Internet Anthropologist Think Tank: 1/25/09 - 2/1/09

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Saturday, January 31, 2009

    Cyber War under way

    Cyber War under way on many fronts.
    By Gerald: Internet Anthropologist Think Tank
    1.31.09

    Russian 'cybermilitia' knocks Kyrgyzstan offline

    Same tactics used in '08 attack against Georgia, but hackers getting faster, says researcher



    January 28, 2009 (Computerworld) A Russian "cybermilitia" has knocked the central Asian country of Kyrgyzstan off the Internet, a security researcher said today, demonstrating that the hackers are able to respond even faster than last year, when they waged a digital war against another former Soviet republic, Georgia.

    Since Jan. 18, the two biggest Internet service providers in Kyrgyzstan have been under a "massive, sustained distributed denial-of-service attack," said Don Jackson, the director of threat intelligence atSecureWorks Inc.

    The attacks, which are ongoing, have knocked most of the country offline and disrupted e-mail to and from a U.S. air base there, Jackson said. The public affairs officer at Manas Air Base in Kyrgyzstan was not immediately available to answer questions about whether the attacks have disrupted operations or other activities.

    According to Jackson, the distributed denial-of-service (DDoS) attacks -- essentially a flood of requests that overwhelm servers and effectively knock them off the Internet -- can be traced to the same groups of Russian and ethnic Russian hackers who assembled in militia-like fashion last August to launch similar attacks against Georgia.

    "The traffic we've collected has all the hallmarks of the tools that were used in the Georgia attacks," said Jackson. "And they're from the same network [of IP addresses] that we associated with the cybermilitia last year." Researchers have also found two groups, led by "two specific players," in common with the 2008 attacks against Georgia, he added.

    Speculation about why Kyrgyzstan's Internet infrastructure was attacked center around an investment deal that Russia is negotiating the country. Russia has indicated that it wants Kyrgyzstan to oust foreign air forces, including those of the U.S., before it will agree to loan the country $300 million and invest another $1.7 billion in its energy industry.

    Opposition to the current administration in Kyrgyzstan has relied heavily on the Internet, while President Bakiyev's government has ignored the Web, said Jackson. "Any attack by Russians would do no collateral damage to their ally in the area, and would only impact the opposition," he explained.

    Beyond the immediate effect on Kyrgyzstan, what's worrisome to Jackson is the speed with which this attack was mounted. "To put some perspective on this, it's been an escalating pattern from Estonia to Georgia to here," he said, referring to the 2007 and 2008 attacks against other former Soviet republics. "The attacks are more closely coinciding with events that are core to the Russian interest, with increasingly fast response and quick mobilization.

    "When it once took days or weeks, now we're seeing it within hours," Jackson said.

    In fact, the attacks on Kyrgyzstan were mobilized in much the same way that the so-called militia was formed last year to cripple Georgia. "It was the same kind of mobilization, where word is put out by a few and then other [hackers] respond," he said. One difference: The attacks against Kyrgyzstan lacked the kind of wide support that the Georgian DDoS attacks gained. At one point, Russian social network were involved in the latter, something not yet seen in the attacks against Kyrgyzstan.

    "We haven't seen a broad base of support by Russian citizens," said Jackson. "It's more the core of the militia group."

    Researchers have not found any direct connection between the attacks -- which originate on botnets and servers that send more mundane pharmaceutical spam or conduct phishing campaigns -- and the Russian government. But to Jackson, that hardly matters.

    "People who once were in the KGB, or other parts of the government, and who now are in computer security, have in the past said, 'We will rely on this capability because there is no risk for us doing so,'" said Jackson. "Using cybermilitias shelters the Russian government from culpability."


    SOURCE:


    XXXXXXXXXXXXXXXXX


    We have warned of a Cyber Pearl Harbor for over a year now 8/01/2007 01:14:00 PM

    It can be prevented. It takes action in advence of the attack.
    We have the paradigm and have noted a solution in many
    of our posts.

