Doxxing the Puppet: Evidence Drop 1 (Torture Incident)

What are the three clues you took away from the Preface? If you found them, you now likely know who the hacker is at the center of this story. If not, this new evidence drop will help.

For this drop our hacker and suspect both refer to a human rights incident that occurred more than a decade earlier in a faraway land to which there appears no obvious connection. Now, why would he/they do that?

You see, one part of this particular hacktivist’s troubled psyche is self-righteousness, another a deep desire for fame, glory, and admiration (different drop), a need for control is in there taking up valuable space, and yet another part storing up the long, very detailed list of adolescent traumas (yet another drop). Bring it (and other evidence) together under the mystique of online anonymity and zap it with the steady current of a fully charged laptop and you get a cyber Frankenstein. As to avoid literary and theatrical appropriation, the politically correct term to use is hacktivist.

By definition, a hacktivist is a person who uses computer knowledge, skills, and abilities in a manner they deem appropriate in support of a political or social cause. Depending on your own perspective of things going on around you or the world you may view them as a black hat (malicious intent) or white hat (positive intent) hacker. These are too clinical in nature and don’t do justice to the complexity of personality behind a person hell bent on imposing their beliefs, will, and sub-surface pain on the world.

Have you ever met a person at a party who went out of their way to make sure you and everyone else knew they were a global citizen; that they were a person whose concerns were worldly? You know they type. They know you will be better off with the wisdom they expound.

It is not unusual for those with the highest opinion of themselves, loudest voices, and the most righteous messages, to be fighting unseen forces whispering to their psyche. These forces can lead them to become very opinionated and highly motivated to act. The righteous voice is often passionately delivered from behind a podium whereas the righteous actions are cloaked in anonymity. How do you fight for good when you yourself violate laws to perpetrate your vengeful crimes? How do you justify criminal activity in the name of justice? How to you balance the noble words coming from your mouth with the poisoned keystrokes dancing from your fingertips? How indeed.

During the final days of the 2001 G8 summit, Italian state police and Carabinieri raided the temporary political headquarters of two anti-globalization, anti-capitalism organizations collocated at and near the Armando Diaz School in Genoa, Italy. The attack resulted in the arrest of nearly 100 protestors who were taken to a temporary facility where they were tortured and humiliated. A trial of 125 policemen charged with brutality was undertaken, however, there were no convictions since torture was surprisingly not illegal at the time.

Our suspect was only 18 years old at the time of the Diaz incident and living in pre-Internet U.S.; thousands of miles away from Genoa. How then would our suspect come to learn about the attack? Why would our hacker reference it? How will these remote points connect?

In 2012 the film Diaz — Don’t Clean Up This Blood was released. The film covered the Armando Diaz School attack and torture. The Italian made film released in only two markets: Berlin on February 12 and Italy on April 13.

Doxxing the Puppet: Evidence Drop 2 (Torture Incident)

As it turns out, our suspect was in Berlin at the exact same time the movie was released. But, alas, Berlin is a big city and a film on human rights wrongs is not something the masses necessarily rush to see at a corner cinema; however, for those who are passionate about the topic then news of this film’s premier would spread quickly.

As the film’s drama poured forth on the big screen and our suspect watched the horrors of this incident it likely reinforced our suspect’s disdain for law enforcement given he previously admitted the police failed him following his father’s murder. As you’ll learn, the trauma of his father’s death is not alone in the troubling events that have created a person whose suspected crimes extend beyond the online realm and into “real life”.

The last drop of glue connecting this yard of evidence yarn occurs in 2014 when one of our suspect’s social media accounts was the sole account mentioned in a post regarding the incident. Who is the “merry” Italian Marxist behind the post and what is the nature of the relationship that created yet another tie between the suspect, the torture incident, and the hacker?

Are you hot on the trail? Do you know who the hacker is? Do you have a suspect?

Cyber Security Consultant & Researcher