Internet Anthropologist Think Tank: 3/14/10 - 3/21/10

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Saturday, March 20, 2010

    The real James Bond is Pashtun

    The real Majhadeen are Pashtun.













    The holy spies working against the al Qaeda cult
    and the Taliban are the Pahstoons, the real 007's.

    They risk their and their families lives daily to
    kill the al Qaeda cult members and the Taliban.

    ISLAMABAD (AP) - Hundreds of tribesmen from Pakistan'ssemiautonomous regions near the Afghan border ended a rare tribal council meeting Saturday with a declaration calling for the army to crush the Taliban.
    The meeting, held in the northwestern city of Peshawar, was called by an umbrella group of aid organizations and political parties in an effort to bring together people from the violence-battered region.




    Participants called for the army to escalate its attack against the network of Islamist militants across the tribal regions, dismissing Pakistan'searlier offensives as "military dramas."



    Syed Alam Mehsud, said the meeting was a way to bring together people from the area that is suffering most in Islamabad'swar against the militants.
    "We have just tried to unite people for the sake of peace," he said.
    Participants said they had little faith in the U.S.-Pakistan alliance, and that Washington and Islamabad were more worried about internal political issues than dealing with the deepset social issues at the root of much of the violence.
    "If we do not address the mindset of the terrorists, we will not be able to eliminate terrorists," said Mehsud.
    The tribal leaders urged the government in Pakistan to reach out to the militants—but also to crush those unwilling to negotiate.


    "We tribesmen are more patriotic than anybody else," said one participant, Din Mohammad Khan, who had come South Waziristan,where a government offensive that began last fall is thought to have killed hundreds of people—militants and civilians.


    "Pakistan is ours. We are for Pakistan," he said.

    SOURCE:


    Why We Fight from Tyler Ginter on Vimeo.




    FATWAH ISSUED AGAINST TERRORISM

    "Terrorism is terrorism, violence is violence, and it has no place in Islamic teaching and no justification can be provided for it."

    Gerald
    Anthropologist

    .

    Labels:

    Terrorist Names SEARCH:
    Loading

    Ops and Intel update 03.20.10

    Google formating sucks, highlight to read post...G


    Fingertips Leave A Bacterial Fingerprint



    Zeus Botnet Activity Down but Far from Out





    Microsoft action on Waledac botnet saw between 70,000 and 90,000 users taken off the network, but computers remain infected and half are still trying to send spam.


    Microsoft's takedown of 277 websites that hosted the Waledac botnet has severed almost 100,000 computers from the network.
    The shutdown of the websites last month in what it called ‘Operation b49' saw a federal judge grant a temporary restraining order that cut off traffic to Waledac at the ‘.com' or domain registry level.
    Jeff Williams, director of the malware protection centre at Microsoft, said that this served as a new phase of exploration in combating botnets, which it calls Project MARS (short for Microsoft Active Response for Security). He said that the company is still analysing and investigating the impact of this action, but early data from Microsoft and other researchers indicate that the actions have ‘effectively decimated communications within the Waledac bot network'.

    Fatwah Issued Against Terrorism

    "Terrorism is terrorism, violence is violence, and it has no place in Islamic teaching and no justification can be provided for it."

    The al-Qaeda-after-next is not to be feared, merely scheduled

    SECURITY | ISLAM: "Terror Has a New Name; Lashkar-e-Taiba--the Pakistani militant group that perpetrated the 2008 Mumbai attacks--Is Getting Ready to Go Global," by Jeremy Kahn, Newsweek, 15 March 2010.
    The roster is always going to be shifting.
    That's why we call it the long war.
    How long? Until globalization is truly global--simple as that.

    MIT Keeps System Online During Cyber Attack

    Previously, when a system was under cyber attack, the only solution to mitigate the threat was to take the server offline. However, there may now be another option. MIT researchers have developed a system that allows servers and computers to continue to operate even while under cyber attack.





    To Battle Computer Hackers, the Pentagon Trains Its Ow
    "We are creating cyber-bodyguards," says Sanjay Bavisi, president of the 

    council. "We're not creating combat people." But as the world becomes 
    increasingly interconnected via the Internet, the stakes have become too 
    high to rely on static defenses alone to protect the immense flows of 
    vital information that operate the world's financial, medical, 
    governmental and infrastructure systems. "The bad guys already have the 
    hacking technologies," Bavisi says. "We can say, 'Tough luck. The bad 
    guys play by different rules, and you can't do anything about it, so 
    just go lock your doors.' Or we can tell the good guys, 'We will arm you 
    with the same knowledge as the bad guys, because to defeat the hacker  


    you need to be able to think like one.'"

