Internet Anthropologist Think Tank: 3/7/10 - 3/14/10

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Saturday, March 13, 2010

    Security Vendors frag themselves



    Security Vendors continue to shoot themselves
    in the Foot.

    "Ethical concerns mean that security firms do not allow their infrastructure to be used in sending spam or running attacks against victims. By monitoring such instructions it's therefore possible for cybercrooks to program command and control servers to disable or simply ignore these machines, thus depriving security firms of vital intelligence in how zombie botnets are operating in the real world."

    Some bot nets run 13 million zombies.
    And the Security Vendors have problems letting
    just on of those infected PCs run  to collect 
    intelligence.

    Their ethical concerns are at the very least misguided
    and at most incompetence.

    The hackers and malware Vendors are kicking the Security
    Vendors ass at every turn.

    And they are playing a poor second best, and promoting
    their security products with misnomers if not out right
    lies.

    The stogy ineffective Security Vendors are are blind 
    sidling the public by developing policys and programing
    methods that require all other security products to be
    uninstalled and not making their security products
    compatible with other Vendors.

    They are not defending their turf, there are 500+
    fake Security Vendors on the WWW now.

    Our testes of the basic function of these vendors
    points to their incompetence, most of the time 
    virus are spotted by anti vir programs 80% of the
    time, if you use multiple anti vir programs this
    increases to around 95%.

    But the vendors block the use of other Security products
    with their products, making the user less safe.

    I would suggest that "Ethical concerns mean that security firms do not allow their infrastructure to be used in sending spam or running attacks against victims."
    are misguided.
    Doctors run double blind tests where one group gets sugar pills while the other 
    group gets the real medicine.

    Some times the members that don't get the real Med.
    DIE.
    If the Medical profession can ethically run double blind tests
    then certainly the Security Vendors can allow some
    of the millions of bots to run to collect intelligence to kill
    the bot farms.

    The Security Vendors are already so far behind
    the hackers, they don't need unnecessary misguided
    handicaps preventing them from collecting Intelligence.

    So far I rate the Security Vendors a "D" failing grade.
    They are NOT getting the job done.


    Gerald
    Internet Anthropologist
    Tactical Internet Systems analyst.

    .

    Labels:

    Terrorist Names SEARCH:
    Loading

    Friday, March 12, 2010

    Down the Cyber S**t creek and not even a keyboard..



    Down the Cyber S**t creek and not even a mouse..

    Please consider, and comment; looking for rebuttals.
    Thanks G

    CONCEPT:
    Paradigm Intel:


    The most recent attacks on the Big US Coprs
    ( See video below )
    may have stolen the source code, the source core code.

    This opens the possibility of hiding malware,
    back doors even exploits into the Source Core
    of most of the WWW programs.

    Its millions and millions of lines of code,
    that need to be checked, Check sum tester
    programs can be defeated and are not reliable
    to verify the safety of source core base programs.

    I would argue there remains the possibility
    key core base programs being corrupted
    with many kinds of bad stuff.
    Hidden, tricked, and invisible ways of
    including malware code with out detection.
    To Include Gov. MIL. and civilian .com.

    Not to mention no one is looking for
    these problems in "core base" after
    the program is written.

    Until now there has been no reason to
    spend huge number of personnel and man hours
    to re check code already done and in use.

    Paradigm Intel says source code has been
    stolen, maybe even re-written and
    inserted back into the "core base".

    Every Company and Gov and MIL that
    was broken into needs to recheck its
    "core base" for bad guys using it
    covertly.

    This is a whole new Security Paradigm
    threat,

    The SOUL OF THE WWW HAS BEEN HACKED.
    This means the code for the source of the proprietary
    programs of these corporations was stolen, and may have
    been corrupted and replaced the original source code,
    can we now trust Google programs, mail, browser any
    thing Google, or did they get MS OS, and make some
    additions?
    Or is Yahoo Mail still the original source code?
    How can anyone tell?
    "THE BAD GUYS" have had full access to it,
    and maybe all of the originals?
    Can they even tell if its been doctored?


    Technical review HERE.

    Gerald
    Internet Anthropologist, ad magnum
    Tactical Internet Systems analyst.



    Layman's review in video.





    News Report:


    Google China hackers stole source code - researcher.




    Explain where this hypothesis is wrong. G


    Comment below....


    .

    Labels:

    Terrorist Names SEARCH:
    Loading

    Ops and Intel update 03.12.10





    Taliban web masters are now using auto responders on their emails, now in Pastho and in English....
    Change to 'service' paradigm?
     its almost as if they are experiencing blow back.
    Paradigm Intel points to Talibi webmasters adapting
    to Video Web cams about a month out. The cams
    are harder to intercept, and instant communication. G

    xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

    Real-life Hurt Locker: how bomb-proof suits work


    xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

    SECRET TREATYS???




    European Parliament Rips Global IP Accord

    The European Parliament delivered a political blow to Hollywood and the Obama administration, voting Wednesday 663 to 13 in opposition to a proposed and secret intellectual property agreement being negotiated by the European Union, United States and a handful of others.
    Wednesday’s developments concerning the Anti-Counterfeiting and Trade Agreement are substantial because the European Union’s 27 countries vastly outnumber the remaining countries negotiating the deal. They are Australia, Canada, Japan, South Korea, Mexico, Morocco, New Zealand, Singapore, Switzerland and the United States. Ambassador Ron Kirk, the top U.S. trade official, is spearheading the deal that began being crafted under the George W. Bush administration.
    Kirk’s office declined comment.
    To be sure, there is a dispute and heavy confusion concerning whether internet service providers under ACTA would be forced to punish customers deemed copyright scofflaws by reducing or eliminating service, according to a string of leaked documents. So parliament members also agreed Wednesday to oppose the measure if it contains so-called “three strikes” or “graduated response” policies — regardless of whether that’s now in the text.
    And because of the text’s secrecy, parliament on Wednesday also demanded (.pdf) that the private agreement still under negotiation be publicly released.


    Read More http://www.wired.com/threatlevel/2010/03/european-parliament-rips-global-ip-accord/#comments#ixzz0i0948p3h

    This Treaty is only a Secret from the American People.
    The US Government and other Nation States are signatories.
    WHY IS IT A SECRET FROM THE AMERICAN PUBLIC?
    What's in it that will anger the American Public?
    G
    XXXXXXXXXXXXXXXXXXXXXXXX
    (Reuters) - Dubai's police chief plans to seek the arrest of Israeli Prime Minister Benjamin Netanyahu and the head of Israel's spy agency over the killing of a Hamas leader in the emirate, Al Jazeera television reported.


    Dahi Khalfan Tamim "said he would ask the Dubai prosecutor to issue arrest warrants for ... Netanyahu and the head of Mossad," the television said. It did not give details.

    ( They don't offer any proof, just accusations.G )
    XXXXXXXXXXXXXXXXXXXXXXXXXXXXX

    Google China hackers stole source code - researcher.



    XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX


    G

    .

    Labels:

    Terrorist Names SEARCH:
    Loading

    Wednesday, March 10, 2010

    Virtual Intelligence Fair





    The IC Virtual Career Fair will offer hundreds of career opportunities available in a diverse array of disciplines, including:
    • Cybersecurity/Information Assurance
    • Engineering and Physical Science
    • Foreign Languages*
    • Information Technology
    • Intelligence Analysis
    • Law Enforcement
    • Many others
    Note: The majority of positions are located in the Baltimore/Washington, DC area. Not all opportunities are available at all agencies.

    *Proficiency in one of the following languages is highly desirable - Arabic, Dari, Farsi, Mandarin, Pashto, Somali, or Urdu.

    At the IC Virtual Career Fair you will be able to:
    • Visit virtual booths for Intelligence Community agencies
    • Chat with recruiters in real time
    • Apply to job openings
    • Network with other job seekers
    • Watch live presentations
    • Download electronic brochures and videos
    Best of all there are no travel expenses and suits are not required!

    The following Intelligence Community Agencies will be participating in the event:



    Gerald
    Internet Anthropologist

    ,


    Labels:

    Terrorist Names SEARCH:
    Loading

    Soul of Internet hacked, core source





    Soul of Internet hacked.
    The most recent attacks on the Big US Coprs
    ( See video below )
    may have stolen the source code, the source core code.

    This opens the possibility of hiding malware,
    back doors even exploits into the Source Core
    of most of the WWW programs.

    Its millions and millions of lines of code,
    that need to be checked, Check sum tester
    programs can be defeated and are not reliable
    to verify the safety of source core base programs.

    I would argue there remains the possibility
    key core base programs being corrupted
    with many kinds of bad stuff.
    Hidden, tricked, and invisible ways of
    including malware code with out detection.
    To Include Gov. MIL. and civilian .com.

    Not to mention no one is looking for
    these problems in "core base" after
    the program is written.

    Until now there has been no reason to
    spend huge number of personnel and man hours
    to re check code already done and in use.

    Paradigm Intel says source code has been
    stolen, maybe even re-written and
    inserted back into the "core base".

    Every Company and Gov and MIL that
    was broken into needs to recheck its
    "core base" for bad guys using it
    covertly.

    This is a whole new Security Paradigm
    threat,

    The SOUL OF THE WWW HAS BEEN HACKED.
    This means the code for the source of the proprietary
    programs of these corporations was stolen, and may have
    been corrupted and replaced the original source code,
    can we now trust Google programs, mail, browser any
    thing Google, or did they get MS OS, and make some
    additions?
    Or is Yahoo Mail still the original source code?
    How can anyone tell?
    "THE BAD GUYS" have had full access to it,
    and maybe all of the originals?
    Can they even tell if its been doctored?


    Technical review HERE.

    Gerald
    Internet Anthropologist, ad magnum
    Tactical Internet Systems analyst.


    .




    MORE:
    .Internet Anthropologist Think Tank: 
    Terrorist Cyber Attack pending




    .

    Labels: ,

    Terrorist Names SEARCH:
    Loading

    Charter Com the Worst



    Charter Com the Worst

    Charter Com the Worst, well maybe not the worst
    I haven't had the "Government Communications Network-District"
    ISP out of Kabul Afghanistan yet, so I can't say for certain they
    are the worst.

    They rope you in with one price and
    later that price increases 100% 
    slowly little at a time and NO ONE
    asks if its ok to charge me more.
    They just increase the price. 

    Charter's service is abysmal.
    95% of the time they are great,
    100% good.
    5% of the time they are 5% good.

    I paid my Charter bill on the 2nd.
    and they shut my phone off on the 
    9th. 




    7 "Chat now" sessions later
    and they still haven't turned it
    back on.

    They said it was an error,
    and 4 times they got my name,
    account number, security code,
    and pin, name and phone number,
    and the last 4 numbers of my Social 
    Security number and address.
    And were going to turn the phone back
    on, they made an error.
    And the "Chat Sessions" got
    dumped 6 times.

    Nobody did, its still off.
    And I'm not going to do chat again,
    I'll pop the computer.

    And not one thought to turn the phone
    on and call me???

    If you use the "back key" to correct
    a spelling error their system dumps
    the chat session and you start all over
    again. With all the security stuff all over again.

    My paranoid mind says they programed
    it that way to discourage people
    from using the chat function.

    And the last time it just froze up.

    After they collect all the information 
    and then they ask me what my name is?
    Of course its right there in chat,
    my name right beside what I type..
    I type "Gerald " right next to
    the "Gerald " on the chat line.
    The chat text says:
    "Gerald says: Gerald"


    AND every time you type in something
    and hit enter, the cursor doesn't pick back
    up on the Text line, you have to recenter
    it on the line and hit enter every time.
    Normally you just keep typing, in the
    text box. Not with Charter Chat from
    HELL.

    So I type in my name in right
    beside my name in the chat line.

    Then I insist she tell me her name
    and she types in "Carol" right beside
    "Carol" on the chat line.
    "Carol says: Carol"

    Two can be stupid at this game.

    And they don't give you the
    option of having a copy of the
    chat sent to you.


    One other time
    I got a bill from Charter
    telling me I have to make payment
    by XX date or the service will
    be turned off. I was late.
    I paid the bill on time then they still shut it
    off 3 days past the shut off date,
    telling me I had an additional bill
    it was a "rolling balance" system
    they were using????

    I told them I had a statement on their 
    letter head to pay $xyz dollars and
    my service wouldn't be shut off, I had it
    in writing, they explained to me
    the letter didn't count it was what
    was in their computer that counted.

    And to straighten it out they want
    me to drive to a city 60 miles away.

    I just paid. I think it was $100.
    I think I know why they are in Bankruptcy.

    I just want to scream when I deal
    with them, but I don't.
    My blood pressure just soars,
    and I just chat.
    I was going to just call them to complain
    but I can't the phone is out.
    I could always contact them by Chat......
    from HELL. Naw.
    They can read it here.

    I wonder how much the Afghan ISP
    charges?


    Gerald
    Anthropologist
    .
    Follow up:
    I called charter by cell phone,
    and got a thick accent,
    said they didn't know why my
    phone service was suspended
    but it would cost $60 to reconnect it.
    I threatened to pull all my services from
    them if they charged me the $60
    so they decided to drop the
    reconnect fee.
    IF you require dependable 
    phone service I'd look elsewhere,
    I am.


    And Charter admits it spys on its USERS.

    .
















    Labels: