Internet Anthropologist Think Tank: 2/21/10 - 2/28/10

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Saturday, February 27, 2010

    Judo Paradigm, N. Korea



    Two posts from Thomas P.M. Barnett
    and a sentence from Gerald.




    Life under Kim Jong Il

    WORLD NEWS: "Pyongyang Reports an Aging, Less Healthy Population," by Evan Ramstad, Wall Street Journal, 22 February 2010.
    Kim's legacy, as measured from the country's two most recent censuses:
    1) population up from 21.2m to 24.0m
    2) infant mortality up from 14.1/1,000 births to 19.3 (not bad but wrong direction, obviously)
    3) maternal mortality up from 54/1,000 births to 77
    4) life expectancy drops from almost 73 years to 69
    5) farming remains the biggest employer at 3.4m, with the gov/mil second at just under 700k (guess that's no million-man army then), followed by education, machine manufacturing, textiles and coal mining. 40k work in electronics.
    Some glimpses into the Hermit Kingdom.





    Good argument on North Korea

    OP-ED: Magical thinking on North Korea, By Leon V. Sigal, Boston Globe, February 24, 2010
    After saying it's "magical thinking" to expect NorKo to collapse, or for China to step up, or for negotiations to stop Pyongyang's nuclear cowboying-up, the Globe makes a strong pitch for an aggressive soft-kill:
    The only way to get North Korea to reverse course, short of war, is to reconcile with it - ending enmity through robust political, economic and cultural engagement, investment and aid, security assurances, normalization of relations, and, above all, a peace treaty ending the Korean war.
    I like anything that's aggressive against the war-criminal Kim regime. I think an aggressive opening-up campaign would be highly destabilizing for the regime, and that we'd trigger a crisis point faster that way than what we've done for the last two decades.
    So I like this argument very much.
    (Thanks: John P. Ryan)

     


    xxxxxxxxxxxxxxxxxxxx

    I'd like the time to run that thru a paradigm engine,
    might be something to it.

    Gerald
    Antropologist

    Labels: ,

    Terrorist Names SEARCH:
    Loading

    RIAA maybe seeking death penalties, sexy

    RIAA abusing 14 yr old cheerleaders for not being Internet literate.






    A federal appeals court is ordering a university student to pay the Recording Industry Association of America $27,750 — $750 a track — for file sharing 37 songs when she was a high school cheerleader.


    The lower court had granted her an “innocent infringer’s” exemption to the Copyright Act’s minimum of $750 per track because she said she didn’t know she was violating copyrights and thought file sharing was akin to internet radio streaming.



    Most of the thousands of RIAA file sharing cases have settled out of court for a few thousand dollars. The RIAA is winding down its 6-year-old litigation campaign targeting individual file sharers and instead is working with internet service providers to adopt rules that could cut off or hinder internet access to copyright scofflaws.
    The first RIAA case to go to trial against an individual concerned Jammie Thomas. A Minnesota jury ordered the woman to pay $1.92 million for file sharing 24 songs. The judge in the case reduced the award to $54,000 — $2,250 a track.
    The second case concerns Joel Tenenbaum, a Boston University grad student who a jury ordered to pay $675,000 for file sharing 30 tracks last year. Tenenbaum has asked the judge in the case to lower the award. A decision is pending.




    Read More http://www.wired.com/threatlevel/#ixzz0gldXnNlM


    xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx


    Our sources report RIAA maybe seeking death penalties in Iran
    for file sharing.


    $1.9 million dollar fine for shoplifting, 
    Now if they had stole the CDs from a brick building
    instead of the Internet I don't think they would
    have gotten $1.9 million dollar fines.




    Cruel and unusual punishment is a statement implying that governments shall not inflict suffering or humiliation on the condemned as punishment for crimes, regardless of their degree of severity. It was founded in the English Bill of Rights, which was signed in 1689 by King William III and Queen Mary II, who were then the joint rulers of EnglandScotland, and Ireland following the 'Glorious Revolution' of 1688.
    These exact words later appeared in the Eighth Amendment to the United States Constitution (1787). 
    So USA prohibits the Government from cruel and unusual punishments but I guess its Ok
    in Civil courts.

    Well the USA allows 460% banking loan sharks, and 30% vig mafia rates on credit cards
    why wouldn't  they allow Million dollar fines for shoplifting?


