Internet Anthropologist Think Tank: 3/21/10 - 3/28/10

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Saturday, March 27, 2010

    WHAT WRONG WITH THE INTERNET THREAT PARADIGMS





    WHAT WRONG WITH THE INTERNET THREAT PARADIGMS?  Senate bill seeks crack down on cybercrime havens.oreign countries that turn a blind eye to cybercrime would lose US financial assistance and resources under a bill introduced Tuesday in the Senate.

    The International Cybercrime Reporting and Cooperation Act would require the President to identify "countries of cyber concern" and to plot a course to help each one get tougher on cybercrime. Those that don't reach prescribed benchmarks would face economic penalties in the form of cuts to trade assistance grants, US export dollars and foreign-direct investment funds.
    SOURCE:


    #2 ) RIAA hunting flies with a 50 cal, and Obama is issuing the hunting lise.




    US has secret treaty to hunt down and take
    off line cyber music shoplifters.
    Plus million dollar fines for shoplifting
    a few songs. $24.00


    #3 ) And the penalty for a terrorist web site?
    ZIP, NADA, NOTHING,
    MANY ARE HOSTED IN USA.
    And YouTube is the worlds biggest
    host for terrorist vids.

    #1 ) CYBER SHOP LIFTING $24.oo, BANNED FROM WWW AND MILLION DOLLAR FINE.
    #2 ) HARBORING CYBER THIEVES, STEALING HUNDREDS OF MILLIONS FROM AMERICAN       ID's AND CC AND BANKS. CUT IN US AID.
    #3 ) CYBER TERRORISM, WEB SITES RECRUITING, FUNDING, TRAINING,
           PROPAGANDA, ADVOCATING KILLING AMERICANS. THATS OK,
           ZIP, NADA, NOTHING, MANY HOSTED IN USA.

    BUT CONGRESS IS TO BUSY TRYING TO DEFEAT HEALTH
    CARE FOR ALL AMERICANS. WTF
    I was a strong Bush Republican, but these Republicans
    I'm ashamed of, its as if they are trying to destroy the
    republican party, and have SOLD out to the Banks
    and Insurance Companies, they are an embarrassment
    to America, history will not be kind to them..
    For Gods sake they ran Sarah Palin for Vice
    President, a heart beat away???





    Gerald
    Internet Anthropologist

    .

    Labels:

    Terrorist Names SEARCH:
    Loading

    Cyber Defcon 1 Level, highest




    Cyber Defcon 1 Level

    Black Mail and Suicide
    cyber attack at highest
    levels.



    Risk:
    WWW down
    or
    Maleware on 100% of PC's.
    BOTH VECTORS ARE OPEN.

    Vectors are over lapping.
    Security on the Internet is at its lowest level EVER.
    Multiple threats are converging.

    Motive, opportunity  and ability are present.
    Attack is just a matter of time.
    So we declared a DEFCON 1 ALERT

    Bots are at an all time high, implanting INVISIBLE rootkits.
    Cyber Bank theft, credit card and Id theft are 
    at all time highs.

    Penetrations of Business, Corporate: Government,
    DOD, Military and State Department are at all times high.

    Volume, depth and source code theft from the Internet
    Power houses are at an all time high.

    The WWW is under seige by Bot nets, rootkits
    maleware, 

    Attacks :DDOS on a scale so massive as to shut down
    the WWW, from millions of bots.
    Penetration by the same botnets, theft of the very source
    code the WWW runs on, Google, Microsoft, Banking.
    The corruption of the same source code.
    Core source codes dropping malware on your PC
    The scale of bot nets on a NEW massive scale.
    with sales levels.



    The biggest cloud on the planet is owned by ... the crooks

    Security expert says the biggest cloud providers are botnets


    Seminal software planting malware

    Could turn terrorist, through Purchase or take-over.

    Take WWW down and keep it down.




    ONE MUST LOOK AT THE WORST CASE WHEN 
    EVALUATING THESE THREATS.


    There is criminal precedent, where corporations have
    been blackmailed or data held for ransom,
    the next step up maybe blackmailing states
    instead of Corps.
    Or blackmail the world keeping the entire
    WWW down.
    Motive, opportunity  and ability are present.




    Gerald
    Internet Anthropologist, ad Magnum
    Tactical Internet Systems analyst.


    .

    Labels: ,

    Terrorist Names SEARCH:
    Loading

    Friday, March 26, 2010

    Political Paradigm INtel





    Political Paradigm INtel.
    Sources inside the Beltway have indicated
    the Republicans are actually considering
    repealing not only Obama's Health Care,
    but they are looking at Social Security 
    and Medicare and Caid.




    Gerald
    Anthropologist

    .

    Labels:

    Terrorist Names SEARCH:
    Loading

    Thursday, March 25, 2010

    Redhat Cloud

    Terrorist Names SEARCH:
    Loading

    OBL caught in LIE

    binny with edema

    Bin Laden; "We love death as the West loves life" LIAR , G


    Osama bin Laden threatened al Qaeda would kill any Americans it takes prisoner if accused September 11 mastermind Khalid Sheikh Mohammed is put to death, according to an audiotape aired on al Jazeera on Thursday.


    Guess the "love death" thing only applies to rank and file, stupid troopers.


    This points out the lie in al Qaeda's cult myth about martyrdom
    and their love of DEATH.


    That the "love death thing" is just propaganda for suckers,
    ignorant followers to die and go to HELL while the LEADERS
    are exempt from the love of death.


    al Qaeda cult has NO martyrs just suicide bombers
    who go to HELL, no paradise, no virgins.




    al Qaeda's cult march to DEATH for ignorant followers only.




    Gerald
    Anthropologist



    HT Bartender recon


    He says al Qaeda will kill POWs.
    This is NEWS? he has been doing that
    for 10 yrs.


    I say try Khalid Sheikh Mohammed in
    a state where he can be strapped to
    an Electrical Chair if found guilty.


    And send me tickets.G




    .

    Labels:

    Terrorist Names SEARCH:
    Loading

    Wednesday, March 24, 2010

    Europe subject to Cyber shutdown



    European Union Committee:
    Protecting Europe against large-scale cyber-attack  HL 68





    large-scale cyber-attacks:
    ( Short sighted and misleading. G )

    Conclusion:


    22.  We asked all our witnesses for their views on whether the Internet was resilient to attack, since this is a prominent concern of the Commission Communication. They were unanimous that it was highly resilient. Mr Ilias Chantzos, the Director of Government Relations at Symantec UK Ltd, part of an American multi-national company which is one of the world leaders in information security, went so far as to say: "…the Internet is probably one of the most resilient networks that has ever been built. I would argue that the Internet has been designed to withstand a nuclear war" (Q 144).
    23.  Professor Jon Crowcroft, Marconi Professor of Communications Systems at Cambridge University, explained the reason for its resilience: "The Internet is a network of networks, and its management is to a very high degree decentralised. This is one of its greatest strengths in resisting attacks. It is hard to find specific weak points, and rare that any particular failure will lead to widespread problems … Terrorists and other enemy organisations are themselves organised in decentralised ways. Asymmetric warfare works for them because their targets are centralised and obvious. The net is one infrastructure which resists this, and should be understood to be more robust as a result of this" (p 124). The Government took the same view in their written evidence: "The Internet is inherently resilient due to diverse network routes, robust network designs, a variety of network providers and the use of different makes of network equipment." With regard to the position of the United Kingdom, their view was that "It is highly unlikely that the UK could be 'cut off' from the Internet by remote electronic attack or technical failure" (p 1).
    28.  We are conscious that cyber-attacks, or natural or man-made disasters, can cause acute disruption to the Internet in the short term. However we believe that the United Kingdom is reasonably well placed to cope with such disruptions.

