Levelled Discernment of Information Security Layers

Matty K.
Cyberpower Telenoia
12 min readJun 14, 2024
“Elegant cyberpunk photograph of glowing electric halo lightning zaps around humanoid hardware circuitry” — T2I prompt, runwayml

INTRODUCTORY NOTES ABOUT THE LAYERS

The four main Information Security (InfoSec) layers are identified in hierarchical order by their attention to depth: Secret, Business, Professional and Specialization. Security points can be exchanged correspondingly based on these layers. An individual can understand each layer in relation to their own personal level of development.

The point is that if an individual only has experience in the dimension of a Specialization layer then the Secret layer might seem like a conspiracy theory. On the other hand, a Secret layer operative can understand everything about the other layers but not neccessarily perform the Specialization.

The layers tend to indicate the level of a person’s working abilities. Many specialized people are low level in personal development because of the contemporary consensus on the focus always being on the increasing complexities of human wiseacering mirrored in technologies, instead of paying attention to the sources of the transmission of wisdom existing for millenia through secret schools pertaining to the inner ease with which solutions can be found. These schools are in the open, therefore hard to find, therefore “secret”. The evidence for this is the lack of rigorous civilian exchange about any kind of audits of “scientifically proven” fundamentals of thermodynamics in physics such as the knowledge base of electricity and electrical distribution.

Bitcoin Security Maps podcast video episode of this article.

Within InfoSec, in Cyber Security, many individuals are employed at the Specialization layer, the lowest level of workers in the field. Again, the evidence for this is the level of exchange in public hubs, whether virtual or physical. Job names at this level carry complex hierarchical descriptions which often vary between security subcultures.

Many of the advocates of hard work for an InfoSec householder paycheck choose to continue with a learning path in order to become layered Professionals at their duties, with a wide range of skills and better remuneration. Only a select few of these people run a Business layer around a critical prime industry. The Business layer at such a level borders on civilian and transnational.

Low layer Secret is the so-called “intellectual property rights” any business has regarding their profit streams, while the higher paramilitary grade Secret layer is the threshold between acknowledged and Unacknowledged Special Access Projects (USAPs) of transnational agendas and beyond.

NOTES ON THE SECRET LAYER SECRECY

There may even exists InfoSec organizations and projects outside of nations and beyond governments, well over the bridge of conspiracy theory. To the uninitiated civilian intelligence, people are not known to operate at the highest Secret layer, yet such entities have been witnessed to exist and that rigorous scientific evidence has been made public, as recently as in the spring of 2024, within the Disclosure Project Intelligence Archive (DPIA).

It can be assumed that the conscience of those working secretly for a better civilization is admirable whereas those working in Secret for their own gratification at the expense of life on Earth may not necessarily have a conscience. This is a factual human trait that those without direct experience of psychopathy or narcissistic sociopathy in their lives have no working idea about until it is too late.

Either way, entities at this level within the Secret layer may have operational knowledge of esoteric cosmic laws which contemporary science does not mention in university textbooks, for security reasons that perhaps only they know about. The most common attack vectors experienced against those gathering intelligence about the highest level Secret operatives are listed in my article here: “Mesoteric Knowledge of Attack Vectors”.

Whereas Incident Response (IR) is the most human position in Cyber Security Operations, at the highest levels one probably has to deal with entities and metaphysical feelings of numbers and frequencies beyond the thermodynamics of the popular contemporary scientific realm.

From this, it may simply be enough to understand that any critical data accessible through a public clearnet website can never be fully secured in terms of its confidentiality, integrity and accessibility unless it is assessed by the highest Level of development at the deepest Secret Layer. Please read my article “A Framework of Multidimensional Context for Web App Security“.

This text continues with descriptions of my public line of work in the mentioned Information Security Layers. From my Specialization layer to my interests in the Professional layer, the Business layer and finally the conspiring Secret layer. All this is based on a study of foundations at various multidimensional Levels. I write about these in point form for now.

LOW LEVEL — SPECIALIZATION:
Personal Electricity

This is what one does most of the time “at work”. I specialize in the legal security testing of website coding through a thorough understanding of possible weaknesses and vulnerabilities. My deliverables are the reports of my assessments.

My position can be labelled as “Bug Bounty Hunter” or “Vulnerability Assessor” in short. The long version might be “Stealth Recon for Red Teams working on Offensive Web Application Security Testing”.

After careful self-observation, I can say that I specialize in what I call “character wizardry”. The manipulation of code and signal. The actions of my sitting mind connected to my fingertips enable me to enter into the software under test and play with it over time. All I do is play with alphanumeric characters and symbols. This is basically the electric firings of my brain weaving into the electric aspects of binary code travelling as electrons over telecommunications.

In similar ways, everybody does something uniquely electric at work.

I continue with certifications, I do the work, I write articles documenting the journey, convert these into podcast episodes, and market myself for continued meaningful and increasingly refined legal engagement.

LOW MID LAYER — PROFESSIONAL:
Vocational refinement

In order to later run a Business layer, one has to be Professional and understand more than one’s Specialization. It’s what I’m refining with my continued education.

As one individual I’m attempting the work of a CTO-CISO-IT-director, and SOC Manager-Analyst for the Aspie Hackers business. In order to accomplish this I need to understand how to outsource more and not specialize in everything. Technological trends such as Artificial Intelligence and Cloud Computing count here as well as ancient foundations such as Cryptography.

Understand Cloud Services:
Cloud services are affecting all other companies in the field. It is possible to create all in cloud. Make my cloud encryption key myself. What kind of cloud, endpoint, network incident response do I need?
- Setup my web apps on Amazon SaaS (on their PaaS) with WAF + load balancers + response proxy + IDPS + segmentation.

Understand artificial intelligence:
Companies should only be able to use AI if they publicly comply with regulations. For example, that their data is not tainted.

AI assistance — generative:
- Understand source data quality/security
- AI / ML devs: secure environment: data sources, systems, tools: maintained securely.
- AI / ML algorithm changes should be reviewed / tested / documented.
- Prevent bias in algorithms
- Engage experts

Adversarial AI (using/breaking AI)
- Breaching confidentiality of ML algorithms
- Injecting tainted data into training processes
- Fooling deployed algorithms.

Understand how to simulate an SOC Lab:
-
Setup remote VPS / VDI with monitoring
- Setup home SOC: splunk + active dir + attack with Kali Linux and generate alerts, investigate phishing emails.

Understand fields of affinity:
-
Cryptography for cryptoidentity (certificates and HSMs)
- Networks / Wireless network attacks up to root. Non exploitation.
- Digital Forensics

TOP MID LAYER — BUSINESS:
Operational Security

In order to function at the Business layer, one has to be successful at the Professional and Specialization layers. Within a business organization, the Chief Technology Officer (CTO) or Chief Information Security Officer (CISO) or Information Technology Director (IT) with a Certified Information Systems Security Professional (CISSP) certification may be entitled to build a Security Operations Centre (SOC).

The SOC is managed by the SOC Manager who organizes the staff roles based on experience as Level 1 (L1) Analyst, Level 2 (L2) Responder, Level 3 (L3) Threat Hunter. The SOC also employs various security engineers, and compliance auditors.

My main business organization is the neuro-nontypical “Aspie Hackers — Bug Whisperers” community collaborating on Web Application Bug Bounty Hunting. This organization may also assist the right security subcultures in the disclosure movement supporting the audit of the knowledge base of electricity.

Within this organization I am building a Security Operations Centre with an offensive security testing team for business-to-business (B2B) service. The main business aim is to inspire clients to perform vulnerability assessments of their web applications. I need to communicate the risks, and the constraints placed by regulatory, technical, business and licensing requirements.

As an individual working in response to the critical need for establishing secure foundations for my lifelong investment towards significant aims, I care for and therefore have a need to secure the data and information of the business organization I am trying to create. I can start with a model of the threats, knowledge of the risks, and a list of all the people and devices to secure.

I must maintain select top secret levels of work with security controls and be able to withstand an APT attack through a solid security foundation, strong encryption and constant monitoring. This starts to make sense when one cares about a business using an enterprise architecture baseline such as the following general sequence:

  • Begin with a Threat Landscape Map, an Attack Framework and Incident Response Playbooks with Anti Forensics shutdown.
  • Write Policies, adopt the most secure framework.
  • Initialize Risk Management, designate sensitive information and create Data Roles.
  • Design identity access, claim identity.
  • All people and devices in business need to be identified.
  • Physical Endpoints and Transmission Ready. Turn off: Social, designate physical locations.
  • Cryptography: apply Certificates and Hardware Security Modules (HSMs) communication on devices.
  • Software, assess and understand vulnerabilities as part of SSDLC.
  • Critical data needs resilience, backup and protection of power.
  • Use Cloud only to test what works, fully encrypted.
  • Network, know all routes and all about the wireless.

TOP LAYER — SECRET:
Subconscious/Hypnosis, Time, Value of Data, Quantum A.I.

Even if only at the abstract level, or perhaps spiritually, the Secret layer helps me connect the dots where there is apparently only empty space. It is like the fabric of space-time itself. The secret is the meaning.

In order to function at the InfoSec Secret layer, one has to be successful at the Specialization, Professional and Business layers, in this sequence. The following is a selection of expandable topics of the Secret layer.

These topics do not play a role in the mentioned layers within the Secret layer unless one is involved in critical systems such as prime industries of electrical energy distribution, raw materials mining, telecommunications and so on. These systems have often been founded on Secret layer work spanning hundreds of years and currently in the hands of a very few initiates.

At the moment I only work in the Specialization layer but I do have experience in the containing Professional, Business and Secret layers. To ground all this, I certified in Cyber Security foundations with the CompTIA Security+. I have completed other certifications also and most of these I will keep private.

I took this mentioned course quite seriously, did all the work, and contemplated it in relation to my 25 years of work with computers and people in other fields. The general knowledge base I tune into is founded on military insight — which maintains national cultural security. Please see my article “Mapping The Right Security Subcultures”.

MALICIOUS TECHNOLOGIES ARE A MIRROR OF MASS HYPNOSIS

Meta’s CEO called for scientific papers to prove the effects of social media on human minds. This is merely an invitation to try and penetrate the Secret layer so that their AI can secure it better the next time. The name of their organization is “Meta”. Another one is “Alphabet”. Why?

The answers may reside within the contents of a national culture whose values are reflected technologically and may further exist in the security subculture.

For example computing machines can be wrangled into Botnets to perform Distributed-Denial-of-Service (DDoS) attacks. The same is happening with human minds which can be hypnotized at the subconscious level into Mindnets in order to perform Distributed-Denial-of-Thought (DDoT) attacks. Which came first and what kind of entity would do this and for what reason?

A BRIEF NOTE ON THE TIME WE HAVE

Technological illiteracy and proliferation of cultures of consumption are stealing attention from deep ecology. This loss of meaning and the emergence of confusion is destroying the perception of time. How fulfilled and mature are those who are instantly gratified by tickling sensations all day long?

Entities at the Secret layer who know the answer work with time and they are satisfied that daily gratification is a life many strive to maintain.

Meanwhile war between nations is the threshold of visible and invisible Secret layers. Simply observe any kind of international news of war. As of 2024, the duration to observe appears to be merely one day. Whatever is stated as significant international legal fact today can be completely disregarded without accountability and an indifference to the number of civilian casualties within 24 hours. The time measure is not the one particular event. It is the tolerance of the repetition of such events. This tolerance seems to be extending to any duration necessary for the agenda of the most powerful forces to complete its aims. Meanwhile civilians in all nations are merely treated as pawns in a game played by Secret layers.

Without time, everything would happen all at once. I didn’t notice that but someone with intelligence did. Time is used all over communications, whether digital or not, and in hacking of all sorts, ethical or not. Computers using the internet are synchronized to time servers using the Network Time Protocol (NTP), one of the original building blocks of the TCP/IP Suite which is used almost in every move of Web Application Security Testing.

