Sunday, February 1, 2015

Piercing the Government Veil

John Robb had an interesting article I just read about piercing the corporate veil and Sony in relation to their 'hack'.

 Why the Sony Hack Worked
The Sony hack worked.  It did the job it was intended to do.  It coerced a major corporation and its corporate partners into changing their behavior.  
It's a good example of a type of attack we are going to see much more of.
However, it's important to understand why it worked so well.  It wasn't due to:
  • its sophistication,
  • the damage it did to Sony's critical systems, or
  • the amount of money it stole.
It was effective because it went after employees and business partners as individuals.  
It was effective because it pierced the corporate veil by personally attacking every employee at Sony (and some of their business partners).

Now think about the same technique applied to the miscreants in your part of the world...

More recent examples:

A Sipsey Street Public Service Announcement: The Connecticut Tyrants List, voluntarily subscribed by the participants on 3 April 2013.
The state of Connecticut is making lists of firearm owners to raid. It seems obvious to me that it is thus only fair to list those anti-constitutional tyrants who will have blood on their hands the moment the first Connecticut citizen is shot by the CT state police while carrying out their orders. I will be sending these folks my own email later today.
CT State Senators voting Yes on "An Act Concerning Gun Violence Prevention and Children's Safety, also known as Public Law 13-3 or Connecticut Senate Bill No. 1160," 3 April 2013. List includes home addresses. Photos and home phone numbers of these tyrants are available here:

Historical examples:

 Now I am not advocating for the Vietcong Model.  I find the Vietcong abhorrent.

However one should have a grasp as to whom and what we are going up against.

The Sony incident shows that objectives can be achieved without firing a shot.

Another thing you need to understand as to who exactly is in charge of the current regime.  Its organizational methods and methods of advancement. 

For example here is just one bureaucrat.  This person is heavily involved in the communist movement and has used entry-ism techniques to gain power.

Dinah Leventhal

Jump to: navigation, search

Dinah Leventhal
Dinah Leventhal

DSA member

In 1991, Dinah Leventhal was Democratic Socialists of America Youth Organizer.[1]
Her term finished in June 1991[2]
That year, Leventhal married Patrick Lacefield. At the time she was working for a "progressive Maryland state senator".[3]


  1. Jump up Democratic Left, Jan./Feb. 1991, page 9
  2. Jump up Democratic Left, March/April 1991, page 2
  3. Jump up Democratic Left, Sept./Oct. 1991, page 23
or this guy

Carl Davidson is a Pennsylvania based acivist and member of the National Committee of the Committees of Correspondence for Democracy and Socialism.

Early life

Carl Davidson grew up in the small town of Alaquippe, Pennsylvania.

Early activism

Davidson participated in the Mississippi Freedom March.

Students for A Democratic Society activism  

One needs to think now days as information itself as the weapon.  This is why the other side is vacuuming up every scrap of information they can due to the following reasons:

1 Information is money.  Corporate espionage on a national governmental scale
2 Information is power.  The ability to blackmail any elected representative
3 Information is tactics.  The means to find any person of relevance in the world
4 information as the payload.  Info dumps are in themselves have been used as weapons.  

Sony, or Wikileaks are refined examples of methods that were more crudely done in the past.