Internet Anthropologist Think Tank: Ops and Intel update:

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Saturday, November 24, 2007

    Ops and Intel update:

    WASHINGTON, Nov. 23 A September raid near the Syrian border uncovered what U.S. military officials term "an al-Qaida Rolodex" of hundreds of foreign fighters in Iraq.

    A senior U.S. military official in Baghdad has confirmed to CNN that the raid netted documents listing the identities of more than 700 foreign fighters believed to have entered the country in the past year.

    The official said the documents, along with other intelligence, indicated that as many as 60 percent of the foreign fighters were from Saudi Arabia and Libya, CNN reported.

    http://www.earthtimes.org/articles/show/146903.html

    http://tinyurl.com/yuzory

    xxxxxxxxxxxxxxxxxxxxx

    Hackers Abuse Domain-Name Trust
    November 20, 2007
    By Andy Patrizio

    Using variations on trusted, popular domains has long been a common tactic for scammers, spammers and porn sites. But cyber criminals have devised a new twist on the misspelled domain-name trick by hijacking IP addresses. And they tried it on Yahoo.

    To fix the old problem, server-based security products would trace the IP address of the server behind the domain. Once the IP address resolved the misspelled domain name, the products would then compare the IP address against a database of known fraudulent sites or questionable locations. So if a site were masquerading as eBay but the filters found it was really a server in China that had only been established one week earlier, it would block access.

    In the case of Yahoo, security firm Finjan said hackers exploited an unused IP address within Yahoo's hierarchy and used that as the domain address behind a forged Google Analytics domain name. This fooled the Web-filtering products into believing a person was going to a highly trusted Yahoo domain. The victims never knew they were on a malicious Web site, and neither did the security mechanisms on the network.

    "They managed to resolve the domain name to an IP address owned by Yahoo. How they added an address into a DNS server to appear to be an IP address owned by Yahoo is unknown," Yuval Ben-Itzhak, CTO of Finjan, told InternetNews.com. He added that Yahoo, while responsive and quick to shut down the compromised address, did not disclose exactly what equipment was behind the compromised IP address.

    http://www.esecurityplanet.com/trends/article.php/3712121

    http://tinyurl.com/2t4yje

    xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

    Australian police get go-ahead on spyware

    A new law gives Australian police the power to install spyware and Trojans on suspected criminals' computers.
    By Munir Kotadia
    Special to CNET News.com
    Published: December 15, 2004, 8:18 AM PST

    Australian police have been given the power to install spyware and Trojans on suspected criminals' computers under the new Surveillance Devices Act.

    The Surveillance Devices Act allows both federal and state police to use key logging and tracking software when investigating offenses that carry a maximum sentence of three years, according to the Sydney Morning Herald.

    Neil Campbell, national security manager of IT services company Dimension Data, said the laws needed updating because of confusion when dealing with new technologies. Campbell previously spent six years working with the Australian Federal Police computer crime team.

    "If the police intercept SMS messages that have not yet been delivered, should that be classified as a telephone interception or as a regular search? Getting a search warrant is relatively easy--you need to show reasonable grounds that executing the search will provide evidence as to the commission of an offense. But getting an interception warrant is difficult," Campbell said.

    SOURCE:

    XXXXXXXXXXXXXXXXXXXXX

    Pak-Afghan border to be guarded with new system Saturday November 24, 2007 (0226 PST)



    KABUL: Afghanistan will install electronic Sensor system on a number of spots on the border areas of the country to avoid cross-movement of the anti-social elements, security officials said .

    Brig Gen Said Amanullah Saddat deputy chief of the border police in the Interior Ministry told Pajhwok Afghan News preliminary works for installation of the electronic machines had been completed.

    Speaking during a certificate distribution for 27 Rapid-Action Forces graduates for the eastern Nangarhar province, he said the project would cost $45m to be provided by United States.

    Though it was not know when the project would be functional but Sadat said that cross border movement was the attention of both Kabul and Islamabad due to the increasing terrorist activities.

    SOURCE:

    XXXXXXXXXXXXXXXXXXXXXXX



    ISNA - Tehran
    Service: Foreign Policy

    TEHRAN, Nov. 23 (ISNA) Iran's ambassador to Russia said that Iran is ready to provide the Islamic states with its nuclear technology on the condition that the IAEA principles are obeyed.

    Emphasizing on the nationalization of the nuclear science in Iran, Gholam Reza Ansari said, "These are technologies that have been acquired by Iranian scientists."

    http://www.isna.ir/Main/NewsView.aspx?ID=News-1038816&Lang=E

    http://tinyurl.com/2zn9ls

    xxxxxxxxxxxxxxxxxxx

    US Admiral Timothy Keating: US more prepared than ever to face threat from Iran

    November 23, 2007, 6:29 PM (GMT+02:00)

    The admiral, head of US military operations in 41 countries, said the United States military machine is undiminished after four years of fighting in Iraq and more prepared than ever to face any threat from Iran. He spoke in Bahrain Friday, Nov. 23, after Mahmoud Ahmadinejad labeled the US army "shabby" and said the West had "rusty and disabled weapons." Adm. Keating went on to say: "Because of our continued presence and exercises we've had… the Fifth Fleet and Central Command's ability to provide for peace and stability is even better than before."

    http://www.debka.com/

    http://tinyurl.com/1jxm

    G

    .

    Labels:

    0 Comments:

    Post a Comment

    Subscribe to Post Comments [Atom]

    << Home