    3.5 million bots:

    The 'Downadup' worm is spreading quickly and now infects more than 3.5 million PCs, according to the security company F-Secure. Another huge bot net, it could be taken over or stolen and used for an attack on the WWW.

    There is a group of Arab hackers mostly using kiddie scripts that have taken down 100+ Israel web sites. ( google formating has locked the txt to BLACK, SORRY g.)
    They are called the "Moroccan Snipers".
    Our BSU's report the number is closer to 300 sites total.
    And our recon teams believe they have progressed
    to using a Trojan that takes out your PC.
    Win32:KillWin-Y
    It is a very new variant, and we have managed to
    get our hands on it. It was sent to one of our C company troops.
    We are examining it now.
    It is new but an updated strain of an older Trojan.
    Our BSU's have monitored their recruiting operation.
    And they are on line daily attempting to recruit new
    members to spread the Trojan.
    These groups web sites should be taken down
    and ANY web site that carries their message
    or information.

    From a hacked site:

    "This Hack iS To DeFend Islam That Has Been Harrased by Denmark and USA and Israel"

    ! Stop ! This is not a dream it's a reality
    "Thanx To Allah For being MuSliMs"

    ( E X I T )

    ( Made . In . MoRocco )

    Its true, they are in Morocco.
    We are collecting IP's and locations.
    With held for opsec reasons.

    Another group is the:

    Hacked By MoroCcaN Inject0r5 Crew

    We have seen the jahiddies grow from a small group

    the al jinan group which was attacking USA

    with a cyber attack in Nov. Which we killed.

    To defacing sites to spreading trojans that take out

    your PC. ( Google formatting is screwing up again )

    Now the cell phones are under attack by a disabling Trojan.

    http://jorhack.blogspot.com/2009/01/blog-post_616.html

    Even though most of them arrested and do years in PRISON.

    The kids think its cool to call themselves hackers and use

    kiddie scripts. Years in prison and a criminal record.

    Because they think this qualifies them as hackers, but

    their just little wanabees going to jail.

    They like to tell and show their non computer

    literate friends their "Hacking". And many

    think this is the door to a hacking education,

    not knowing they will actually have to learn  coding

    and that bieng part of these groups brands them

    as "wanabee fakes".

    More coming.

    Gerald

    Tactical Internet Systems analyst

    Morocco spiders BURNED:










    Labels:

    Terrorist Names SEARCH:
    Loading

    CIO NIGHTMARE



    Fannie Mae Logic Bomb Would Have Caused Weeklong Shutdown

    By Kevin Poulsen EmailJanuary 29, 2009 | 1:41:19 PMCategories: Threats  

    FannieA logic bomb allegedly planted by a former engineer at mortgage finance company Fannie Mae last fall would have decimated all 4,000 servers at the company, causing millions of dollars in damage and shutting down Fannie Mae for a least a week, prosecutors say.

    Unix engineer Rajendrasinh Babubha Makwana, 35, wasindicted (.pdf) Tuesday in federal court in Maryland on a single count of computer sabotage for allegedly writing and planting the malicious code on Oct. 24, the day he was fired from his job. The malware had been set to detonate at 9:00 a.m. on Jan. 31,

    Had it not been found, the FBI says the code would have executed a series of other scripts designed to block the com

    pany's monitoring system, disable access to the server on which it was running, then systematically wipe out all 4,000 Fannie Mae servers, overwriting all their data with zeroes.

    "This would also destroy the backup software of the servers making the restoration of data more difficult because new operating systems would have to be installed on all servers before any restoration could begin," wrote Nye.

    As a final measure, the logic bomb would have powered off the servers.

    SOURCE:Permalink 

    g

    .

    Labels:

    Terrorist Names SEARCH:
    Loading

    Russian Coded com

    Following is a coded email message to the Russians.

    Hello Sweety! How are you? I'm good. Sorry for taking so long to write to you…you know how work is and all. Any7ways, things are good. It looks like I will still be able to go on that vacation! I will keep you updated on that though. I am very much looking forward to it, and to seeing you again! Well hon, I just thought I'd say "hi" since I had the time!