    They acknowledge the threat but miss the scope of the problem.
    They discuss the Estoania cyber attack AND that it was caused by a few thousand PCs, and do not even discuss the threat posed by Cornfliker, with millions of bots.
    They miss the possibility of someone taking over cornfliker and launching a truly massive DDOS attack against not Europe or England, but all 13 Internet Nodes at one time.
    They miss the possibility of something the size of cornfliker
    knocking down the WWW every time they try to bring it back up.

    I was amazed to see Mr Ilias Chantzos, the Director of Government Relations at Symantec UK Ltd, part of an American multi-national company which is one of the world leaders in information security, missed the scope and source, its potential and the vectors involved. It was most disappointing.
    Internet Anthropologist Think Tank has been warning about this problem since 2007.
    EU and England are not immune.



    Gerald
    Internet Anthropologist

    Tactical Internet Systems analyst.


    .

    Labels:

    Terrorist Names SEARCH:
    Loading

    RIAA hunting flies with a 50 cal







    RIAA hunting flies with a 50 cal, and Obama is
    issuing the hunting lise.

    US has secret treat to hunt down and take
    off line cyber music shoplifters.
    Plus million dollar fines for shoplifting
    a few songs.



    Paradigm Intel says RIAA is pushing
    for an assassination option also.

    al Qaeda and other terrorist are OK,
    no treaty about them on the Internet.

    Obama is more concerned about the
    the terrible massive damage and loss of life 
    from these music shoplifters on line
    than TERRORISTS.

    OMG what a few million dollars in the 
    hands of lobbyist can do, and all
    the bribes are legal.

    RIAA should be fined Billions just
    for being so damn bullheaded and
    stupid.

    Anybody on the HILL  got their
    priorities straight?
    Why is Obama wasting time, money
    and resources on Internet shoplifting
    instead of Terrorism and the Internet
    jahiddies?

    This is an excellent example of
    lobbyist control over the US
    Government.

    Treatys secret from the American
    Public? Guess who the Government
    is working for ?
    Give you a clue its not the American
    people.

    What would you call 100 lobbyist
    arrested for corrupting US Government ?
    A good start.



    Gerald
    Anthropologist


    .

    Labels:

    Terrorist Names SEARCH:
    Loading

    Lehman Bros. guilty of Fraud



    Lehman Bros. using fraud to hide losses.



    Lehman Bros. used accounting trick amid financial crisis – and earlier



    Failed investment bank Lehman Bros. used an accounting trick ( Fraud, G ) at the end of each quarter to make its finances appear less shaky than they really were, says a report from an examiner.
    Repo 105, a type of repurchase agreement (or "repo" deal) that temporarily removed securities from Lehman's balance sheet. Unlike typical agreements for a repurchase, a Repo 105 deal would be characterized by Lehman as an outright sale of securities. This, according to the examiner's report, created "a materially misleading picture of the firm’s financial condition in late 2007 and 2008."
    And it used the ploy well before then.
    "Lehman first introduced its Repo 105 program in approximately 2001," the report says. "Unable to find a United States law firm that would provide it with an opinion letter permitting the true sale accounting treatment under United States law, Lehman conducted its Repo 105 program under the aegis of an opinion letter [by a British law firm] ... under English law."
    "Bad data lead to bad decisions," says William Black, a financial expert at the University of Missouri in Kansas City. Despite the crisis, the US government isn't putting enough resources into pursuing accounting fraud, argues Mr. Black, who led prosecutions during the 1980s savings-and-loan crisis.
    SOURCE: CSM

    Will Lehman chief executive officer Richard Fuld, three former Lehman chief financial officers (Christopher O'Meara, Erin Callan, and Ian Lowitt), and the firm's external auditor (Ernst & Young) be charged for criminal fraud?
    Or is cooking the books legal now?

    Gerald
    series 3 & 7

    .


    Labels:

    Terrorist Names SEARCH:
    Loading

    Monday, March 22, 2010

    Fort Mead kicks CIA ass.



    Fort Mead kicks CIA ass.

    Fort Mead takes down CIA
    terrorist hunny pot.

