Internet Anthropologist Think Tank: 2/8/09 - 2/15/09

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Saturday, February 14, 2009

    Jahidies Demographics


    JIHAD IN ARABIC:




    IN ENGLISH




    Past 30 days




    Gerald
    Anthropologist

    .



    Labels:

    Terrorist Names SEARCH:
    Loading

    Our Paradigm engine, crystal ball




    Our Paradigm engine, crystal ball
    By Gerald: Internet Anthropologist Think Tank
    1.14.09

    Ever have a bad dream about getting hurt etc.
    And your so happy when you wake up,
    Cause it wasn't true but seemed so real.

    I'm hoping our economic paradigm is
    just a bad dream, and soon we will all wake up HAPPY.

    I've been reading about the Nationalization of the Banks.
    It is false, turn that 180 degrees, it actually is the privatization of
    the Federal Reserve
    The Feds. handed out 2 Trillion dollars to the banks,
    no strings attached.
    There is no control of those banks but it looks like the
    CRIMINAL banks have considerable control of the
    Federal Reserve.

    The Government is trying to avoid some big bumps
    in the road but in the process are steering for a cliff.

    They have run up Trillions in debt, our economy is
    debt driven. During the cold war USA could borrow
    from Germany, Japan and Opec countrys by selling
    them Treasury Bills, notes and Bonds.
    Russia couldn't. They had to finance the cold war
    with cash. And USA just out spent them, crashing
    their economy. They couldn't keep up the arms
    race on just their hard cash, while USA could
    borrow.

    At that time USA had around 1 trillion in debt.
    Now we are at 12 Trillion in debt.
    Thats
    all current economist know, a debt driven
    economy and they have
    seen it work quite well in the past.

    US Bonds are trusted as a safe haven for cash
    and always convertible to cash the world over.

    But USA banks have poisoned the well, with toxic
    sub-prime paper, and the regulators turned a
    blind eye to the Banks criminal activities,
    packaging loans they KNEW would turn bad,
    and got them rated AAA investment paper.
    A clear swindle.

    US banks leading way to world depression.



    Then sold them to China, Russia and the rest of the
    world, in ( TYPO =hundreds)  TENS of Trillions of dollars.

    The guardian of the worlds financial system

    USA, just screwed the world, let the Banks sell
    toxic bad sub-prime paper.
    The chairman of the Federal Reserve admitted
    on TV he saw it coming and felt powerless to do anything.


    This is going to set the democratizing agenda back 30 years.
    And gives American capitalism a black eye.
    And has caused considerable dammage to our China and
    Russian relationships. I expect Europe to see it for what it
    was Banking fraud and not an American Gov. conspiracy.
    And is the contributing factor for the resulting World Depression.

    American Banks have almost done what the Russians and al Qaeda
    couldn't do,
    take out the American economy.
    Al Qaeda has already tried to take credit for the American economic .
    debacle. George will go down in History as leading the war on Terrorism and
    the President when American Banks robbed the world.

    There is a lesson from the first Great depression that congress forgot,
    Why they banned Banks mixing into Wall Street, with
    The Glass-Segal act, a law passed in the 1930s that mandated a
    separation of lending and investment banking, was repealed in 1999.
    To create sub-prime investments, banks injecting sub-prime paper directly
    into Wall St. We can trace this Depression to the sponsors of that 1999 bill
    and the Lobbyist who bought them.

    ( Some one leave me note in comments, who they were. G )
    And 9 years latter US Banks have defrauded the world of hundreds
    of Trillions of dollars....... I told you so in 1999...G
    And the bank's lobbyists have privatized the Federal Reserve
    The tip off should have been when US banks started
    to charge usury / criminal interest rates.

    And now the Government wants to spend its way out of this
    debacle with the "stimilus package".

    Expecting to sell T bills notes and bonds to raise the funds
    to try and counter the Depression.

    Sell to whom?

    xxxxxxxxxxxxxxx=xxxxxxxxxxxxxxx


    Germany - the heart and soul of the European Union, is now facing their largest deficit since WWII and their deepest recession since reunification. Doubts are beginning to emerge about the engine of the EU. "Once the world's exemplary fiscal student," Investment Director Eric Roseman wrote last week, "the Germans have now been forced to join the bailout parade in 2009 as her economy comes undone and deflation grips its banking sector." And their bond market - one of the largest and most liquid in the entire world - has actually been forced to cancel several auctions in the last few months, citing insufficient demand. Doubts have only just begun to arise regarding the EU. Several credit downgrades and these canceled German bond auctions are bringing a rapid end to the EU's honeymoon phase, and their future is increasingly uncertain.

    As we saw on Wednesday and Thursday of last week, Japan and China are both export-oriented economies, and they're both suffering from the precipitous drop in U.S. demand for their finished goods. In China, this is leading to mass unemployment - a recent survey estimates some 10 million migrant workers lost their jobs in the third quarter of 2008.

    ( China's exports are down 17%. G )


    SOURCE:

    xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

    On one of the TV news shows the the anchor asked whom we were going to
    sell the Treasury paper too?

    The Federal Reserve guest said the Middle East.
    Oil has gone from a high of $147 BBL to $33 bbl Friday.
    This is a world Depression.

    I expect they will monetize the spending .
    Which will create huge inflationary pressures on Prices and deflationary pressures on the currency.

    In this bad dream I see the taxpayer spending $10 to buy what used to
    cost $1, from the combined effects of huge inflationary pressures on Prices and deflationary pressures on the currency.

    They should have included $300 billion in the stimulus program for Food
    stamp programs and soup kitchens.

    US needs to beef up the Social support net for its citizens.
    US is about to switch from a debt driven financial system to
    one of Cash, THE HARD WAY.

    Gerald
    Series 7 and 13
    Internet Anthropologist

    .
    BACKGROUND:

    Excerpts form:
    Annual Threat Assessment of the
    for the Senate Select Committee on Intelligence

    12 February 2009

    The primary near-term security concern of the United States is the global economic crisis
    and its geopolitical implications. The crisis has been ongoing for over a year, and economists are
    divided over whether and when we could hit bottom. Some even fear that the recession could
    further deepen and reach the level of the Great Depression. Of course, all of us recall the
    dramatic political consequences wrought by the economic turmoil of the 1920s and 1930s in
    Europe, the instability, and high levels of violent extremism. Though we do not know its
    eventual scale, it already looms as the most serious global economic and financial crisis in
    decades.

    FBI shifting agents to match threat Assessment, to protect the economy.
    FBI may shift counterterror agents to anti-fraud

    Law enforcement

    The number of Federal Bureau of Investigation (FBI) agents assigned to mortgage-related crimes increased by 50% between 2007 and 2008.[247] In June 2008, the FBI stated that its mortgage fraud caseload has doubled in the past three years to more than 1,400 pending cases.[248] Between 1 March and 18 June 2008, 406 people were arrested for mortgage fraud in an FBI sting across the country. People arrested include buyers, sellers and others across the wide-ranging mortgage industry.[247]

    On 8 March 2008, the FBI began a probe of Countrywide for possible fraudulent lending practices, securities fraud.[249]

    On 19 June 2008, two former Bear Stearns managers were arrested by the FBI, and were the first Wall Street executives arrested related to the subprime lending crisis. They were suspected of misleading investors about the risky subprime mortgage market.[245]

    On July 162008, an unnamed US Government official said that the FBI is investigating IndyMac for possible fraud. It is not clear if the investigation began before the bank was taken over by the FDIC upon its $32 billion collapse. [250][251]

    On 23 September 2008, in response to concerns about the bailouts of so many firms, two government officials stated that the Federal Bureau of Investigation was looking into the possibility of fraud by mortgage financing companies Fannie Mae and Freddie MacLehman Brothers, and insurer American International Group, bringing to 26 the number of corporate lenders under investigation.[252]

    SOURCE:


    This months Feds Stats:

    ( I grant
    my permission ot post it in its entirety if you wish as a PSA.)
    .

    Labels: ,

    Terrorist Names SEARCH:
    Loading

    $250,000 price on Hackers head

    Putting A Price On A Hacker's Head

    Andy Greenberg, 02.12.09, 06:00 PM EST

    Microsoft, Symantec and others are making the Conficker worm Internet enemy No. 1.

    A word of advice to Internet parasites: Don't do so much damage that you get noticed. As the cybersecurity industry turns its focus onto the Conficker worm currently plaguing millions of computers worldwide, that's a lesson the virus' authors could soon discover.

    On Thursday, a coalition of tech companies and nonprofit groups ranging from Microsoft (nasdaq: MSFT - news - people ) to ICANN, AOL, Symantec (nasdaq: SYMC - news - people ), F-Secure and Verisign announced that they've teamed up to put an end to the worm, also known as Downadup, that has infected as many as 12 million computers, according to researchers at Arbor Networks, a cybersecurity company tracking its spread. Microsoft has even offered $250,000 to anyone who can offer information that leads to the arrest of the malicious codes' authors.


    Although the worm hasn't communicated with a central server--a development that could have stolen millions of passwords or created an enormous "bot-net" of cybercriminal-controlled computers for spamming--it's caused costly headaches for IT administrators dealing with users locked out of their accounts by the worm's password guesses.

    Now, the coalition of cybersecurity companies has teamed up with ICANN, which controls the Internet's domain name system, to cut Conficker off from any potential control by its authors. In early January, Finnish cybersecurity research firm F-Secure cracked the algorithm that determined which domain name the virus looked to at a given time for new software updates.

    Working with ICANN and Web registrars who own domain names, the companies have now blocked all domains that the worm could potentially use as a command-and-control center or for siphoning off users' data.

    As for Microsoft's quarter-million dollar reward--the first time the company has offered a bounty for cybercriminals since 2005--the money is designed less to end Conficker's damage than to send a message. "The reward won't stop the virus," says Microsoft anti-malware engineer Vinny Gullotto. "Instead we're trying to hold these folks accountable for what they've done with this worm and deter the next one."

    SOURCE:

    XXXXXXXXXXXXXXXXXXX


    Hacking the Protectors:

    F-Secure

    Kaspersky Lab

    Bitdefender's

    All hacked by by the same Romanian group.

    After Kaspersky and BitDefender, it’s now time for F-Secure.com … vulnerable to SQL Injection plus Cross Site Scripting. Fortunately, F-Secure doesn’t leak sensitive data, just some statistics regarding past virus activity.

    Exposed database tables:
    MailboxInfo, VirusUpdated, dtproperties, Country, sysconstraints, VirusTrends, Virus_Top50_24h, Virus_Top50_30days, Virus_Top50_7days, Virus_Top50_90days, Virus_Top50_Month, Virus_Top50_Week, VirusDateTotal, VirusDate, VirusMonthTotal, VirusReports, VirusReportsTemp, VirusTrends.

    Screenshots:
    SQL Injection (SQL Server info / Extracting table names):

    Cross Site Scripting (XSS):


    .

    Labels: ,

    Terrorist Names SEARCH:
    Loading

    Taliban in fighting causes Beheading

    Taliban in pissing contest:

    The full picture is not clear yet.

    Some interesting Intel the BSU's have developed: Input from inside the beltway,
    and Recon teams and OSINT.

    Taliban says hostage Piotr Stanczak beheaded:

    "When Stanczak was first kidnapped, I've seen a photograph of him and his captors. In it he is wearing a Baloch head cover and a Baloch style caftan."

    The video and the demands indicate that Solecki, the head of the U.N. refugee agency in Quetta, a city near the Afghan border, is still alive and that his captors want to negotiate.

    The American UN person kidnapped:

    The kidnappers have identified themselves as the Baluchistan Liberation United Front, suggesting a link to local separatists who have waged a long, low-level insurgency against the Pakistani government and not the Taliban or al-Qaida, who are fighting U.S. forces in neighboring Afghanistan.

    "The Mehsud's are a fractious group, Baitullah is only supported by about 80% of the elders. However, killing Stanczak has some very odd aspects. Stanczak was more or less under the protection of the Taliban."

    "He may have been re-kidnapped by the Taliban and then fought over and killed to keep one Taliban faction from re-taking him. This is not unusual in the kidnapping industry of Pakistan that the Baloch are deeply involved in."

