By 2014, the majority of Lulzsec members had been arrested, charged, and sentenced; 13 out of 14 members of the PayPal 14 had pled guilty; the U.S. courts handed down a crushing 10-year sentence in Jeremy Hammond’s case; and Barrett Brown was arrested and served almost five years in prison.
After leaking a trove of documents on U.S. surveillance in the spring of 2013, Snowden was forced to remain in Russia. Assange was granted political asylum in a tiny room within the Ecuadorian embassy in London the year prior and three months before Hammond’s sentence, Manning was sentenced to a devastating 35 years in prison.
And yet, despite all of this and hot off the heels of Sabu, members of Anonymous inexplicably decided to jump into bed with U.S. intelligence.
Operation NO2ISIS and #OpIceISIS
According to Twitter Advanced Search, as early as June 24, 2014—less than seven months after Hammond was sentenced to 10 years in prison—the hashtag #OpISIS appeared on the social media platform in connection with Anonymous. I’m sure a multitude of Twitter accounts have since been deleted or suspended, however, based on those that are still active, #OpISIS was definitively being used by accounts that identified themselves as Anonymous such as “AnonGhostTeam,” “an0nymousbl0ke,” “MissAnonymous32,” and “AnonLORAX” during this early time period.
That week Anonymous declared what I would describe as their first cyber war against ISIS. The media reported that in response to one of the collective’s Twitter accounts, @TheAnonMessage, getting hacked by ISIS, they started “Operation NO2ISIS.” However, a simple Twitter search shows that this was not an original Anonymous operation.
The “NO2ISIS” campaign started on June 17, 2014, and at no point was Anonymous ever mentioned. In fact, the initial campaign appeared to be “No2ISIS Yes to Iraq,” and Vice was the only one who seemed to report on the situation accurately (with emphasis):
“…a hashtag belatedly emerged in Iraq in June—#NO2ISIS—to combat the aggressive ISIS social media campaigns. The hashtag also seems to be the inspiration behind the Anonymous name for its operation targeting IS supporters.
Right. Anonymous was “inspired” by the hashtag, they didn’t create it. On August 31, 2014, the second Anonymous war against ISIS was declared and according to FRANCE 24:
“Wearing the group’s trademark Guy Fawkes mask and with his voice digitally disguised, one member of the loosely coordinated network of activists explained the reasons behind the social media campaign…
‘We took this initiative in order to establish two things…One: We needed the public to understand how urgent the situation is in Iraq. Before the mainstream media took serious direction in reporting the ISIS threat, we were one of the first to communicate it to the masses via the video we uploaded on YouTube in June explaining how and why ISIS came to be.’”
The link in the FRANCE 24 article for “the video we uploaded on YouTube in June” was the same video that the @TheAnonMessage account released previously. However, between the first and second declared war (my words) against ISIS, some members of Anonymous effectively disowned @TheAnonMessage account for posting misinformation and sending out a press release to the media with weak security. According to The Atlantic, one of the media outlets that received the press release:
“TheAnonMessage had threatened to release the disclose [sic] the identity of the Ferguson police officer involved in the Michael Brown shooting on Twitter if the Ferguson Police Department didn’t do so first. The wrong name and photographs of the officer were released and the account was suspended by Twitter. It turns out that this e-mail was the final straw.”
Because the lengthy response to @TheAnonMessage’s actions from other members of Anonymous is pretty hilarious, I’m posting it in full (via theatlantic.com):
Citizens of the media,
TheAnonMessage is what is commonly referred to as a “namefag” within anonymous. When you have someone so full of themselves and with the ability to gain followers, their ego tends to overshadow their common sense. Please know that there are much more astute people within the ranks of anon who bring all manner of talent to the table. They do it as the name indicates: anonymously. They do not seek celebrity and typically abhor personal attention. Also, anon does not broadcast their email addresses publicly.
This, my friends, is proof of how just one person flying the flag of Anonymous can fully discredit an entire movement. See how I simply I could have replied all? I now have all of these media emails; not that I care to do anything with them. It’s yet another mistake that could have major consequences made by this one individual that is pretending to be the voice for the collective. Some anon… can’t even keep his contacts hidden from each other. Thanks for making everyone look like fools yet again, TAM. One of the first things we learn as anons is that our security is only as strong as our weakest link. TAM has proven to be the weakest link yet again. For the record, bonehead, we BCC our addresses, such as I have done here. Better yet, use a proper mailer… and stop using Microsoft email. Your email password is probably anon1234 like it was on your Twitter account.