    It says: "confirming a Dec. 10, 2008, meeting at a TGI Friday's located at 12 Diagorou Avenue, Nicosiya
    in Cyprus:
    "

    Son of a disgraced imprisioned CIA agent collected $35,593.

    FBI was all over this, court docs from 1.27.09

    Conspiracy to Act As an Agent of a
    Foreign Government Without Prior
    Notification of the Attorney General

    Russian Federation and operates a foreign intelligence service known as the Sfuzhba Vneshney
    Razvedki Rossii (SVRR). The SVRR is the successor to the Committee for State Security of the
    Union of Soviet Socialist Republics. commonly known as the KGB. It is also commonly referred
    to as the "SVR."

    This is a father and son team, the son was 12 at the time of the dads arrest,
    The son delivered info from the dad who was in prison to Putin's boys.
    and Dad instructed the son to disperse the funds received from the Russian
    Federation to his grandparents and siblings.

    The dad even had the son do test runs to get text info out of the prison
    But the Dad told other inmates he was trying to contact the Russians.

    FBI surveillance was tight and comprehensive.

    The son is expected to appear today in a Portland federal court

    Gerald

    .

    Terrorist Names SEARCH:
    Loading

    Friday, January 30, 2009

    NO, NO no

    NO, NO no
    By Gerald: Internet Anthropologist Think Tank
    1.31.09


    U.S. Central Command has 14 different, physically separated networks. To get access to the info on all of 'em, a military type needs as many as five different computers, sitting on his desk. But new software being tested by CENTCOM would enable a single computer to connect to all those networks at once -- from the open internet to the top secret stuff. "If it proves secure, could save more than $200 million for CENTCOM," UPI's Shaun Waterman reports. And a ton of hassle, too.

    But the best part of the project might be its acronym. The demonstration is called "One Box, One Wire" -- OB1, for short. Use the Force, sysadmins!

    The key to OB1, retired U.S. Air Force Gen. Eugene Habiger tells Waterman, is the "separation kernel," a piece of software "guaranteed to keep the different networks separate."

    SOURCE:Permalink

    xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

    " a piece of software "guaranteed to keep the different networks separate."

    B.S.

    Its software.

    There is no software, security or otherwise that makes your PC 100% safe.

    With the coming recession there is more motivaton for hackers,

    ( profit )

    and less motiation for Security software cos.

    ( expenses/costs )

    The Security software industry is a failure.

    There is no way to secure a PC or MAC connected to the net.

    The hackers are way ahead of the curve in maleware

    and the Software Security Cos are way behind the curve.

    And its going to get worse as in the depression the Sec.

    Cos cut budgets, and hackers go for more $$$.


    If the Military connects the seperate 14 newworks

    they are providing a bridge to each one.

    IT IS NOT POSSIBLE TO SECURE A COMPUTER

    IF IT IS CONNECTED TO THE WWW.

    I'm saying it here now, so I can quote my self later.

    all 14 networks will be breached if you connect them

    on one computer and the WWW.

    At no time in the history of the WWW have computers

    been so vunerable and from automated attacks, as they are now.


    One of the leading Security Companies Trend Micro

    has some of the best security systems, but the worst

    service for paying clients I have ever experienced.

    Their service is abysimal. They are unbelieveably

    Bad. But some of their programs are the best out

    there.


    The hackers, and malware creators are so far ahead

    of the Security Cos, it will take a major new paradigm

    breakthrough to catch up. And there are none on the horizon.

    There is no Security program or combination of programs

    that will porvide 100% security, ain't no such animial.

    Any company that says that is lying.

    Lets look at the press release: MY COMMENTS IN CAPS FOR EASE OF READING.G

    Last year the U.S. military banned the use of removable media like thumb and Flash drives after a worm spread on such devices infected CENTCOM computers.

    "Through a Flash drive, a worm or a virus is introduced," said Liacko, "and moving data physically like that opens up the door, and once the door is open, it can propagate and the whole network can be compromised. Integrity stops that."

    Retired U.S. Air Force Gen. Eugene Habiger, a member of the company's advisory board, is blunter. "Had this operating system been used within the systems (that were compromised by the worm), this would not have happened."