    "When Stanczak was killed, his captors had agreed to a ransom of about $262,000 instead of the release of their compatriots. Why kill him? And lose all that money? Likely out of spite as they were about to lose Stanczak to another faction. That fits the petty and ignorant behavior of the Mehsuds."

    Taliban takeover of Swat. The picturesque valley in the NWFP, once a holiday destination for tourists, is now under the grip of a Taliban group under the leadership of Fazlullah, a mullah with extreme views who has thrown in his lot with the South Waziristan-based warlord Beithullah Mehsud.
    Baitullah Mahsud in South Waziristan and Maulana Fazlullah in Swat
    'Mehsud has severed contacts with Fazlullah'

    Related to the Polish beheading?


    Excerpts from

    Taliban feud over murder of Polish hostage

    Stanczak was kidnapped in Attock on Sept. 28, 2008, by Taliban fighters under the command of Zakir Mehsud operating from the Arakzai tribal agency. ... Attock is a district in Punjab province that borders the districts of Nowshera, Swabi, and Haripur in the Taliban insurgency-ridden Northwest Frontier Province.

    Punjab is in between Swat and Wariristan.

    Two senior Pakistani Taliban leaders had a disagreement over the handling of kidnapped Polish geologist Piotr Stanczak. The disagreement led to Stanczak's gruesome beheading, which was videotaped by the Taliban and released to the public. ( Well not really its a mystery,
    Why release a video to a News Agency but not post it to the Internet? Why has the News Agency not released the video? And note Piotr Stanczak, was asked questions
    in English by the terrorist on the video just before they beheaded him. G )

    Baitullah sought to use Stanczak to obtain the release of several of his followers, while Qari Hussain, who had custody of Stanczak, sought the release of four members of the radical Lashkar-e-Jhangvi and an Uzbek, a Taliban source told The News. The move triggered Qari to execute Stanczak.

    “A day before the beheading of the engineer [Stanczak], Baitullah sent his men to bring the captive but the Qari group did not agree and beheaded the captive the next day,” Mohammed, a Taliban spokesman for Zakir Mehsud told The News. "This forced Qari to behead the Polish engineer." Zakir Mehsud is one of Qari's lieutenants in the city of Darra Adam Khel in the Arakzai tribal agency.

    Mohammed quoted Zakir as saying Qari's decision to behead Stanczak was sound "as it would create fear amongst the nonbelievers. If we keep on sending such gifts to the Europeans and others, they would soon be compelled to flee the region,” Mohammed said. “If God wishes, people would see more and more beheadings of nonbelievers in the future.”

    ( And yet they didn't post it to the Forums.G )

    ( Our BSU's and Recon teams continue to search for the Video.G )

    Hakimullah Mehsud, the Taliban commander in Arakzai, Khyber, and Peshawar who is behind the attacks on NATO's supply lines in northwestern Pakistan, had hoped to get a teenager to behead Stanczak but the plan was called off due to the short amount of time to find a child, Mohammed said.

    Several times in the past, the Taliban in both Pakistan and Afghanistan have released videotapes of children and teenagers beheading captives.

    The report of the disagreement between Baitullah and Qari became public just two days after a roadside bomb wounded Mullah Noor Sayyed Mehsud, a deputy of Baitullah's, and killed another Taliban commander and wounded another leader. Noor was leaving a meeting of senior Taliban commanders in Makeen, Baitullah's home town. There is no evidence that the two incidents are linked, but Qari is one of the few people who could pull off such an attack.

    Qari Hussain Mehsud is a senior deputy to Pakistani Taliban commander Baitullah Mehsud and an ally of al Qaeda as well as the Lashkar-e-Jahangvi and other extremist groups. He runs camps in South Waziristan that train children to become suicide bombers. Children as young as seven years old are indoctrinated to wage jihad in Pakistan and Afghanistan, a video taken at one of his camps in Spinkai showed.

    SOURCE:

    xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

    Foreign Minister Radek Sikorski condemned the apparent killing as a "bestial execution" and said the government would issue arrest warrants for the culprits.

    "A crime was committed, so there has to be an investigation, a search for the culprits, and if possible putting them before the justice system and an exemplary punishment," he said.

    It was not immediately clear what impact the issuing of warrants might have, because Poland does not have an extradition treaty with Pakistan. Islamabad has refused to extradite Pakistanis suspected of taking part in the November terrorist attack in Mumbai, India.

    A spokesman for Taliban militants in northwestern Pakistan told The Associated Press that Stanczak was "slaughtered" because the Pakistani government missed a deadline to release 26 prisoners. The Taliban had also demanded the government withdraw troops from Pakistan's tribal areas.

    The video, seen by the AP, shows two hooded men taking a dagger in turn and running it along the victim's neck. They then lay him out on the floor and put his head on his chest. One of them then cleans his blood-soaked hands with the Pole's shirt.

    After that, a hooded militant delivers a message saying his group would have let the victim go if the Pakistani government had freed their jailed comrades.

    "We did make all contacts with Pakistani government, and even asked them to arrange our contact with the government of Poland," he said. "But Pakistan did not agree and said ... 'you kill this man as we do not need him.'"


    SOURCE:

    xxxxxxxxxxxxxxxxxxrxxxxxxxxxxx

    We have picked up roumors that,
    "When Stanczak was killed, his captors had agreed to a ransom of about $262,000 instead of the release of their compatriots."

    "He may have been re-kidnapped by the Taliban and then fought over and killed to keep one Taliban faction from re-taking him. This is not unusual in the kidnapping industry of Pakistan that the Baloch are deeply involved in."

    We are still grinding this thru our Paradigm Engine, power struggle within the Taliban.

    Gerald


    Confirmation: Monday, March 02, 2009
    The source added serious differences had emerged between Commander Tariq, who heads the Taliban in Darra Adamkhel, and chief of the banned Tehrik-e-Taliban Pakistan (TTP) Baitullah Mehsud over the fate of the Polish engineer. He claimed Baitullah Mehsud was opposed to the execution of the captive.

    “The differences have reached such a stage that Tariq killed seven representatives of Baitullah Mehsud from Waziristan in a Jirga, refused to accept Mehsud’s advice and assassinated the Polish engineer,” the source said.



    .

    Labels:

    Terrorist Names SEARCH:
    Loading

    Friday, February 13, 2009

    Peter Principle: Diane Feinstein,


    File:Dianne Feinstein, official Senate photo.jpg

    Senator Diane Feinstein, Chairman of Senate Intelligence Committee.
    She hasn't been chairman for 2 months yet.
    The United States Senate Select Committee on Intelligence (sometimes referred to as SSCI) is dedicated to overseeing the United States Intelligence Community—the agencies and bureaus of the Federal government of the United States who provide information and analysis for leaders of the executive and legislative branches.

    In a hearing room in the Hart Senate Office Building, Sen. Feinstein "expressed surprise at Pakistani opposition to the ongoing campaign of Predator-launched CIA missile strikes," according to the L.A. Times.

    "As I understand it, these are flown out of a Pakistani base," she said.

    She doesn't seem to read the papers or listen to the news.

    Certianly not conneced to the Internet. Chairman of the Intelligence Committe?

    Which is news to many Pakistanis. Their President has called the strikes -- more than 40 in the past year -- "counterproductive"; their prime minister, "intolerable." Pakistan's army has practiced shooting down the drones.

    The Chairwoman of the Senate Intelligence Committe didn't know about: "Pakistani opposition to the ongoing campaign of Predator-launched CIA missile ".

    She didn't KNOW?

    I just don't know what to say?

    Incompentent, Peter Principle, ignorance?

    How did she become Chairwoman?

    The Senate has to be ashamed and embarrased of this .
    She is a Demorcat, WHAT WERE THEY THINKING?

    She may have single handedly brought down the CIA drone program in Paki.
    The conquenses and heat level are unknown.

    She should resign.
    A link for her.

    Gerald

    .
    .

    Labels: ,

    Terrorist Names SEARCH:
    Loading

    Thursday, February 12, 2009

    Annual Threat Assessment



    Excerpts form:
    Annual Threat Assessment of the
    Intelligence Community
    for the Senate Select Committee on Intelligence



    12 February 2009

    The primary near-term security concern of the United States is the global economic crisis
    and its geopolitical implications. The crisis has been ongoing for over a year, and economists are
    divided over whether and when we could hit bottom. Some even fear that the recession could
    further deepen and reach the level of the Great Depression. Of course, all of us recall the
    dramatic political consequences wrought by the economic turmoil of the 1920s and 1930s in
    Europe, the instability, and high levels of violent extremism. Though we do not know its
    eventual scale, it already looms as the most serious global economic and financial crisis in
    decades.

    Time is probably our greatest threat. The longer it takes for the recovery to begin, the
    greater the likelihood of serious damage to US strategic interests. Roughly a quarter of the
    countries in the world have already experienced low-level instability such as government
    changes because of the current slowdown. Europe and the former Soviet Union have
    experienced the bulk of the anti-state demonstrations. Although two-thirds of countries in the
    world have sufficient financial or other means to limit the impact for the moment, much of Latin
    America, former Soviet Union states and sub-Saharan Africa lack sufficient cash reserves, access
    to international aid or credit, or other coping mechanism. Statistical modeling shows that
    economic crises increase the risk of regime-threatening instability if they persist over a one to
    two year period. Besides increased economic nationalism, the most likely political fallout for US
    interests will involve allies and friends not being able to fully meet their defense and
    humanitarian obligations. Potential refugee flows from the Caribbean could also impact
    Homeland security.

    The dramatic decline in oil prices—more than a two-thirds decline from the July peak of
    $147 per barrel—is partially a result of the market betting on a deep and perhaps protracted
    global recession. A serious supply crunch is possible down the road if sustained low prices lead
    to major cuts or delays in investment by national and international oil companies, especially high
    cost unconventional oil sources like oil sands. Nevertheless, lower prices benefit consumers, and
    declining revenues may put the squeeze on the adventurism of producers like Iran and
    Venezuela.

    The crisis presents many challenges for the United States. It started in the United States,
    quickly spread to other industrial economies and then, more recently, to emerging markets. The
    widely held perception that excesses in US financial markets and inadequate regulation were
    responsible has increased criticism about free market policies, which may make it difficult to
    achieve long-time US objectives, such as the opening of national capital markets and increasing
    domestic demand in Asia. It already has increased questioning of US stewardship of the global
    economy and the international financial structure.

    I next want to focus on extremist groups that use terrorism. The groups with the greatest
    capability to threaten are extremist Muslim groups. In 2008 terrorists did not achieve their goal
    of conducting another major attack in the US Homeland. We have seen notable progress in
    Muslim opinion turning against terrorist groups like al-Qa’ida. Over the last year and a half, al-
    Qa’ida has faced significant public criticism from prominent religious leaders and fellow
    extremists primarily regarding the use of brutal and indiscriminate tactics—particularly those
    employed by al Qa’ida in Iraq (AQI) and al-Qa’ida in the Lands of Islamic Maghreb (AQIM)—
    that have resulted in the deaths of Muslim civilians. Given the increased pressure posed by these
    criticisms, al-Qa’ida leaders increasingly have highlighted enduring support for the Taliban and
    the fight in Afghanistan and Pakistan and in other regions where they portray the West being at
    war with Islam and al-Qa’ida as the vanguard of the global terrorist movement. A broad array of
    Muslim countries is nevertheless having success in stemming the rise of extremism and
    attractiveness of terrorist groups. No major country is at immediate risk of collapse at the hands
    of extremist, terrorist groups, although a number—such as Pakistan and Afghanistan—have to
    work hard to repulse a still serious threat. In the next section I will discuss at length the
    challenges facing us in Pakistan and Afghanistan where militant have gained some traction
    despite the successes against al-Qa’ida.
    Because of the pressure we and our allies have put on al-Qa’ida’s core leadership in
    Pakistan and the continued decline of al-Qa’ida’s most prominent regional affiliate in Iraq, al-
    Qa’ida today is less capable and effective than it was a year ago.
    In Pakistan’s Federally Administered Tribal Areas (FATA), al-Qa’ida lost significant
    parts of its command structure since 2008 in a succession of blows as damaging to the group as
    any since the fall of the Taliban in late 2001. Key leaders killed over the past year include
    Khalid Habib, al-Qa’ida’s military chief and the fourth man in its chain of command; Abu Layth
    al-Libi, who directed cross-border attacks against our forces in Afghanistan and was a rising star
    in the organization; Abu Khabab al-Masri, the group’s leading expert on explosives and chemical
    attacks and a driving force behind its terrorist plotting against the US Homeland and Europe; and
    Usama al-Kini who was involved in the bombings of our Embassies in East Africa in 1998 and
    later became the chief planner of al-Qa’ida’s terrorist attacks in Pakistan.
    • The loss of these and many other leaders in quick succession has made it more difficult for
    al-Qa’ida to identify replacements, and in some cases the group has had to promote more
    junior figures considerably less skilled and respected than the individuals they are replacing.
    Sustained pressure against al-Qa’ida in the FATA has the potential to further degrade its
    organizational cohesion and diminish the threat it poses. If forced to vacate the FATA and locate
    elsewhere, the group would be vulnerable to US or host-country security crackdowns as well as
    local resistance, and probably would be forced to adopt an even more dispersed, clandestine
    structure, making training and operational coordination more difficult. Without access to its
    FATA safehaven, al-Qa’ida also undoubtedly would have greater difficulty supporting the
    Taliban insurgency in Afghanistan. It is conceivable al-Qa’ida could relocate elsewhere in South
    Asia, the Gulf, or parts of Africa where it could exploit a weak central government and close
    proximity to established recruitment, fundraising, and facilitation networks, but we judge none of these locations would be as conducive to their operational needs as their location in the FATA.

    The social, political, and economic integration of Western Europe’s 15 to 20 million
    Muslims is progressing slowly, creating opportunities for extremist propagandists and recruiters.
    The highly diverse Muslim population in Europe already faces much higher poverty and
    unemployment rates than the general population, and the current economic crisis almost certainly
    will disproportionately affect the region’s Muslims. Numerous worldwide and European Islamic
    groups are actively encouraging Muslims in Europe to reject assimilation and support militant
    versions of Islam. Successful social integration would give most ordinary Muslims a stronger
    political and economic stake in their countries of residence, even though better educational and
    economic opportunities do not preclude radicalization among a minority. Visible progress
    toward an Arab-Israeli settlement, along with stability in Iraq and Afghanistan, would help
    undercut radicals’ appeal to Muslim foreign policy grievances.

    We judge any homegrown extremists in the United States do not yet rise to the numerical
    level or exhibit the operational tempo or proficiency we have seen in Western Europe. A range
    of factors inside the United States may contribute to a lower incidence of homegrown cells
    developing. Nevertheless, we remain concerned about the potential for homegrown extremists
    inspired by al-Qa’ida’s militant ideology to plan attacks inside the United States, Europe, and
    elsewhere without operational direction from the group itself. In this regard, over the next year
    we will remain focused on identifying any ties between US-based individuals and extremist
    networks overseas. Though difficult to measure, the spread of radical Salafi Internet sites that
    provide religious justification for attacks; aggressive and violent anti-Western rhetoric; and signs
    that self-generating cells in the US identify with Bin Ladin’s violent objectives all point to the
    likelihood that a small but violent number of cells may develop here.

    Iran’s longstanding foreign policy goals are to preserve the Islamic regime, safeguard
    Iran’s sovereignty, defend its nuclear ambitions, and expand its influence in the region and the
    Islamic world. Iranian leaders perceive that regional developments—including the removal of
    Saddam and the Taliban, challenges facing the Untied States in Iraq and Afghanistan, the
    increased influence of HAMAS and Hizballah, and, until recently, higher oil revenues—have
    given Tehran more opportunities and freedom to pursue its objective of becoming a regional
    power. This perception has produced a more assertive Iranian foreign policy in which Tehran
    has focused on expanding ties in Iraq, Afghanistan, and the Levant to better influence and exploit regional political, economic, and security developments. Iran’s pursuit of nuclear weapon
    capability is another element in its more assertive foreign policy—an aspect that I will discuss
    later. In Tehran, Iran’s conservative faction continues to dominate the government. Supreme
    Leader Khamenei has consolidated political power in his office, but his reliance on hardline
    conservative elements—the IRGC, war veterans turned politicians such as President Mahmud
    Ahmadi-Nejad, and selected clerics—to bolster his authority has upset the earlier factional
    balance in Iranian politics.

    Although the regime still comprises many competing factions, only those that support the
    concept of a powerful Supreme Leader and advocate revolutionary values now have a
    significant voice in decisionmaking.
    President Ahmadi-Nejad faces less than certain prospects for reelection in June because
    his management of the economy and aggressive foreign policy rhetoric have become sources of
    significant domestic criticism and political friction. Ahmadi-Nejad’s economic policies have
    reduced unemployment marginally, but have fueled significant inflation, providing his critics
    ample ammunition to question his competence. The sharp fall in global oil prices will add to
    Iran’s economic problems, but Tehran has a substantial cushion of foreign reserves to support
    social and other spending priorities. Less energy revenues may also help to dampen its foreign
    policy adventurism.

    Militarily, Iran continues to strengthen the three pillars of its strategic deterrence:
    surface-to-surface missiles, long-range rockets and aircraft for retaliation; naval forces to disrupt
    maritime traffic through key waterways; and unconventional forces and surrogates to conduct
    worldwide lethal operations. Although many of their statements are exaggerations, Iranian
    officials throughout the past year have repeatedly claimed both greater ballistic missile
    capabilities that could threaten US and allied interests and the ability to close the Strait of
    Hormuz using unconventional small boat operations, anti-ship cruise missiles, and other naval
    systems. Some officials, such as Islamic Revolutionary Guard Corps Commander Major General
    Mohammad Ali Jafari-Najafabadi, have hinted that Iran would have a hand in attacks on
    “America’s interests even in far away places,” suggesting Iran has contingency plans for
    unconventional warfare and terrorism against the United States and its allies.
    Iran’s goals in Iraq include preventing the emergence of a threat from Iraqi territory,
    either from the government of Iraq itself, or from the United States. To achieve this, Iran
    probably seeks a government in Baghdad in which Tehran’s Shia allies hold the majority of
    political, economic, and security power. Iran also has sought to make the United States suffer
    political, economic, and human costs in order to limit US engagement in the region and to ensure
    that Washington does not maintain a permanent military presence in Iraq or use its military to
    pressure or attack Iran.

    Iranian efforts to secure influence in Iraq encompass a wide range of activities, including
    using propaganda, providing humanitarian assistance, building commercial and economic
    ties, and supporting Shia elements fighting the Coalition. Iran has provided a variety of Shia
    militants with lethal support including weapons, funding, training, logistical and operational
    support, and intelligence training.
    • We judge Iran will continue to calibrate its lethal aid to Iraqi Shia militants based on the
    threat it perceives from US forces in Iraq, the state of US-Iran relations, Tehran’s fear of a
    Ba’thist resurgence, Tehran’s desire to help defend Iraqi Shia against sectarian violence, and
    to maintain the ability to play a spoiler role in Iraq if Iran perceives the government of Iraq
    has become a strategic threat.
    • Despite Tehran’s efforts, we judge Iraqi nationalism and the growing capabilities of the Iraqi
    government will limit Iranian influence in Iraq. Baghdad, for example, signed the US-Iraq
    security agreement despite Iranian opposition.

    In Afghanistan, Iran has focused on promoting a friendly central government in Kabul
    and limiting Western power and influence. Iran’s policy in Afghanistan follows multiple tracks,
    including providing political and economic support to the Karzai government and developing
    relationships with actors across the political spectrum.
    • Iran has opposed Afghan reconciliation talks with the Taliban as risking an increase in the
    group’s influence and legitimacy.
    • We judge Iran distrusts the Taliban and opposes its return to power but uses the provision of
    lethal aid as a way to pressure Western forces, gather intelligence, and build ties that could
    protect Iran’s interests if the Taliban regains control of the country.
    In the Levant, Tehran is focused on building influence in Lebanon and expanding the
    capability of key allies. Tehran continues to support groups such as Hizballah, HAMAS, and
    Palestine Islamic Jihad (PIJ), which it views as integral to its efforts to challenge Israeli and
    Western influence in the Middle East.
    • Hizballah is the largest recipient of Iranian financial aid, training, and weaponry, and Iran’s
    senior leadership has cited Hizballah as a model for other militant groups. We assess Tehran
    has continued to provide Hizballah with significant amounts of funding, training, and
    weapons since the 2006 conflict with Israel, increasing the group’s capabilities to pressure
    other Lebanese factions and to threaten Israel.
    • Iran’s provision of training, weapons, and money to HAMAS since the 2006 Palestinian
    elections has bolstered the group’s ability to strike Israel and oppose the Palestinian
    Authority.

    Iranian Nuclear and Missile Programs. The Iranian regime continues to flout UN
    Security Council restrictions on its nuclear programs. There is a real risk that its nuclear
    program will prompt other countries in the Middle East region to pursue nuclear options
    conducive to the development of nuclear weapons, and the advent of additional nuclear weapons
    programs might lead countries in other regions to reassess their nuclear options.
    I want to be very clear in characterizing the Iranian nuclear program. First, there are
    three key parts to an effective nuclear weapons capability:
    (1) Production of fissile material,
    (2) Effective means for weapon delivery, and
    (3) Design, weaponization, and testing of the warhead itself.
    We assessed in our 2007 NIE on this subject that Iran’s nuclear weapon design and
    weaponization work was halted in fall 2003, along with its covert uranium conversion and
    enrichment-related activities. Declared uranium enrichment efforts were suspended in 2003 but
    resumed in January 2006 and will enable Iran to produce weapons-usable fissile material if it
    chooses to do so. Development of medium-range ballistic missiles, inherently capable of
    delivering nuclear weapons, has continued unabated.
    We assess Iranian military entities were working under government direction to develop
    nuclear weapons until fall 2003. Iranian entities are continuing to develop a range of technical
    capabilities that could be applied to producing nuclear weapons, if a decision were made to do
    so.
    • Iran continues its efforts to develop uranium enrichment technology, which can be used both
    to produce low-enriched uranium for power reactor fuel and to produce highly enriched
    uranium for nuclear weapons.
    • As noted, Iran continues to deploy and improve ballistic missiles inherently capable of
    delivering nuclear weapons.
    • We assess Iran since fall 2003 has conducted research and development projects with
    commercial and conventional military applications, some of which would be of limited use
    for nuclear weapons.
    We judge in fall 2003 Tehran halted its nuclear weapons design and weaponization
    activities and that the halt lasted at least several years. We assess Tehran had not restarted these
    activities as of at least mid-2007. Although we do not know whether Iran currently intends to
    develop nuclear weapons, we assess Tehran at a minimum is keeping open the option to develop
    them.
    We judge the halt was directed primarily in response to increasing international scrutiny
    and pressure resulting from exposure of Iran’s previously undeclared nuclear work. This
    indicates Iran may be more susceptible to influence on the issue than we had judged in the 2005
    National Intelligence Estimate.
    We do not have sufficient intelligence reporting to judge confidently whether Tehran is
    willing to maintain indefinitely the halt of its previously enumerated nuclear weapons-related
    activities while it weighs its options, or whether it will or already has set specific deadlines or
    criteria that will prompt it to restart those activities. We assess Iran has the scientific, technical,
    and industrial capacity eventually to produce nuclear weapons. In our judgment, only an Iranian
    political decision to abandon a nuclear weapons objective would plausibly keep Iran from
    eventually producing nuclear weapons—and such a decision is inherently reversible. I reiterate
    that two activities of the three relevant to a nuclear weapons capability continue: development of
    uranium enrichment technology that will enable production of fissile material, if Iran chooses to
    do so, and development of nuclear-capable ballistic missile systems.
    We assess convincing the Iranian leadership to forgo the eventual development of nuclear
    weapons will be difficult given the linkage many within the leadership see between nuclear
    weapons and Iran’s key national security and foreign policy objectives, and given Iran’s
    considerable effort from at least the late 1980s to 2003 to develop such weapons. Our analysis
    suggests that some combination of threats of intensified international scrutiny and pressures,
    along with opportunities for Iran to achieve its security and goals might—if perceived by Iran’s
    leaders as credible—prompt Tehran to extend the halt to the above nuclear weapons-related
    activities. It is difficult to specify what such a combination might be.
    We continue to assess Iran does not currently have a nuclear weapon. We continue to
    assess Iran probably has imported at least some weapons-usable fissile material but still judge it
    has not obtained enough for a nuclear weapon. We cannot rule out that Iran has acquired from
    abroad or will acquire in the future a nuclear weapon or enough fissile material for a weapon.
    Barring such acquisitions, if Iran wants to have nuclear weapons it would need to produce
    sufficient amounts of fissile material indigenously. We judge it has not yet done so.
    Iran made significant progress in 2007 and 2008 installing and operating centrifuges at its
    main centrifuge enrichment plant, Natanz. We judge Iran probably would be technically capable
    of producing enough highly enriched uranium (HEU) for a weapon sometime during the 2010-
    2015 time frame. INR judges Iran is unlikely to achieve this capability before 2013 because of
    foreseeable technical and programmatic problems.
    Iranian Missile Threat. Beyond its WMD potential, Iranian conventional military power
    threatens Persian Gulf states and challenges US interests. Iran is enhancing its ability to project
    its military power, primarily with ballistic missiles and naval power, with the goal of dominating
    the Gulf region and deterring potential adversaries. It seeks a capacity to disrupt the operations
    and reinforcement of US forces based in the region, potentially intimidating regional allies into
    withholding support for US policy, and raising the political, financial, and human costs to the
    United States and our allies of our presence.
    • Iran’s growing inventory of ballistic missiles—it already has the largest inventory in the
    Middle East—and its acquisition of anti-ship cruise missiles provide capabilities to enhance
    its power projection. Tehran views its conventionally armed missiles as an integral part of its
    strategy to deter and if necessary retaliate against forces in the region, including US forces.
    Its ballistic missiles are inherently capable of delivering WMD and if so armed would fit into
    this same strategy.
    The Terrorist CBRN Threat. Over the coming years, we will continue to face a
    substantial threat, including in the US Homeland, from terrorists attempting to acquire
    biological, chemical, and possibly nuclear weapons and use them to conduct large-scale attacks.
    Conventional weapons and explosives will continue to be the most often used instruments of
    destruction in terrorist attacks; however, terrorists who are determined to develop CBRN
    capabilities will have increasing opportunities to do so, owing to the spread of relevant
    technological knowledge and the ability to work with CBRN materials and designs in
    safehavens.
    • Most terrorist groups that have shown some interest, intent, or capability to conduct CBRN
    attacks have pursued only limited, technically simple approaches that have not yet caused
    large numbers of casualties.
    In particular, we assess the terrorist use of biological agents represents a growing threat
    as the barriers to obtaining many suitable starter cultures are eroding and open source technical
    literature and basic laboratory equipment can facilitate production. Terrorist chemical attacks
    also represent a substantial threat. Small-scale chemical attacks using industrial toxins have been the most frequent type of CBRN attack to date. The chlorine attacks in Iraq from October 2006 through the summer of 2007 highlighted terrorist interest in using commercial and easily
    available toxic industrial chemicals as weapons.
    Al-Qa’ida is the terrorist group that historically has sought the broadest range of CBRN
    attack capabilities, and we assess that it would use any CBRN capability it acquires in an anti-US
    attack, preferably against the Homeland. There also is a threat of biological or chemical attacks
    in the US Homeland by lone individuals.

    The Growing Cyber and Organized Crime Threat
    Threats to the US Information Technology Infrastructure
    The US information infrastructure, including telecommunications and computer networks
    and systems, and the data that reside on them, is critical to virtually every aspect of modern life.
    Threats to our information technology infrastructure are an important focus of the Intelligence
    Community. As government, private sector, and personal activities continue to move to
    networked operations, as our digital systems add ever more capabilities, as wireless systems
    become even more ubiquitous, and as the design, manufacture, and service of information
    technology have moved overseas, the threat will continue to grow.
    This information and communications revolution also is enabling an unprecedented
    ability to spread ideas and influence large numbers of people. Nation-states and non-state groups
    are taking an increasing interest in the role of mass media in shaping international opinions.
    Terrorists will continue to be motivated to conduct spectacular attacks in part by the desire to
    achieve maximum media exposure for their cause. Increasing global connectivity is enabling
    radical groups to recruit and train new members, proliferate extremist ideologies, manage their
    finances, manipulate public opinion, and coordinate attacks. In the recent conflict in Gaza, for
    example, the media played an important role for both sides in shaping public perceptions of the
    conflict. We can expect future adversaries to similarly employ mass media in an attempt to
    constrain US courses of actions in a future crisis or conflict.
    Further, the growing connectivity between information systems, the Internet, and other
    infrastructures creates opportunities for attackers to disrupt telecommunications, electrical
    power, energy pipelines, refineries, financial networks, and other critical infrastructures. Over
    the past several years we have seen cyber attacks against critical infrastructures abroad, and
    many of our own infrastructures are as vulnerable as their foreign counterparts.
    • A successful cyber attack against a major financial service provider could severely impact
    the national economy, while cyber attacks against physical infrastructure computer systems
    such as those that control power grids or oil refineries have the potential to disrupt services
    for hours to weeks.
    Network defense technologies are widely available to mitigate threats but have not been
    uniformly adopted due to associated costs, perceived need, operational requirements, and
    regulatory constraints. This slow rate of adoption has allowed cyber attackers to keep up with
    many defensive advances. Meanwhile, advances in digital communications technology, such as
    the growth in wireless connectivity and the acceleration of network convergence with a variety
    data increasingly digitized and transmitted over the Internet, are creating new vulnerabilities in
    our networks and new avenues for cyber attacks.

