I used to follow some of what The Jester wrote. There are a number of people out there who think he's overrated, more brag than anything else. Still, I saw some pretty clever things out of him. For example, at one point he was going after some other hacking collective (I don't recall which one), and he announced a successful attack against them and posted a list of all of their names and real IP addresses. Only, the list wasn't real. Instead, anyone who tried to download the list had their connection logged and probed, an exploit used to trigger the computer to make a (real) TCP connection back to one of his computers, and a number of automated attacks launched against targets it considered particularly suspect (for example, if there was evidence of being logged into a known member twitter account). I.e., it wasn't actually a list of suspects, it was bait to build a list of suspects. I think he did the same trick with QR codes later.