    See what assholes can get thru congress with Lobbyist
    and a few million dollars in bribes, errr I mean legal 
    donations, sorry my error.


    Does everybody on the hill have their head up their ass?




    Gerald
    Anthropologist
    Remember the rootkit Sony put on everyone's
    PC with their CDs, and they got away with it.
    .

    Labels:

    Terrorist Names SEARCH:
    Loading

    Iran working on nuke, 02.27.10



    Iran working on nuke, 02.27.10

    Iran moved nearly its entire stockpile of low-enriched nuclear fuel to an above-ground plant. 


    That mystery is the subject of fervent debate among many who are trying to decode Iran’s intentions. The theories run from the bizarre to the mundane: Under one, Iran is actually taunting the Israelis to strike first. Under another, it is simply escalating the confrontation with the West to win further concessions in negotiations. The simplest explanation, and the one that the Obama administration subscribes to, is that Iran has run short of suitable storage containers for radioactive fuel, so it had to move everything.


    Since October, when Iran agreed in principle to ship much of its nuclear stockpile out of the country so that it could be converted to fuel for a medical reactor, there have been a series of unexplained actions. President Mahmoud Ahmadinejad has veered from hailing the deal to backing away from it. The country has declared that it will soon build 10 new enrichment plants — a number it does not have the capacity to carry out. 


    The report said that on Feb. 14, with inspectors present, the Iranians moved roughly 4,300 pounds of low-enriched uranium out of deep underground storage to the small plant that they have declared they will use to re-enrich the fuel to 20 percent purity. (It takes 80- to 90-percent purity to make a weapon, a relatively small technological leap from 20 percent.)


    SOURCE:


    XXXXXXXXXXXXXXXXXXXX


    PARADIGM INTEL


    Our sources say that the low-enriched uranium is virtually useless for anything
    but running an energy plant. Its all contaminated and unusable for weapons 
    purposes.
    Internet Anthropologist Think Tank: Iran Epic nuke fail?
    If this is true there is no point in attacking that product.
    And it also frees up underground space for new non-contaminated
    3% uranium, which they can spin into weapons grade product.


    They lost many of their centrifuges when they tried to use
    the contaminated product.
    Maybe as many a third of the centrifuges were destroyed.


    This action points to secret underground processing
    new material to weapons grade product.




    Gerald
    Anthropologist


    Internet Anthropologist Think Tank: Iran is SCREWED




    .

    Labels: ,

    Terrorist Names SEARCH:
    Loading

    Paradigm UPDATE 02.27.10




    IMF's Strauss-Kahn suggests IMF may one day provide global reserve asset

    What is really scary is this guy misses the main point in a reserve currency, and he is the 
    head of IMF.

    The reason US dollar is a reserve currency is the US Military.
    It provides the safety and confidence investors need. G

    xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx


    xxxxxxxxxxxxxxxxxx


    System Is 'Fragile' and Cannot Sustain Tempo of Current or Future Operational Missions


    xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

    Pakistani court blocks transfer of Mullah Baradar and four senior Taliban leaders to Afghanistan

    Read more: http://www.longwarjournal.org/#ixzz0giGxskHV

    Not the first time the Paki courts have saved the Taliban and Al Qaeda.G

    xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx



    G


    .

    Labels:

    Terrorist Names SEARCH:
    Loading

    Cybersecurity bill to give president new MAGICAL powers


    Cybersecurity bill to give president new MAGICAL powers???


    Cybersecurity bill to give president new emergency powers.


    The president would have the power to safeguard essential federal and private Web resources under draft Senate cybersecurity legislation.
    ( BS, how is he going to safeguard the web? Is this some magic power? This is nonsense. Currently there are no silver bullets.
    USA can't do a damn thing look at Cornfliker and the Secret hacker with a 100 terabyte stash. THERE IS NO PROTECTION. G )

    ( Jesus, lets get someone in there that knows what the hell they are talking about. G )
    "The president would then have the ability to initiate those network contingency plans to ensure key federal or private services did not go offline during a cyberattack of unprecedented scope, the aide said." 
    MY COMMENTS IN CAPS FOR EASE OF READING. G
    IF THEY WAIT FOR THE PRESIDENT TO INITIATE SOMETHING THEN ITS ALREADY TOO LATE.
    THERE IS NO WAY TO ENSURE KEY FED OR PRIVATE SERVICES WILL REMAIN ON LINE, 
    ITS JUST BULL SHIT.
    THEY ARE MAKING STUFF UP. G

    Their renewed focus arrives on the heels of two, high-profile cyberattacks last month: A strike on Google, believed to have originated in China, and a separate, more disjointed attack that affected thousands of businesses worldwide.
    YES THEY WALKED RIGHT THROUGH THE BEST SECURITY IN THE USA AND NO BODY COULD STOP THEM. GOOGLE, MICROSOFT, DOD, STATE DEPT. ETC.


    Internet Anthropologist Think Tank:
     WE ARE ALL RUNNING NAKED
    I wrote this in Jan, of 2009.

    When early reports predicted the cybersecurity measure would allow the president to "declare a cybersecurity emergency,
    HE CAN DECLARE ANYTHING HE WANTS, HE CAN DANCE A JIG, THATS NOT GOING TO STOP A CYBER PEARL HARBOR.

    "Too much is at stake for us to pretend that today’s outdated cybersecurity policies are up to the task of protecting our nation and economic infrastructure," 
    THERE ARE NO POLICIES THAT WILL PROTECT THE NATION AND ECONOMIC INFRASTRUCTURE.

    Rockefeller said. "We have to do better and that means it will take a level of coordination and sophistication to outmatch our adversaries and minimize this enormous threat."
    ITS GOING TO TAKE A LOT MORE THAN A LEVEL OF COORDINATION AND SOPHISTICATION TO OUT WIT THE HACKERS.

    CURRENTLY THE PRES HAS THE POWER TO SHUT OFF PART OR MOST OF THE INTERNET.
    I HAVE NO IDEA UNDER WHAT CIRCUMSTANCES THAT WOULD HELP USA, IT WOULD ONLY AID THE ENEMY.

    RIGHT NOW THE RESPONSE TO A MAJOR WWW ATTACK WOULD BE AD HOC AND WAY TO SLOW, DISJOINTED
    AND A JUMBLE OF FEDERAL AND PRIVATE ACTIONS WHICH WOULD BE UNCOORDINATED.
    NEED C.O.W.s FOR COORDINATED AUTOMATIC TIMELY RESPONSE.

    CURRENTLY IF CORNFLIKER WANTED TO TAKE DOWN THE WWW I DON'T THINK THEY COULD BE
    STOPPED. 

    THE ONLY POSSIBILITY WOULD BE THE OUT OF THE BOX PARADIGM WE WROTE A WHITE PAPER
    ON FOR THE AIR FORCE.

    SOURCED FROM HERE:

    THIS IS NOT A PATCH UP JOB THAT NEEDS COORDINATION, THE HACKERS OUTCLASS THE
    USA AND WORLDS CYBER SECURITY.

    THE WWW IS VULNERABLE , RIGHT NOW TODAY.

    Gerald
    Internet Anthropologist, AD MAGNUM
    Tactical Internet Systems analyst
    .

    .

    Labels:

    Terrorist Names SEARCH:
    Loading

    Friday, February 26, 2010

    What RPG/IED

    Takes out a RPG in mid air from roadside attacker.
    WOW
    Would work on IED coming in from the side also. G





    Good time to be INSIDE...

    g

    .

    Labels:

    Terrorist Names SEARCH:
    Loading

    I am a Warrior, this is my song.

    I am a Warrior, this is my song.


    Gerald in Uniform




    Saw  it on JAWA.


    Barb

    .

    Labels: ,

    Terrorist Names SEARCH:
    Loading

    World's best and Dumbest Hackers




    World's best and Dumbest Hacker 
    By Gerald Internet Anthropologist Think Tank

    First run: Paradigm Intel:

    The hacking attacks against US defense and corporate secrets
    was successful.

    How? Metrics:

    Needed lot of confidence.
    Needed experience.
    Be certain they couldn't be traced 
    from experience.

    Needed to know what to look for and Where.
    Thats a big deal, expert in each industry.

    Needed experienced troops, and resources.
    Inside knowledge of the WWW.

    Good and professional security,
    keep their mouths shut.

    Paradigm points to Professional criminal
    hackers, with prior experience and successes.

    And economy and cash flows to monetize
    the data streams, across the board.

    RBN would be primary suspect for hackers.
    First sales would be to Russian FSB
    of US defense secrets. Then sold to China's
    Military.