TheAnonMessage: This call to action is yours and only yours. You release that tripe. No one else on this list is going to give a damn about another robot-voice video with the same tired spinning globe and video clips ripped from the very people you’ve emailed. They aren’t going to give a damn about anything else that you say, for that matter. There’s not a single new bit of data in this video, it is regurgitation of old news. It should be taken for exactly what it looks like: Nothing at all. Were OpFerguson to reach out to the public, we would do it on our own, and without begging for mainstream media attention. This video should rightfully be ignored. The only good thing about your message is the attached Pastebin with locations for people to meet in solidarity.
heAnonMessage [sic], stay out of #OpFerguson. You have done more than enough damage. Stop making it look even more foolish. I spent five hours talking to the media about the mess you created. I voted against your release of the information, I asked you directly if you were 120% sure, but you just pissed yourself with excitement and went with it anyway. No more. Go play with your My Little Ponies or whatever it is you do when you’re not busy crying about losing your Twitter account. Leave intel to the intelligent people.
Speaking of Twitter, whatever happened to this? “I have therefore decided to step down and completely expel myself from any collective associated with #Anonymous.” https://twitter.com/TheAnonMessage3/status/500857312731729920 Yet here you are.
TheAnonMessage, please remove your associations with Anonymous. We don’t want you. In the meantime, the rest of us are working toward real action and change.
Several people you pissed off
With that said it’s unknown (to me) if Anonymous’ first two calls to take up cyber arms against ISIS were legit in terms of the majority of the collective supporting and/or taking part in them.
What I do know is that Jester had been fighting jihadists since 2010, and during the very early days of Anonymous jumping into the same ring, a Twitter user named “SheliJ,” who seemed to consider Jester (@th3j35t3r) her hero, was also becoming a high-profile figure in the “ISIS slaying” community.
Exeintel, SheliJ, and the Feds
As online activism against ISIS increased, two private intelligence firms emerged, one of which was Counter Global Defense. Jaime Chanaga founded the company on September 10, 2014, two years after he founded Umbra Systems LLC. According to the U.S. Trademark and Patent Office, Umbra Systems owns two trademarks: Secure Suisse and Exeintel. Secure Suisse is apparently both a “online privacy services and cybersecurity services” firm and an email hosting service in Switzerland (via SecureSuise.ch).
As for Exeintel, if you’ve been following Buzzfeed News, the name probably sounds familiar. According to Ken Bensinger and Jessica Garrison:
“On the afternoon of Oct. 7, 2020, a Twitter account known for right-wing trolling issued an enigmatic warning: ‘Don’t worry Michigan I told ya A LOT more coming soon.’
The account, @ravagiing, provided no further details, but just hours later, the FBI executed coordinated raids throughout Michigan, arresting nearly a dozen people it said were involved in a plot to kidnap the state’s governor, Gretchen Whitmer.
The next day, after the alleged plot had made international headlines, the account tweeted again: ‘I told ya ahead of time, Michigan.’ And, indeed, @ravagiing — whose Twitter bio describes the individual or individuals as CEO of a cyber intelligence firm called Exeintel — had been dropping hints for months. ‘Soon….MICHIGAN Soon,’ the account tweeted on Sept. 24.”
This wouldn’t be such a big deal had it not been for the fact that records show Jayson Chambers, an FBI agent who acted as a handler for at least one of the defendants in the Michigan case, owns the company, Exeintel—the same company that @ravagiing a.k.a. “SheliJ” allegedly headed up as CEO.
According to BuzzFeed, neither the FBI nor Chambers would comment on the story and the “identity of the individual or individuals behind the @ravagiing account could not be ascertained.”
“Chanaga offered no explanation for why his own company, which owns the Exeintel trademark, is registered at the same rural New Mexico address as the Exeintel LLC registered to Chambers. Chanaga promised to send answers to additional questions in writing, but never did.”
That “rural New Mexico address” is located in Rio Arriba county on a property that appears to carry two different addresses. Both have the same owner, both can be found on the Rio Arriba GIS Data Map, but one of the addresses doesn’t seem to exist in Rio Arriba’s other databases. Is it possible I used the county’s search pages incorrectly? Sure.
Southwest Documents Services, Inc. appears to be run out of the address that only registers on the GIS Data Map although a Google search returns CT Corporation at the same address, as well. And for what appears to be a small company operating out of shanty town Espanola, New Mexico, another quick search brought up at least five companies tied to that address, all of which have CAGE codes.
There’s also a crime cleanup company linked to it so that’s super fun. As for the trademarks, Exeintel and SecureSuisse, they’re registered to what appears to be either a non-existent address in Plano, Texas or a UPS mailbox.
@Ravagiing (SheliJ) is, or was, a fashion model for a company called Pain vs. Guilt. She’s used at least a dozen different names and handles on Twitter and is well known in certain circles as an ISIS hunter of sorts although Barrett Brown’s description might be a little more accurate:
Indeed, even BuzzFeed noted that her account is followed by Michael Flynn and that Exeintel’s intelligence “has been publicly cited by conservative journalist Andy Ngo” (see also “How Andy Ngo and Sections of the Left Teamed Up to Successfully Work for the Home Office“).
Aside from what appears to be an FBI agent funneling case file information to an online, far-right, ISIS slaying, maybe Nazi-porn fashion model in order to boost his private company’s profile, BuzzFeed also reported that emails and encrypted texts they reviewed “show that Chambers, as far back as 2015, appeared to be in direct communication with individuals who described themselves as ISIS hunters, seeking information about the online activity of suspected terrorists.”
Read that again. It was no secret that by mid-2015 members of Anonymous were feeding information to certain individuals tied to or working directly for U.S. and foreign intelligence, but therein lies the difference. What was a secret up until a month or so ago, was Agent Chambers lurking around the #OpISIS scene back in 2015, and in direct communication with “ISIS hunters”.
Sure, this kind of arrangement works in favor of the FBI but within an activist and/or hacktivist community, it’s one thing to be fully aware of who is working with the feds but it’s quite another to have a fellow member of the community hide the fact or not explain fully who they were involved with, and that’s exactly what happened in the WikiLeaks support community with at least one member of Anonymous.
@AnonScandinavia, a Twitter account that I firmly believe Ray Johansen has access to (they denied it), once told me in Twitter DMs that they used to be “a member of a group that chased DAESH and Pedoes,” and that the group was headed up by their “friend,” SheliJ. This isn’t terribly surprising due to the fact that @AnonScandinavia (under their former handle @AnonScan) was playing “ISIS slaying Nazi Porn” with her in 2016, if not earlier.
First of all, yes, @AnonScandinavia can be friendly, informative…and very, very manipulative. And, like some of their close associates, they are a carbon copy of Suzie “victimhood” Dawson. For instance, the account will privately tell you ad nauseam that they’re being “attacked” by U.S. intelligence, their servers are being targeted by the CIA, or they have to “go dark” to protect themselves from spooks and feds. Insert eye roll…
So, they act like they’re a high-value target for U.S. intelligence but in reality they’re either bumbling idiots that couldn’t figure out what @Ravagiing a.k.a. SheliJ was doing in her free time or they openly embraced her arrangement with the FBI. My money is on the latter due to the fact that they tried to sugarcoat working with the same people who put Hammond away:
Yeah no. Feeding information from your own operations to U.S. intelligence agencies, one of which deliberately set Hammond up and then locked him away for ten years, is considered working with U.S. intelligence. This isn’t rocket science and if you come across anyone in your activist circles that tries to convince you otherwise, run.
@AnonScandinavia, who now spends their time online promoting Beth Bogaerts’ astroturfed face, was so obsessed with the far-right ISIS slaying queen that they still use the same sayings and hashtags that she used such as #TinyTroll, a fairly obscure hashtag that Bogaerts has also used since at least 2017.
As recently as December 2021, @Anonscandinavia used this saying that appears to have been first used within #OpISIS circles by SheliJ (first used, not originated):
Oh look, Loopy Louise:
It even appears that @AnonScandinavia designed their logo after Exeintel:
AnonScandinavia’s “Following” list on their old Twitter account (which was conveniently shut down after I started publishing The Rabbit Files) was also a who’s who of SheliJ-obsessed followers and fellow ISIS hunters. For instance, below you can see one of SheliJ’s account’s (“Beast” with the handle @OSweetSavage) and the company she modeled for, Pain vs. Guilt.
The others circled in purple were avid followers of hers like “flyboy65,” “RazorWolf77” (which sounds like a sock account of Johansen’s), and “AnonyMissy,” or @MissyGH.
Make no mistake, as late as April 4, 2019, on the same exact day that FBI Agent Chambers filed the company, Exeintel—the same name and filing location of the “Exeintel” company that SheliJ headed up as CEO—@AnonScandinavia told the world that they were still associated with her.
Did AnonScandinavia Deliberately Hide the Fact They Might Have Been Working With the Feds (“With” Not “For”) ?
Then there are the people @AnonScandinavia followed who work directly with U.S. intelligence before we knew that SheliJ was doing the same (thanks Buzzfeed!).
Rita Katz, for instance, is the founder and CEO of Site Intelligence Group and it’s not hard to find records that show they received contracts worth over $1 million from the Canadian Department of National Defence and the Privy Council Office.
They’ve also received at least $2.5 million in funding from the U.S. government:
And they still have open contracts with the U.S. For instance, last year they were awarded over $200K for one contract, and another one, awarded on October 20, 2021, was described as “Expert witness services, terrorism…expertise in the field of monitoring terrorist and extremist groups online activities.”
The Twitter account circled next to Rita Katz is @RaijinRising, head of Ghost Security Group, a group of Anonymous members that left the collective to work with, not for, intelligence agencies in a legitimate capacity.
According to what the @AnonScandinavia account told me, SheliJ’s ISIS hunting group wanted to “monetize the efforts” so they left in the summer of 2017, because “Anonymous does not operate that way.” At no point did they ever mention any concerns about SheliJ outside of monetization nor did they warn me about her despite the fact I had been in contact with them for months while they’re were still working with her.
And yes, @AnonScandinavia is welcome to claim ignorance as the laughably incompetent hackers they must be, but they themselves admitted publicly that they knew hackers were feeding intel to the U.S. government and they sugar coated it. Would they have been terribly bothered to find out Sweet L’il Savage was feeding FBI Agent Chambers? Probably not.
The point being is that I’m not aware of @AnonScandinavia ever warning a single Assange supporter about SheliJ or stating, “Hey, we might be working with the feds.” Sure, the people they followed on Twitter weren’t hidden but when you’re a newbie Assange supporter, you’re not a hacker, and you’ve never followed #OpISIS, how would you possibly know who SheliJ and others were?
It’s unclear if and when SheliJ/Chanaga started working with Chambers or which “ISIS slayers” Chambers was communicating with by 2015. No one’s talking, including the FBI. But even if SheliJ wasn’t working with Chambers when @AnonScandinavia was busy licking their computer screen over far-right ISIS slayer porn (they claim it was all ISIS hunting-related), there’s more to come on this subject and what they were involved in doesn’t get any prettier from an activism standpoint, especially within the hacktivist and WikiLeaks community.
Disclaimer: Ten thousand more pages of disclaimers to follow.
If you were mentioned in this article because your associate(s) did or said something stupid/dishonest, that’s not a suggestion that you did or said something stupid/dishonest or that you took part in it. Of course, some may conclude on their own that you associate with stupid/dishonest individuals but that’s called having the right to an opinion. If I’ve questioned something that doesn’t make sense to me, that’s not me spinning the confusing material you’ve put out. That’s me trying to make sense out of something that doesn’t make sense. And if I’ve noted that you failed to back up your allegations that means I either missed where you posted it or you failed to back your shiz up.
If I haven’t specifically stated that I believe (my opinion) someone is associated with someone else or an event, then it means just that. I haven’t reported an association nor is there any inference of association on my part. For example, just because someone is mentioned in this article, it doesn’t mean that they’re involved or associated with everyone and everything else mentioned. If I believe that there’s an association between people and/or events, I’ll specifically report it.
If anyone mentioned in this article wants to claim that I have associated them with someone else or an event because I didn’t disclose every single person and event in the world that they are NOT associated with, that’s called gaslighting an audience and it’s absurd hogwash i.e. “They mentioned that I liked bananas but they didn’t disclose that I don’t like apples. Why are they trying to associate me with apples???” Or something similar to this lovely gem, “I did NOT give Trish the thumb drive!” in order to make their lazy audience believe that it was reported they gave Trish the thumb drive when, in fact, that was never reported, let alone inferred.
That’s some of the BS I’m talking about so try not to act like a psychiatric patient, intelligence agent, or paid cyber mercenary by doing these things. If you would like to share your story, viewpoint, or any evidence that pertains to this article, or feel strongly that something needs to be clarified or corrected (again, that actually pertains to the article), you can reach me at firstname.lastname@example.org with any questions or concerns.
I cannot confirm and am not confirming the legitimacy of any messages or emails in this article. Please see a doctor if sensitivity continues. If anyone asks, feel free to tell them that I work for Schoenberger, Fitzgibbon, Steven Biss, the CIA, or really just about any intelligence agency because your idiocy, ongoing defamation, and failure as a human is truly a sight to behold for the rest of us.
If I described you as a fruit basket or even a mental patient it's because that is my opinion of you, it's not a diagnosis. I'm not a psychiatrist nor should anyone take my personal opinions as some sort of clinical assessment. Contact @BellaMagnani if you want a rundown on the psych profile she ran on you.
This is an Op-ed article. The information contained in this post is for general information purposes only. While we endeavor to keep the information up to date and correct, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the website or the information contained on the post for any purpose. The owner of this blog makes no representations as to the accuracy or completeness of any information on this site or found by following any link on this site.
The views or opinions represented in this blog do not represent those of people, institutions or organizations that the owner may or may not be associated with in professional or personal capacity, unless explicitly stated. Any views or opinions are not intended to malign any religion, ethnic group, club, organization, company, or individual.
The owner will not be liable for any errors or omissions in this information nor for the availability of this information. The owner will not be liable for any losses, injuries, or damages from the display or use of this information.