URGENT: If you're reading this before the evening of September 23rd, 2024 (in the Western hemisphere), please stop until you read the information below the timer on the II Revelation page, or at the bottom of the Revelation 2 HTML page.
Hollywood, Big Tech, and the Aggregated Data Caper
The HTML or PDFs below are copies of the website I created in 2021, documenting how I conceived "aggregated data," and how the US government, tech and film industry stole this and all of my IP, in real time, and paid US judges to make it work.
From about February 2021 to February 2023, I had a website at www.DataCaper.com, which told the astounding story of how Hollywood (and the US government) stole my intellectual property, using a variety of hacking methods. The website linked to about 200 legal documents, website, news articles, and videos. I even identified, by name and face, about five of the elite Stanford hackers the US and Hollywood deployed to steal my works and ideas. But easily the most amazing part of the story was the STUXNET portion, which showed conclusively the extreme, almost impossible length the US went to steal my work. Because I've made a policy of writing what I feel and believe, without being insulting, but without pretentiously diluting my views to win-over skeptics, many of my claims initially seem hard to believe -but the more you investigate, the more you understand everything I've alleged (and much more) is accurate.
The Stuxnet section begins on page 37. The PDF is just a PDF copy of the website I made around February or 2023. The links in the PDF no longer link to documents, and the photos that were on the original website did not print in the process of creating the PDF. I'll upload some of the pics and PDFs, again, if time allows.
If you'd rather read the phone and computer-friendly HTML version just scroll down.
This is a PDF of the original Data Caper / Stuxnet website. The site did not convert very well to PDF, so portion are unreadable. Thus, I made the PDF above. Curiously, the many photos on the website/article would not print in the PDF.
Below is the text of my old website (at datacaper.com), created in 2021. The links are no longer active, but I uploaded some of the photos from the site. I'll upload some of the old PDFs soon.
The STUXNET section begins
HOLLYWOOD, BIG TECH, AND THE AGGREGATED DATA CAPER
FOREWORD
My name is Steve Wilson Briggs. In December 2006 I introduced the world to the concept of “Data Aggregation,” in a screenplay that presented a sinister vision of how all of the world’s data could be aggregated (collected together) and streamed into a massive Earth/universe computer replication (simulation), which could then be sped up, thousands of time faster than the actual world, to create a virtual time machine, capable of predicting and preventing crime and predicting military outcomes. In short, beyond “aggregated data,” I conceived the world’s first (and only) actionable time machine.
Overnight, these ideas would change the world, very much for the worse.
I introduced these plainly evil ideas to show the unparalleled danger of unbridled, hate-based power. But sickeningly, a group of American corporate powerhouses would unlawfully obtain these ideas, and find them “desirable,” and act to create a White-Western dominated world, where their status as rulers of this new world is cemented by global surveillance, disinformation and aggregated data.
The following Data Caper article explains how, in December 2006, U.S. big-tech and big-media industries unlawfully accessed my ideas by using a hacking company named MovieLabs (Motion Picture Laboratories, Inc), run by Steve Weinstein, an elite hacker and Stanford University professor to US intelligence personnel, and via the social network for filmmakers "Trigger Street," owned by Kevin spacey, at TriggerStreet.com, where the script was posted, on and off, from 2006 to 2007. (Concurrent to these hacking events, my screenplay was also accessed by a film company, named Zero Gravity Management, who emailed me to request a copy of the script in January 2006. Zero Gravity Management would quickly join forces with the other conspirators.) These parties then quickly involved the US government (under President George W Bush), and invited over 140 major tech and media executives to meet in Hawaii, in October 2007, for a convention called “The Lobby,” to plan secret new US policing and defense systems, based on aggregated data, unauthorized data collection and mass surveillance. Among those in attendance at The Lobby were Jeff Bezos (Amazon), Mark Zuckerberg (Facebook), Sergey Brin and Larry Page (Google), Evan Williams (Twitter founder), Peter Thiel (Palantir, PayPal), Jimmy Wales (Wikipedia). The Lobby, and its elite invitees, were first reported, May 2, 2007, on VenturBeat.com, at: https://venturebeat.com/2007/05/02/the-lobby-are-you-on-the-list/ (or see the pdf HERE).