    Upsets Saudis and German Intelligence.
    Saudis are very good hackers,
    Germans are sloppy ( We have dealt with
    them, which we can't talk about for opsec reasons G )

    SOURCE

    This problem points to the issues around
    a new Theater of operations.
    Who runs this dominion?

    And clarifies the issues, as I expected
    the Internet Operations are run piece
    meal.

    And there is not even agreement on 
    basic paradigms.

    Intel collection or security.
    Collect intel and allow them to
    run an Info war operation or
    take them down and stop their
    operations?

    Evan F. Kohlmann has some
    paradigm the CIA seems to be
    running on.

    And we think his hypothesis
    is in error.

    And this might explain why the
    terrorist are winning the Info War.

    No only is the USA failing to run a
    successful counter Info War operation
    they are allowing the Terrorist Info
    War operations to run unchecked.

    Who's the boss? 
    Who is setting the Paradigms?
    Whats the policy?
    And there are still no Rules of Engagement.

    But we did get a peek at the power
    and scope of US Internet Mussel.
    And its Awesome.

    If it comes to a cyber war, 
    USA will kick ASS.


    Gerald
    Internet Anthropologist
    Tactical Internet Systems analyst.
    My staff corrected me it may have been
    Ft. Huachuca that kicked CIA ass. G


    .

    Labels:

    Terrorist Names SEARCH:
    Loading

    Sunday, March 21, 2010

    Drug lord busted, soon



    Our BSU's indicate a major drug bust is pending.
    Opsec prevent us from mentioning names.

    It good news.


    G

    .

    Labels: ,

    Terrorist Names SEARCH:
    Loading

    Why Security Vendors are loosing



    Why Security Vendors are loosing the Battle.


    Q & A WITH Dancho Danchev and  Thorsten Holz, researcher at Vienna University of Technology, whose team not only participated in the recent takedown of the Waledac botnet, but released an interesting paper earlier this year, summarizing their findings based on 33GB of crimeware data obtained from active campaigns......


    Presumably an attacker can also use other methods to access a dropzone from another attacker: an attacker could exploit vulnerabilities in the dropzone’s web app (e.g., SQL injection, default passwords, open MySQL access etc.), something that we could not do as part of our research. There have been some reports about vulnerabilities in dropzone kits, and I am sure that one could find other ways to access a dropzone.
    Dancho: With Zeus clearly reaching a monocultural stage within the cybercrime marketplace, a remote exploitable flaw within the kit’s web interface could trigger an effect often seen from a white hat’s perspective. In fact, there have been cases of cybercriminals hijacking one another’s Zeus botnets due to insecurely configured web servers.
    Do you believe these are isolated incidents, or a logical development in the long term, which can contribute to the rise of underground turf wars?
    Thorsten: I think that this is a logical development: If I would be an attacker, it would be way easier to simply exploit other dropzones than doing all the hard work on my own (buying the kit, hosting it, exploiting machines etc.). And with tools such as ZeuS Tracker I could also easily find other dropzones and perform my attack on a larger scale.

    I'd like to make two points here.
    #1 bot nets are subject to hijacking, and subversion.
    #2 Researchers and Security Vendors do not have the legal where withall to
    get a court order to penetrate bot nets; like the Police can get a legal writ to wire tap.
    And the Police do not have the computer where withall to know how to penetrate
    a bot net.
    So the Bot Nets remain secure, and untouchable.
    And the most effective methods to go after bot nets remain extra legal and unused.
    while the bot nets rampage on the Internet.
    There needs to be a marriage between the FBI and a core team of the
    best hackers the Security Vendors have, to make the "wiretapping, extra legal"
    methods available to bring down these bot nets. The FBI to provide legal cover
    while the Security Vendors hack the bot nets and put in place their own
    security back doors.
    The bot nets could be subverted by others for destruction of crimeware families
    or the WWW its self ( DHS secret level 4. )

    Gerald
    Anthropologist


    Tactical Internet Systems analyst.



    Labels: