Internet Anthropologist Think Tank: 3/30/08 - 4/6/08

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Saturday, April 05, 2008

    OFF SUBJECT: SPRING












    Spring in MY woods, g

    Labels: ,

    Terrorist Names SEARCH:
    Loading

    Taliban sign own Death Warrant








    Afghanistan: Taliban sign own Death Warrant.

    Taliban are about to release their version of a
    "
    Constitution of the Islamic Emirate of Afghanistan:"

    It needs to be translated from Poshtoon to Arabic.

    Taliban HAVE NOT RELEASED THIS YET.

    Company "C" DOES IT AGAIN.
    They have obtained all of their signatures:

    Wouldn't it be great to have a list of all the Taliban
    leaders in Afghan, and signatures attesting to same?

    See above.
    NATO WILL LOVE THIS.
    Posted 22/2/2008, we copied files.

    " Source / page (Voice of Jihad) in 23/2/2008
    موقع رسمي لإمارة أفغانستان الإسلامية - طالبان Official site of the Islamic Emirate of Afghanistan - Taliban"

    Gerald

    UPDATE:
    This could be a new posting of old information, as we have not see the old doc.s
    or
    A new posting of new info.
    Further Investigation, it appears this is a new posting of an known document.

    Hat tip anonymous.
    .


    Labels: ,

    Terrorist Names SEARCH:
    Loading

    Friday, April 04, 2008

    Company C strikes again



    Hezbollah[1] (Arabic: حزب اللهḥizbu-llāh,[2] literally "party of Allah") is a Shi'a Islamic political and paramilitary organization based in Lebanon. The group's official name in Arabic is Hizb Allah-Al-thawra Al-Islamiya fi Lubnan. [3] It follows an Islamist Shi'a ideology developed by Ayatollah Ruhollah Khomeini, leader of the Islamic Revolution in Iran.[4][5][6][7][8]

    Hezbollah first emerged during the Lebanese Civil War in the early 1980s as a militia of Shia followers of the Ayatollah Khomeini, trained, organized and funded by a contingent of Iranian Revolutionary Guards

    SOURCE:

    Because if Hezbollah's connection ti Iran and their work in trying to develop a nuclear weapon we passed the info on Aron at internet haganah and sat on the story for 5 days. We often get actionable Intel and don't report it if the info is sensitive.

    Company "C" located 15 bank accounts for them.

    GREAT WORK COMPANY "C".

    Gerald

    .



    Labels: , , , ,

    Terrorist Names SEARCH:
    Loading

    Shift in al Qaeda media operations



    Zawahiri tape suggest Al Qaeda PR shift - Christian Science Monitor

    BS... G

    ABC News reports that the medium by which Zawahiri's latest message was released also suggests a tactical change.

    One terrorism expert who studies jihadist websites says the audio message may signal a shift in Al Qaeda's media operations. The expert cites the fact that both Zawahiri's message and top Al Qaeda leader Osama bin Laden's last address were both released without video. The expert also says the recent files uploaded to jihadist websites have appeared in Arabic, rather than their usual format in English.
    SOURCE:
    xxxxxxxxxxxxxxxxxxxxxxxxx

    "One terrorism expert who studies jihadist websites says the audio message may signal a shift in Al Qaeda's media operations."

    Yes its a shift its called degraded, crippled.

    They are operating with 3 and 4 th level cadre.
    That means Zees Internet Security had to be sloppy.....

    They have gone from high end professional produced videos in multiple languages to "VOICE TAPE RECORDINGS"
    They know the webmasters/media are being tracked and arrested or KILLED.
    Sometimes they just disappear in the middle of the night, CIA denys any knowledge.

    Here Rattler here.....

    G

    .


    Labels: , , , , ,

    Terrorist Names SEARCH:
    Loading

    Thursday, April 03, 2008

    Quran on FIRE, Islamic backlash






    من تصمیم گرفتم که قرآن را به آتش بزنم تا زمانیکه حکومت دیکتاتوری اسلامی ایران:

    1. متعهد به قوانین اعلام شده در اعلامیه جهانی حقوق بشر نباشد
    2. اعدام ها را متوقف ننماید
    3. دانشجویان و مخالفان سیاسی را از زندان آزاد نکند
    4. عدالت و انصاف را به سیستم قضایی کشور و جامعه بازنگرداند

    من اعتقاد دارم، نافرمانی دینی راه حل ما برای نجات کشور از دست طبقه ملای اسلامی حاکم می باشد. آنها در حالی اسلام را دین صلح و آزادی معرفی می نمایند در حالیکه در واقع با این تعریف ریاکارانه بر مردم جفا می کنند.

    بنابراین تا زمانیکه این ریاکاری در ایران در جریان است، این آتش بر قرآن خواهد بود. پیشنهاد من این است که هر کسی در هر شهر و خیابانی قرآن ها را به آتش بکشند و در شهر رها کنند تا پیغام این مبارزه برای آزادی از حکومت دیکتاتوری اسلامی موجود، به همگان برسد.

    مجتهدین همیشه ساکت دین اسلام و آخوندهای سیاسی و ملایان، از این حرکت بشدت در هراس هستند چون این حکومت اسلامی را مردم انتخاب کردند و حال اگر مردم به آتش زدن قرآن بپردازند، در واقع پایه های این حکومت به لرزه در خواهد آمد.

    من این تاریخ را برای اعلام این خبر انتخاب کردم، به این دلیل که این ماه در تقویم اسلامی از ماه های مقدس می باشد، که حجاج برای زیارت به مکه می روند. بنابراین، با به آتش کشیدن قرآن در این ماه، این پیغام را به آخوندها که تمامی زندگیشان را با دورویی سپری می کنند، میدهم، که اگر اسلام برای ما ایرانیان، صلح، آرامش و خوشبختی به ارمغان نیاورده است بنابراین بر اساس منطق عقل، باید از شر آن خلاص شویم.

    همچنین من از شما شهروندان دنیا که شامل ایرانیان عزیز می باشد، تقاضامندم که این حرکت را پشتیبانی کنید.

    با تشکر
    If you can't read above Persian text, please click on following image then you will read above text in Persian regardless of your browser capability to support Persian or not.


    Hat tip Jawa
    SOURCE:

    Your opinion?

    Gerald

    .

    Labels: , , ,

    Terrorist Names SEARCH:
    Loading

    "The War on Terror Is the Best Jihad for the Sake of Allah"


    In an article published on April 1, 2008, in the Arab liberal e-journal Elaph, Iraqi liberal Khudayr Taher, who now lives in the U.S., wrote that American intelligence has done a great service to humanity in helping to defeat Nazism, communism, the Taliban, and Saddam Hussein, and that cooperating with the CIA is a moral and religious obligation.

    The following are excerpts:(1)


    "I Have the Pleasure of Being the First Arab to Write About the Bright Side of the CIA"


    "When we in the Arab world look at others we are accustomed to projecting our own faults onto them. We pull out rash and gratuitous ready-made judgments that are without basis in reality. In so doing, we do wrong to ourselves and to others.