    Malicious activity on the Internet also is rapidly increasing: spam—unsolicited email that
    can contain malicious software—now accounts for 81 percent of all email according to Message
    Labs (Symantec); the Georgia Tech Information Security Center projects a ten-fold increase in
    malicious software targeting data in the coming year; and botnets—networks of hijacked
    computers used to deliver spam or launch distributed denial of service attacks—are expected to
    compose 15 percent of all online computers in 2009. Ferris Research estimates that the total cost
    of spam and all of the types of fraud that take advantage of spam’s impact is $42 billion in the
    United States and $140 billion worldwide in last year, while McAfee estimates that global
    companies may have lost over $1 trillion worth of intellectual property to data theft in 2008.
    State and Non-State Threats. A growing array of state and non-state adversaries are
    increasingly targeting—for exploitation and potentially disruption or destruction—our
    information infrastructure, including the Internet, telecommunications networks, computer
    systems, and embedded processors and controllers in critical industries. Over the past year, cyber
    exploitation activity has grown more sophisticated, more targeted, and more serious. The
    Intelligence Community expects these trends to continue in the coming year.
    We assess that a number of nations, including Russia and China, have the technical
    capabilities to target and disrupt elements of the US information infrastructure and for
    intelligence collection. Nation states and criminals target our government and private sector
    information networks to gain competitive advantage in the commercial sector. Terrorist groups,
    including al-Qa’ida, HAMAS, and Hizballah, have expressed the desire to use cyber means to
    target the United States. Criminal elements continue to show growing sophistication in technical
    capability and targeting and today operate a pervasive, mature on-line service economy in illicit
    cyber capabilities and services available to anyone willing to pay. Each of these actors has
    different levels of skill and different intentions; therefore, we must develop flexible capabilities
    to counter each. We must take proactive measures to detect and prevent intrusions from
    whatever source, as they happen, and before they can do significant damage.
    We expect disruptive cyber activities to be the norm in future political or military
    conflicts. The Distributed Denial of Service (DDoS) attacks and Web defacements that targeted
    Georgia in 2008 and Estonia in 2007 disrupted government, media, and banking Web sites.
    DDoS attacks and Web defacements targeted Georgian government Web sites, including that of
    Georgian President Saakishvili, intermittently disrupting online access to the official Georgian
    perspective of the conflict and some Georgian Government functions but did not affect military
    action. Such attacks have been a common outlet for hackers during political disputes over the
    past decade, including Israel’s military conflicts with Hizballah and HAMAS in 2006 and 2008,
    the aftermath of the terrorist attacks in Mumbai last year, the publication of cartoons caricaturing
    the Prophet Mohammed in 2005, and the Chinese downing of a US Navy aircraft in 2001.
    The Comprehensive National Cybersecurity Initiative. In January 2008, the
    Comprehensive National Cybersecurity Initiative (CNCI) was adopted as national policy as part
    of National Security Presidential Directive 54/Homeland Security Presidential Directive 23
    (NSPD-54/HSPD-23). With bipartisan support, Congress appropriated the vast majority of the
    CNCI funding request in the Consolidated Security, Disaster Assistance, and Continuing
    Appropriations Act of 2009.

    The CNCI addresses current cybersecurity threats, anticipates future threats and
    technologies, and develops a framework for creating in partnership with the private sector an
    environment that no longer favors cyber intruders over defenders. The CNCI includes defensive,
    offensive, education, research and development, and counterintelligence elements, while
    remaining sensitive throughout to the requirements of protecting the privacy rights and civil
    liberties of US citizens. The CNCI is now making considerable progress in building a better
    understanding of the cyber threat, developing concrete solutions, and approving detailed courses
    of action. The Adminstration is now reviewing CNCI, to ensure it is consistent with its own
    cybersecurity policy.
    To be sure, significant work remains in order to protect, defend, and respond to the cyber
    threat in a manner that markedly improves our nation’s overall security. Yet there is reason to be
    hopeful. We are witnessing an unprecedented unity of effort across a broad coalition of
    government agencies, members of Congress, and leaders of industry. To succeed, however, the
    CNCI must remain a long-term national priority. With sustained momentum and continued
    national resolve we can and will build an enduring security framework capable of protecting our
    vital national security, economic, and public health interests.
    We cannot afford to discover successful cyber intrusions after-the-fact, accept disastrous
    losses, and then seek merely to contain them. It requires a broad alliance of departments,
    agencies, and industry leaders to focus on countering the threat, mitigating vulnerabilities, and
    enhancing resiliency in order to preserve our national security, national economy, and public
    welfare.
    Growing Transnational Organized Crime Threat
    Most organized criminal activities increasingly involve either networks of interconnected
    criminal groups sharing expertise, skills, and resources in joint criminal ventures that transcend
    national boundaries or powerful, well-organized crime groups seeking to legitimize their image
    by investing in the global marketplace. Organized criminals and groups will increasingly pose a
    threat to US national security interests by enhancing the capabilities of terrorists and hostile
    governments.
    Some organized crime networks, groups, and individuals also have invested in energy
    and mineral markets in an effort to diversify and legitimize their business activities. Criminals’
    coercive tactics, underhanded business practices, opaque motives, and self-serving loyalties can
    undermine the normal workings and integrity of these global markets. The most powerful, highprofile
    Eurasian criminal groups often form strategic alliances with senior political leaders and
    business tycoons and can operate from a relative safehaven status with little to fear of
    international arrest and prosecution. The leaders of many of these groups go to great lengths to
    portray themselves as legitimate businessmen and use front companies that give them more
    market access and leverage. They also employ some of the world’s best accountants, lawyers,
    bankers, and lobbyists to deflect and frustrate the efforts of authorities.

    The change in the structure and types of activities conducted by transnational criminal
    groups is making it increasingly difficult to identify and attack them. In particular, the
    increasing prevalence of loosely knit networks, the use of cyberspace and global financial
    systems, and political corruption have made it easier for them to hide their involvement, to
    thwart law enforcement efforts, and to create images of legitimacy.

    The international security environment is complex. No dominant adversary faces the
    United States that threatens our existence with military force, but the global financial crises has
    exacerbated what was already a growing set of political and economic uncertainties. We are
    nevertheless in a strong position to shape a world reflecting universal aspirations and values that
    have motivated Americans since 1776: human rights; the rule of law; liberal market economics
    and social justice. Whether we can succeed will depend on actions we take here at home—
    restoring strong economic growth and maintaining our scientific and technological edge and
    defending ourselves at reasonable cost in dollars without violating our civil liberties. It will also
    depend on our actions abroad, not only in how we deal with regions, regimes and crises, but also
    in developing new multilateral systems, formal or informal, for effective international
    cooperation in trade and finance, in neutralizing extremist groups using terrorism, in controlling
    the proliferation of WMD, developing codes of conduct for cyberspace and space, and in
    mitigating and slowing global climate change.

    Full report here:


    Gerald

    ( sorry Google blog text formating scewing up in Google's chrome browser.)

    .

    Labels: