Terrorist Names SEARCH:
Friday, November 14, 2008
Taliban webmasters hiding, terrified
Taliban webmasters hiding, terrified on the RUN:
By Gerald; Internet Anthropologist Think Tank
Started Nov 15, finished Nov 16, 2008
The first time we burned him he was in Islambad:
he is s an Arab, from Saudi Arabia.
Speaks Arabic and Pashto and some english.
He lived 4km out side Islambad, to the East south east.
HIS IP is 119¸154¸65¸172:1660
He was on line
17-Oct-08 at 01:08:15am EST (UTC -4:00)
That our moles won't live with them?
emailed me about him with info on his activities.
Thursday, November 13, 2008
ops and Intel update
Taipei Times -
PHOTO: AP A group of pranksters handed out more than 1.2 million fake New York Times newspapers mainly in New York City and Los Angeles on Wednesday with a front page story declaring “Iraq War Ends” and another on the indictment of US President George ...
A new Pentagon manual (pdf) issued by Under Secretary of Defense (Intelligence) James R. Clapper prescribes the implementation of the Department of Defense operations security (OPSEC) program. OPSEC is the process of identifying sensitive information that could be exposed to hostile detection in the course of military operations, and taking steps to protect such information.
Seoul (AFP) Nov 11, 2008 - South Korean police said Tuesday they have seized almost 10,000 fake 100-US dollar bills, known as "supernotes" for their high quality, and arrested four people. The Busan Metropolitan Police Agency said its arrest Monday of the four men led to the seizure of 9,904 100-dollar notes brought in from China. They were caught trying to sell the notes for 50 dollars each in the southern
London, UK (SPX) Nov 12, 2008 - The 13 members of the Organization of the Petroleum Exporting Countries (OPEC) pumped an average 32.26 million barrels per day (b/d) of crude oil in October, according to a Platts survey of OPEC and oil industry officials just released. This is a 210,000 b/d decline from the September level of 32.47 million b/d. Excluding Iraq, production from the 12 members hitherto bound by
Labels: Ops and Intel UPDATE
Treasury's new plan?
Labels: Treasury's new plan?
Wednesday, November 12, 2008
Mexico: drug cartels have 50 cals.
Tuesday, November 11, 2008
Monday, November 10, 2008
Are Federal Reserve screwing up?
CYBER PEARL HARBOR POSSIBLE
SAN FRANCISCO: Attackers bent on shutting down large Web sites — even the operators that run the backbone of the Internet — are arming themselves with what are effectively vast digital fire hoses capable of overwhelming the world's largest networks, according to a new report on online security.
In these attacks, computer networks are hijacked to form so-called botnets that spray random packets of data in huge streams over the Internet. The deluge of data are meant to bring down Web sites and entire corporate networks. Known as distributed denial of service, or DDOS, attacks, such cyberweapons are now routinely used during political and military conflicts, as in Estonia in 2007 during a political fight with Russia, and in the Georgian-Russian war last summer. Such attacks are also being used in blackmail schemes and political conflicts, as well as for general malicious mischief.
A survey of 70 of the largest Internet operators in North America, South America, Europe and Asia found that malicious attacks were rising sharply and that the individual attacks were growing more powerful and sophisticated, according to the Worldwide Infrastructure Security Report. This report is produced annually by Arbor Networks, a company in Lexington, Massachusetts, that provides tools for monitoring the performance of networks.
The report, which will be released Tuesday, shows that the largest attacks have grown steadily in size to over 40 gigabits, from less than half a megabit, over the last seven years. The largest network connections generally available today carry 10 gigabits of data, meaning that they can be overwhelmed by the most powerful attackers.
The Arbor Networks researchers said a 40-gigabit attack took place this year when two rival criminal cybergangs began quarreling over control of an online Ponzi scheme. "This was, initially, criminal-on-criminal crime though obviously the greatest damage was inflicted on the infrastructure used by the criminals," the network operator wrote in a note on the attack.
"We're definitely seeing more targeted attacks toward e-commerce sites," said Danny McPherson, chief security officer for Arbor Networks. "Most enterprises are connected to the Internet with a one-gigabit connection or less. Even a two-gigabit DDOS attack will take them offline."
Large network operators that run the backbone of the Internet have tried to avoid the problem by building excess capacity into their networks, said Edward Amoroso, the chief security officer of AT&T. He likened the approach to a large shock absorber, but said he still worried about the growing scale of the attacks.
Edward Amoroso of AT&T said:
"We have a big shock absorber," he said. "It works, but it's not going to work if there's some Pearl Harbor event."
Over all, the operators reported they were growing more able to respond to DDOS attacks because of improved collaboration among service providers.
According to the Arbor Networks report, the network operators said the largest botnets — which in some cases encompass millions of "zombie" computers — continue to "outpace containment efforts and infrastructure investment." ( IATT has forwarded a method to DIA to stop bot attacks as they happen, shutting down the indivual bots, as they come up. G )
Despite a drastic increase in the number of attacks, the percentage referred to law enforcement authorities declined. The report said 58 percent of the Internet service providers had referred no instances to law enforcement in the last 12 months. When asked why there were so few referrals, 29 percent said law enforcement had limited capabilities, 26 percent said they expected their customers to report illegal activities and 17 percent said there was "little or no utility" in reporting attacks. ( nothing happens. G )
Labels: CYBER PEARL HARBOR POSSIBLE
Secret Order; U.S. Raids Al Qaeda. Many Countries
WASHINGTON — The United States military since 2004 has used broad, secret authority to carry out nearly a dozen previously undisclosed attacks against Al Qaeda and other militants in Syria, Pakistan and elsewhere, according to senior American officials.......
The details of one of those aborted operations, in early 2005, were reported by The New York Times last June. In that case, an operation to send a team of the Navy Seals and the Army Rangers into Pakistan to capture Ayman al-Zawahri, Osama bin Laden’s top deputy, was aborted at the last minute.
Mr. Zawahri was believed by intelligence officials to be attending a meeting in Bajaur, in Pakistan’s tribal areas, and the Pentagon’s Joint Special Operations Command hastily put together a plan to capture him. There were strong disagreements inside the Pentagon and the C.I.A. about the quality of the intelligence, however, and some in the military expressed concern that the mission was unnecessarily risky.....
Sunday, November 09, 2008
Hacker group trageting US Army
Labels: Hacker group trageting US Army