    ( GOOD LUCK, We are looking at selling a new cyber sidearm,
    details to be released soon. G )


    Gerald

    Labels:

    Terrorist Names SEARCH:
    Loading

    Friday, March 19, 2010

    Blacks can't fight, US Civil War





    Blacks can't fight, US Civil War


    Dutch reject contention that gay troops undermined military

    Los Angeles Times - ‎2 hours ago‎
    After retired US Gen. John Sheehan criticized the Dutch policy, linking it to the Srebrenica massacre in 1995, the Netherlands' defense minister calls the comments 'unworthy of a soldier.

    xxxxxxxxxxxxxxxxxx

    During the US Civil War there were some Generals that thought
    the same way about blacks. G


    the resistance to black soldiers was the result of racist beliefs that African Americans were mentally and temperamentally unsuited for military service. Whites accepted this myth in spite of the participation of black men in the Revolutionary War and the War of 1812

    Read more: Black Civil War Soldiers http://encyclopedia.jrank.org/articles/pages/5997/Black-Civil-War-Soldiers.html#ixzz0igDQ6Mx7



    Gerald
    Antropologist


    .

    Labels: ,

    Terrorist Names SEARCH:
    Loading

    New wave of Terrorists?




    New wave of Terrorists?

    Pakistani police captured him with a truckload of laptop computers, video cameras, jihad training videos and semiautomatic weapons.

    ( Computers were given equal space as AK 47's. G )


    The tools this particular terrorist had adopted to accomplish that goal were not suicide bombs or sniper rifles, but laptop computers and other high-tech equipment. The purpose of his Taliban cell was to reach potential recruits online over the Internet.

    What I was hearing in the spare interview room would shed light on how the Taliban and al Qaeda in Pakistan and Afghanistan reached potential recruits around the world.

    "We video our fights with American forces and keep records of our martyrs," he said when I asked him about the laptops and video equipment found by police. "We want to get the message out to the world so they will see what is being done to us."
    He added, "We see the Internet, media reports about what is going on here. We see that it is lies, what the Americans and the British portray. We use our means to get the message out, the truthful message about what is happening here, and our war."
    Pakistani counterterrorism officials said in meetings last week that al Qaeda and the Taliban factions "have been recruiting more technologically savvy persons that can get their message out on the Internet."

    A Pakistani counterterrorism official said the Taliban and al Qaeda are stepping up efforts at online recruiting. "This is not endemic to Pakistan. They are feeling pressure and are now using the Internet even more to get their message across. It is their new tool in the war and a way to gain new recruits worldwide."
    In an earlier interview that day with North Western Frontier Province's Inspector General Malik Naveed Khan, whose men captured the young fighter, he said that these groups are "waging war against the world, not only with weapons but through the Internet and other media."


    Read more at the Washington Examiner: http://www.washingtonexaminer.com/world/Taliban-Internet-recruiting-through-the-eyes-of-a-detainee-87709987.html#ixzz0ieK1jgVe


    The Real Terror War Is On the Internet


    Terrorists and rogue states are moving their battle to the Internet in a virtual war against liberal democracy. For too long, the United States and its allies have ignored the incitement and violent propaganda from Internet platforms operated by violent Islamist extremists.
    Today, such neglect is not an option. As we have been warned by Harry Wingo -- a former Navy SEAL who now serves as Google's Washington, D.C. policy counsel-- "the code is mightier than the sword."
    Internet code is an operational weapon used by terrorist groups to indoctrinate, recruit, train, and finance the next generation of terrorists. Terrorist groups like Al Qaeda, Hezbollah, and Hamas (with support, in some cases, from rogue states like Iran) use a vast and anonymous terrorist Web network as another front in their war against the West. These Web outlets should be treated as indistinguishable from the terrorist organizations that use them.
    Is the threat real? A declassified U. S. National Intelligence Estimate concludes: "The radicalization process is occurring more quickly, more widely, and more anonymously in the Internet age, raising the likelihood of surprise attacks by unknown groups whose members and supporters may be difficult to pinpoint. We judge that groups of all stripes will increasingly use the Internet to communicate, propagandize, recruit, train and obtain logistical and financial support."







    What a wonderful smell you've discovered! JAWA



    Gerald
    Tactical Internet Systems analyst.


    ,

    Labels:

    Terrorist Names SEARCH:
    Loading

    Thursday, March 18, 2010

    DHS secret level 4

    DHS Cyber Threat to the U.S.

    Remote Cyber Threat 3 Levels
    ( They missed level 4. G )




    Homeland Infrastructure Threat and Risk Analysis Center (HITRAC)















    Threat Level 4
    ( Paradigm Intel )

    Religious Fanatic, terrorist, Uber Criminal

    High order skills

    Well financed

    Target Internet nodes

    Use Bot herds

    Super DDos kind of attacks

    Detectable impossible to trace
    Bring down the WWW

    Motive:
    End of Gobalization,
    Expand the Gap away 
    from the core
    Black Mail
    Terrorism


    Gerald
    Internet Anthropologist
    Tactical Internet Systems analyst.