This plan was so contrary to our Founding Fathers’ intent that it amounted to the unlawful formation of a new nationalist social order. And, inevitably, this plan would connect former U.S. President Donald Trump to 3 Ukrainian/Russian businessmen, and entangle the US Copyright Office in multiple acts of document falsification.
The conspirators / participants. The primary participants in this plan were Microsoft, Amazon, Facebook, Google, Twitter, News Corp, the “Big 6” studios (Disney, Warner Bros, Paramount, Universal, 20th Century Fox, Sony Pictures), their parent corporations (WarnerMedia, Comcast, ViacomCBS, Paramount Global & Sony), the Motion Picture Association & MovieLabs (which are jointly owned by the Big 6 studios), Lionsgate, MRC (Media Rights Capital), WME (Williams Morris Endeavor), and the owners of these companies. For brevity, the article refers to these corporations and their owners as “the conspirators” or “the participants.”
Amazingly, the facts in the following Data Caper article were only discovered because a wonderful 89-year old attorney named Shirley Potash called me with a tip in March 2018. [Please see my “thank you” to Shirley, on the “Thanks” page, to read the whole story. And read more about Shirley Potash HERE.]
Steve Weinstein teaching hacking to future US intel prospects at a program connected with Standford University and the US Air Force. Weinstein was one of the elite hackers deployed to hack me from 2007 until around 2019. After that, his subordinated at MovieLabs took over. I also believe Weinstein was one of 2-4 people deployed to hack and spy on me, via cable boxes and phones, from 1982 to 1998 (when I moved to NYC). Edward Horowitz (of HBO) likely led all hacking activities from 1982 to 2007.
Here's Steve Weinstein on his Stanford faculty page.
Here's the elite hacking and theft team at MovieLabs. I suspect Kip Welch was responsible for giving my works to a myriad of talentless Hollywood "writers" to make crappy derivatives. I suspect Daniel Lucas gave any actionable technological ideas to US defense and tech industries, who otherwise had no ideas.
TWO MONTHS AFTER THE LOBBY, THE ONLY
EVIDENCE THAT 9TH CIRCUIT CHIEF JUDGE
JANUARY 2022 UPDATE:
STUXNET GETS ITS NAME
Stuxnet was originally named “MRx”, or Mr. X. Microsoft, a centralconspirator in this matter, re-named the virus “Stuxnet,” in September 2010.
As Wikipedia explains, Stuxnet was first discovered by the Belarusian antivirus company VirusBlokAda, on June 17, 2010. VirusBlokAda did not call the virus “Stuxnet”; the virus had no name. VirusBlokAda ONLY reported that the virus had two main files, named mrxnet.sys and mrxcls.sys. The original VirusBlokAda report can be seen at http://anti-virus.by/en/tempo.shtml . This article was crawled by the Internet Archive (see: https://web.archive.org/web/20100722095105/http://anti-virus.by/en/tempo.shtml ) . The evidence indicates that Internet Archive’s Wayback Machine is no longer a reliable service, and should not be trusted; however this crawl is legitimate.
The VirusBlokAda report reached few people, because VirusBlokAda is an antivirus company, with a limited audience. The Stuxnet virus was next reported, semi-broadly, 28 days later, July 15, 2010, in Brian Krebs’ blog “Kreb on Security.” But, once again, the virus had no name. Brian Krebs’ original article can be read at: https://krebsonsecurity.com/2010/07/experts-warn-of-new-windows-shortcut-flaw/ . As you see, the ONLY file names that are mentioned in Krebs’ report are mrxnet.sys and mrxcls.sys.
The word “Stuxnet” did not appear in print until September 14, 2010, when Microsoft’s Jerry Bryant (Group Manager, Response Communications) used the name “Stuxnet” in a web posting about the virus, which can be seen at: https://msrc-blog.microsoft.com/2010/09/13/september-2010-security-bulletin-release/ . That same day, Brian Krebs also used the name “Stuxnet” in his second blog about the virus. But Krebs’ article referred to, and linked to, Jerry Bryant’s posting. Thus, Microsoft’s Jerry Bryant’s post was the first use of the name “Stuxnet.”
Wikipedia’s Stuxnet entry cites a July 11, 2011, Ars Technica article “How Digital Detectives Deciphered Stuxnet, The Most Menacing Malware In History,” by Kim Zetters, which further explains how Microsoft allegedly gave Stuxnet its name: “...dubbed Stuxnet by Microsoft from a combination of file names (.stub and MrxNet.sys) found in the code.”
Microsoft named Stuxnet.
Why “Stuxnet”?
In all of my reading on the Stuxnet virus, the previously cited Kim Zetters article, in Ars Technica, is the only article that mentions a meaningless “.stub” file that was allegedly found in the code. I believe Microsoft and the conspirators gave the virus the absurd name “Stuxnet” to give the virus a name that I would NOT associate with my film. Because, after all, I had suffered an extreme viral attack, while making Mr. X, in late 2009 —by a virus that behaved exactly like the Stuxnet virus. But the reason that Microsoft had to publicly change the virus’ name is because the virus was rapidly spreading through USB drivers—because I was unwittingly giving the virus to other people connected to the Amazing Mr Excellent (who, in turn, were infecting other systems). Thus, a few months after I got the virus and unwittingly unleashed it on the world, the virus was being discussed in major antivirus circles. Microsoft and the conspirators reasoned that if I happened to hear of a virus named MRX or Mr. X, or of a virus’ whose main files were named “MRx”, and if I learned that this virus allowed the controllers to observe infected computer, steal files, take control of the infected computer, and destroy all files and the hard drives, I might realize that the creators of the MRx virus created that virus to hack into my system, steal my work, and destroy my files and hard-drives.
THE STUXNET IRAN NUCLEAR FACILITY ATTACK STORY
One of the most unusual things about the Stuxnet virus is that shortly after Stuxnet was discovered, rumours and reports began to leak that Stuxnet was created to attack the Natanz nuclear plant in Iran. These reports were leaked MONTHS BEFORE Stuxnet actually attacked the Natanz nuclear power plant in Iran. Please read the previous underlined section again.
Why would the US create a virus to attack a nuclear facility in Iran, but release news reports about the planned attack, in American publications, BEFORE THE VIRUS ACTUALLY ATTACKED ITS TARGET? Is America so feckless that it would create the most advanced virus ever conceived, then bone-headedly tell the world what it had done months before the virus attacked the intended target? Of course not. The US did this to hide why the government originally created the Stuxnet virus. Stuxnet’s payload—two files— were created to destroy my files. The government did this, NOT because I am important or interesting, they did this simply because they were preparing to invest hundreds of billions into an unprecedented aggregated data collection-base defense and policing system (which I conceived), and they wanted to eliminate all cyber evidence that these ideas ALL came from me. Even if the virus cost a few million to create, the aggregated data defense systems that it would help secure would generate hundreds of billions, eventually trillions, of dollars.
As far as the Natanz nuclear facility… Somehow the US got an infected USB driver into Natanz, briefly took control of the facility, and interrupted enrichment for a few weeks. This provided a reasonable explanation as to why the US had created an amazing new virus (which only did a few million dollars in damage to Natanz).
DISINFORMATION
As you may have observed in the previous portions of this article, the conspirators have no respect for facts, and they seem to believe it is reasonable to produce false documents, and fraudulently backdate documents. Keeping with this, I found an unusual Russian report called “Stuxnet Under The Microscope,” at https://www.esetnod32.ru/company/viruslab/analytics/doc/Stuxnet_Under_the_Microscope.pdf . This report attempted to date the origin of Stuxnet mrxnet and mrxcls drivers. However, when I entered the documents into the Internet Archive’s Wayback Machine, the Internet Archive redirected to a demonstrably fake crawl. Thus, when you enter the URL of the Russian report into the Wayback app, the Wayback adds four digits to the URL (“2020”), then redirects to a fake crawl page. Thus, the Wayback should direct to: https://web.archive.org/web/*/https://www.esetnod32.ru/company/viruslab/analytics/doc/Stuxnet_Under_the_Microscope.pdf , however the Wayback improperly adds “2020” and directs to:
https://web.archive.org/web/2020*/https://www.esetnod32.ru/company/viruslab/analytics/doc/Stuxnet_Under_the_Microscope.pdf . Click the first URL (without the “2020” in the URL) to see the URL add “2020” and redirect to a fake crawl.
ALARM
It is alarming that, in MovieLabs 16 year history, it just so happens that the same year that Stuxnet attacked my computer, 2009, MovieLabs applied for its only valid patent—a hacking system that allows MovieLabs to monitor and spy on a targeted “peer”. See this patent HERE. The patent describes functionality that is precisely what Stuxnet’s operators would need to monitor a hacked computer system. This patent was granted 2.5 years later, September 6, 2011. (NOTE: In MovieLabs 16 year history, it only has applied for 3 patents, two of which appear fraudulent, as explained earlier in this article).
This suggests that the US government created a monster hacking system (now called Stuxnet) which features fantastic spyware and destructive tools, then gave MovieLabs the patent for this system. This is, at a minimum, implicit permission for MovieLabs to continue to unlawfully monitor me, with the MR X (Stuxnet) hacking/virus system, for the remainder of my life. This is also, at a minimum, implicit permission for MovieLabs (which is owned by the Big 6 film companies and the Motion Picture Association) to unlawfully distribute my ideas amongst Big 6 film studios, their news companies, and their big-tech conspirator associates, to claim as their own.
The Conspirators' Still Use Stuxnet (MRx) To Hack Me Today
This charge that the hackers continue to hack me to this very day is more than just a theory. As F-Secure.com explained earlier, Stuxnet hides the MRx virus drivers in the C:\Windows\System32\Drivers folder. Thus, as I completed this “Stuxnet” section, I found 5 mrx drivers in my C:\Windows\System32\Drivers folder. (See screenshot HERE). The suffixes of these MRx drivers have changed, indicating that the MovieLabs and the US government have updated and improved this virus. I purchased my current computer in March or April 2019. But, as you can see from the screenshot, all of the mrx drivers were installed in my computer AFTER the purchase date, and as recently as April 15, 2021, while I was writing this Stuxnet section. Four of the mrx files may be innocuous files, but one of the "mrxdav" files is a well-known hacking tool that gives hackers complete background access and control of the computer. Here is the evidence.
As you can see (HERE) in this screenshot of these mrx files' general properties, unlike the other mrx files, the mrxdav file does not have a digital signature, and, more importantly, if you examine the "details" of these mrx files (HERE), just like the original Stuxnet drive files, the mrxdav file adheres to the Stuxnet nomenclature, using a capitalized M and R, followed by a lowercase "x", while all of the other files capitalize all three letters (MRX).
After observing that the MRxDAV file adhered to the Stuxnet nomenclature (capitalized MR, lowercase x), I noticed that the in the "details" of this file the file description read "Windows NT WebDav Minirdr". Thus, I put this file description in quotes and performed a Google Chrome search. The results of this search can be seen HERE. As you can see in this Google search, the first search results seem innocuous enough, but after about the 8th result, the search results begin to suggest that the MRxDAV (Windows NT WebDav Minirdr) file is a virus of some sort. But the 12th result ( https://www.hackercoolmagazine.com/ms16-016-webdav-privilege-escalation-in-windows/ ) is A WEBSITE THAT ACTUALLY INSTRUCTS HACKERS ON HOW TO USE THIS HACKER CODE, with screenshots. The Hackcool Magazine article explains that the hacking code/virus gives hackers background (invisible) access, and complete control of the targeted/hacked computer (just like Stuxnet). Because some readers of this web-article may be uncomfortable visiting a website that is for hackers (although the website passes "Norton Safe Web" standards), I have upload three screenshots of this Hackercool webpage in a single PDF HERE (I had to create a screenshot composite PDF, rather than a conventional PDF of the page, because of formatting anomalies with the website).
All of this unlawful conduct, which appears executed with the awareness and approval of former Presidents George W Bush and Donald Trump, is a betrayal of American values, is an evil disgrace.
The 2007 Pre-Stuxnet ".Trashes" Virus Attack
In 2007 I experienced two severe hacks/viruses. On page 56 of the BvC Complaint, I discussed one of these 2007 hacking/viruses, which erased all of my Hotmail email from May 2005 to September 2007 (this was an effort to erase all records of the December 2006 Butterfly Driver script). In the BvC Complaint, I speculated that this email virus was unleashed by an infected email, sent by a company named SE Film Club, or SE Film Association, which erased all history of itself as I wrote the BvC Complaint (see BvC Complaint, p 56, and exhibits F5, G5, H5). However, the SE Film Club email may have released countless virus types. And Microsoft, a central conspirator, likely erased the emails themselves, without need of some email-erasing subcontractor.
But the 2007 “.Trashes” computer virus (which, as I recall, manifested in January 2007, but may have manifested as late as Summer 2007), erased 7-12 of my 3.5-inch floppy drives and destroyed one hard drive. The 2007 virus that was injected into my computer (likely via Steve Weinstein and MovieLabs) was the first “.Trashes” virus.
“.Trashes” can also be a type of Mac/Apple file extension, which can sometimes be loaded onto Windows USB and floppy drives, if they are inserted into a Mac/Apple computer. The “.Trashes” virus that I was infected with was designed to appear as if a Mac/Apple “.Trashes” folder had been loaded on a Window 3.5-inch floppy or USB drive. Like Stuxnet, “.Trashes” attacks hard-drives, USB drives, and 3.5-inch floppy drives, and replicates itself onto those drives.
The “.Trashes” virus was unknown until 2008 or 2009. But one or two years before then, the conspirators first released the “.Trashes” virus onto my computer, around January 2007. This is proven by doing a basic Google Chrome search for “.Trashes virus” (in quotes); see HERE, a PDF of this modified Google Chrome search. Examining the PDF, you will see various blogs about the virus going back to 2008.
If you modify this Google search, using Google Chrome’s special search “Tools,” then using the drop-down menu to select the “Custom range” time parameters of January 2006 to December 2007; see HERE, a screenshot of this modified Google search. As you can see in the screenshot, this virus was not discussed anywhere before 2008 or 2009.
However, if you expand this custom range search parameters to January 2006 to December 2009; see HERE, a PDF of this custom range Chrome search. The single search result, displayed in the previous PDF, shows that, suddenly, in 2009, the world first began discussing a “.Trashes” virus that attaches to USB (and floppy) drives.
However, one or two years before the world knew about the “.Trashes” virus, I had the “.Trashes” virus destroy one hard-drive and many 3.5-inch floppy drives—and I still possess several of these infected floppies. The contents of one of these floppies, showing the “.Trashes” virus folder, can be seen HERE. Regrettably, to produce the previous screenshot of the “.Trashes” virus folder on one of my old floppies, I had to connect an infected floppy, via an external 3.5-inch floppy drive, to my computer. In doing so, I re-infected my current, modern computer with the 2007 “.Trashes” virus. Although this infection did not destroy my hard-drive, the old “.Trashes” virus now replicates itself and attaches to USB drives inserted into my computer. You can see a screenshot of this new “.Trashes” virus now on one of my USB drives HERE. (As you can see in screenshot, the “.Trashes” virus created three folders on this USB drive, which all have the strange future date-of-creation year of 2106.)
Further proof that this “.Trashes” virus was infecting my computer in early 2007, can be seen HERE, a screenshot of the virus on a floppy from 2007. This screenshot is the only floppy drive that the “.Trashes” virus folder manifested but did not erase all other files. I suspect that the hackers who installed the “.Trashes” virus on my computer wanted this disk to survive. I suspect this because the “.Trashes” virus is designed to steal and/or destroy all files, then leave the “.Trashes” folder, to make the hacking appear as if the owner of the hacked computer/drive caused the erasure or disappearance of his/her work by mistakenly connecting his/her Windows drive to a Mac/Apple computer. I suspect the hackers wanted this one disk to survive, as it is, because on this disk the “.Trashes” virus appears with a “.DS_Store” file, which is another Mac/Apple format file. From what I’ve read, a “.Trashes” folder with a “.DS_Store” file sometimes appears on Windows USB and floppy drives when they are inserted into Mac/Apple computer ports. This did not happen with my floppies. I exclusively used Windows computers, from 2002 to the present. Period.
Why Would George W. Bush Allow The US
(And The Conspirators) To Hack Me?
An argument can be made that my ideas were so compelling that the US felt it had to "commandeer" my ideas, in the interest of national security. Of course, at that point, the US would need to inform me, and pay me market value (billions). But the US did not do this. Rather, as you have seen, between 2007 and 2007, the US government (likely via Steve Weinstein and MovieLabs) released two never-before-used computer viruses on me, which allowed the government and the conspirators to observe my activities, steal my works and ideas, then destroy all of my works and my hard-drive (which they did numerous times). This invites the question: why would the Bush administration allow this plainly evil attack and theft of a patriotic US citizen? The despicable nature of this action is amplified by the fact that the hero of the Butterfly Driver/Uberopolis screenplay (that featured the aggregated-data ideas that the US government and the conspirators determined to steal) is a proud American soldier, who, after America loses World War III and is incorporated into a larger new world government, lives as a fugitive because he refuses to renounce his American identity. So... Why would George W. Bush allow this sort of attack on an American patriot? It could be that George Bush and the conspirators have no moral structure. It could be that Bush despised my African lineage. But it also could be because my screenplay blamed Bush and his administration for the downfall of America. See pages 12-14 of the May 25, 2005 version of the screenplay (see HERE). In fact, I was so emphatic that Bush's actions would eventually lead to the fall of America that I put the dialogue that blamed Bush for the fall of the US in BOLD print. This was the only section of the 2005 script that I put in bold text. The character "John Carlos" explained:
JOHN CARLOS:
"There was once a free land called America. The wealthiest most powerful
nation the world had ever known, a country that once led industry in environmental
protection, led the world in human rights and garnered the respect of the world.
But in the early 21st century the new American government ended key environmental
protection, in the interest of business, prompting the collapse of the ozone
and the outer atmosphere. Simultaneously, they staged numerous ill-advised
military invasions into other sovereign nations and threatened even more.
At the time, the world's most powerful nations were beholden to America -since
its economy was so robust that it supported all of the world's economies.
America also employed millions of talented, educated people whom its companies
paid well. But under the new government corporations were encouraged to seek
greater profits abroad. American businesses sent millions of pivotal jobs over-seas.
The loss of these jobs destabilized the American economy. The economy was
worsened by border control problems -which politicians wouldn't secure for fear of
losing the immigrant vote. When America's economy finally collapsed the world's
economy collapsed with it. No longer economically beholden to America, the
nations of the world turned and rose up with military force against America -whom
they blamed for unjust military aggression and the fall of the world's economies,
This was the beginning of the Unification War. America survived the ten year war
-only after sustaining heavy nuclear damage and unleashing it's nuclear arsenal
on fourteen nations. The war left America a poor, third world economy. With the
world boycotting all American business, America eventually agreed to pay trillions
in war reparations and give up its munitions. After which America was granted
state status in the Unified World Nation, the new unrestricted business centered
world government."
Some of the corrupt and incompetent people employed at the US copyright office.
DISCLAIMER: Everything written, said or presented on this website, or the documents attached to this website, is/are just allegations, not necessarily facts. Although I, Steven Kenyatta Briggs (AKA: Steve K Wilson Briggs) the owner of this website, wholeheartedly believe every allegation to be true, and although all of the articles posted on the website present seemingly overwhelming evidence in support of every allegation, everything presented on this website, no matter how persuasive, is/are just allegations and opinions.
The preceding disclaimer is made for legal reasons.
I ran out space for the Zodiac evidence on the "Zodiac's ID Revealed" page, zo I had to use the space below for evidentiary storage.
Copyright © 2024 Zone Resistance - Todos los derechos reservados.
Con tecnología de GoDaddy
Usamos cookies para analizar el tráfico del sitio web y optimizar tu experiencia en el sitio. Al aceptar nuestro uso de cookies, tus datos se agruparán con los datos de todos los demás usuarios.