Wednesday, 21 March 2018

Blogger Biography

Ryan the Whistleblower

Ryan in 1997
In the early 1980's computers were all about giving users the tools and resources to do their job better. Fast forward nearly 40 years and there are now record numbers of jobs displaced by technology and almost unbridled use of computers to psychologically manipulate humanity. I take my share of the blame for serving to get to this sorry place and all I can do now is hold up my hands and apologize and help those who are increasingly becoming the targets for such attacks.

I am very determined to try and turn the tide of computer misuse that pervades our world today.

To expose the coercive forces behind the hijack on human consciousness, tricking humanity in to  self-imposed-enslavement by conjuring and perpetuating fake fear and hope realities and by using ever greater proliferation of artificial intelligence(s) to integrate with it's own self-serving alien consciousness.

Biography



British media researcher with a background demonstrating how fake news, bad social media actors and hypnotic technology can be used to exploit user perception for corporate, political or criminal gain. See captology.stanford.edu

His expertise combines the practices of public relations, IT security, industrial espionage, social engineering and competitive intelligence.

Today, operating as a whistleblower he advises on threats and counter-strategies for protecting the general public and institutions from hijack and fakery by governments, corporate sponsors, the media and criminal groups.

--

Stephen's career started in computer networking in the early 80's, with the advent of the IBM PC.

He was Head of PC Systems Development at Hiscox, Head of Mobile Development at Capita Mobile, Head of Development at Codemasters and Head of Identity Products at BBC New Media. He also worked with Microsoft Research on Netscan tools for data mining social cyberspaces for detecting criminal intent in online communities.

He was a co-founder and CEO of Dotcom Internet Software in 1997, the worlds first social network 'honeypot' for attracting and mining bad actor behaviour from data contributed.

Ryan launched Website Wizard "Build-A-Social-Network-Online" from an office in Smeeth, near Ashford, UK in 1999 with his other programmer colleagues, Christopher Neal and Clive Hawkins. Website Wizard expanded rapidly, reaching 100 hundred thousand users by 2000.

During that time Ryan was able to study his members behaviors and identified a number of criminal groups, including cocaine dealers, state anarchists, gun sellers, prostitution agents and many others.

In recent years Ryan built a database of threats to the general public from bad social media actors and exposed fake news activities on Facebook. He also infiltrated ISDARK.com, an invitation only forum based in Argentina targeted at exchanging hacked subscriber databases and discussing how to hijack political elections and international brands. The forum was subsequently seized by the authorities.

He consulted as an Attention Engineer with IBM Research in Hursley on persuasive technology for Goldman Sachs on B2C projects.

Since 2001, Ryan has worked as a design team leader for FTSE100, UK Government and the BBC and has supplied data mining code to shepwayvox.org, a news organisation investigating financial and political fraud on The Panama Papers.

Other research and responsibilities
1. Chair of bbc.co.uk SSO Membership DB Under 16's data protection & policy committee
2. He built on Codemaster Founder Richard Darling FADE anti-piracy concept by designing remote distress code into games to call home and injecting ads when they were copied and was a Member of the European Leisure Software Publishers Association (ELSPA) Anti-Piracy Unit.
3. Utilize the services of hacker communities to falsify Channel 4 Big Brother house Poll
4. Utilized botnets to test exploit of online beauty competition poll
5. Blackhat SEO poisoning tactics and defrauding Google Adwords and Adsense
6. Trust hijacking - injecting ads on authority websites and creating false brand associations
7. Creating armies of collaborating fake personas on social media sites
8. Utilizing subtle parody on conspiracy websites to disrupt anarchistic campaigns

Handle = rudyvise

Key phrases = misuse of computers via dark algorithms; dark algorithms elicit emotions to exploit human perception, dark content payload vehicles are phishing, adware and spyware; use of technology to hijack attention, attention engineering precedes payload deployment; whistleblower of computer misuses by organisation backed actors; Ryan is counter-dark-content-design-specialist. Ryan is a dark content investigator.

Monday, 12 February 2018

All belief is a box on your head.


Brand Killer Robots reveal:

All belief is a box on your head.

If you believe.

The Matrix has you!

Saturday, 6 June 2015

Digital identity is the reflection of you in cyberspace




Identity lay in data!
When your fingers crack across the keyboard, you are forming patterns online, these patterns are your digital identity, perhaps used to track you, perhaps used to assess you, perhaps used to defraud you.
Wherever your fingers on the keyboard (or mouse) take you, you are at the same time leaving a trail of you, a trail that can lay there for as long as the data is stored.
Your activity online creates a kind of persistent you!
Commercial retailers can get to know you by reading this data so they can contact you in a way that is much more personal to you. Perhaps to sell you more of the things you like, or to influence you to buy things you didn't know about or like.
Criminals can profile you such that they can identify your weak points and exploit your vulnerabilities, whether this be physical, virtual or both.
Your digital Identity is your unique digital fingerprint.
Yet, do you know where it is and what is out there about you in Cyberspace?
Perhaps your digital identity has become distorted in some way and you don't know it. Perhaps it has been captured and being used in some kind of crime.
Without in-depth technical knowledge and substantial access, most people will never appreciate just how vulnerable their digital identity makes them.
Digital identity is the reflection of you in cyberspace
I hope this brief article gave some food for thought.

Tuesday, 7 April 2015

Brand Killer Robots say thankyou to readers!

Just to say a big hello and thank you to our readers for your very interesting emails and comments. We thought we'd compile a list of some of the most well known brands and institutions that have visited this blog to read numerous articles. Please do keep coming back and let us know what you think.

Brand Killer Robots


This is a sample list of Brands and institutions who visit this blog.
The Pentagon
U.S House of Representatives
Goldman Sachs
U.S Government
U.K Cabinet Office
Microsoft
IBM
BBC
Synetrix Holdings Ltd
Commercial Properties
Disney
Performance Systems International
Mediaworks
Embark Corporation
Mccann-Erikson
JP Morgan Chase
Proctor and Gamble
Pfzier
Lockheed Martin
Cargill
Codemasters
Development Dimensions
Haymarket Publishing
Jessup & Lamont
Medtronic
N.A.S.A
Polo Ralph Lauren
Rohde & Schwarz
Ticketmaster
Checkpoint
Bose
BSkyB
Hathaway
Netscape Corp
Google Inc
Nat West
News International
Ogilvy & Mather
Stanford University
Willis Caroon
Vodafone
Apple Computers
University of ????? in the U.S, Europe and UK.
Finanical Times
ITV
American Express

Just some of the many brands and institutions that frequent Brand Killer Robots .

Sunday, 11 January 2015

Charlie Hebdo : Black Hat or White Hat Agent Provocateurs?

Brand Killer Robots reveal::


An agent provocateur is a person assigned to provoke the awakening of a new order within a group. This assignment can be either covert or overt and predominately represents the interests of others, outside the group.

Agent provocateurs can be found in the secret intelligence services, business directorate, politics and the worlds media.

Agent provocateurs can be classified in two camps.

1. Black hat
Black hat agent provocateurs seek to undermine and crush the free will of the target. Black hat agent provocateurs will step outside ethical boundaries to get the job done. Black hat agent provocateurs will take personal risks to get the job done.

2. White hat
White hat agent provocateurs seek to uplift and redirect the free will of the target. White hat agent provocateurs will only ever work within ethical boundaries to get the job done. White hat agent provocateurs will take personal risks to get the job done.


Agent provocateurs are experts in the art of subversion.
Agent provocateurs are sponsored by government or business, usually on temporary assignment - such is the nature of the job. Their work is rarely accountable to anyone else but them.


What camp do you think Charlie Hebdo fit into? Black Hat or White Hat!
You Choose!