    Backgrounder:



    .

    Labels:

    Terrorist Names SEARCH:
    Loading

    Wednesday, March 17, 2010

    Dems sing "Cum bi ya"




    Political Paradigm Intel.

    The Republicans were preferred for 
    the initial GWOT.

    But the GWOT has matured.
    And the Public swept in the
    Democrats, a President,
    Majority in both the Senate and
    House.

    The two main issues have
    been Health Care,
    and Banking.

    The Republicans gave
    the keys to congress
    to the Bankers and 
    rescinded most Banking
    Regulation.

    And the Republicans did the 
    same for the Health Insurance
    companies.

    Paradigm Intel indicates
    the Democrats will maintain
    power directly in proportion 
    to what they do related
    to these issues.

    Americans are fed up with both
    the Republicans and Democrats.

    And the old parties are presenting
    good cases for a new third party.

    While the Banks and Insurance Cos
    control congress and the related laws
    thru lobbyists and legal bribery.

    American still control who is elected
    to Congress.

    The Democrats seem to be willing to
    leave Consumer Protection with

    The Federal Reserve has failed at 
    consumer protection, a total failure
    and almost allowed the Banks to
    bring the world to its knees in a credit
    meltdown.

    And still NOTHING  has been done
    to curb the Banks criminal activities.
    30% interest on Credit cards and 460%
    interest on pay day loans. Mafia vig
    rates on loan sharking.

    Its up to the Democrats to grow some
    balls and confront the Banking and Insurance
    regulations, or they too will be out.

    Everyone ready for a Third party 
    find some to run.


    Gerald
    Internet Anthropologist

    .

    Labels:

    Terrorist Names SEARCH:
    Loading

    Initiative will be punished, investigated




    Initiative will be punished, investigated.
    Force protection be damned.

    NYT reporter rats out team protecting US troops on battle field.
    Intelligence columnist indeed, speculation passes for news.


    On Monday, the Times ran a story about Michael Furlong, the Defense Department official being investigated over an ad hoc spy ring. The piece raised more questions than it answered, and Washington Post intelligence columnist David Ignatius is now filling in some of the blanks.
    In a column today, Ignatius distills the story. “Under the heading of ‘information operations’ or ‘force protection,’ he writes, “the military has launched intelligence activities that, were they conducted by the CIA, might require a presidential finding and notification of Congress. And by using contractors who operate ‘outside the wire’ in Afghanistan and Pakistan, the military has gotten information that is sometimes better than what the CIA is offering.”


    Read More http://www.wired.com/dangerroom/2010/03/danger-room-explainer-outsourced-intel-in-afghanistan/#more-23257#ixzz0iSXG8JAp

    xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

    Instead of giving Michael Furlong a medal, and honors
    they are serving him up as scapegoat.

    New successful methods and techniques result in 
    witch hunt.

    New SysAdmin force paradigm:

    "force protection atmospherics", 
    “cooperators.”,


    The military has been frustrated by a general lack of  understanding about the social and cultural landscape of Afghanistan and Pakistan. And in its quest for ground truth, it has turned to nontraditional sources to fill in the gaps on cultural knowledge and the local scene.

    Read More http://www.wired.com/dangerroom/2010/03/danger-room-explainer-outsourced-intel-in-afghanistan/#more-23257#ixzz0iSaKkM2X




    General David McKiernan, the former top U.S. commander in Afghanistan, greenlighted AfPax Insider to help provide open-source assessments of the local situation in areas where coalition forces were operating. It was part of an effort to improve information flow — as well as respond to reports of civilian casualties, among other things.

    Smells like a turf war?
    Looks like active real time OSINT in situ.
    Feels like a GREAT idea.

    Gerald
    Anthropologist.
    .

    Labels: ,

    Terrorist Names SEARCH:
    Loading

    Tuesday, March 16, 2010

    Cyber Threat Branch (CTB)



    Division, Office of Intelligence & Analysis (I&A), U.S. Department of Homeland Security
    (DHS). The mission of I&A is to provide a full range of synchronized intelligence to support
    the Secretary and Department, as well as DHS partners and customers to protect the homeland.
    This position performs a range of substantive intelligence operations duties associated with cyber
    threats by applying a knowledge of intelligence gathering and dissemination methods and
    techniques through utilization of multiple forms of information technology to address complex
    projects and issues.  The incumbent is responsible for supporting ongoing complex research collection and dissemination activities through assessments of information and data secured from various cyber sources. Concurrently, incumbent identifies cyber threats indentified with systems and technology vulnerabilities and risks by storing and providing access to the information and data under study.


    Related Posts: Cyber Threats.

    New threat:

    Old continual Threat:

    Defensive Measures:



    Gerald
    Internet Anthropologist, ad Magnum
    Tactical Internet Systems analyst.



    .

    Labels: