code name
MM1 0
Kasen 0
MarketOther 0
Helper 19
Lan 3
streetwise 1
domain 1
mother 1
signal 0
spacesea 0
noclist 0
Egypt 2
Bman 1
dancer1 1
dancer2 1
musicstoregrey 1
musicstoremop 1
chipteeth 2
editorsp 1
watchgame 1
blachat 1
greysmall 1
pointandshoot 1
cameragate 1
walkaway 1
dogwatcher 1
familyman 1
familyllv 1
tunisiaitaly 1
Retrubution Day
The day of retribution has been forwarded as the demand for reprisals
has escalated. Retribution wil happen as follows:
- The public will reject vises of the financiers
- Public will supress devices of the financiers
- Corrective measures will be forced into practise
The NSA is a vise for the financiers and will be held accountable.
Retribution will be conducted similar to the Cuban rebellion cue
of Castro. There will be victims on both sides but given the numbers,
the publicc will prevail. Several NSA opperatives have taken a proactive
step to issure their survival through the ordeal. This is an oppertunity
for you to take the nesscessary steps to insure your survival.
NSA management are in communication with key persons in the public.
They want to insure that when retribution occours that they are
not lumped into the group with the others. This is a wise strategy
asnd any agent weather junor or senior can participate . If you
are unsure of the orders you are recieving then hedge your bets
and register with the public in order to avoid prosecution and any
death sentence. Those that are registered with the public are safe
from reprisals and will be vindicated.
NSA, CIA, NASA agents will register with the public but will avoid
any association or detection from their organizations. The public
use encrypted 256 keys that will be associated to each agent. 256
bit keys are 256 randomly generated numbers that represent an agent.
Names are never used. Each agent creates the random 256 characters
and sends this code to the public. The agent will be addressed by
the first 16 random characters. For example:
thebeartree588324ujjdgfnlkrejljewru409urlkhfrekjlkj98989089jujlkjlkjou90jujhouuo
silentrunner2340-399069873984759834753984053984753984753984759832093840928134989
These keys codes will be shared by the select few public that share
a databse log of keys. each agent will be associated by their key.
All actions conducted by the agent will be associated to the key
code. Agents should remember their key code. On the day of retribution,
those agents that match their key codes will get a pass. Key codes
are only revealed on the day of retribution.
Submit your key code: Once any level agent creates their own key
code they send that code to one key person from the public. They
can send it electronically, through audio, visual, or any other
means. The agent does not have to physically be present in the handoff.
They just have to be sure that the public have recieved the code.
The public will acknowledge the reception by posting the first 16
characters of the code online. The rest of the code will remain
secret. This key code will save your life and the life of your family
and friends. Do not let anyone have this code nor should you share
it.
Fill up your account: Once the key code has been registered and
you find your 16 bit code name on the website then its time to fill
up your account. This will determine your validity to the public.
actions taken to assist the public will all be associated to that
16 bit code name. Each action will be recorded into a log databse.
each action builds your case as a supporter of the public. The more
actions you have that support the public, the better your chances
are on getting a pass on retribution day. Each action conducted
by the agent should be followed by the reveal of your name code
(16 bit) . For example:
- Warned public member of plot. thebeartree
- Revealde monitoring of computer. silentrunner
- disable radio wave abuse for 1 night. silentrunner
- reduced radio wave pulses on public member one night. thebeartree
- Removed surgical implant. sielentrunner
- removed toxic gas in room a. silentrunner
Once an action is conducted, follow up the action by revealing
to the public member your code name. The public member will detect
the change in abuse or the change in fortune, or the change in rutine
and give your code name the credit. The database of actions for
the public will build therein giving you a pass on retribution day.
On retribution day you will reveal your code name and entire key
code to a key public member. any prosecution on the agent will be
dropped. Any exicution of family members or the agent will be dropped.
You have successfully created a hedge for your survival. You have
avoided the firing squad and saved the fortune of your family without
alerting your employeer. You are one of the fortunate ones as many
of your colleagues will suffer dearly. One simple action will save
your life and the life of your family. Your insurance policy is
set in. This offer is not just reserved for secret service management
but any agent who wishes to secure their future. Either way you
win, wether the public wins or the financiers win.... you win.
The list of code names will be posted on several websites including
www.bookham.press/codename.html . after an action is recorded in
association with your codename, there will be a number beside your
name to incrament how many entries there are. For example:
thebeartree 1
silentrunner 4
Agents should build up their scores. Agents should never tell other
agents their code names. If you feel that you want to save one of
your fellow agents then direct them to this website which will provide
them with instructions. www.bookham.press/codename.html
Currently I am accepting keycodes. agents who approached me with
key codes will be acknowledged but not revealled. This is a professional
and scripted transaction which I've done before. I will only acknowledge
you as a random person and nothing more. Do not tell me any additinal
information of any sort. The interaction should not last more than
seconds. For example:
- agent picks up a paper from the ground and says I dropped the
paper. I will accept paper and say "thank you". The interaction
will be over.
- agent asks for directions and shows map with key code. Key code
will be recorded and I will say "you're welcome". The
insteraction will be complete.
- agent slips key code in clothing. I place jacket on and notice
key code. I record key code.
- agent sends audible wave at super market. I stop and record the
audible key code.
- agent sends electronic key code in email advertisement with key
word "dependents A"
- agent plants key code on super market product which I purchase.
Key code will be recorded.
Try to incorporate key word "dependants A" into the interaction
for public members. I'm skilled enough to detect an interaction
without the signal word.
Sending the signal after a task has been completed. You have to
be descrete. I am informed of the NSA tactics and am skillful enough
to determine when they are changed. Send your code name after this
event has taken place. I will open up more venues to send signals,
for example:
- twitter response to picture: "nice camera angle. sr"
sr means silentrunner
- email subject dependants A: "download the latest..... tbt"
tbt means thebeartree
- associate your actions with a random audio sound like a car horn.
car horn means silentrunner
- associate your actions with a bump into event at the super market
then rub your nose. nose rub means thebeartree
- agents responds to date stamps of times when actions took place
via paper
Agents operate autonomously when on assignment. their actions are
not closely monitored and there are many loop holes or chances to
pass on information to public members. Agents dont track agents.
Management has a level of trust with peon agents. This loop hole
will be your oppertunity. Dont approach me in an area that has been
setup for monitoring like common stops. I will randomise my locations
on a daily bases. Take the opportunity with me or the other public
members that are recording code names. Currently public members
outnumber the amount of deployed agents so finding a public member
will not be difficult. As an agent you will direct the interactions
and I will say little to no words.
|