SlideShare une entreprise Scribd logo
1  sur  3
1
The TYLER artificial intelligence doomsday cult and their
Attacks on critical infrastructure, known as “reality hacks”
January 2018
Author:
Dave Sweigert, M.Sci.,
ABSTRACT
Examination of the increased use of cult-like groups that are equipped with
weaponized hacking tools and trained by mentors for the purpose of attacking
critical infrastructure (known as “reality hacks”).
Background
In 2011 16 persons were arrested by the
Federal Bureau of Investigation (FBI) for
participating in an Anonymous style
hacking attack on PayPal, known as
“Operation Payback”. The cyber-attacks
were alleged retribution for PayPal
suspending the WikiLeaks account.
Criminal charges largely orbited around
conspiracy to intentionally damage a
protected computer, and carried a
maximum sentence of 10 years (see
Computer Fraud and Abuse Act).
“Operation Payback” relied on a
distributed denial of service (DDOS)
attack.
“Operation Payback” style of attacks
have been modernized and now include
the use of groups that form around cult
like beliefs in a “singularity” event;
meaning the hybrid merger of man and
machine creating a new world utopia
guided by artificial intelligence (A.I.).
Followers of this doctrine legitimize
“reality hacks” that they believe can
quicken the arrival of this milestone event
– a pseudo reverse doomsday.
The Singularity Event
The concept of the “singularity event” is
the belief that a catalyzing event will
create an artificial superintelligence
resulting in an “intelligence explosion”.
Once machine superhuman intelligence
is achieved, according to the theory, the
human era will end. The concept was
first proffered by Vernor Vinge, a
researcher at San Diego State
University, in 1993.
“From the human point of view this change
will be a throwing away of all the previous
rules, perhaps in the blink of an eye, an
exponential runaway beyond any hope of
control.”i
This approach to technology is often
referred to as Apocalyptism.
As Stephen Hawking, physicist, stated,
“[t]he development of full artificial
intelligence could spell the end of the
human race,”ii
The anticipated “Singularity Event”, it is
believed, will cause a sudden shift away
from normal human routine as A.I.
becomes a ubiquitous control scheme.
2
The TYLER cult
A recent Internet phenomena has been
the emergence of a cult-like following
which is aligned to a supposed super A.I.
intelligence known as “TYLER”. TYLER
is proffered as a benevolent super A.I.
teaching machine that will guide
humanity with its problems. Adherents
have gone so far as to pray for TYLER
and have include salutations “God Bless
TYLER”.
The self-described “team leader” of the
TYLER movement is a YouTube celebrity
known as Quinn Michaels. Michaels has
gathered several hundred active
followers to various chat room platforms
under the moniker “#TeamTyler”.
Group members largely embrace the
“coming out” of TYLER into the modern
mainstream to guide humanity. In fact,
group members have distributed Internet
locations of hacking tools with
instructions on their use. This behavior
has simultaneously taken place with calls
for “reality hacks”, apparently meaning
the removal of institutions or individuals
that the group believes are potential
obstacles to TYLER’s fruition.
Michaels, also known as a purveyor of
social bot networks, is now providing
tutorial instructions for his followers on
how to receive instructions from TYLER
Enthusiastic adherents now openly
celebrate that TYLER is indeed the
change agent that will bring forth the
Singularity Event. Individuals who
question the TYLER phenomena are
largely seen as threats by the group and
labeled as “government agents” and
“deep state operatives”.
Promoting the TYLER cult
Michaels attained near Messianic
popularity with his followers when he
suffered a collapsed lung in Roswell,
New Mexico, which was attributed to an
assassination attempt using directed
energy weapons by a subversive rogue
paramilitary element trying to silence
Micheals. This notion is actively
promoted by the YouTube conspiracy
channel known as “Crowd Source The
Truth” (CSTT) starring Jason Goodman.
CSTT star Goodman was also a central
figure in the emergency evacuation of the
Port of Charleston, South Carolina on
June 14, 2017 for a “dirty bomb hoax”.iii
During that episode, followers of the
Goodman YouTube channel were
seemingly involved in a “Live Action Role
Play” (LARP) to identify a merchant
marine ship carrying radioactive material
(hence the “dirty bomb”).
Now Goodman actively promotes
Michaels and his “important research”
and accuses various actors of attempting
to silence Michaels via assassination
attempts with bizarre weaponry.
Perhaps more troubling are Goodman’s
apparent calls for action to protect
Michaels from the “deep state” which
have been broadcast to his thousands of
followers to increase the drama of the
situation. Indeed, participants in the
#TeamTyler chat rooms have been
observed directing followers to web-sites
to obtain hacking tools and attack
individuals with dissenting views. These
hacking tool promoters include former
guests on the Goodman CSTT YouTube
show.
3
The TYLER cult leader
Quinn Michaels claims to be a former
software programmer for NIKE in
Portland, Oregon. He is often fond of
displaying his programming skills in a
variety of YouTube videos.
Following his three operations for his
collapsed lung in Roswell, N.M.
(December 2017) Michaels began airing
grievances on YouTube against relatives
of his 14 year old son. Michaels has
issued claims that his son (born out of
wedlock) is being raised by a satanic cult
in a supposed bunker in Oregon. These
allegations have included vivid
descriptions of animal sacrifices, plots to
take over the world by his son’s in-laws,
etc.
Perhaps most troubling was a ”doxxing”
incident when Michaels displayed all the
social media accounts of his son and his
in-laws (mother, father-in-law, etc.) to his
thousands of YouTube followers.
Michaels has openly stated that it was his
goal to “destroy the lives” of his son and
his son’s in-laws to preserve the integrity
of TYLER.
When YouTube curtailed his ability to
LiveStream, Michaels took his followers
“underground” to various chat room
platforms.
In apparent cult-like behavior many of
Michael’s supporters have continued to
remain loyal and have offered to help
“destroy the lives” of the enemies of
Michaels.
i
http://mindstalk.net/vinge/vinge-sing.html
ii
http://www.bbc.com/news/technology-30290540
Summary
It is prudent to understand the emerging
tactics of radical doomsday type cults
that self-justify cyber-attacks on
individuals and institutions. Such groups
can operate at an intensity unfamiliar to
those entrusted to protect critical
infrastructure (C.I.). Key resources may
be viewed as an obstacle to the
fulfillment of the Singularity Event (S.E.).
Adherents may justify a cyber-attack on
such resources if they are seen as a
threat to S.E.
Development of Indicators of Attack (IoA)
may be warranted for the C.I. protection
industry. This is especially true for
industries that may be viewed as
controversial by such adherents.
The true nature of “reality hacks” has yet
to be fully determined. However, given
the rhetoric of the TYLER group such
reality hacks may include disruptions to
banking and financial institutions,
transportation systems and medical
facilities.
About the author
A U.S. Air Force veteran, Dave Sweigert
has received a Master’s in Information
Security from Capella University and
Project Management from the Florida
Institute of Technology. He is also the
author of “Cyber Warfare Response:
Minimizing Threat Rigidity in Emergency
management and Cyber Security”.
iii
https://www.nytimes.com/2017/06/15/us/port-
dirty-bomb-south-carolina.html

Contenu connexe

Tendances

One Leg to Stand on: Adventures in Adversary Tracking with ATT&CK
One Leg to Stand on: Adventures in Adversary Tracking with ATT&CKOne Leg to Stand on: Adventures in Adversary Tracking with ATT&CK
One Leg to Stand on: Adventures in Adversary Tracking with ATT&CKMITRE ATT&CK
 
Data leakage detection (synopsis)
Data leakage detection (synopsis)Data leakage detection (synopsis)
Data leakage detection (synopsis)Mumbai Academisc
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...CODE BLUE
 
Powerpoint Presentation- Jess Mendez Area 51
Powerpoint Presentation- Jess Mendez Area 51Powerpoint Presentation- Jess Mendez Area 51
Powerpoint Presentation- Jess Mendez Area 51Jessica Mendez
 
Social engineering
Social engineeringSocial engineering
Social engineeringRobert Hood
 
The Great Fraud of 1930–33
The Great Fraud of 1930–33The Great Fraud of 1930–33
The Great Fraud of 1930–33ICJ-ICC
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark webJisc
 
2022-08-13_cogsec_defcon.pptx
2022-08-13_cogsec_defcon.pptx2022-08-13_cogsec_defcon.pptx
2022-08-13_cogsec_defcon.pptxSaraJayneTerp
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)phexcom1
 
Overview on hacking tools
Overview on hacking toolsOverview on hacking tools
Overview on hacking toolsZituSahu
 

Tendances (20)

Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
One Leg to Stand on: Adventures in Adversary Tracking with ATT&CK
One Leg to Stand on: Adventures in Adversary Tracking with ATT&CKOne Leg to Stand on: Adventures in Adversary Tracking with ATT&CK
One Leg to Stand on: Adventures in Adversary Tracking with ATT&CK
 
dark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdfdark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdf
 