    Second major sales to few Russian Corporations,
    Cover provided by FSB.

    If its criminal or State, the question
    becomes how to monetize the corporate secrets information.


    China would be in the best position to monetize 
    the corporate data, and have the cash to actualize
    the Data stream, and 1 billion 400 million books
    size data base is a "Data Stream"

    Paradigm Intel indicates the operations hacking were 
    the former RBN and selling to China.
    Military info to China Government and
    Business intel to China Corporate.

    Google and Micro Soft are pumping dollars
    into an offensive cyber forces.

    Google put one together fairly fast
    ad hoc. Micro Soft is buying theirs
    and have not gone rouge, still using
    the Courts.

    A treaty would be useful in dealing
    with the end use of stolen technology
    on the WWW.

    The WWW by agreement have
    the capability to almost cut off
    any nation form the WWW,
    for a given time,
    by mutual agreement/treaty.
    As a form of punishment for
    abusing the WWW.


    And it might be interesting to see
    who opposes it.


    Russia just isn't in the position
    to capitalize on this cutting edge
    data stream, lack of capital and 
    high technology personnel.

    China has the cash to exploit the
    high tech data flow and implement
    the infrastructure needed to use it.
    And they have more high tech personnel
    than Russia. And huge population of
    English readers/speakers to translate
    the data base. Buts its still equal
    to 1 billion 400 million books...

    The RBN heist of US major corps
    PCs could mean huge cash flows
    from China to Russia.

    And would fit into their mutual 
    security agreements.

    They are very sure they can't be traced
    to the perps over the WWW.

    But prize its self may not be able to 
    be hidden, its use will be self apparent.

    Sate sponsored Industrial espionage faces the law of unintended consequences.

    How can you secretly dispose of your Booty?
    You have a herd of stolen elephants on your
    hands.



    Gerald
    Anthropologist

    Even with 'Googles Guts' ; Badiu will never
    be a "Google" .
    Its a different species in the
    respective cultures.


    Labels:

    Terrorist Names SEARCH:
    Loading

    Thursday, February 25, 2010

    Google screw up, SORRY





    SORRY

    No matter what I put the settings, formatting at...
    30 days, or 30 posts...

    Google only displays 9 posts?
    Somebody fix this please.
    ( GNASHING OF TEETH.)

    Must be them Google hacker....
    messin with Blogs.

    I bet alot of stuff is getting blamed
    on them.

    Gerald

    .

    Labels: ,

    Terrorist Names SEARCH:
    Loading

    Off Subject; Killer Whale

    There is a problem with the whales environment, and psychology.

    In the wild.


    SeaWorld Orlando FL's Whale.


    The "down fin" comes from a too small pool, its like a jail for them.
    SeaWorld whales are SICK.......SLUMPING FIN SYNDROME.



    Gerald


    .

    Labels:

    Terrorist Names SEARCH:
    Loading

    Cryptome GONE


    Microsoft Takes them Down..


    backup:


    xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx



    by: rfrancis1980 | 02/24/10 | 7:27 pm |
    Cryptome needs to sue Network Solutions over this.
    .
    We can’t keep having DNS and hosting providers cutting off services whenever some company files a DMCA complaint.
    .
    There are proper legal procedures in place to deal with DMCA takedown requests, Network Solutions did not follow them and showed their disdain for their customers.
    .
    I for one with never buy a product from Network Solutions again.






    by: Zenc | 02/25/10 | 12:45 am |
    NetSol actually locked the domain name, so it can’t be moved until after this dispute is resolved…
    In the meantime you can find the site mirror at http://cryptomeorg.siteprotect.net/ , sans the MS document.


    Read More http://www.wired.com/threatlevel/2010/02/microsoft-cryptome/#comments#ixzz0gYwA84lr



    G

    Update:
    Like all service providers, Microsoft must respond to lawful requests from law enforcement agencies to provide information related to criminal investigations. We take our responsibility to protect our customers privacy very seriously, so have specific guidelines that we use when responding to law enforcement requests. In this case, we did not ask that this site be taken down, only that Microsoft copyrighted content be removed. We are requesting to have the site restored and are no longer seeking the document’s removal.
    Read More http://www.wired.com/threatlevel/#ixzz0gbLMd8qJ
    .

    .

    Labels: