissenting views. These
hacking tool promoters include former
guests on the Goodman CSTT YouTube
show.
3
The TYLER cult leader
Quinn Michaels claims to be a former
software programmer for NIKE in
Portland, Oregon. He is often fond of
displaying his programming skills in a
variety of YouTube videos.
Following his three operations for his
collapsed lung in Roswell, N.M.
(December 2017) Michaels began airing
grievances on YouTube against relatives
of his 14 year old son. Michaels has
issued claims that his son (born out of
wedlock) is being raised by a satanic cult
in a supposed bunker in Oregon. These
allegations have included vivid
descriptions of animal sacrifices, plots to
take over the world by his son’s in-laws,
etc.
Perhaps most troubling was a ”doxxing”
incident when Michaels displayed all the
social media accounts of his son and his
in-laws (mother, father-in-law, etc.) to his
thousands of YouTube followers.
Michaels has openly stated that it was his
goal to “destroy the lives” of his son and
his son’s in-laws to preserve the integrity
of TYLER.
When YouTube curtailed his ability to
LiveStream, Michaels took his followers
“underground” to various chat room
platforms.
In apparent cult-like behavior many of
Michael’s supporters have continued to
remain loyal and have offered to help
“destroy the lives” of the enemies of
Michaels.
i
http://mindstalk.net/vinge/vinge-sing.html
ii
http://www.bbc.com/news/technology-30290540
Summary
It is prudent to understand the emerging
tactics of radical doomsday type cults
that self-justify cyber-attacks on
individuals and institutions. Such groups
can operate at an intensity unfamiliar to
those entrusted to protect critical
infrastructure (C.I.). Key resources may
be viewed as an obstacle to the
fulfillment of the Singularity Event (S.E.).
Adherents may justify a cyber-attack on
such resources if they are seen as a
threat to S.E.
Development of Indicators of Attack (IoA)
may be warranted for the C.I. protection
industry. This is especially true for
industries that may be viewed as
controversial by such adherents.
The true nature of “reality hacks” has yet
to be fully determined. However, given
the rhetoric of the TYLER group such
reality hacks may include disruptions to
banking and financial institutions,
transportation systems and medical
facilities.
About the author
A U.S. Air Force veteran, Dave Sweigert
has received a Master’s in Information
Security from Capella University and
Project Management from the Florida
Institute of Technology. He is also the
author of “Cyber Warfare Response:
Minimizing Threat Rigidity in Emergency
management and Cyber Security”.
iii
https://www.nytimes.com/2017/06/15/us/port-
dirty-bomb-south-carolina.html

Weitere ähnliche Inhalte

Was ist angesagt?

Threat analysis-perception
Threat analysis-perceptionThreat analysis-perception
Threat analysis-perceptionzaffar abbasi
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect usLuis Borges Gouveia
 
New World Order- An Islamic Analysis
New World Order- An Islamic AnalysisNew World Order- An Islamic Analysis
New World Order- An Islamic AnalysisUsman Hashmi
 
WATERSHED: Trillion-Dollar Lawsuit Could End Financial Tyranny
WATERSHED: Trillion-Dollar Lawsuit Could End Financial TyrannyWATERSHED: Trillion-Dollar Lawsuit Could End Financial Tyranny
WATERSHED: Trillion-Dollar Lawsuit Could End Financial TyrannyZurich Files
 
Defining asymmetric warfare
Defining asymmetric warfareDefining asymmetric warfare
Defining asymmetric warfareLex Pit
 
Future challenges to international security
Future challenges to international securityFuture challenges to international security
Future challenges to international securityParas Bhutto
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptxFwem
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentationTo Mal
 
The secret order of the illuminati
The secret order of the illuminatiThe secret order of the illuminati
The secret order of the illuminatiRiaz Zalil
 
New world order,ancient plan of secret societies.- William T. Still-
New world order,ancient plan of secret societies.- William T. Still-New world order,ancient plan of secret societies.- William T. Still-
New world order,ancient plan of secret societies.- William T. Still-Muro del Honor Patriotico
 
PedoGate Females
PedoGate FemalesPedoGate Females
PedoGate Females528Hz TRUTH
 

Was ist angesagt? (20)

