BLUE DELTA INVESTIGATIONS, LLC

Identify   .   Penetrate   .   Neutralize

Cody, Wyoming

 

 

 

ASHLEYMADISON.COM & ESTABLISHEDMADISON.COM HACKING AND DATA DUMP

What we suspect is the true nature of this data hack dump.

by Guillermo D Jalil, MS

ASHLEYMADISON.COM AND ESTABLISHEDMEN.COM IS PART OF A WIDER HACKING WAR

Economic, trade, political and kinetic wars require the elimination of internal distractions within the country and within the minds of the players.  Likewise, it is advantageous for one to increase the internal distractions of an adversary.  At present, China and Russia are building their militaries at a rapid pace, engaging in currency wars, and facilitating trade wars.  The AshleyMadison data dump is likely an attempt by the Russians or the Chinese to maximize the internal distractions of US personnel, and encourage them to lose focus from their mission.

If the hackers wanted to avoid government investigators, they could at least removed the government and military notables from the data dump.  This endeavor would've been easy by simply deleting the .mil and .gov emails from the data.  They didn't.  The all inclusive release of the above data supports the hunch this was a subterfuge to the Americans, government employees and their home life, to introduce protracted distraction and conflict--and maximize internal distraction within the minds and homes of the affected personnel.

There are thousands of email addresses associated with government employees, politicians and military personnel that were released as part of the data dump targeting AshleyMadison.com and EstablishedMen.com.  Bank executives are also ensnared in the hack and dump.  15,000 of those emails were hosted on US government and military servers.  Others worked for the government in the UK.  We're talking TSA, NSA, the Attorney General's Office and Naval Intelligence, Raytheon defense co, IBM and the list goes on--and on.  This is an effective data bomb blowing up in the lives of the all-too-willing participants who never considered this consequences of their actions.

Another concern is the exposure of personal sexual preferences to the enemy.  Honey-pot arrangements and sexual bribery are harder to detect for lack of a paper trail.  Further, executives of business, banks and defense industries are easily targeted, enticed, and blackmailed; once their sexual preferences are known.

Just as money launderers and hackers like to send data between the hours of 1 pm and 4 pm to piggie-back on the large flow of information and funds funneled through the system,  the hackers possibly targeted US personnel by releasing everyone else's data as camouflage.  In other words, it's possible everyone else got data dumped to obfuscate the real targets.

Mind you that these people have government and military clearances.  Pics may be searched using google.  And PI's routinely search through these posts to gather evidence, as non paying members, and will pay for an account to engage the Subject in sexual texts, messages and traceable conversations.  A common PI trick is to download a picture of a sexy female and create a fake account to lure a Subject into a situation.  This is how evidence is collected, organized and used.  It's normal PI work.  And yet most people don't consider that when they post a profile, their spouse or a private investigator may be looking.  It is true that most men are simply stupid when they are aroused, and don't think about what they are doing.

Imagine your part of the Chinese People's Liberation Army(PLA), and you find this site.  You access the emails, billing address of the credit cards, the .mil and the .gov emails and the pictures!  Now the PLA has the pics and the sexual profiles of government and military personnel.  This is a "for instance" idea.  Do you follow?

Considering the behavioral typology of the Chinese PLA, it is likely this is a Chinese effort as a "distraction bomb."  This fits PLA conduct because they usually espouse some moralist point of view as they are enslaving their own people, or someone other group, in dark(secret) jails, executing prisoners, or harvesting organs of Christians using execution vans.  All the while, they talk about reducing corruption so they may be "moral."  Likewise, the hackers and data dumpers, involving AshleyMadison.com, are espousing morality as they publish the data; effectively dragging in US government and military personnel into their own distracting scenarios at home.  For the above reasons, the behavioral footprint appears to be Chinese. 

Remember this?  First on CNN:  US Data hack may be 4 times larger than the government originally said.  A data hack that the US government says originated from China may affect more people than originally reported.

And this?  Hacks of OPM databases compromised 22.1 million people, federal authorities say

And this?  Hackers Stole Secrets of US Government Workers' Sex Lives

And what about this just recently?  China and Russia are using hacked data to target US spies, officials say.

WATCH OUT FOR THE FOREIGN BRIDES WHO KNOW WHAT YOU WANT.

Those whom are looking for foreign brides online from Russia, China, or Venezuela better watch out.  If your info got hacked, and they know your sexual modus operandi, and you're seeking a foreign bride, the above is a recipe for disaster.  If this hack and dump effort, involving AshleyMadison.com was sponsored by Russia or China, they know all about sexual likes of their targets, and are able to tailor the honeypot accordingly.  They are sitting ducks, and so may the intelligence they carry.  It doesn't matter if the employee works for a defense contractor, the government or the military.  If the enemy knows the sexual preferences of particular military, government and weapon research notables, they can design and train any attractive agent to walk in and take control. 

This hack and dump may also serve the following objectives:

  • Point the blame of the previous attacks on someone else other than China and the PLA.

  • Obfuscate the intent, source and who is responsible.

  • Gather more information

  • Validate the information from previous hacks.

  • Prepare intelligence agents with competently with the proper sexual training to fill those sexual expectations of the targets involved.

If an enemy can target the family unit, that enemy can easily split apart the country one family at a time.  Just look at the United States now with the divorce rate and the corresponding problems.

There's one more concern here.  People could download the data dump, amend the files and repost adding the names and contact information of their enemies.  This is effective for character assassination; particularly when we're in the middle of an election.  In most cases, this information is kept quiet for later use.  The abrupt and public manner of this disclosure is to create imbalance, disharmony, conflict and distraction within the minds of US personnel.

PRIVATE INVESTIGATORS AND CRIMINAL INVESTIGATORS USE ASHLEYMADISON.COM,  ESTABLISEDMEN.COM AND CRAIGSLIST.COM

Criminal investigators use EstablishedMen.com and Craigslist to troll around for any prostitutes to bust.  Surely, no one here is saying there are prostitutes on EstablishedMen.com; but anything is possible.  In fact, any "adult services" section of many websites are visited by criminal investigators to tag and follow prostitutes, drug dealers and other persons of interest.

Consider how the participants of AshleyMadison.com and EstablishedMen.com posted their pictures online.  That's stupid.  Any PI, or a victim of infidelity, can simply sign up to search if their spouse has posted a profile. 

NO VERIFICATION OF EMAIL ADDRESS

AshleyMadison.com failed to validate email addresses.  This means that someone could easily input someone else's email address into AshleyMadison.com.  Someone could enter your email address in AshleyMadison.com right now without any verification.  In all honesty, people don't sign up other people's email addresses expecting a hack attack to blow it wide open to the public.  If the email address is listed with AshleyMadison.com or Establishedmen.com, then they are likely there because they were looking, fantasizing, or anything else.

90 PERCENT OF THE ASHLEYMADISON.COM MEMBERS ARE MEN

The AshleyMadison.com categories include:

  • Attached males seeking females.

  • Attached female seeking males.

  • Single male seeking females.

  • Single female seeking males.

  • Males seeking males.

  • Female seeking females.

Viewing the above categories and realizing that 90% members are male leads to the following possible outcomes or suspicions:

  • AshleyMadison.com is a fantasy website for men. 

  • The was often used by gay men more than straight men.

  • Female members dropped out after using the website, or after signing up.

  • Many members are manufactured or don't exist.

  • Female pictures were taken off the internet to create fake accounts.

  • The women who signed up for AshleyMadison.com didn't really use the website.

  • None of the above

 

 

 

If you would like to contribute to this post, please reach us at USA@BlueDeltaInvestigations.com.  Thank you.

 

 

 


 

ISSUES OF PUBLIC INTEREST     .      POLITICAL AND SOCIAL COMMENTARY

 

Due to a busy schedule and confidentiality issues, we are delayed in posting articles at this time.

ASHLEYMADISON.COM & ESTABLISHEDMEN.COM DATA DUMP DISCUSSED

 

 

PUBLICLY TRADED MARIJUANA STOCK/CANNABIS STOCK FACT CHECKING

 

Cannabis/Marijuana stocks are all the rage.  We decided to make a few calls and to see what's real.  Inspect what you expect. 

CHINA & RUSSIA

POLITICAL & ECONOMIC, PERSONAL AND PUBLIC SECURITY

PERSONAL

FOR PRIVATE INVESTIGATORS LICENSED IN FLORIDA:

ENTERTAINMENT

FUTURE POSTINGS

  • OTG Financial Reporting and what it means to institutional financial reporting

  • Basics on protecting your patent from pirates

  • Interpol and fugitive tracking

  • Cults in public and private institutions

  • Hacking, Anti-hacking digital signatures