    "When the subject of the CIA comes up, [we] fling out a handful of descriptions and accusations that have nothing to do with reality. The CIA is a national [security] apparatus whose mission is different than that of the intelligence apparatuses in Arab states. It is an apparatus that defends the national interest, and not the ruling regime.

    "The CIA has a bright side to it, and… it has done [a great service to] humanity and civilization. However, the counter-propaganda of the Communists, the pan-Arabists, and the Islamists obscures this accomplishment. It is difficult for the Arab mind to see this bright side of the CIA, laden as it is with demagoguery, superstition, and slogans hostile to Western civilization, and to America in particular.

    "I have the pleasure of being the first Arab in the history of the Arab press to write about the bright and civilized side of the CIA. I alone bear the moral and political responsibility for the contents of this article, in which I wanted to show to what extent ideological propaganda distorts [one's perception of] the rival. I also wanted to spur the reader to engage in informed and realistic political analysis, far from the frenzy of the rabble and their ideological slogans."


    "A Great Part of the Defeat of Communism Was Due to the Monumental Efforts of the CIA"


    "The Agency inaugurated its activities under another name [i.e. the Office of Strategic Services] with its entry into the fierce war against Hitler's criminal Nazi regime. The defeat of Nazism and the liberation of humanity from its evil are considered the first of the CIA's noble achievements. It did a service to humanity and saved millions… from Hitler's evil.

    "Then, together with the emergence of the evils of the communist danger to civilization and freedom, the CIA was founded under its current name. It began its noble battle against the danger of communism, [both] as an ideology and as repressive and dictatorial political regimes that herded their peoples into prisons and to the gallows. These regimes extinguished human dignity under a pretext [provided by] insane slogans that were far from any logic and the self-evident truths of [human] life.

    "This ended with a great victory for Western civilization, its humanist philosophy, and its social laws, which protect the rights of man and offer him the greatest respect and the greatest measure of justice, rights, and social solidarity ever known to humanity. A great part of the defeat of communism was due to the monumental and noble efforts of the CIA throughout the Cold War."


    "The War on Terror Is the Best Jihad for the Sake of Allah"


    "Then came the age of the war on terror, and the Agency played a large role in crushing and deposing the Taliban regime and the Saddam regime, in liberating their peoples, and granting them liberty. And the Agency continues to brave the hazards of the fierce battle against the virus of the terrorism perpetrated by the parties of political Islam with the support of Iran and Syria.

    "If we examine the efforts and achievements of the CIA rationally and in [good] conscience, we will find them to be noble and honorable activities that were always to the benefit of all the world's peoples and to the benefit of civilization, security, and stability. Putting an end to Nazism, communism, the Taliban, and Saddam, and the persistence in the war on terror – all of these are courageous and honorable activities that do a service to all peoples, without exception…

    "It saddens me to say that I do not personally have any connection or ties to the CIA. [I say it saddens me] since I consider cooperating with American intelligence – or with the intelligence agencies of Britain, France, Germany, and other Western countries – to be a moral and religious imperative incumbent on all honorable people, in order to combat the crimes of terrorism, and in order to protect human lives, the achievements of civilization, public liberties, security, and stability.

    "The war on terror is the best jihad for the sake of Allah, so as to protect the lives of humans [and] their beautiful civilization."



    Endnote:
    (1)
    www.elaph.com, April 1, 2008. For previous articles by Khudayr Taher, see MEMRI Special Dispatches No. 1737, "Iraqi Liberal Khudayr Taher: My Journey from Darkness to Light; America Is the Prophet of Liberty," October 12, 2007, http://memri.org/bin/articles.cgi?Page=archives&Area=sd&ID=SP173707; and No. 1650, "Arab Liberals on the 'Terrorist Doctors' Plot in the U.K.," July 11, 2007, http://memri.org/bin/articles.cgi?Page=archives&Area=sd&ID=SP165007.


    SOURCE:

    Labels: , ,

    Terrorist Names SEARCH:
    Loading

    Iran circulating rumors of USA attack in April



    Iran circulating rumors of USA attack in April

    Started with this story:
    http://www.presstv.com/detail.aspx?id=49572&sectionid=351020104

    Note the site looks similar to BBC site.

    Registrant: presstv saadat abad - farhang blvd 2 sharghi no 25 Tehran, TEHRAN 1997766411 Iran Registrar: DomainPeople, Inc.

    March 30, 2008

    Planning for Iran Attack?

    Posted by Charles Featherstone at March 30, 2008 04:24 PM

    A couple of news sites I have never heard of are quoting the Jeddah-based Saudi newspaper Okaz (owner of the Saudi Gazette, a former employer) that Saudi Arabia's governing Shura Council has approved plans to deal with fallout from a U.S. nuclear attack on Iran.

    The first piece appears at something called shortnews.com:

    Saudi newspaper Okaz claims that the government of Saudi Arabia is preparing the kingdom for the nuclear fallout which could reach the area if the US attacks nuclear installations in Iran.

    The news comes days after US Vice President, Dick Cheney’s visit to the country. Some experts claim the Bush Administration is on the brink of launching an attack against Iran’s Bushehr nuclear reactors' and is warning neighboring allies.

    Admiral William Fallon who was in staunch opposition to the White House rhetoric against Iran, was replaced recently fueling speculation the Administration was preparing for an attack.

    The second story, citing the same source, appears at a web site called News Blaze:

    Night Watch: RIYADH - It seems Washington used the recent visit to West Asia (Middle East) by Vice-President Dick Cheney to alert the House of Saud the U. S. has completed preparations for a missile-air attack on Iran's nuclear facilities in April. PressTV reports the Saudi paper Okaz mentioned a meeting of the Saudi Shura Council after the Vice-President's visit in which the council approved preparations to counter "radioactive fallout" due to a U. S. attack on Iran. There has also been a recent deployment of a U. S. nuclear submarine in the Persian Gulf. That is why I suspect the real reason for the current three day visit by U. S. Secretary of State Dr. Condoleezza Rice to Israel is not to discuss the removal of road blocks in the West Bank but to alert Jerusalem.

    SOURCE:

    And Hersh with his perfect record of being wrong about Iranian attack conforms

    the attack.

    Playing with fire: United States attack on Iran canard

    04/01/2008

    Periodically, we are victimized by headlines that insist that the United States is about to attack Iran. The attack has been in preparation for a long time. Here's Seymour Hersh predicting the attack in 2005. Seymour Hersh reported again that it was about to go down in the New Yorker on April 17, 2006. There's another such story here from February 2007. Here's a story from March 29, 2007, that insists that an attack is imminent. And here's another, closer to he source of the "information" - Russian intelligence. The indefatigable Hersh was at it again in October of 2007, with the same arguments and rumors. And the Russians are back at it again too. Now, almost a year to the day after the last Russian-inspired Iran attack fiction, they have once again published "intelligence" about U.S. military moves that are supposedly preparatory to an attack on Iran.