    OK NOW THE WORM WAS SPREAD BY A THUMB DRIVE MOVED FROM PC TO PC.

    NOW INSTEAD OF A THUMB DRIVE, ITS ONE PC CONNECTED TO ALL THE NETWORKS,

    HOLD THAT THOUGHT. G

    Habiger, a former head of cybersecurity at the Department of Energy, said the technology on which the new software was based had been certified by the National Security Agency.

    "The fact that the NSA has given this certification to Integrity and its software after, as I understand it, a very intensive, exhaustive two-plus years of analysis … that speaks volumes for its reliability and security.

    "This operating system is revolutionary," he concluded. "The technology is revolutionary."

    The key to Integrity's game-changing character, said Jones, is known as the separation kernel, a piece of software "guaranteed to keep the different networks separate … all the way from the unclassified to the top-secret level."

    KEEPS NETWORKS SEPERATE, BUT ALL USING THE SAME PC, WHICH WILL BE INFECTED FROM THE WWW. G

    The software, Liacko explained, creates "what we call security domains … in essence virtual machines or virtual servers … each one of them is impregnable. Even viruses that operate at the very deepest level of the operating system cannot get around the new software, he said.

    IF MALWARE GETS TO THE KERNEL LEVEL OF THE PC, THE PC IS INFECTED, THEN THEY START

    CONNECTING THAT INFECTED PC TO 14 DIFFERENT SECURE NETWORKS. G

    "We sit literally on the bare metal … on the microprocessor. What we create is a secure platform, and on top of that platform you can run Windows or Linux … inside of a securely separated domain, where … your top-secret or confidential corporate data … can be protected and cannot be accessed by an intruder" from any one of the other domains.

    RIGHT CANNOT BE ACCESSED FROM ANY OTHER DOMAIN BUT THE CENTERAL POINT IS THE SAME

    INFECTED PC IS USED BY ALL THE NEWTORKS TO SPREAD THE INFECTION.G

    Specialists at the NSA tested the system for three years, said Liacko. "We had to give source codes andblueprints to the NSA, and they began a multiyear process of doing mathematic and physical penetration testing. … They were not able to penetrate it."

    BUT DID THEY LOOK AT HOW THEY ARE GOING TO PROTECT THE CENTERAL VECTOR TO ALL

    THE NETWORKS? HOW THEY WERE GOING TO STOP THE PC CONNECTED TO THE WWW AND ALL 14 NETWORKS FROM GETTING INFECTED?

    THAT PC IS LIKE A DIRTY SPOON FEEDING ALL THE NETWORKS INFECTED MALWARE.

    IF THEIR SYSTEM WORKS, SHOW ME THE PC THAT CANNOT BE INFECTED.

    THE SOFTWARE THAT MAKES THE PC 100% SAFE.

    I SAY BS.

    IT DOES NOT EXISIT.

    THEY ARE SAYING THE SOFTWARE CAN KEEP THE 14 NETWORKS SEPERATE.

    YES THEY CAN, BUT THEY ARE INTERODUCING A CENTERAL INFECTION VECTOR

    BY USING THE SAME PC FOR ALL 14 NETWORKS WHICHIS CONNECTED TO THE WWW.

    U.S. Central Command would enable military computers for the first time ever to be connected at the same time to both classified and unclassified networks -- including the public Internet.

    Officials say the technology, if it proves secure, could save more than $200 million for CENTCOM and eliminate the need to use workarounds like thumb drives to move data between networks at different levels of classification -- which can facilitate the spread of viruses and other malware.

    IF THE THUMB DRIVE WAS THE CENTERAL VECTOR, MOVED FROM PC TO PC CAUSED INFECTION

    THAN USING THE SAME PC FOR ALL 14 NETWORKS BECOMES THE CENTERAL VECTOR FOR INFECTION

    JUST LIKE THE THUMB DRIVE DID.

    DON'T LET THEM CONECT TO YOUR NETWORK.