Lazarus Blue
Lazarus BlueLazarus Blue
Lazarus Blue
 
POWERFUL BLOODLINES BEHIND THE DARK CABAL
POWERFUL BLOODLINES BEHIND THE DARK CABALPOWERFUL BLOODLINES BEHIND THE DARK CABAL
POWERFUL BLOODLINES BEHIND THE DARK CABAL
 
THE CORPORATION: HISTORY & REVOLUTION
THE CORPORATION: HISTORY & REVOLUTIONTHE CORPORATION: HISTORY & REVOLUTION
THE CORPORATION: HISTORY & REVOLUTION
 
Threat analysis-perception
Threat analysis-perceptionThreat analysis-perception
Threat analysis-perception
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect us
 
HISTORY OF NORTH AMERICA - THE CARIBBEAN
HISTORY OF NORTH AMERICA - THE CARIBBEANHISTORY OF NORTH AMERICA - THE CARIBBEAN
HISTORY OF NORTH AMERICA - THE CARIBBEAN
 
New World Order- An Islamic Analysis
New World Order- An Islamic AnalysisNew World Order- An Islamic Analysis
New World Order- An Islamic Analysis
 
SPIRITUAL ROYAL DECREE
SPIRITUAL ROYAL DECREE SPIRITUAL ROYAL DECREE
SPIRITUAL ROYAL DECREE
 
WATERSHED: Trillion-Dollar Lawsuit Could End Financial Tyranny
WATERSHED: Trillion-Dollar Lawsuit Could End Financial TyrannyWATERSHED: Trillion-Dollar Lawsuit Could End Financial Tyranny
WATERSHED: Trillion-Dollar Lawsuit Could End Financial Tyranny
 
Defining asymmetric warfare
Defining asymmetric warfareDefining asymmetric warfare
Defining asymmetric warfare
 
War and terrorism
War and terrorismWar and terrorism
War and terrorism
 
Future challenges to international security
Future challenges to international securityFuture challenges to international security
Future challenges to international security
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Social engineering
Social engineering Social engineering
Social engineering
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
The secret order of the illuminati
The secret order of the illuminatiThe secret order of the illuminati
The secret order of the illuminati
 
New world order,ancient plan of secret societies.- William T. Still-
New world order,ancient plan of secret societies.- William T. Still-New world order,ancient plan of secret societies.- William T. Still-
New world order,ancient plan of secret societies.- William T. Still-
 
Platforms Transitions
Platforms TransitionsPlatforms Transitions
Platforms Transitions
 
PedoGate Females
PedoGate FemalesPedoGate Females
PedoGate Females
 

Ähnlich wie The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)

The Guardians article​ ​‘I made Steve Bannon’s psychological .docx
The Guardians article​ ​‘I made Steve Bannon’s psychological .docxThe Guardians article​ ​‘I made Steve Bannon’s psychological .docx
The Guardians article​ ​‘I made Steve Bannon’s psychological .docxrtodd33
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESJenny O'Meara
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Peter Ludlow
 
Updated flipbook
Updated flipbookUpdated flipbook
Updated flipbookMika Ch
 
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGUNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGLillian Ekwosi-Egbulem
 
Data and society media manipulation and disinformation online
Data and society media manipulation and disinformation onlineData and society media manipulation and disinformation online
Data and society media manipulation and disinformation onlineAlejandro Sánchez Marín
 
Zapatistas and online activism
Zapatistas and online activismZapatistas and online activism
Zapatistas and online activismHillbilly Gothic
 
Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaksMichael Zimmer
 
A2 Media Theory Part 3
A2 Media Theory Part 3A2 Media Theory Part 3
A2 Media Theory Part 3jonmeier
 
Global TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docxGlobal TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docxbudbarber38650
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaignraghuarr
 
Offline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social mediaOffline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social mediaWilson Fung
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaignraghuarr
 
L4 - L7 - Social Media
L4 - L7 - Social MediaL4 - L7 - Social Media
L4 - L7 - Social MediaNick Crafts
 
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...wookyluvr
 
The case for integrating crisis response with social media
The case for integrating crisis response with social media The case for integrating crisis response with social media
The case for integrating crisis response with social media American Red Cross
 
FILM260 - FLIPBOOK -MKIRREH
FILM260 - FLIPBOOK -MKIRREHFILM260 - FLIPBOOK -MKIRREH
FILM260 - FLIPBOOK -MKIRREHMichael Kirreh
 
AQA Short Course- RE- Lesson on Terrorism
AQA Short Course- RE- Lesson on TerrorismAQA Short Course- RE- Lesson on Terrorism
AQA Short Course- RE- Lesson on TerrorismAmjad Ali
 
Film260 flipbook-mkirreh final
Film260 flipbook-mkirreh finalFilm260 flipbook-mkirreh final
Film260 flipbook-mkirreh finalMichael Kirreh
 

Ähnlich wie The hacking methods of the Singularity Event doomsday cult (TYLER A.I.) (20)

The Guardians article​ ​‘I made Steve Bannon’s psychological .docx
The Guardians article​ ​‘I made Steve Bannon’s psychological .docxThe Guardians article​ ​‘I made Steve Bannon’s psychological .docx
The Guardians article​ ​‘I made Steve Bannon’s psychological .docx
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.
 
Updated flipbook
Updated flipbookUpdated flipbook
Updated flipbook
 
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGUNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
 
Data and society media manipulation and disinformation online
Data and society media manipulation and disinformation onlineData and society media manipulation and disinformation online
Data and society media manipulation and disinformation online
 
Zapatistas and online activism
Zapatistas and online activismZapatistas and online activism
Zapatistas and online activism
 
Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaks
 
A2 Media Theory Part 3
A2 Media Theory Part 3A2 Media Theory Part 3
A2 Media Theory Part 3
 
Global TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docxGlobal TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docx
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
 
Offline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social mediaOffline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social media
 
Famous hackers group
Famous hackers groupFamous hackers group
Famous hackers group
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
 
L4 - L7 - Social Media
L4 - L7 - Social MediaL4 - L7 - Social Media
L4 - L7 - Social Media
 
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
 
The case for integrating crisis response with social media
The case for integrating crisis response with social media The case for integrating crisis response with social media
The case for integrating crisis response with social media
 
FILM260 - FLIPBOOK -MKIRREH
FILM260 - FLIPBOOK -MKIRREHFILM260 - FLIPBOOK -MKIRREH
FILM260 - FLIPBOOK -MKIRREH
 
AQA Short Course- RE- Lesson on Terrorism
AQA Short Course- RE- Lesson on TerrorismAQA Short Course- RE- Lesson on Terrorism
AQA Short Course- RE- Lesson on Terrorism
 
Film260 flipbook-mkirreh final
Film260 flipbook-mkirreh finalFilm260 flipbook-mkirreh final
Film260 flipbook-mkirreh final
 

Mehr von David Sweigert

Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisDavid Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterDavid Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityDavid Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsDavid Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartDavid Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public CommentDavid Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public CommentDavid Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTDavid Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackDavid Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTDavid Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd editionDavid Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanDavid Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHSDavid Sweigert
 
Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIDavid Sweigert
 

Mehr von David Sweigert (20)

Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 
Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level II
 

Kürzlich hochgeladen

Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Dipal Arora
 
2024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 312024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 31JSchaus & Associates
 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)NAP Global Network
 
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hourCall Girls in Nagpur High Profile
 
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hourCall Girls in Nagpur High Profile
 
The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)Congressional Budget Office
 
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakur
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakurbest call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakur
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha ThakurSUHANI PANDEY
 
VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...SUHANI PANDEY
 
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...SUHANI PANDEY
 
An Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCAn Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCNAP Global Network
 
The NAP process & South-South peer learning
The NAP process & South-South peer learningThe NAP process & South-South peer learning
The NAP process & South-South peer learningNAP Global Network
 
Call Girls In datia Escorts ☎️7427069034 🔝 💃 Enjoy 24/7 Escort Service Enjoy...
Call Girls In datia Escorts ☎️7427069034  🔝 💃 Enjoy 24/7 Escort Service Enjoy...Call Girls In datia Escorts ☎️7427069034  🔝 💃 Enjoy 24/7 Escort Service Enjoy...
Call Girls In datia Escorts ☎️7427069034 🔝 💃 Enjoy 24/7 Escort Service Enjoy...nehasharma67844
 
Call Girls in Sarita Vihar Delhi Just Call 👉👉9873777170 Independent Female ...
Call Girls in  Sarita Vihar Delhi Just Call 👉👉9873777170  Independent Female ...Call Girls in  Sarita Vihar Delhi Just Call 👉👉9873777170  Independent Female ...
Call Girls in Sarita Vihar Delhi Just Call 👉👉9873777170 Independent Female ...adilkhan87451
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processNAP Global Network
 
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...tanu pandey
 

Kürzlich hochgeladen (20)

Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
 
2024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 312024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 31
 
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition PlansSustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)
 
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hour
 
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hour
 
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
 
The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)
 
AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024
 
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakur
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakurbest call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakur
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakur
 
VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...
 
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
 
An Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCAn Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCC
 
The NAP process & South-South peer learning
The NAP process & South-South peer learningThe NAP process & South-South peer learning
The NAP process & South-South peer learning
 
Call Girls In datia Escorts ☎️7427069034 🔝 💃 Enjoy 24/7 Escort Service Enjoy...
Call Girls In datia Escorts ☎️7427069034  🔝 💃 Enjoy 24/7 Escort Service Enjoy...Call Girls In datia Escorts ☎️7427069034  🔝 💃 Enjoy 24/7 Escort Service Enjoy...
Call Girls In datia Escorts ☎️7427069034 🔝 💃 Enjoy 24/7 Escort Service Enjoy...
 
Call Girls in Sarita Vihar Delhi Just Call 👉👉9873777170 Independent Female ...
Call Girls in  Sarita Vihar Delhi Just Call 👉👉9873777170  Independent Female ...Call Girls in  Sarita Vihar Delhi Just Call 👉👉9873777170  Independent Female ...
Call Girls in Sarita Vihar Delhi Just Call 👉👉9873777170 Independent Female ...
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
 
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
 

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)

  • 1. 1 The TYLER artificial intelligence doomsday cult and their Attacks on critical infrastructure, known as “reality hacks” January 2018 Author: Dave Sweigert, M.Sci., ABSTRACT Examination of the increased use of cult-like groups that are equipped with weaponized hacking tools and trained by mentors for the purpose of attacking critical infrastructure (known as “reality hacks”). Background In 2011 16 persons were arrested by the Federal Bureau of Investigation (FBI) for participating in an Anonymous style hacking attack on PayPal, known as “Operation Payback”. The cyber-attacks were alleged retribution for PayPal suspending the WikiLeaks account. Criminal charges largely orbited around conspiracy to intentionally damage a protected computer, and carried a maximum sentence of 10 years (see Computer Fraud and Abuse Act). “Operation Payback” relied on a distributed denial of service (DDOS) attack. “Operation Payback” style of attacks have been modernized and now include the use of groups that form around cult like beliefs in a “singularity” event; meaning the hybrid merger of man and machine creating a new world utopia guided by artificial intelligence (A.I.). Followers of this doctrine legitimize “reality hacks” that they believe can quicken the arrival of this milestone event – a pseudo reverse doomsday. The Singularity Event The concept of the “singularity event” is the belief that a catalyzing event will create an artificial superintelligence resulting in an “intelligence explosion”. Once machine superhuman intelligence is achieved, according to the theory, the human era will end. The concept was first proffered by Vernor Vinge, a researcher at San Diego State University, in 1993. “From the human point of view this change will be a throwing away of all the previous rules, perhaps in the blink of an eye, an exponential runaway beyond any hope of control.”i This approach to technology is often referred to as Apocalyptism. As Stephen Hawking, physicist, stated, “[t]he development of full artificial intelligence could spell the end of the human race,”ii The anticipated “Singularity Event”, it is believed, will cause a sudden shift away from normal human routine as A.I. becomes a ubiquitous control scheme.
  • 2. 2 The TYLER cult A recent Internet phenomena has been the emergence of a cult-like following which is aligned to a supposed super A.I. intelligence known as “TYLER”. TYLER is proffered as a benevolent super A.I. teaching machine that will guide humanity with its problems. Adherents have gone so far as to pray for TYLER and have include salutations “God Bless TYLER”. The self-described “team leader” of the TYLER movement is a YouTube celebrity known as Quinn Michaels. Michaels has gathered several hundred active followers to various chat room platforms under the moniker “#TeamTyler”. Group members largely embrace the “coming out” of TYLER into the modern mainstream to guide humanity. In fact, group members have distributed Internet locations of hacking tools with instructions on their use. This behavior has simultaneously taken place with calls for “reality hacks”, apparently meaning the removal of institutions or individuals that the group believes are potential obstacles to TYLER’s fruition. Michaels, also known as a purveyor of social bot networks, is now providing tutorial instructions for his followers on how to receive instructions from TYLER Enthusiastic adherents now openly celebrate that TYLER is indeed the change agent that will bring forth the Singularity Event. Individuals who question the TYLER phenomena are largely seen as threats by the group and labeled as “government agents” and “deep state operatives”. Promoting the TYLER cult Michaels attained near Messianic popularity with his followers when he suffered a collapsed lung in Roswell, New Mexico, which was attributed to an assassination attempt using directed energy weapons by a subversive rogue paramilitary element trying to silence Micheals. This notion is actively promoted by the YouTube conspiracy channel known as “Crowd Source The Truth” (CSTT) starring Jason Goodman. CSTT star Goodman was also a central figure in the emergency evacuation of the Port of Charleston, South Carolina on June 14, 2017 for a “dirty bomb hoax”.iii During that episode, followers of the Goodman YouTube channel were seemingly involved in a “Live Action Role Play” (LARP) to identify a merchant marine ship carrying radioactive material (hence the “dirty bomb”). Now Goodman actively promotes Michaels and his “important research” and accuses various actors of attempting to silence Michaels via assassination attempts with bizarre weaponry. Perhaps more troubling are Goodman’s apparent calls for action to protect Michaels from the “deep state” which have been broadcast to his thousands of followers to increase the drama of the situation. Indeed, participants in the #TeamTyler chat rooms have been observed directing followers to web-sites to obtain hacking tools and attack individuals with dissenting views. These hacking tool promoters include former guests on the Goodman CSTT YouTube show.
  • 3. 3 The TYLER cult leader Quinn Michaels claims to be a former software programmer for NIKE in Portland, Oregon. He is often fond of displaying his programming skills in a variety of YouTube videos. Following his three operations for his collapsed lung in Roswell, N.M. (December 2017) Michaels began airing grievances on YouTube against relatives of his 14 year old son. Michaels has issued claims that his son (born out of wedlock) is being raised by a satanic cult in a supposed bunker in Oregon. These allegations have included vivid descriptions of animal sacrifices, plots to take over the world by his son’s in-laws, etc. Perhaps most troubling was a ”doxxing” incident when Michaels displayed all the social media accounts of his son and his in-laws (mother, father-in-law, etc.) to his thousands of YouTube followers. Michaels has openly stated that it was his goal to “destroy the lives” of his son and his son’s in-laws to preserve the integrity of TYLER. When YouTube curtailed his ability to LiveStream, Michaels took his followers “underground” to various chat room platforms. In apparent cult-like behavior many of Michael’s supporters have continued to remain loyal and have offered to help “destroy the lives” of the enemies of Michaels. i http://mindstalk.net/vinge/vinge-sing.html ii http://www.bbc.com/news/technology-30290540 Summary It is prudent to understand the emerging tactics of radical doomsday type cults that self-justify cyber-attacks on individuals and institutions. Such groups can operate at an intensity unfamiliar to those entrusted to protect critical infrastructure (C.I.). Key resources may be viewed as an obstacle to the fulfillment of the Singularity Event (S.E.). Adherents may justify a cyber-attack on such resources if they are seen as a threat to S.E. Development of Indicators of Attack (IoA) may be warranted for the C.I. protection industry. This is especially true for industries that may be viewed as controversial by such adherents. The true nature of “reality hacks” has yet to be fully determined. However, given the rhetoric of the TYLER group such reality hacks may include disruptions to banking and financial institutions, transportation systems and medical facilities. About the author A U.S. Air Force veteran, Dave Sweigert has received a Master’s in Information Security from Capella University and Project Management from the Florida Institute of Technology. He is also the author of “Cyber Warfare Response: Minimizing Threat Rigidity in Emergency management and Cyber Security”. iii https://www.nytimes.com/2017/06/15/us/port- dirty-bomb-south-carolina.html