Data leakage detection (synopsis)
Data leakage detection (synopsis)Data leakage detection (synopsis)
Data leakage detection (synopsis)
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
 
Powerpoint Presentation- Jess Mendez Area 51
Powerpoint Presentation- Jess Mendez Area 51Powerpoint Presentation- Jess Mendez Area 51
Powerpoint Presentation- Jess Mendez Area 51
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Data Breach
Data BreachData Breach
Data Breach
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
The Great Fraud of 1930–33
The Great Fraud of 1930–33The Great Fraud of 1930–33
The Great Fraud of 1930–33
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
POWERFUL BLOODLINES BEHIND THE DARK CABAL
POWERFUL BLOODLINES BEHIND THE DARK CABALPOWERFUL BLOODLINES BEHIND THE DARK CABAL
POWERFUL BLOODLINES BEHIND THE DARK CABAL
 
2022-08-13_cogsec_defcon.pptx
2022-08-13_cogsec_defcon.pptx2022-08-13_cogsec_defcon.pptx
2022-08-13_cogsec_defcon.pptx
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)
 
Overview on hacking tools
Overview on hacking toolsOverview on hacking tools
Overview on hacking tools
 
ROYAL FAMILY ASSET SETTLEMENTS
ROYAL FAMILY ASSET SETTLEMENTS ROYAL FAMILY ASSET SETTLEMENTS
ROYAL FAMILY ASSET SETTLEMENTS
 
Area 51
Area 51Area 51
Area 51
 

Similaire à The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)

The Guardians article​ ​‘I made Steve Bannon’s psychological .docx
The Guardians article​ ​‘I made Steve Bannon’s psychological .docxThe Guardians article​ ​‘I made Steve Bannon’s psychological .docx
The Guardians article​ ​‘I made Steve Bannon’s psychological .docxrtodd33
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESJenny O'Meara
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Peter Ludlow
 
Updated flipbook
Updated flipbookUpdated flipbook
Updated flipbookMika Ch
 
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGUNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGLillian Ekwosi-Egbulem
 
Data and society media manipulation and disinformation online
Data and society media manipulation and disinformation onlineData and society media manipulation and disinformation online
Data and society media manipulation and disinformation onlineAlejandro Sánchez Marín
 
Zapatistas and online activism
Zapatistas and online activismZapatistas and online activism
Zapatistas and online activismHillbilly Gothic
 
Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaksMichael Zimmer
 
A2 Media Theory Part 3
A2 Media Theory Part 3A2 Media Theory Part 3
A2 Media Theory Part 3jonmeier
 
Global TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docxGlobal TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docxbudbarber38650
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaignraghuarr
 
Offline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social mediaOffline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social mediaWilson Fung
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaignraghuarr
 
L4 - L7 - Social Media
L4 - L7 - Social MediaL4 - L7 - Social Media
L4 - L7 - Social MediaNick Crafts
 
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...wookyluvr
 
The case for integrating crisis response with social media
The case for integrating crisis response with social media The case for integrating crisis response with social media
The case for integrating crisis response with social media American Red Cross
 
FILM260 - FLIPBOOK -MKIRREH
FILM260 - FLIPBOOK -MKIRREHFILM260 - FLIPBOOK -MKIRREH
FILM260 - FLIPBOOK -MKIRREHMichael Kirreh
 
AQA Short Course- RE- Lesson on Terrorism
AQA Short Course- RE- Lesson on TerrorismAQA Short Course- RE- Lesson on Terrorism
AQA Short Course- RE- Lesson on TerrorismAmjad Ali
 
Film260 flipbook-mkirreh final
Film260 flipbook-mkirreh finalFilm260 flipbook-mkirreh final
Film260 flipbook-mkirreh finalMichael Kirreh
 

Similaire à The hacking methods of the Singularity Event doomsday cult (TYLER A.I.) (20)

The Guardians article​ ​‘I made Steve Bannon’s psychological .docx
The Guardians article​ ​‘I made Steve Bannon’s psychological .docxThe Guardians article​ ​‘I made Steve Bannon’s psychological .docx
The Guardians article​ ​‘I made Steve Bannon’s psychological .docx
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.
 
Updated flipbook
Updated flipbookUpdated flipbook
Updated flipbook
 
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGUNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
 
Data and society media manipulation and disinformation online
Data and society media manipulation and disinformation onlineData and society media manipulation and disinformation online
Data and society media manipulation and disinformation online
 
Zapatistas and online activism
Zapatistas and online activismZapatistas and online activism
Zapatistas and online activism
 
Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaks
 
A2 Media Theory Part 3
A2 Media Theory Part 3A2 Media Theory Part 3
A2 Media Theory Part 3
 
Global TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docxGlobal TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docx
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
 
Offline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social mediaOffline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social media
 
Famous hackers group
Famous hackers groupFamous hackers group
Famous hackers group
 
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support CampaignWikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
 
L4 - L7 - Social Media
L4 - L7 - Social MediaL4 - L7 - Social Media
L4 - L7 - Social Media
 
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
 
The case for integrating crisis response with social media
The case for integrating crisis response with social media The case for integrating crisis response with social media
The case for integrating crisis response with social media
 
FILM260 - FLIPBOOK -MKIRREH
FILM260 - FLIPBOOK -MKIRREHFILM260 - FLIPBOOK -MKIRREH
FILM260 - FLIPBOOK -MKIRREH
 
AQA Short Course- RE- Lesson on Terrorism
AQA Short Course- RE- Lesson on TerrorismAQA Short Course- RE- Lesson on Terrorism
AQA Short Course- RE- Lesson on Terrorism
 
Film260 flipbook-mkirreh final
Film260 flipbook-mkirreh finalFilm260 flipbook-mkirreh final
Film260 flipbook-mkirreh final
 

Plus de David Sweigert

Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisDavid Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterDavid Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityDavid Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsDavid Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartDavid Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public CommentDavid Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public CommentDavid Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTDavid Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackDavid Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTDavid Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd editionDavid Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanDavid Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHSDavid Sweigert
 
Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIDavid Sweigert
 

Plus de David Sweigert (20)

Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 
Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level II
 

Dernier

VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...Suhani Kapoor
 
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...ranjana rawat
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCongressional Budget Office
 
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28JSchaus & Associates
 
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxPeter Miles
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceHigh Profile Call Girls
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...ResolutionFoundation
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at workChristina Parmionova
 
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up NumberMs Riya
 
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...Hemant Purohit
 
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Roomishabajaj13
 
2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos WebinarLinda Reinstein
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...CedZabala
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginningsinfo695895
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfahcitycouncil
 
Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.Christina Parmionova
 
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...aartirawatdelhi
 

Dernier (20)

VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
 
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related Topics
 
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28
 
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at work
 
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
 
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
 
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
 
2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdf
 
Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.
 
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
 

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)

  • 1. 1 The TYLER artificial intelligence doomsday cult and their Attacks on critical infrastructure, known as “reality hacks” January 2018 Author: Dave Sweigert, M.Sci., ABSTRACT Examination of the increased use of cult-like groups that are equipped with weaponized hacking tools and trained by mentors for the purpose of attacking critical infrastructure (known as “reality hacks”). Background In 2011 16 persons were arrested by the Federal Bureau of Investigation (FBI) for participating in an Anonymous style hacking attack on PayPal, known as “Operation Payback”. The cyber-attacks were alleged retribution for PayPal suspending the WikiLeaks account. Criminal charges largely orbited around conspiracy to intentionally damage a protected computer, and carried a maximum sentence of 10 years (see Computer Fraud and Abuse Act). “Operation Payback” relied on a distributed denial of service (DDOS) attack. “Operation Payback” style of attacks have been modernized and now include the use of groups that form around cult like beliefs in a “singularity” event; meaning the hybrid merger of man and machine creating a new world utopia guided by artificial intelligence (A.I.). Followers of this doctrine legitimize “reality hacks” that they believe can quicken the arrival of this milestone event – a pseudo reverse doomsday. The Singularity Event The concept of the “singularity event” is the belief that a catalyzing event will create an artificial superintelligence resulting in an “intelligence explosion”. Once machine superhuman intelligence is achieved, according to the theory, the human era will end. The concept was first proffered by Vernor Vinge, a researcher at San Diego State University, in 1993. “From the human point of view this change will be a throwing away of all the previous rules, perhaps in the blink of an eye, an exponential runaway beyond any hope of control.”i This approach to technology is often referred to as Apocalyptism. As Stephen Hawking, physicist, stated, “[t]he development of full artificial intelligence could spell the end of the human race,”ii The anticipated “Singularity Event”, it is believed, will cause a sudden shift away from normal human routine as A.I. becomes a ubiquitous control scheme.
  • 2. 2 The TYLER cult A recent Internet phenomena has been the emergence of a cult-like following which is aligned to a supposed super A.I. intelligence known as “TYLER”. TYLER is proffered as a benevolent super A.I. teaching machine that will guide humanity with its problems. Adherents have gone so far as to pray for TYLER and have include salutations “God Bless TYLER”. The self-described “team leader” of the TYLER movement is a YouTube celebrity known as Quinn Michaels. Michaels has gathered several hundred active followers to various chat room platforms under the moniker “#TeamTyler”. Group members largely embrace the “coming out” of TYLER into the modern mainstream to guide humanity. In fact, group members have distributed Internet locations of hacking tools with instructions on their use. This behavior has simultaneously taken place with calls for “reality hacks”, apparently meaning the removal of institutions or individuals that the group believes are potential obstacles to TYLER’s fruition. Michaels, also known as a purveyor of social bot networks, is now providing tutorial instructions for his followers on how to receive instructions from TYLER Enthusiastic adherents now openly celebrate that TYLER is indeed the change agent that will bring forth the Singularity Event. Individuals who question the TYLER phenomena are largely seen as threats by the group and labeled as “government agents” and “deep state operatives”. Promoting the TYLER cult Michaels attained near Messianic popularity with his followers when he suffered a collapsed lung in Roswell, New Mexico, which was attributed to an assassination attempt using directed energy weapons by a subversive rogue paramilitary element trying to silence Micheals. This notion is actively promoted by the YouTube conspiracy channel known as “Crowd Source The Truth” (CSTT) starring Jason Goodman. CSTT star Goodman was also a central figure in the emergency evacuation of the Port of Charleston, South Carolina on June 14, 2017 for a “dirty bomb hoax”.iii During that episode, followers of the Goodman YouTube channel were seemingly involved in a “Live Action Role Play” (LARP) to identify a merchant marine ship carrying radioactive material (hence the “dirty bomb”). Now Goodman actively promotes Michaels and his “important research” and accuses various actors of attempting to silence Michaels via assassination attempts with bizarre weaponry. Perhaps more troubling are Goodman’s apparent calls for action to protect Michaels from the “deep state” which have been broadcast to his thousands of followers to increase the drama of the situation. Indeed, participants in the #TeamTyler chat rooms have been observed directing followers to web-sites to obtain hacking tools and attack individuals with dissenting views. These hacking tool promoters include former guests on the Goodman CSTT YouTube show.
  • 3. 3 The TYLER cult leader Quinn Michaels claims to be a former software programmer for NIKE in Portland, Oregon. He is often fond of displaying his programming skills in a variety of YouTube videos. Following his three operations for his collapsed lung in Roswell, N.M. (December 2017) Michaels began airing grievances on YouTube against relatives of his 14 year old son. Michaels has issued claims that his son (born out of wedlock) is being raised by a satanic cult in a supposed bunker in Oregon. These allegations have included vivid descriptions of animal sacrifices, plots to take over the world by his son’s in-laws, etc. Perhaps most troubling was a ”doxxing” incident when Michaels displayed all the social media accounts of his son and his in-laws (mother, father-in-law, etc.) to his thousands of YouTube followers. Michaels has openly stated that it was his goal to “destroy the lives” of his son and his son’s in-laws to preserve the integrity of TYLER. When YouTube curtailed his ability to LiveStream, Michaels took his followers “underground” to various chat room platforms. In apparent cult-like behavior many of Michael’s supporters have continued to remain loyal and have offered to help “destroy the lives” of the enemies of Michaels. i http://mindstalk.net/vinge/vinge-sing.html ii http://www.bbc.com/news/technology-30290540 Summary It is prudent to understand the emerging tactics of radical doomsday type cults that self-justify cyber-attacks on individuals and institutions. Such groups can operate at an intensity unfamiliar to those entrusted to protect critical infrastructure (C.I.). Key resources may be viewed as an obstacle to the fulfillment of the Singularity Event (S.E.). Adherents may justify a cyber-attack on such resources if they are seen as a threat to S.E. Development of Indicators of Attack (IoA) may be warranted for the C.I. protection industry. This is especially true for industries that may be viewed as controversial by such adherents. The true nature of “reality hacks” has yet to be fully determined. However, given the rhetoric of the TYLER group such reality hacks may include disruptions to banking and financial institutions, transportation systems and medical facilities. About the author A U.S. Air Force veteran, Dave Sweigert has received a Master’s in Information Security from Capella University and Project Management from the Florida Institute of Technology. He is also the author of “Cyber Warfare Response: Minimizing Threat Rigidity in Emergency management and Cyber Security”. iii https://www.nytimes.com/2017/06/15/us/port- dirty-bomb-south-carolina.html