    Add that to the Israeili actions:



    Exclusive: Barak calls off German trip next week as Damascus raises war alarm

    April 2, 2008, 3:16 PM (GMT+02:00)

    Syrian troops

    Syrian troops

    Israel’s security cabinet convened Wednesday, April 2, to examine the homeland’s preparedness for war. It decided to redistribute the bio/chemical warfare masks a few months after they were called in. DEBKAfile’s military sources disclose intelligence data indicating the possibility that Syria may transfer to Hizballah chemical or biological warheads known to have been developed for its war arsenal.
    More...


    Ominous war signals are again flashing between Syria and Israel

    April 2, 2008, 8:28 PM (GMT+02:00)

    How real are they and how far are Iran and Hizballah involved?

    Read the coming DEBKA-Net-Weekly’s exclusive forward insights to judge whether these sparks are a flash in the pan or the portents of a real conflagration.

    Find out too how Iran exploited the Basra crisis for major inroads on southern Iraq and its oil.

    Don’t miss these critical disclosures.

    To subscribe to DEBKA-Net-Weekly click HERE

    and this story at Jawa:

    Massive War Drill In Israel Next Week

    Jerusalem News Wire

    Tens of thousands of Israelis are to participate next week in a nationwide emergency drill that will simulate a massive missile strike on the country's population centers.

    The exercise was approved by Israel's security cabinet Wednesday and will be launched with a cabinet meeting conducted as if Israel was at war, and the sounding of air raid sirens throughout the land.

    Sectors to be involved will include the Israel Defense Forces, all government ministries, local authorities and the educational services.[...]

    Last week IDF officials reported that the Hizb'allah now has more rockets than it did before the last war, and that it is now equipped with missiles that can hit much deeper into Israel, even as far south as Dimona, the site of Israel's nuclear facility.

    Before this was reported Iran called up its reserve troops fearing an Israeli air strike. Or could it be preparing for one of its own.

    Related:

    Israeli's to be kitted for non-conventional warfare

    By Stable Hand at 05:36 PM

    And you have the makings or a great rumor:

    and filters down on the Internet to:

    Russians have leaked a possible timeline for an attack on Iran. A 12 hour aerial bombardment will most likely start on or about 6:30 PM, Friday 5, April, our time (4:00 AM Saturday, 6, April, Tehran, Iran). No ground forces expected to participate. This is from a former adviser to Vladamir Putin (Russian President). Nuclear weapons will be used. Suspect that Internet services from the greater ME will be cut for a second time. There was a suspected rehearsal last month when cables were cut in 5 places.

    We are searching for the Russian links:

    NO ATTACK ON IRAN YET.
    NO SUBSTANTIAL CHATTER OR BACKGROUND NOISE.


    G

    .

    Labels: , , , , ,

    Terrorist Names SEARCH:
    Loading

    Zawahri LIES to Ummah

    Ayman al-Zawahiri praising Abu Musab al-Zarqawi after the death of the latter in June 2006Image from Wikipedia
    Top al-Qaeda official answers Internet questions
    Malaysia Sun
    Wednesday 2nd April, 2008

    Al-Qaeda's second-in-command, Ayman al-Zawahri, has described the United Nations as an enemy to Muslims and vowed attacks on Jews both inside and outside Israel.

    In a statement posted on the Internet on Wednesday, Zawahri defended the al-Qaeda organisation and said it does not kill innocents.

    LYING SOB, bombing Mosques, market places, beheading civilians.
    What about 3,000 Americans at work on 9.11

    In a lengthy audio response to 900 questions submitted to the movement on extremist Web sites, Zawahri made the response that al-Qaeda had not killed any innocents: "not in Baghdad nor in Morocco, nor in Algeria, nor anywhere else".

    The friend of Satan: Zawahri has already apologized for killing innocents.


    "If there is any innocent who was killed in the Mujahideen's operations, it was either an unintentional error or out of necessity," he said, in response to several questions about the taking of innocent lives.

    Women, children, mentally handicapped tricked into suicide bombers.

    The semi-interactive forum allowed Zawahri to appear accessible to followers even though he and other top al-Qaeda leaders are believed to be hidden in a remote area in Pakistan.

    http://story.malaysiasun.com/index.php/ct/9/cid/b8de8e630faf3631/id/344232/cs/1/

    http://snipurl.com/23c0s

    xxxxxxxxxxxxxxxxxxxxxxxxxx

    Moslems posed some excellent questions:

    1/1: The questioner Mudarris Jughrafiya [Geography Teacher] asks, "Excuse me,
    Mr. Zawahiri, but who is it who is killing with Your Excellency's blessing the innocents
    in Baghdad, Morocco and Algeria? Do you consider the killing of women and children
    to be Jihad? I challenge you and your organization to do that in Tel Aviv. Why have
    you ­ to this day ­ not carried out any strike in Israel? Or is it easier to kill Muslims in
    the markets? Maybe it is necessary [for you] to take some geography lessons, because
    your maps only show the Muslims' states."\

    2/1: The questioner Talib Jami'i Tib al-Jazaa'ir [University Student, Medicine,
    Algeria] says, "Al-Qaida Organization in the countries of the Islamic Maghreb: is killing
    women and children Jihad in your view? I want al-Zawahiri to answer me about those
    who kill the people in Algeria. What is the legal evidence for killing the innocents? The
    blood of sixty Muslims was spilled on the 11 th
    of December in Algeria, and al-Qaida
    claims for itself an explosion in which Muslims who worship Allah (the Glorious and
    Great) alone died. There is no power nor strength except with Allah. So
    congratulations to the champion al-Zawahiri and Droukdel on the killing of the
    innocent students, children and women in this `Eid. What is the sin of the innocent?
    Allah suffices us and is the best of protectors against you."

    “I think al Qaeda has lost considerable popularity because its indiscriminate violence has provoked a backlash among Muslims, who have been its principal victims. Al Qaeda has murdered more Muslims than non-Muslims, more Afghans than Americans. Also more Iraqis than Americans,” says James Phillips, Research Fellow for Middle Eastern Affairs, Douglas and Sarah Allison Center for Foreign Policy Studies.

    More, Source:

    Muslims become cynical about false prophet Bin Laden and terrorism in the name of Allah

    "Prime Minister" of Jihadism

    more:

    Blessed be al Qa'ida and Arab Mujahideen


    “There is no God but Allah; Mohamed is the Messenger of Allah” In the name of God, praise be to God, and praise and blessings be upon the Messenger of God, his family, his Companions, and all those who follow him.

    al Qa'ida and the Mujahideen Shura Council have brought many blessings to the Islamic Umma.
    My brothers and Allah help me count the blessings.

    The Mujahideen Shura Council is composed of eight insurgency groups in Iraq: al-Qaeda in Iraq, Victorious Army Group, the Army of al-Sunnah Wal Jama’a, Jama’a al-Murabiteen, Ansar al-Tawhid Brigades, Islamic Jihad Brigades, the Strangers Brigades, and the Horrors Brigades,

    Before al Qa'ida there were 10,000 to 20,000 americans in the Middle East, blessed be al Qa'ida

    By attacking the americans al Qa'ida have brought and kept 140,000 american and forgein troops with in the land of two rivers.

    al Qa'ida attacked on 9.11, hoping USA would attack Afghan.
    My brothers you know USA took Afghan and Iraq, blessed be al Qa'ida

    If not continually attacked USA would have left in the first year, with al Qa'ida and the Mujahideen attacks USA troops are still here 3 years later. blessed be al Qa'ida.