    THEY ARE PLAYING SEMANTIC GAMES WITH USA MILITARY NETWORK/PC SECURITY.

    AGAIN I SAY ITS BS.G

    Just say no to OB1 USE THE FORCE.G


    Gerald

    Tactical Internet Systems analyst

    ps: ask NSA to see one of their

    PC's connected to the WWW

    that is 100% secure.


    If your network isn't connected

    to the WWW, OB1 will expose your network to the WWW.

    Rebuttal:

    Your misunderstanding here stems from your failure to understand what a separation kernel does. There IS NO central, common, shared infection vector. Each virtual OS is self contained and the software allows for switching between them. ( what happens when a rootkit/hacker gets access to the software/program that allows switching between networks? G ) One OS cannot access the portion of the drive allocated to another OS. This is not some guy using IE or Firefox to access secure networks on the same machine he checks his Yahoo mail with some fancy "anti-virus" running in the background. The main reason it's nearly impossible to completely secure an internet connected PC is because there is always a tradeoff to an end user of security vs. convenience. There is no such compromise in this system. Unknown author.

    Second:

    if each virtual machine is running in parallel and not being hosted by an OS with access to the network interface, then tunneling into WWW-connected Machine #1 gives no access to a network interface that can be used by Secure Machine #2. This is what is meant by kernel separation, and I would advise you to talk to network security experts before making such broad and unfounded proclamations.

    This is not to say that somebody clever can't possibly figure out a way around these measures, just that this new system is not any worse than using 5 computers on the same switch connected to different military networks. by Aaron

    ( OB1 is a central vector vs having to hack 5 PC's/networks, HACKING just one sounds less secure.G )


    Update:

    kernel rootkits: Basics

    Blue pill Demo project

    VMBRs virtual-machine based rootkits G



    Labels: ,

    Terrorist Names SEARCH:
    Loading

    Banks PIMP the taxpayer AGAIN and AGAIN ETC.

    Banks PIMP the taxpayer AGAIN and AGAIN ETC.
    The banking whores screw the tax payer AGAIN...

    Congress is surprised at the $18 billion dollars bank CEO's
    paid themselves?

    mmmmmmmm

    Why we said,
    "We need new leadership at the federal reserve and 100% more transparancy.
    The CEOs only get performance bonuses, DUH, they just lined up $700 billion.
    Let the performance bonuses flow, flood the boardrooms, they just pulled off
    the biggest scam in history.

    This will go down in history as a new era of Bank Robber Barrons, and criminal banking activity.
    We have picked up noise back ground chatter about a lobbyist firms $100,000,000 ( $100 million dollar ) fee .

    We said this on 10/08/2008 10:50:00 PM

    WE TOLD THEM...WE TOLD THEM...3 MONTHS AGO

    We said "
    This will go down in history as a new era of Bank Robber Barrons, and criminal banking activity."

    We said they would pay themselves HUGE PERFORMANCE BONUSES.
    They did and congress is surprised?

    The Federal reserve put NO checks and balances on the Trillion dollar
    paments made to the criminal banks, fire the leadership at the Federal Reserve,
    and prosecute the CEO's for stealing taxpayer money and usury interest rates
    on credit cards. Suspend Federal payments to all States that have no consumer
    protection laws, and allow these criminal Banking enterprises to operate.


    Gerald
    series 7 & 13

    Labels:

    Terrorist Names SEARCH:
    Loading

    Mexico: Drug Civil war?

    Santiago Meza Lopez, aka the 'Stew Maker'

    He was known as El Pozolero — The Stew Maker — but his ingredients were less than savoury.

    The job of Santiago Meza López was to dispose of the enemies of a notorious drug baron by dissolving them in tubs of acid. Over several years he claims to have “disappeared” 300 enemies of Teodoro García Semental, a former henchman for one of the largest cartels in Mexico and now in a bloody struggle for supremacy over the trade.

    Meza, 45, told police that, once their remains had been in the acid baths for 24 hours, he would bury them. In a twisted act of chivalry, he said he only dissolved men, refusing to make women vanish this way. He said that he was paid $600 (£440) a week by García.

    SOURCE:

    XXXXXXXXXXXXXXXXXXXXXXXXXXXXX

    CBS: But there's even more evidence the cartels are operating with near impunity as they wage bloody battle for control of lucrative smuggling routes into the U.S. It's only 28 days into the new year and already there have been 400 drug-related slayings across Mexico.

    Last year ended with a grisly flourish: 12 soldiers were found decapitated with this note: "For every one of us you kill, we'll kill 10."

    "These criminal kingpins are not afraid of government authority," said Rand Corp. terror expert Brian Jenkins. "They're willing to take it on directly.”

    The cartel carnage and brutality are escalating so rapidly - and the authorities are so besieged - that some U.S. analysts are warning that Mexico is in danger of collapse, leaving a lawless, failed state right across the southern U.S. border.

    A recent Pentagon report warned that if trends continue into the next decade, the U.S. must be on alert for the possible "rapid and sudden collapse" of Mexico.

    SOURCE:

    XXXXXXXXXXXXXXXXXXXXXXX

    We have been warning Americans to boycott

    Mexico since Apr 15, 2008

    The Government should consider intervention.

    With the Mexican Government approval.

    With out send in the CIA for wet ops.

    The one thing that should be clear from the Iraq

    war is that it maybe eaiser to support a Government

    rather than occupy a country.

    MacArthur's Occupation of Japan:

    utilized the current Government

    vs

    Paul Bremer's Occupation.

    Ousted the entire Government

    MacArthur was a success

    Bremem was a disaster.

    With our porus border with Mexico

    The drug violence will leach into the USA.

    The sooner US finds ways to intervene

    Against the Mexican cartels the safer

    and less costly it will be.


    Gerald

    http://warintel.blogspot.com/2009

    /01/gov180-degree-turn.html


    http://warintel.blogspot.com/2008/11

    /mexico-drug-cartels-have-50-cals.html


    Goole formatting controls refuse to allow

    me to change colors of links, GOOLGE SUCKS.

    .


    .



    Labels:

    Terrorist Names SEARCH:
    Loading

    Thursday, January 29, 2009

    Economic stimulus package:Diversion


    The new economic stimulus package is
    a diversion, has nothing to do with the 
    economic problems USA is facing,
    the Toxic sub-prime paper the Criminal 
    banks fosted on the stock markets is the 
    real problem, a festering cancer.

    The growing size of the Gross National
    debt from around 2 trillion to 7 Trillion
    in the space of a couple of years
    is a concentrated form of inflationary
    pressure on prices and deflationary
    pressure on the US Dollar.
    This will result in higher prices and 
    lower value for the Dollar.

    The stimlus package amounts to a bribe
     to the American public to ignore the 
    base economic problems.

    If the Toxic paper issue isn't addressed
    soon it could result in an economic 
    Collapse.

    A defaulting of huge amounts of toxic paper
    many many Trillions of Dollars,
    in the money markets and other deratives.
    And other paper investments related to the 
    mortage markets and Fannie and Freddie.
    And other funds with the toxic paper, including
    hedge funds.

    Resulting in the possible nationalization of banks
    and hopefuly criminal prosecution for the main
    banking actors.

    Other issue: Whom decided hedge funds
    Shouldn't be regulated?
    Find him, fire him.
    Why is Bernie still at large?
    Why isn't he in prision.
    If US can track al Qaeda funding world wide,
    we don't need Bernies cooperation.
    The feds will find everything they need.

    Regulate  hedge funds NOW.

    Gerald
    Series 7 and 13


    .

    Labels:

    Terrorist Names SEARCH:
    Loading

    Paki government, Army, ISI incompentent.


    Paki government, Army, ISI incompentent.
    By Gerald: Internet Anthropologist Think Tank
    1, 29,09

    By Kamran Haider

    ISLAMABAD (Reuters) - Veteran ethnic Pashtun politician Mohammad Afzal Khan refuses to leave home in northwest Pakistan's Swat Valley even though the Taliban have tried to kill him, and says the people should stand up to the militants.

