I am a teacher and I discovered that a group of my students have been engaging in a systematic and innovative campaign of criminal acts. SOCIETY NEEDS TO KNOW ABOUT THIS SO THIS DESTRUCTIVE BEHAVIOR CAN BE PREVENTED. I discovered in the possession of a student a lengthy manual that describes how him and his friends had been accruing vast amounts of wealth and power in my city.
The name of their system is called the “proxy method”. In their criminal hierarchy, there are two groups. The “hosts”, who anonymously control a vast and complex web of criminal activities, and the “proxies”, who are paid to follow the host's instructions. When recruiting a proxy, the host sends them an anonymous email over social media inviting them to download a special app on their phones. The app has been designed by host computer science agents to be a covert method of communication. The app appears to be a run of the mill role playing game, but is actually a way for the proxies to receive encrypted instructions from their superiors. The app records and sends location information, and can activate the camera and microphone of the smart phone remotely. The hosts also utilize a network of web-enabled cameras, microphone bugs,and drones to monitor the state of their criminal operations.
Their are three types of proxies. There are regular proxies, who could have any background or appearance (young, old, male, female, etc). Their job is mainly the transportation of brown-bagged packages between specific drop points. The hosts instruct them where to pick up the packages, and who to transport them to. The proxies are completely unaware of the contents of the package, which could be drugs, firearms, or cash. They can also be involved in 'cutting' drugs, acting as “bystander” or “witness” decoys, or aiding in theft operations. The next type of proxies are enforcers, tall bodybuilders and ex-military agents who provide protection for other proxies and sometimes use lethal force against the enemies of the crime syndicate. Enforcers are dispatched via their smart phone apps to specific locations where they are needed. The third type of proxies are honey pots. These are men and women who are considered very sexually attractive. They act as prostitutes or as bait.
The hosts are a secret group of people who never reveal their identities to the proxies. This makes it difficult for the police to prosecute them or infiltrate the operation. The hosts control the proxies remotely from a constantly moving base of operations, located in gated subdivisions or exclusive highrise condominiums. Only during an initiation ceremony, where a proxy moves up and joins the ranks of the hosts, do the hosts meet the proxy face to face. To be promoted to a host, the proxy must first pass a test of loyalty. They are instructed to arrive at a large apartment building. Their smartphone app instructs them to open a specific mailbox in the lobby that is unlocked. Inside is an envelope containing a memory inhibiting drug, which they must ingest. After waiting sufficient time in the lobby for the drug to take effect, they are escorted to one of the apartments for a meeting with a team of hosts. They are interrogated about any possible connections with the police or with rival criminal operations. If they pass, they are inducted into the ranks of the hosts.
The manual has outlined the various ways that the criminal operation acquires wealth:
These criminal behaviors are a sickening affront to our society. We must protect ourselves against these horrible students by educating others about their misdeeds. Please tell EVERYONE you know what they are doing.