    No House divided against its self can stand.
    Blessed be al Qa'ida, for they have turned Sunni against Shia, and kept the crusaders from returning to the USA.

    Blessed be al Qa'ida, for they have stopped Iraq from uniting and telling the crusaders to leave.

    Blessed be al Qa'ida and the Mujahideen, they have muliplied Islams enemies six fold. And they have Muslims killing Muslims.

    MUSLIM KILLING MUSLIM, ALL FOR PERSONAL GLORY OF A FEW munaafiqeen. Blessed be al Qa'ida

    They criticize the Muslim religious leaders who are obstructing the path of al Qaeda.
    The path of al Qa'ida and the Mujahideen are in contravention of the Shura methodology.

    Blessed be al Qa'ida and the Mujahideen, for the street man now lives like a dog.

    al Qa'ida has taken a switch to the Lion and now wants Islam to bare the burden. Blessed be al Qa'ida and Arab Mujahideen.

    We ask God that He send down his victory upon us that he promised to his faithful worshipers, and we are still waiting three years later, How have we offended Allah? Blessed be al Qa'ida.

    THE Islamic Umma ARE IGNORANT so says al Qa'ida.

    al Qa'ida has attacked the mausoleum of Imam Ali Bin Abi Talib, may God honor him. Blessed be al Qa'ida.

    And can the mujahedeen kill all of the Shia in Iraq? So says al Qa'ida.

    And why kill ordinary Shia considering that they are forgiven because of their ignorance? Blessed be al Qa'ida.

    al Qa'ida has ordered muslims killed even if they announced Shahadateen and this rule is agreed upon by all Muslims.

    So says al Qa'ida: consulting with religious scholars (and this does not necessarily mean accepting their opinion every time, or even most of the time) and having them participate in the matter is a wise policy that is supported by evidence from religious law, reason, history, and the knowledge of nations and their experiences. Blessed be al Qa'ida.

    Brother Abu-Musa'b, may God protect and guide you. Bless you, my brother. Know that we ( al Qa'ida ) , like all the mujahidin, are still weak. We are in the stage of weakness and a state of paucity. Blessed be the weak al Qa'ida

    Allah is great,

    Those who believe, fight in the Cause of Allâh, and those who disbelieve, fight in the cause of the (false moujadeem), Tâghût (Satan). So fight you against the friends of Shaitân (Satan). Ever feeble indeed is the plot of Shaitân (Satan the false Moujahedeen ). ] al-Nissa:76.

    Allah said : (Allah has promised, to those among you who believe and work righteous deeds, that He will, of a surety, grant them in the land, inheritance (of power), as He granted it to those before them; that He will establish in authority their religion -the one which He has chosen for them; and that He will change (their state), after the fear in which they (lived), to one of security and peace: 'They will worship Me (alone) and not associate aught with Me. 'If any do reject Faith after this, they are rebellious and wicked.) 55,AlNOOR.

    Allah said: "The punishment of those who wage war against Allah and His Messenger, and strive with might and main for mischief through the land is: execution, or crucifixion, or the cutting off of hands and feet from opposite sides, or exile from the land: that is their disgrace in this world, and a heavy punishment is theirs in the Hereafter." 33:Al-Maeda .

    Allah said : (Allah has promised, to those among you who believe and work
    righteous deeds, that He will, of a surety, grant them in the land, inheritance (of power), as He granted it to those before them; that He will establish in authority their religion -the one which He has chosen for them; and that He will change (their state), after the fear in which they (lived), to one of security and peace: 'They will worship Me (alone) and not associate aught with Me. 'If any do reject Faith after this, they are rebellious and wicked.) 55,AlNOOR.

    Moslems created the al Qa'ida and the Mujahideen Shura.

    Only Moslems can stop the al Qa'ida and the Mujahideen Shura

    Asking the Lord to accept. The overall objective of this bulletin : Brothers and sisters urged to publish this article to relatives and friends, and in the mosques, and every person standing on the Internet Through the printing and distribution of the bulletin, and read on boards and also through sent by e-mail and e-mail Different groups, and chat rooms. , and other ideas that have the positive impact

    Gerald
    Anthropologist

    What about all the innocents on the 4 planes al Qaeda hijacked, women, children, LYING BASTARD.

    Pdf his full transcript in English HERE

    From Jawa, graphic examples al Qaeda killing innocents here

    .

    Labels: , , , , ,

    Terrorist Names SEARCH:
    Loading

    Wednesday, April 02, 2008

    AIR FORCE INTERNET PARADIGM ERROR



    BUMPED SEE SECOND SECTION IF YOU HAVE ALREADY READ FIRST.



    FIRST SECTION:
    The Dogs of Web War

    By Rebecca Grant
    After years of claims and counterclaims concerning the severity of national security threats in cyberspace, the picture is at last starting to become clear. Recent jousting within cyberspace has provided clues about what to expect from combat in this new domain.

    EXCERPTed:

    The new Cyber Command will focus dedicated attention to the problem. Elder and others are working to lay the foundation for a cyberspace career path in the Air Force on a par with those for weapons systems and specialties. "We're looking to set up a professional cadre of cyber operators, and this would be enlisted and officer," Elder said.

    Investing now in survivability should help keep down the costs of buying new technology. A prime system is the Combat Information Transport System Block 30. "This is a system that is reducing our exposure to the commercial Internet," said Elder. "It's providing us much greater situational awareness in terms of being able to track the traffic on our networks.

    ( SURVIVABILITY? ? ?...I am aghast. The main mode of handling the cyber threat is "SURVIVABILITY". While this is crucial, its a poor paradigm. The Marines don't have as their main paradigm DEFENSE. THE main paradigm should be offensive. KILL THE ATTACKERS. G. )


    Already, however, Cartwright hinted at a greater freedom of action in the cyberspace commons. "Once you leave our shores, then the military authorities start to be present, and what we do is layer the defenses out as best we can to get the most warning, situation awareness that we can to protect our interests," he said.

    Given the constant probing, investing in survivability is a big priority. The cyber balance of power is "the most dynamic world we've ever seen," said a senior STRATCOM official. Software security fixes may just last for hours.

    ( NOTHING ABOUT OFFENSIVE CAPABILITIES, DESTROYING THE ATTACKERS WEAPON, THEIR server/PC. FOCUS IS NOT DEVELOPED YET. G )

    Investment will fund software tools to track vulnerabilities "before the hackers find them," said Elder, and insulate them with database wrappers that create portals to block incursions. The Air Force is also investing in extensive database encryption—a proven technique. "It's just much more difficult for someone to fool with your system when the data's encrypted," Elder said.
    Yet it may take an increased sense of strategic threat to force clarification of the cyberspace mission.

    Currently, there are classic divides. The intelligence community uses cyberspace in its tradecraft. Yet there is growing demand for operators to be able to exploit the same turf.

    Also yet to be determined is how much traction the Air Force is getting with its commitment to cyberspace.

    ( NOT MUCH TRACTION, GWOT HAS BEEN IN EFFECT FOR 6 YRS AND AIR FORCE DOESN'T EVEN HAVE ACTIVE CYBERWAR, WEB PAGE OR ACTIVE RSS FEEDS FOR THE WWW SERVICE, NAVY ( NNIC ) IS WAY AHEAD ON OSINT AND ITS VALUE/CAPABILITIES. They have a web page but I can't get into, no sec. clearance, which is ok, and no public face. G )


    US armed forces face "peer" adversaries in only one area—military cyberspace. ( NOT )


    More than ever before, cyberspace is on the minds of America's top leaders. Air Force Gen. Kevin P. Chilton, the new head of US Strategic Command, said during his confirmation hearing that "attacks impacting our freedom to operate in space and cyberspace pose serious strategic threats."

    Defending the nation from cyberspace attacks is STRATCOM's mission—but one of the big challenges is assessing the strategic threat and demarcating lines of response.

    It all begins with knowing the adversary. China is at the top of most lists of nations with advanced cyber capability—and the will to use it. ( The RBN has more advanced capabilities, G )

    Because of the overall tenor of military competition with China, every report of Chinese activity raises hackles. In fact, there's been a steady level of reported skirmishing in cyberspace this decade.

    Tactic No. 1 is near-constant pressure on US government systems. The goal of these attacks is to breach systems and leave behind malicious code capable of redirecting network activity or enabling access to stored data—to change it or steal it. "Cyber is all about 'protect it or steal it,'" Lt. Gen. Robert J. Elder Jr., commander of 8th Air Force and USAF's point man on cyber issues, said last year.

    "Estonia was kind of a wake-up call," said Marine Corps Gen. James E. Cartwright, vice chairman of the Joint Chiefs of Staff and previous head of STRATCOM. "We've got to make sure we have situation awareness at a scale commensurate with our equities."

    All doubt about Chinese culpability in these sorts of attacks vanished shortly after Russia's likely assault on Estonia. Pentagon sources acknowledged that a Chinese attack broke into an unclassified e-mail system used by the Office of the Secretary of Defense in June 2007. As reported by the Financial Times, the Pentagon attributed the attacks not only to Chinese server locations but to the People's Liberation Army itself.



    Air Force Lt. Gen. Daniel P. Leaf, deputy commander at US Pacific Command, told the Washington Times in November 2007 that computer attacks were a growing problem. "We're very concerned about that—for the information that may be contained on [the networks] or for the activities we conduct that are command and control and situation awareness related," he said.

    The attacks are of interest not for their fleeting effects—but for what they suggest about adversary intent, evolving capabilities, and the potential for debilitating breaches.

    ( I WANT TO HEAR COMPLAINTS FROM ATTACKERS ABOUT PC HARD DRIVES/SERVERS BEING DESTROYED, ABOUT THE USA MILITARY HARSH DEALINGS WITH HACKERS, G )

    "China has put a lot of resources into this business," said Elder. Communist China's public doctrine calls for dominating the five domains of air, land, sea, space, and the electromagnetic spectrum. Although "they're the only nation that's been quite that blatant," Elder said, "they're not our only peer adversary."



    The Air Force has recently taken bold action in this regard. In 2005, it elevated cyberspace to a level on par with air and space, when cyberspace was added to USAF's mission statement.
    Marine Corps Gen. James Cartwright (l) meets with USAF Lt. Gen. Robert Elder for a status brief on issues including the stand-up of Cyberspace Command.


    Rules of Engagement ( NONE )
    Elder himself oversaw the service's cyberwar capabilities during the time when the mission was being reinforced by the creation of a new Cyber Command, the Air Force's 10th major command.

    A larger policy problem rests with calibrating cyberspace operations to a scale of legitimate action. Over the last decade, rules of engagement for kinetic military operations—like targeting a terrorist safehouse in Iraq—have become highly refined.

    Theater-level rules of engagement, collateral damage estimation, and positive identification all must be observed before any strike takes place. Rules such as these keep responses proportionate to the political-military goals of an operation. It's a framework familiar to the hundreds of thousands of US troops operating around the world today.

    With cyberspace operations, that framework is not so prominent. German Chancellor Angela Merkel said recently that China "must respect a set of game rules."

    But what are those rules, and what constitutes a breach? Connecting cyberspace activities to the geographical norms of international politics is no easy task.

    ( YES IT IS, IF AN ATTACK COMES FROM XYZ SERVER, TAKE IT DOWN, USA HAS A RIGHT TO SELF DEFENSE, IF A SERVER HAS POOR SECURITY, AND IS COMPROMISED, USED FOR AN ATTACK, USA STILL HAS A RIGHT TO SELF DEFENSE, AND THE RIGHT TO TAKE OUT THE ATTACKING SERVER OR PC. WHICH WILL ALSO FORCE OWNERS OF THE SERVERS TO USE GOOD SECURITY AND VET USERS. G )


    For centuries, most international law has depended on the concept of sovereign borders and sovereign rights of states to gauge legitimacy. Everything from the Geneva Convention to the law of armed conflict is predicated on most offenses taking place between—or within—sovereign states. Rules of war also take for granted that events occur at a physical location tracing back to a nation-state.

    It is easy to tell when a state is using tanks or artillery against its neighbors or its own populace. With cyber attacks, it's unclear when and whether the state is involved.

    ( DOESN'T MATTER, IF IT IS STATE SPONSORED OR NOT, AN ATTACK IS AN ATTACK, USA HAS A RIGHT TO SELF DEFENSE. POLICE ARE NOT CONCERNED ABOUT OWNERSHIP OF A BUILDING A SNIPER IS IN, THEY TAKE OUT THE THREAT. G )

    Tracing attacks back to the originating Internet service provider does yield a physical location. (Cyberspace is projected from a physical infrastructure of servers, routers, and computers that have definite and sovereign physical locations.) However, cyberspace exists in a domain deemed independent of the nation-state.

    What's harder to establish is whether people conducting the attacks are hackers working on their own or at a government's behest. If a computer remotely "occupied" by hackers traces a physical location to China, that is not necessarily evidence that China is behind the scheme. The ambiguity works both ways, however. If China is behind an attack, it has built-in deniability.
    Estonian police use tear gas and truncheons to disperse a crowd protesting the removal of a bronze statue of a Russian soldier from the center of the capital city. The clash resulted in a massive cyber attack on government and private Web sites.


    A Fundemental Question
    "In this environment it's just very difficult to tell the point of origin," said Cartwright. "The source of the activity can be widely separated. Al Qaeda can live on a US ISP and execute from someplace else. How do we handle that?"

    ( TAKE OUT THE ATTACKING SERVER OR PC, THIS WILL IN THE LONG RUN HELP SERVICE PROVIDERS EXPAND SECURITY, FROM A BOTTOM LINE VIEW, G )

    It boils down to a fundamental question: When does an attack in cyberspace become a de jure attack? Even in the case of Estonia, protected by NATO's collective defense principle, the proper response to last spring's attack was open to debate.

    ( THERE WAS AN ATTACK, AND IT WAS TRACED TO SPECIFIC SERVERS, HOWEVER THE PERSONS CAUSING THE ATTACK WERE UNKNOWN, WHY WERE THE SERVERS NOT TAKEN OUT? G)



    Still undefined is the proper role for the US military. Inside the United States, legal precedent and direction limits what the military can do. According to Cartwright, "If it's inside the US, if we're to do anything about it, it's got to be on dot.mil" for the military to act. Most classified military networks are self-contained and rarely subject to the same barrage of attacks carried via the Internet.

    "If it's outside that and they want the military to do anything about it, then its military support to civil authorities just like we would do with a hurricane or anything else," he explained.

    In fact, it's the Department of Homeland Security that houses the key response teams for responding to Internet attack.

    Already, however, Cartwright hinted at a greater freedom of action in the cyberspace commons. "Once you leave our shores, then the military authorities start to be present, and what we do is layer the defenses out as best we can to get the most warning, situation awareness that we can to protect our interests," he said.

    Given the constant probing, investing in survivability is a big priority. The cyber balance of power is "the most dynamic world we've ever seen," said a senior STRATCOM official. Software security fixes may just last for hours.

    Expect to see an impact on Air Force budgets as service leaders fund the new mission. "What we're trying to do in '08 and '09 is to accelerate the programs that are tied to survivability of the Air Force portion of the global information grid," Elder said.

    The new Cyber Command will focus dedicated attention to the problem. Elder and others are working to lay the foundation for a cyberspace career path in the Air Force on a par with those for weapons systems and specialties. "We're looking to set up a professional cadre of cyber operators, and this would be enlisted and officer," Elder said.

    Investing now in survivability should help keep down the costs of buying new technology. A prime system is the Combat Information Transport System Block 30. "This is a system that is reducing our exposure to the commercial Internet," said Elder. "It's providing us much greater situational awareness in terms of being able to track the traffic on our networks."

    Serious money is going to the effort. "Some things we're trying to do with the CITS Block 30, for example, are in the range of half a billion dollars," Elder said.

    ( WHEN WILL THEY HAVE "RULES OF ENGAGEMENT" ABILITY TO GO ON THE OFFENSIVE? IF ATTACKED USA HAS A RESPONSIBILITY TO TAKE OUT THE ATTACKER. IF A SERVICE PROVIDER LOOSES A SERVER BECAUSE OF POOR SECURITY OR LACK OF OVER SIGHT ON WHOM THEY LET USE THE SERVER, THAT SHOULD NOT DETER USA FROM COUNTER STRIKING AN ATTACKING SERVER. G )

    Investment will fund software tools to track vulnerabilities "before the hackers find them," said Elder, and insulate them with database wrappers that create portals to block incursions. The Air Force is also investing in extensive database encryption—a proven technique. "It's just much more difficult for someone to fool with your system when the data's encrypted," Elder said.
    Yet it may take an increased sense of strategic threat to force clarification of the cyberspace mission.

    Currently, there are classic divides. The intelligence community uses cyberspace in its tradecraft. Yet there is growing demand for operators to be able to exploit the same turf.

    Creating Effects
    Many acknowledge the current US cyberspace strategy is "dysfunctional"—to use Cartwright's term from when he headed STRATCOM. But there's been only tepid enthusiasm for the Air Force's willingness to step up to the growing mission. Ultimately, the Air Force may be recognized as the chief force provider for cyber capabilities. Signs suggest it won't come without a period of debate.

    That debate will center first on the logic of cyberspace as a domain. To Air Force planners, the domain aspects have become self-evident. Cyberspace operations include activity to maintain the freedom to attack and freedom from attack in that domain. In fact, counterdomain operations are being defined, too.

    As Elder put it, "The better your cyber is, the [more] quickly you can do decision-making, [to] create effects." Degrading and slowing operations—especially to the point where "you can't operate anymore"—creates what Elder termed a "counterdomain effect."

    Not all accept cyberspace as a clear-cut domain like air, space, or the sea, however. Cartwright, for one, pointed out that it all turns in part on whether cyberspace is to be treated as a truly separate and co-equal area of warfare. "That's the huge debate," he said. "Should this be a domain or not be a domain?"

    ( ONLY A TROGLIDITE , WOULD CLAIM THE WEB ISN'T A DOMAIN, I THINK AL QAEDA HAS PROVED THAT HYPOTHESIS. G )

    Even as the pace of activity escalates, there's a sense of proceeding carefully. Part of the concern rests with a reluctance to lock in poor solutions.

    ( "LOCK IN " IS BS FOR LACK OF DECISION MAKING, NOTHING IS LOCKED IN, IT WILL BE TRIAL AND ERROR. G )

    Cartwright urged senior leaders to recognize how much there is to learn from the younger generation. "The Joint Staff is an old staff, demographically," he said. "So here we are, in charge of thinking our way through cyber without the 20-somethings."

    He warned against putting in place a rigid doctrine for cyberspace that might end up squashing the creative thinking that has always been a hallmark of the domain.

    "If we try to use our industrial-age Napoleonic decision structures, are we disadvantaging ourselves?" asked Cartwright. He saw "a lot of cultural issues that far outreach the technical issues and the organizational constructs. What I'm most concerned about is protecting the decision space and the opportunity space of the 20-somethings."

    But he stopped well short of handing over the cyber mantle to the Air Force. "Where we are right now, each of the services has found value," Cartwright said. The Air Force is making investments and letting its money "speak about their risk equations. We've got enough time to let that play out."

    ( EVENTUALLY EACH SERVICE WILL HAVE ITS OWN CYBER FORCE. G )

    Rebecca Grant is a contributing editor of Air Force Magazine. She is president of IRIS Independent Research in Washington, D.C., and has worked for RAND, the Secretary of the Air Force, and the Chief of Staff of the Air Force. Grant is a fellow of the Eaker Institute for Aerospace Concepts, the public policy and research arm of the Air Force Association. Her most recent article, "There When it Counts," appeared in the December 2007 issue.

    SOURCE:

    XXXXXXXXXXXXXX

    Its just so frustrating to see discussions of fiat acompli like they are NOT.
    Is the WWW a domain, is something that is self evident, to the Internet
    I don't want to hear from anyone that doesn't have a PC on his desk, and I suspect there are a lot of general officers that don't , and they should be replaced.


    "US armed forces face "peer" adversaries in only one area—military cyberspace." NOT. USA armed forces are 5 years behind, force projection on the www.

    This reminds me of, I think it was Doolittle, that exposed the air as a domain by bombing some battle ships to the bottom of the sea, to show air as force projection.

    The Internet itself is at sever risk NOW.
    The world is facing a Pearl Harbor www attack that could take out the Internet.
    And they are discussing if it is a domain?

    Hell: there is a new www WMD and we are still discussing if its a "domain" we are 5 years behind.

    The same logic that applies to coastal defenses applies to server and net defenses.
    Offense not defense. ( I'm not saying to drop defenses but we MUST have and use a offensive capability. Right now it takes an ok FROM BUSH, to take down a server.)
    Would any military service exist with out offensive capabilities?
    We acting with out rules of engagement on the WWW, USA IS AN EASY,SAFE
    TARGET.
    If USA used the rules of engagement in Iraq as they use on the WWW, USA would have surrendered by now.

    NSA is hiding all the cool www side arms.
    Our Intel paradigm on NSA remains confidential, their capabilities boggle the mind.


    Gerald


    "





    SECOND SECTION

    UPDATE:


    US reveals plans to hit back at cyber threats

    MY COMMENTS IN CAPS.G

    Tom Espiner ZDNet.co.uk

    Published: 02 Apr 2008 17:27 BST

    The US Air Force Cyber Command is developing capabilities to inflict denial of service, confidential data loss, data manipulation, and system integrity loss on its adversaries, and to combine these with physical attacks, according to a senior US general.

    Air Force Cyber Command (AFCYBER), a US military unit set up in September 2007 to fight in cyberspace, is due to become fully operational in the autumn under the aegis of the US Eighth Air Force. Lieutenant general Robert J Elder, Jr, who commands the Eighth Air Force's Barksdale base, told ZDNet.co.uk at the Cyber Warfare Conference 2008 that Air Force is interested in developing its capabilities to attack enemy forces as well as defend critical national infrastructure.

    "Offensive cyberattacks in network warfare make kinetic attacks more effective, [for example] if we take out an adversary's integrated defence systems or weapons systems," said Elder. "This is exploiting cyber to achieve our objectives."

    However, this is a double-edged sword, as adversaries will also attempt to develop similar capabilities, especially considering the US military's heavy use of technology, said Elder.

    NOW THIS IS A ONE EDGED SWORD, THEY MAY HAVE THAT CAPABILITY, USA DOES NOT AND WOULD NEED BUSH'S OK TO ENGAGE. G

    "Terrorists and criminals are doing the same thing. We depend so heavily as a military on the use of cyber, we have to be cautious about it," said Elder. "Cyber gives us a huge advantage but adversaries look at our capabilities and see areas they can undermine. We need to protect our asymmetric advantage — on the one hand by having people further exploit cyber, and on the other by having mission assurance."

    This problem is made more pressing by the military's reliance on the public internet to perpetrate cyberattacks. The infrastructure the US military uses to both launch and defend against cyberattacks runs through the public internet system. Military networks such as the Global Information Grid are linked to US government and critical national infrastructure systems, which in turn are linked to the public internet. Adversary systems are subverted by the US military through public channels — however, this also leaves the US military open to attack through the same channels, said Elder.

    ELDER IS MISSING A GOOD POINT HERE, IF THE PUBLIC INTERNET SYSTEM IS TAKEN DOWN WHAT HAPPENS TO THE C2 FOR THE MILITARY.G

    "The infrastructure on which the Air Force depends is controlled by both military and commercial entities and is vulnerable to attacks and manipulation," said Elder.

    Other causes for military concern include possible supply-chain vulnerabilities, where vulnerabilities are introduced into chipsets during manufacturing that an adversary can then exploit, and electronics vulnerabilities.

    "We need to make sure chips aren't manipulated — we're worried about information assurance just like everyone else," said Elder.

    Other problems being faced by the Cyber Command are centred around different Air Force and military units needing to improve their channels of communication before the autumn.

    "We have 10,000 people to do this, but the problem is they are stovepiped," said Elder.

    10,000 PEOPLE THEN WHY ARE THERE 5,000 TERROR WEB SITES STILL UP?
    WHY ARE WE ALLOWING THEIR C2 TO FUNCTION ON THE INTERNET?G
    I HAVE 100 AND WE ARE COMPILING LISTS OF TERROR SITES.
    MY TROOPS JUST VETTED 700 SITES IN 2 DAYS.G

    "Stovepiping" has two complementary meanings. In IT terms it describes information held in separate databases which is difficult to access due to its multiple locations — the UK equivalent term would be "siloed". In intelligence-gathering terms — the Eighth also serves as the US Air Force information operations headquarters — "stovepiping" refers to information which has been passed up the chain of command without undergoing due diligence.

    Elder said that, while he was satisfied with AFCYBER's covert operations capabilities and its demonstrable ability to remotely destroy missile defence systems, he wished to further develop its attack capabilities.

    "IT people set up traditional IT networks with the idea of making them secure to operate and defend," said Elder. "The traditional security approach is to put up barriers, like firewalls — it's a defence thing — but everyone in an operations network is also part of the [attack] force. We're trying to move away from clandestine operations. We're looking for real physics — a bigger bang resulting in collateral damage."

    MOVING AWAY FROM COVERT OR CLANDESTINE OPERATIONS ON THE INTERNET
    IS THE OPPOSITE OF A FORCE MULTIPLIER. FORCE REDUCER? BAD MOVE. THE INTERNET WAS MADE FOR COVERT OPERATIONS, AND USA HAS THE TECHNOLOGY AND POWER TO DOMINATE THE INTERNET LIKE THE AIR FORCE DOES THE AIR.
    THE PARADIGM AND EXPERIENCED LEADERSHIP IS MISSING.G

    For deterrence we have to clearly identify the attacker. We're working on rapid forensics to determine who the adversary is.

    WITH BOT NETS I DON'T THINK THIS IS POSSIBLE OR THAT YOU CAN DO IT WITH CURRENT TECHNOLOGY.G


    Lieutenant general Robert J Elder, Jr

    US Cyber Command also needs to develop the means to quickly pinpoint exactly where an attack is coming from, to be able to retaliate, and also to deter potential attackers.

    "We haven't done a good job in the cyber-domain just yet," said Elder. "We have to demonstrate the capability to do [rapid forensics] then message that to our adversaries. For deterrence we have to clearly identify the attacker. We're working on rapid forensics to determine who the adversary is."

    MESSAGE THE ADVERSARIES WE KNOW WHO AND WHERE THEY ARE?
    WOULD YOU DO THIS ON A BATTLE FIELD? THIS IS NUTZ, IT MAKES USA A SAFE TARGET AGAIN, YOU ENABLE THEIR ATTACKS WITH THIS PARADIGM. TAKE THE BASTARDS OUT.G
    WE ARE UNDER ATTACK. ELDER DOESN'T SEEM TO GET THAT.G

    While cyber-espionage was inevitable, said Elder, knowledge of the US military being able to pinpoint the source of cyberattacks could deter assaults on critical national infrastructure that use Supervisory Control And Data Acquisition (Scada) systems.

    "We're not going to deter cyber-espionage, but we might be able to deter attacks on Scada networks," said Elder.

    As well as developing forensics tools, Cyber Command is also coding tools to check for incursions, including a "Cyber Sidearm", which will monitor activity on the Combat Information Transport System — the US Air Force cyber-network.

    A CYBER SIDEARM DOES NOT MONITOR, A SIDEARM DOES DAMAGE, YOU DO NOT HAVE A CYBER SIDEARM IF IT ONLY MONITORS, YOU HAVE A DAMAGE RECORDER NOT A SIDEARM. I HAVE BEEN ISSUING CYBER SIDEARMS TO SELECT TROOPS SINCE MAR 22 IN OUR "C" COMPANY THAT CAN DO DAMAGE, QUOTE FROM OUR BLACK WIKI:
    "We will issue you a cyber sidearm, and rules of engagement.
    Violation of the rules of engagement could result in criminal prosecution, they are strictly for self defense only,
    (YOUR PC under attack.).
    Use of the small arms may automatically notify the Watch Officer, calling in backup, and alerts me to a situation.
    And activates Internal Affairs.

    Gerald"



    "We've been working to get the functionality built — we're supposed to have it in the next couple of months," said Elder.

    US Eighth Air Force said it was seeking partnerships with both public- and private-sector organisations to "secure cyberspace". The Department for Homeland Security's Strategy to Secure Cyberspace includes establishing a public-private architecture to gauge and respond to cyberthreats, and increase information-sharing between public- and private-sector organisations and the military.

    SOURCE:

    XXXXXXXXXXXXXXXXXXXXXXXXXXXXX

    AIR FORCE IS STILL A GENERATION BEHIND, AND WORKING WITH THE WRONG PARADIGM.

    WHEN AN ENEMY JET COMES UP AGAINST THE USA AIR FORCE, THEY RUN AWAY OR DIE.
    THAT IS THE PARADIGM FOR THE US AIR FORCE ON THE INTERNET.

    YOU DOMINATE YOUR DOMINION BE IT AIR OR CYBER.

    GERALD ( WITH ARMS OPEN )
    INTERNET ANTHROPOLOGIST
    DIRECTOR OF "C" COMPANY

    .

    Labels: , , , , ,

    Terrorist Names SEARCH:
    Loading

    cyb3rt Burned.


    http://mypetjawa.mu.nu/archives/192029.php

    Anti-Fitna Website wS Hacked by ISLAMIC Cyberterrorists!

    Why?


    The site appears to simply aggregate articles about Geert Wilders and Fitna. Most of those articles are filled with statements about how hateful the movie and/or Geert Wilders is.

    The cyber terrorist is
    cyb3rt

    He is using a Secure Elite proxy in Chicago, Illinois, United States

    The IP is in Chicago.


    His REAL IP is
    (212.76.64.4:34216)

    Location: Riyadh, Ar Riyad, Saudi Arabia
    Language: PC: ar-jo (Arabic/Jordan), ar;q=0.8 (Arabic), en-us;q=0.5 (English/United States), en;q=0.3 (English)
    Moz/5.0 (Win; U; Windows NT 5.1; ar; rv:1.8.0.12) Gecko/20070508 Firefox/1.5.0.12
    Riyadh







    Image from Wikipedia
    Great work Company "C".

    I am with holding his name, which has been given to the FEDS.

    Gerald

    .more:

    al-ansar.virtue.nu
    An email jihad site
    HERE : a support site for the old Www.al-jinan.org, which we took down, and burned their head hacker. May be behind some of the latest DOS attacks.



    .
    UPDATE:
    We have no interest in the other team members unless they too
    do something stupid.
    z3r0.2.z3r0
    The_Fox_HaCkErS
    And the others on his PC, Casus - SeaNPauL - Cobra - Eno7 - PowerFull - m3rhametsiz - SinAriTx - Dengesiz-Tr© - 0xyGen - Cod3 Z3r0 - Blueent - KaRaSeyTaN - Swan - The [B]l4ck[B]on3r - PowerDream - ColdTurk -
    FaTaLTerrOr - saudia_hacker - Oaddah - nEt^DeViL [ S4ud1-C0d3r ] - Dєvil Hackєг - d3vil-x - PHP Emper0r - Lordvb - xzemor - CLass!c - MujaHeeD - al3frite - By_Ogmass- MacHaCk-Nator


    Gerald
    Barb

    .






    Labels: , , , , ,

    Terrorist Names SEARCH:
    Loading

    known as "Kill TV"

    Inside the Bridge: Behind the scenes of a strike into Pakistan

    _MG_9906-sm.jpg

    Inside the Bridge, five massive projected screens dominate the main wall, and stadium-style layout allows personnel manning the various workstations to view the screens with an unhindered view. Despite having a business-like workplace feel, the Bridge maintains a throbbing pulse, with personnel constantly monitoring, analyzing, and disseminating the intelligence pouring into their sections. The nature of the work performed in the Bridge plays a fundamental role in the Coalition's ability to target and disrupt insurgent activities and fugitive commanders.

    Fluorescent lights keep the room bright 24 hours a day. The sheer amount of computer equipment is a striking feature. The workers dressed in uniform go about their business.

    But inside this overhauled Soviet-era hangar on Bagram Air Field, Afghanistan's sprawling main hub for international operations, lies the heart of the effort to hunt Taliban and terrorist masterminds: The Joint Operation Center's operation cell, aka "the Bridge."

    The Long War Journal's Phil Peterson had extraordinary access inside the Bridge during the evolution of the March 12 strike that destroyed a Haqqani Network safe house in Pakistan.

    The March 12 strike originated from intelligence gathered on the ground from a subordinate unit seeking information on the Haqqani Network. After full-motion video and other "special intelligent collection capabilities" were performed, the Bridge confirmed this particular compound was indeed a safe house for insurgents. Analysts continued to scrutinize the area looking for any signs of life, the presence of women or children, and activity in neighboring structures. Other disciplines, such as law and weapons, are consulted as well. In this case, intelligence assets reported no presence of civilians in the area over the previous five days, making the decision to launch a strike urgent. Full-motion video captured and projected on to the center projection screen -- known as "Kill TV" -- several individuals performing sentry duty in and around the Haqqani Network compound's boundaries.

    At 9:40 PM local time, Coalition forces declared an imminent threat from the compound and gathered in the Bridge to discuss the possibility of striking the compound. Due to its location inside Pakistan, the proposal was sent up the chain of command to US Central Command and ISAF (International Security Assistance Force). After discussing the latest intelligence reports, rechecking and confirming their accuracy, the commanding general ordered the strike.

    in the minutes leading up to the strike, everyone was working to make sure their data and intelligence was correct. In the final seconds, all eyes were on Kill TV, some people were sitting while others were standing, to see the real time video of the impending strike.

    There was no cheering or high fives; only a hushed "ohhh" from a few people when the strike was made.

    The strike was completed and work resumed as usual. Personnel returned to their workstations and the designated section began the process of contacting Pakistan officials to let them know about the strike. Analysts continued studying the streaming video images looking for signs of life in and around the area while other teams at offsite locations were doing the same and then feeding their conclusions to the Bridge commander.
    SOURCE:
    http://www.longwarjournal.org


    Labels: ,