At least 3,218 people are now known to have died in a massive earthquake which hit Nepal on Saturday

I am a teacher and I discovered that a group of my students have been engaging in a systematic and innovative campaign of criminal acts. SOCIETY NEEDS TO KNOW ABOUT THIS SO THIS DESTRUCTIVE BEHAVIOR CAN BE PREVENTED. I discovered in the possession of a student a lengthy manual that describes how him and his friends had been accruing vast amounts of wealth and power in my city.

The name of their system is called the “proxy method”. In their criminal hierarchy, there are two groups. The “hosts”, who anonymously control a vast and complex web of criminal activities, and the “proxies”, who are paid to follow the host's instructions. When recruiting a proxy, the host sends them an anonymous email over social media inviting them to download a special app on their phones. The app has been designed by host computer science agents to be a covert method of communication. The app appears to be a run of the mill role playing game, but is actually a way for the proxies to receive encrypted instructions from their superiors. The app records and sends location information, and can activate the camera and microphone of the smart phone remotely. The hosts also utilize a network of web-enabled cameras, microphone bugs,and drones to monitor the state of their criminal operations.

Their are three types of proxies. There are regular proxies, who could have any background or appearance (young, old, male, female, etc). Their job is mainly the transportation of brown-bagged packages between specific drop points. The hosts instruct them where to pick up the packages, and who to transport them to. The proxies are completely unaware of the contents of the package, which could be drugs, firearms, or cash. They can also be involved in 'cutting' drugs, acting as “bystander” or “witness” decoys, or aiding in theft operations. The next type of proxies are enforcers, tall bodybuilders and ex-military agents who provide protection for other proxies and sometimes use lethal force against the enemies of the crime syndicate. Enforcers are dispatched via their smart phone apps to specific locations where they are needed. The third type of proxies are honey pots. These are men and women who are considered very sexually attractive. They act as prostitutes or as bait.

The hosts are a secret group of people who never reveal their identities to the proxies. This makes it difficult for the police to prosecute them or infiltrate the operation. The hosts control the proxies remotely from a constantly moving base of operations, located in gated subdivisions or exclusive highrise condominiums. Only during an initiation ceremony, where a proxy moves up and joins the ranks of the hosts, do the hosts meet the proxy face to face. To be promoted to a host, the proxy must first pass a test of loyalty. They are instructed to arrive at a large apartment building. Their smartphone app instructs them to open a specific mailbox in the lobby that is unlocked. Inside is an envelope containing a memory inhibiting drug, which they must ingest. After waiting sufficient time in the lobby for the drug to take effect, they are escorted to one of the apartments for a meeting with a team of hosts. They are interrogated about any possible connections with the police or with rival criminal operations. If they pass, they are inducted into the ranks of the hosts.

The manual has outlined the various ways that the criminal operation acquires wealth:

  1. Honey Pot Dealer Scam The hosts search through public records and online databases to find wealthy individuals who live in the city. A team of honeypot proxies are dispatched to a location where they will cross paths with the target (i.e. a restaurant, bar, or store). There are instructed to make sexual advances to the target, and eventually propose that they return to the target's home to hold a “party”. The proxies will have picked up a package of amphetamines, cocaine, and GHB at a drop point before meeting with the target. When they get back to the target's home, they will initiate a days-long drug-fueled series of sexual escapades. When the target has ingested enough drugs to develop an addiction, the next stage of the operation is initiated. The proxies will tell the target that they have run out of drugs and will need to buy more. The hosts will dispatch another proxy (with drugs) to the target's home. These drugs will be sold to the target for 10-100x the street value of the substances. The target will continue to be sold overpriced drugs at a rate that sustains their addiction without compromising their ability to make money or fulfill the duties of their job. A proxy is assigned to the target as a handler. This proxy will pose as the target's “assistant” or girlfriend, and accompany the target to their job and on social occasions. The ostensible reason for this is that the proxy would be romantically interested in the target, while also would be their connection for purchasing drugs to fuel their addiction. Eventually, the proxy would bury deeper and deeper into the target's personal life. They would take control of the target's finances so that they can pump funds directly into the rest of the criminal organization.
  2. Chain Invasion In this scam,the criminal organization invades a chain store or restaurant and take control of it. Proxies are instructed to all apply for positions at a specific location, to the point that every potential employee that is interviewed is actually a proxy. Over time, more and more proxies are hired by the company and move up into manager positions so that they can hire more proxies. At this point, the store or restaurant is converted into an outpost of criminal activity. For example, drive-thru fast food restaurants are used as packaging and distribution points for illicit drugs. Retail stores are used to resell stolen merchandise. Funds are skimmed from the operating costs of the business, and cash from drug dealing is laundered through the business.
  3. Knock-Off Designer Drugs One of the most insidious activities that the criminal operation has undertaken in my city is the creation of knock-off designer drugs. They purvey a wide range of psychoactive substances that are purported to be new drugs that are distinct from the others commonly available on the market. Instead, the substances they sell are actually just mixes of different drugs and other substances. Just in the past month in my school, we have had to confiscate hundreds of vials of a blue powder labeled “AquaFrost-13”, and a black powder labeled “Carbon-G9-Prismatic”. I was horrified to find a bottle of the former in my daughter's purse. I immediately had her drug tested, and the results showed she had small amounts of cocaine, amphetamines, oxycontin, and MDMA in her system! Just from smelling the bottle I could tell there was some sort of candy sugar and menthol in it as well.
  4. Flash Job This criminal activity has been all over the local news in my city. Dozens of proxies are instructed to converge on a specific mall or big-box store. They first pick up a wig or baseball hat a drop point. Two specific proxies pick up packages of low-intensity flash bang grenades or fireworks. The proxies progressively fill the store until almost all the customers are criminal agents. At a specific time (for example, 6:13 pm), the proxies position themselves in front of an expensive piece of merchandise. At the set time, the two special proxies set off the firework diversion. The rest of the proxies grab their target merchandise and rush towards the store exit, pretending to flee from the fireworks that they think is a bomb. The proxies get into their cars and take off their disguises, leaving before the police arrive. The merchandise they acquire is resold in chain stores that are controlled by the criminal organization.

These criminal behaviors are a sickening affront to our society. We must protect ourselves against these horrible students by educating others about their misdeeds. Please tell EVERYONE you know what they are doing.

/r/worldnews Thread Parent Link - bbc.com