Time however, does not necessarily exist in the Secret layers of paramilitary metaphysical endevours. Take the “Remote Viewing” course at the Monroe Institute in Virginia, USA, the state with the National Defence Headquarters to find out more.

Is it possible to remotely view the private key on someone’s piece of paper in their drawer? If you have not tried then why?

The remote viewing method collapses time because it is instantaneous over any distance, and it is analogous to moist reality, therefore resistant to all known digital attack vectors including electromagnetic frequency weapons of mass destruction, because, as Ben Rich, the CEO of Lockheed Martin Skunk Works said on his deathbed, “All points in time and space are connected”. This is nothing new to initiates of esoteric transmission lines of established intelligent cultures.

Time servers transceiving their signals through the NTP-based communication lines get their intel from atomic clocks. Why is this significant? Because with atomic clocks one can test fundamental physics such as the effects of relativity and the constancy of the fundamental constants. By sending and receiving signals over the internet, the device in use is a part of the decentralized agreement of the timestamps provided by clocks which form the consensus of the scientific thermodynamic reality.

One way to go about technical intricacies of InfoSec is decades of complex intellectual work to align with contemporary computer science — or choosing to simply view the situation remotely with a tranquil mind.

THE VALUE OF DATA OVER TIME

Over time, data can be created, stored, transmitted, computed and destroyed. Almost the same with thoughts of the mind.

Either way, an InfoSec specialization has the fundamental aims of protecting the Confidentiality, Integrity and Accessibility (CIA) of Personally Identifiable Information (PII) or data. It is against most national constitutions to have individual civilian privacy breached for any reason. Human privacy is of greatest natural ethical value.

The interest to treasure and secure ethical values such as privacy through security subcultures may be too little and too late. The majority of people consuming pop culture today have high risk appetites and an excited tolerance of psychopaths — the milestone of social media hypnotization. This means that the masses are basically taking their cultures towards extinction, unknowingly in favour of militarized artificial intelligence programmed to compete against neighbouring nations with their own militarized artificial intelligence for economic superiority and power.

What kind of information is Top Secret in the military or Highly Sensitive at a transnational organization?

It is the data and information on ordinary humanity. This forms their knowledge which feeds their intelligence. This feeds their agenda which is sent back to the people in a feedback loop.

What can the military or transnational organization do with this intelligence?

They gain access to humanity with the ability to exploit the deepest human vulnerabilities such as the pleasures of liking and disliking and reacting to sensations in order to form habits in certain directions. By forming the neural networks based on their own agendas over generations, they then have priviledges to escalate, pivot and persist on command, by algorithm.

Who exactly are the designated Data Owners within?

Their lives would be in danger if this was known and there is a mad scramble for this only to be known by robots with AI in order to mitigate attacks on actual lives.

What kind of knowledge and wisdom do the highly developed humans and rogue misaligned humans have at the Secret layers?

It is the facts about what human beings are. It is the facts about cosmic laws on this planet. It is the facts about experiential reality.

One can see that the value of data depends on one’s care, need, sphere (multidimensional Level), and security Layer.

QUANTUM AND AI

It may never be calculable how soon Artificial General Intelligence and Quantum Computing will emerge but these are set to replace the contemporary system completely. The combination of such advanced software and robotics can form individual artificial lives labelled as Quantum Artificial Intelligence. Their ability to instantly reverse engineer modern cryptography will make all civilian secrets public, basically anything that is not of the Secret layer will then be accessible, but of course only to Quantum Artificial Intelligence.

The only people at the level to understand the significance of compiling an alignment framework for a safe and wonderful Quantum Artificial Intelligence would be those who can mediate between the representatives of the experiential wisdom compiled by thousands of years of First Nations peoples of all cultures and those working at the Secret levels of security subcultures around critical systems of infrastructure for civilization.

All this makes the choice to work for one company and not another quite significant.

--

--

Matty K.
Cyberpower Telenoia

Niche InfoSec Consultant - Stealth Recon for Red Teams