    Swat was until recently one of Pakistan's top tourist destinations but Pakistani Taliban have all but taken over the scenic mountain valley, imposing their severe interpretation of Islamic law and slaughtering opponents with impunity.

    Many families have fled, while residents say many policemen have either deserted or simply refuse to act against the militants, who have shot, blown up or beheaded numerous officers.

    But Khan, an 82-year-old former cabinet minister known as Afzal Lala, or Afzal the Elder, has chosen to stay on to try to rally resistance to the militants.

    "I'm from this soil. It's my home. My tribe is here," Khan told Reuters in a telephone interview.

    "I want to live among my people. I won't run away."

    The Islamists' grip on the valley, just 130 km (80 miles) northwest of Islamabad and away from the lawless Afghan border, highlights Pakistan's deteriorating security.

    SOURCE:

    Ive been posting a series of articles

    showing even the Pashtuns hate the

    Taliban. The Pashtuns need to be 

    organized and supported.

    US has a host of spies among the 

    Pashtuns. 

    Any Pashtuns that want to fight the 

    Taliban PLEASE EMAIL ME.

    InternetAnthropologistTT at Gmail dot com


    We will get the info/intel to the US Military, in secret,

    to take out the Taliban, we can do this

    in almost real time.

    We will support you.

    We will help get the Taliban

    leadership Killed.


    Gerald

    Internet Anthropologist

    .

    Labels: , ,

    Terrorist Names SEARCH:
    Loading

    Pashtuns: ISI must target-kill entire Taliban leadership


    Many people said that if the ISI was sincere with the Pakhtuns it must target-kill the entire Taliban leadership just like the Taliban did with elders

    What Pakhtuns think
    Wednesday, January 28, 2009
    Farhat Taj
    One man said: "Look at the ease with which the Taliban have been occupying Waziristan for years and now Swat. How is that possible given that we have one of the largest and well-trained armies in the world?"

    What I have written in the two parts of my article are views gained from travelling very recently across NWFP and parts of FATA. I spoke to internally displaced people of FATA in NWFP, daily wage-earners, public transport drivers, shop-keepers, low-ranking government employees, journalists, lawyers, students, teachers and housewives. Almost everywhere people were resentful of the military leadership and the ISI and held them responsible for the brutal excesses of the Taliban. They were not even willing to give the benefit of the doubt to the ISI. Many people said that if the ISI was sincere with the Pakhtuns it must target-kill the entire Taliban leadership just like the Taliban have done in the case of over 200 tribal leaders and must restore the writ of the government in the Taliban-occupied areas.


    People are especially angry over the presence of so many foreign Taliban militants and refer to them as no better than 'mad dogs'.

    Last, but by no means least, I would also request fellow citizens to build up pressure on the government and the military to decisively deal with the Taliban and restore the government's writ in FATA and NWFP. The armed forces are financed by taxpayers hard-earned money and we all have a right to demand that the army provide us security and protect us from extremists who want to butcher us and destroy are way of life. 
    SOURCE:
    .
    Why is the ISI not willing to wipe out this criminal element, the Taliban?
    G

    Labels:

    Terrorist Names SEARCH:
    Loading

    Most effective weapon against Taliban



    The most effective weapon against Taliban
    By Gerald: Internet Anthropologist Think Tank
    1.29.09

    The US drones over Paki have proved to be the
    most feared weapon against the Taliban.

    Over and over again the Taliban have made
    threats ofer the use of the Drone equipted
    with Missiles.

    They are the Taliban's worst nightmare.
    GAMERS
    And again they have sucessfully pressured
    the Paki Goverment to request the USA
    withdraw the weapon.

    US should consider doubling the weapon.
    And training "GAMERS".

    The skill level for drone flight and attack
    is more akin to a video game and doesn't
    require REAL military pilots to fly them.

    Taking actual attack videos and actions
    and converting them to gaming box, will
    allow the training of huge volumes of
    ready trained "drone pilots".

    The current paradigm is equalivant to
    saying an auto driver must be an
    automotive engineer.

    It just doesn't make sense.
    Game training can make the
    required parameters for drone flying
    and attacks intutive.

    And there is a huge population in the
    military that are very adept at gaming
    consuls.

    Even the Air Force uses computer
    trainers for their pilots.

    The paradigm for gamers to adopt to
    drone engagements is there.
    But not reconignized by the BRASS.

    The younger officers know it and
    have experienced it.

    X-Box. re configure the parameters
    to match the drones and attacks
    and you have a great training
    method for non pilot gamers
    to run very efficent attacks
    and a great force mulitiplier.

    Why is Paki asking USA to
    drop the most effective
    weapon they have against
    the Taliban, the same
    demand the Taliban is making.


    Gerald
    .

    Pakistan to U.S.: Stop the Drone Strikes (And More Weapons, Please)

    By Nathan Hodge EmailJanuary 28, 2009 | 11:48:50 AMCategories: Drones, Perils Of Pakistan, War Update

    Predator_hellfireAs a new U.S. administration tries to craft a new strategy for the region, Pakistan's government seems to be embarking on a public-relations push. Step one: ask Washington to call off the drones.

    Speaking to CNN's Christiane Amanpour at the World Economic Forum, Pakistani Prime Minister Yousuf Raza Gilani called on the United States to stop drone attacks against al Qaeda and Taliban fighters on Pakistani territory. "I want to put on record that we do not have any agreement between the government of the United States and the government of Pakistan," Gilani said.

    Gilani's statement was in response to testimony yesterday by U.S. Secretary of Defense Robert Gates. Asked by senators if the missile strikes by drones would continue, Gates said both President George W. Bush and President Barack Obama had made clear they would continue to pursue al Qaeda across the border into Pakistan. "Has that decision been transmitted to the Pakistan government?" asked Sen. Carl Levin, chairman of the Senate Armed Services Committee.

    "Yes, sir," Gates said.

    In parallel, Asif Ali Zardari, the president of Pakistan, is urging Washington to send more money and equipment to fight extremists. In an opinion piece in today's Washington Post, he chided critics in the United States for questioning Pakistan's commitment to the war on terrorism. "With all due respect, we need no lectures on our commitment," he wrote. "This is our war. It is our children and wives who are dying."

    Zardari also asked for more advanced weaponry:

    To the extent that we are unable to fully execute battle plans, we urge the United States to give us necessary resources -- upgrading our equipment and providing the newest technology -- so that we can fight the terrorists proactively on our terms, not reactively on their terms. Give us the tools, and we will get the job done.

    Interestingly, Zardari said that Pakistani F-16s had been used in airstrikes against Taliban and al-Qaeda. That's an interesting point: the long-delayed delivery of F-16s to Pakistan was a major sore point in relations between Islamabad and Washington, and many observers suggested Pakistan's interest in advanced weaponry had less to do with fighting extremists and more to do with arming against the old adversary, India. "Even if Pakistan were serious about fighting the Taliban, it could certainly find a better way to spend the hundreds of millions of dollars the F-16s will cost," wrote DANGER ROOM pal Joshua Kucera back in 2004. "But the Pakistanis gave a clue as to what they really want with the planes: They are requesting that the F-16s be armed with top-of-the-line air-to-air missiles that would be of little use against targets like the Islamists it's fighting on the ground."

    [PHOTO: Militaryphotos.info]


    .


    xxxxxxxxxxxxxxxxxxxxx

    Paki asking the US to stop the drone attacks
    shows a basic fatal flaw in their paradigm
    of fighting the Taliban.
    Any increase of advanced weapons could
    end up in the hands of the Taliban.
    I still do not believe the Paki army is serious
    about fighting the Taliban.
    The Paki Army has shown to many failures
    related to defeating the Taliban and
    their Intelligence service has been too
    friendly with the Taliban to be trusted
    completly.
    They still have not taken out the key
    info wariors in Paki.
    The web masters, even though Internet
    anthropologist have provided 15 of their
    IPs and physical locations.

    Gerald
    .
    Big question still remains "Where are the
    Taliban getting their ammo from?

    .

    Labels: