Anonymous Bloggers Exposing OpSec SEALs Unmasked
by 07) Douglas Stewart on September 19, 2012
Co-Authored by Patrick S. Read –
The Op Sec Team are former American Special Force Operators, who banded together to curb top-secret leaks for personal gain and they’ve now been targeted by radical left, anonymous bloggers who criminally exposed their personal information on several public websites.
Per the Intelligence Identities Protection Act of 1982, passed by Ronald Reagan here it is a federal crime to expose covert agents
Whoever, in the course of a pattern of activities intended to identify and expose covert agents and with reason to believe that such activities would impair or impede the foreign intelligence activities of the United States, discloses any information that identifies an individual as a covert agent to any individual not authorized to receive classified information, knowing that the information disclosed so identifies such individual and that the United States is taking affirmative measures to conceal such individual’s classified intelligence relationship to the United States, shall be fined under title 18 or imprisoned not more than three years, or both.
The OpSec Team here recently had, not only their personal information,
but their family & associates’ personal-information disclosed by a
group known as ‘Surfers United’ (S.U.) The group claims in its mission
statement that its purpose is to ‘combat online harassment and
bullying;’ which appears to be contradictory to their actions and
publications.
Not only did S.U. release an uncanny
amount of personal information about the members of the OpSec Team, but
with no clear motive or justification, they also released the personal
information of George Zimmerman and his entire family, and did the same
to a U.S. Army Brigadier General. This just names a few instances of
their campaign, which is clearly politically motivated and oriented to
the radical left.
Well, the attack that S.U. waged against the heroes of the OpSec Team is now being waged on them.
While the group has tried to hide behind
the online veil of anonymity, Conservative Report Online has learned
the identity of at least one of the SU team members. Linda Mendes of North Dighton, Massachusetts
is the real name of author “Missy D,” who cross-posted the OpSec Team
members personal details across numerous websites linked to the S.U.
group.
Mendes’ ID was accidentally revealed
when her postings at another site had triggered another conflict. She
had published just enough information for researchers to determine a
general physical location and real life name. When one of her targets
grew tired of her harassment, they released her information and cited
Mendes’ own blog post on The Howlers Den as one part of the confirmation
of her real identification. The group then quickly deleted the blog post to get rid of the identifying information.
Sources also revealed to Conservative
Report Online that members of Surfers United have had a long history of
harassment, and have threatened a wide array of people going back many
years. This is something the Conservative Report is in the process of
reviewing, and our findings will be published in the near future.
The Howlers Den, and other S.U. associates appear to have taken every precaution so as to not have their own personal information available on the internet. So, why a group would make it their sole purpose to publish another’s personal information is not really clear, since the group claims to be focused strictly on ‘anti-bullying.‘
The very act of releasing information of
people, whom took every precaution to remain anonymous, is in fact an
act of bullying itself. Judging by their actions on the web, and their
interactions with others, the group’s intentions is to remain secretive
and private while not allowing others to do so too.
The method S.U. used against OpSecTeam
is referred to online as “doxing.” This is the act in which personal
information, including official documents (dox) are released publicly
online. This can include but is not limited to social security numbers,
credit card numbers, and any other personal information that is normally
safe-guarded by the owner. While “doxing” can be used by hackers, the
process of doxing has grown more popular among internet users with
little or no skills in the realm of hacking or even investigative
research. Since the trove of personal information is exponentially
expanding, it has become easier and easier to locate, and publish
personal information.
But by focusing on OpSecTeam, SU and The Howlers Den have taken a stand in favor of security leaks and breaches.
Such releases, in just the past couple
of years, have been responsible for captures of US operatives, as well
as private individuals being targeted by America’s enemies.
And the radical group continues to
expose the identities of US SEALs despite it being top-secret
information, and despite the death threat Al Qaeda recently made against
the author of “No Easy Day,” Mark Owen. S.U. continues to expose the
identity of SEALs despite twenty-four of them having been killed since
they raided, and killed Osama Bin Laden. One former SEAL was just killed
on 9/11 in an attack on Libya, which has been storied to be linked to
Al Qaeda.
If S.U. isn’t interested in helping to
protect those who protect both them and their rights, then who are they
interested in helping–during war time?
Why a group would target US Navy SEALs,
and their non-partisan efforts to protect innocent people is beyond the
understanding of nearly anyone reading about the attack on Team Op Sec.
Furthermore, what does SU stand to gain from this? If it is notoriety
and infamy, then they will be surprised to learn that they will be
selling themselves short of their own dream–all while helping chip away
at the last remnants of basic decency and decorum in an already leaky
intel world.
Here is a link to the Team Op. Sec website, and if you would like to support their mission to end top-secret leaks for political gain, you can make a tax-deductible contribution to them here (Contact information contained within).
No comments:
Post a Comment