Internet Anthropologist Think Tank: 7/18/10 - 7/25/10

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Saturday, July 24, 2010

    Los Zetas seizes 2 Ranches in Texas

     

    From our OSINT feed on Twitter.

    Geraldanthro Los Zetas seizes 2 Ranches in Texas, Grenades used. http://www.diggersrealm.com/mt/archives/003439.html Drug gang invasion? G

    Sourced from Jawa
     http://mypetjawa.mu.nu/archives/203368.php

    Mexican insurgency, call it like I see-em.


    G


    .
     
    Enhanced by Zemanta

    Terrorist Names SEARCH:
    Loading

    Google source code put to use?

    Terrorist Names SEARCH:
    Loading

    Thursday, July 22, 2010

    24 hrs

    Twenty Four hours. 
    start:July 22 8 pm est.
    End : July 23 8 pm est.

    G

    .

    Terrorist Names SEARCH:
    Loading

    Counter surveillance: 06.22.10



    Google bot surveillance back to normal levels.
    Striped us of adwords cash flow.

     James XXXXXXX Send a Taxi for a Pickup Please.... It
    seems that someone has done all the heavy lifting
    concerning the Taliban and their staff responsible for
    hosting and media. ...and no this is NOT a humor post.
    ( Accolades always appreciated:G )
    http://warintel.blogspot.com/2008/11/taliban-webmaster-ips-location-pakistan.html

    Inside belt way ID's us.
    "army cyber network war site:warintel.blogspot.com"


    Pick up in Foreign Intelligence serves
    reading our war OSINT on Twitter.
    READ OR SUBSCRIBE, Our WAR OSINT on Twitter
    http://twitter.com/Geraldanthro

    One US Intelligence service copies our
    web site in entirety.

    Syria and Iranian intel interested in my
    personal email addy?

    Personal:
    Utapkapi Singh , may you confuse your left and right
    hands. You are Takfir, you are not a Muslim, you
    shame Islam. you are not fit to rest my shoes on.
    You are all talk, you bacha bazi wana be ...


    Gerald
    Internet Anthropologist

    .
    Enhanced by Zemanta

    Terrorist Names SEARCH:
    Loading

    Wednesday, July 21, 2010

    Genius readers 06.21.10

    Terrorist Names SEARCH:
    Loading

    WaPo Intel Gators and swamps

      Our paradigm on the American Intel system indicates
    there is duplication, waste, obfuscated programs
    and no one sees it all.



    The American Intel system is paranoid and doesn't
    play well with others or its own.

    NSA is so paranoid, ( For good reason ) they
    refused to use FISA courts, the President finally
    gave them a finding so they didn't need to use the
    courts, NSA didn't trust the FISA courts. NSA doesn't
    trust any body. Why ask for info when you can
    just go and take it.
    Google employees change Index ratings.
    They can for example raise Image search engine ratings,
    and lower search terms rating, which maintains number
    of hits, but lowers quality and reach of site.

    The reasons for the  construction of the Intel
    paradigm in this manner is security.

    What WaPo calls   "lacking in thorough oversight",
    "so massive that its effectiveness is impossible to determine.",

    Is partly compartmentalization, if one intel section gets
    penetrated then the others are still secure.

    If one service gets penetrated and fed bad Intel
    a second service maybe collecting the same
    Intel and not find the bad intel, and discover the
    info plant.

    Why are they paranoid, does the US have
    any real enemies? After all they are the worlds
    only super power.

    Russia is no longer a super power threat but
    they are a an OLD nuclear power, and they
    have a ace in the hole.

    Our Paradigm intel says it was the RBN
    that penetrated most US nets, DOD, Google,
    and State dept among so many others.
    They were and still are looking to sell the
    data to others, they won't sell to terrorist
    that could bring about very grave consequences.
    But China is interested but doesn't trust Russia,
    and Paki has paid for a peak and maybe even
    Afghan.

    The data transfers have to be made by CDs
    and independent networks not connected
    to the WWW, other wise Fort Meade's computers
    will light up like Christmas trees when that data
    hits the WWW.

    China and the US economic systems are
    so interlocked one could not destroy the
    other with out doing themselves in.

    The over lap and redundancy is good security
    in some cases. And one would not expect
    even a super user to grasp the entirety
    of all the data produced.
    http://projects.washingtonpost.com/top-secret-america/articles/a-hidden-world-growing-beyond-control/
    Its like you using your towns library.
    You will never know every book.
    But some one does, each book,
    someone wrote them, and some
    people read them but never all
    of the books. But you can search
    the Index for info you need.

    Although I can't understand not
    letting a super user take notes?
    How can one do analysis without
    taking notes?
    That needs to be fixed.
    http://projects.washingtonpost.com/top-secret-america/articles/a-hidden-world-growing-beyond-control/

    The problem becomes security
    vs functionality.
    What you gain in security you loose
    in functionality.

    The inability to search across all
    intel data bases limits ability
    to go after the bad guys,
    But at the same time shields
    the systems against spies.
        Geraldanthro
    Clapper Calls for Terrorism Data Repository, Search Engine - http://goo.gl/news/NMwI

    And there are two reasons for
    reports not being on line.
    #1) old school.
    #2) Security, hackers can't
    penetrate a piece of paper.
    http://projects.washingtonpost.com/top-secret-america/articles/a-hidden-world-growing-beyond-control/
    Cyber espionage complicates
    the paradigm and forces security
    around the bend.

    Any agency that would have total
    access would be a prime target
    for other foreign Intel agencys.

    Right now no one has total access
    Right now no one other than God,
    knows it all.

    The very problems WaPo
    points to also provide great security.
    http://projects.washingtonpost.com/top-secret-america/articles/a-hidden-world-growing-beyond-control/ 

    It could use some cleaning up,
    But its more important to remember
    your here to empty the swamp even when
    you up to your ass in alligators,
    its not as important to worry
    what someone 'thinks' your are doing.

    Washington Post:
    Please don't stop empting the swamp,
    or fighting gators, but explain why you
    parked over there and drove that car today
    while your doing it.


    Gerald
    Internet Anthropologist
    KEEP UP THE GOOD WORK GUYS.

    Enhanced by Zemanta

    Terrorist Names SEARCH:
    Loading

    Tuesday, July 20, 2010

    2 U.S. Trainers Are Shot Dead in Afghanistan

    An Afghan Ministry of Defense official, who spoke on the condition of anonymity because he was not authorized to talk to the news media, said that the fight began with an argument between an Afghan sergeant and trainer named Jaffar and one of the American trainers. According to the defense official, the Afghan sergeant shot two American trainers; then a third American trainer shot and killed the Afghan sergeant as well as another Afghan soldier, who was an innocent bystander. The NATO soldier was wounded in the cross-fire.

    SOURCE: bREAKING

    Afghan defence ministry spokesman Mohammed Zahir Azimi.
    "We wish to express our deepest sorrow for the deaths of our colleagues in this tragic event today," he said.
    ISAF spokesman Brigadier General Josef Blotz said: "The actions of this individual are not representative of the thousands of men and women who train and fight side-by-side with ISAF everyday."
    http://www.google.com/hostednews/afp/article/ALeqM5gN8BFWtrEY-zb3EOb3FSECiomJ4A

    near the northern city of Mazar-i-Sharif at a training center for Afghan soldiers named Camp Shaheen,

    A suspected Afghan army trainer on a shooting range in northern Afghanistan opened fire on his fellow instructors ???

    An Afghan who wants to join the army now must provide a government ID card, pass a medical screening, receive a letter of guarantee from two people in his village, such as a tribal elder or local government official, take a drug test and submit to biometric screening. If he matches a biometric database of previous insurgent activity, the soldier is kept out of the course, according to NATO.
    "The security process is in place," the NATO official said. "It's not infallible."


    g
    Enhanced by Zemanta

    Terrorist Names SEARCH:
    Loading

    OSINT sweet tonight

    Terrorist Names SEARCH:
    Loading

    Monday, July 19, 2010

    Apology to WaPo

    We were in error, based on public media
    about Washington Post's, Secret America.

    We suggested they were functioning like
    an al Qaeda cell, aiding the enemy,
    dispensing secret intel.

    That wasn't the case, they have handled
    the info most responsibly.

    And I apologize.
    We are still adding their info
    to our paradigm.


    Gerald
    Anthropologist

    .
    Enhanced by Zemanta

    Terrorist Names SEARCH:
    Loading

    WaPO Secret America, site up

    Wash Post Top Secret America,
    We condemned this effort earlier.
    It may have some merit. 

    The investigation's other findings include:
    * Some 1,271 government organizations and 1,931 private companies work on programs related to counterterrorism, homeland security and intelligence in about 10,000 locations across the United States.
    * An estimated 854,000 people, nearly 1.5 times as many people as live in Washington, D.C., hold top-secret security clearances

     The story:

    http://projects.washingtonpost.com/top-secret-america/articles/a-hidden-world-growing-beyond-control/

    Still reading, comments analysis later.( 15 pages. +)

    G

    .

    Terrorist Names SEARCH:
    Loading

    Wanted list


    Internet Anthropologist Think Tank: WANTED Interpol Infra-Red

    Jul 7, 2010 ... WANTED Interpol Infra-Red. Infra-Red is seeking the public's support in locating the ... See other wanted persons ( photos included, g )

    Internet Anthropologist Think Tank: 85 wanted Saudie Terrorist

    9 شباط (فبراير) 2009 ... 85 wanted Saudie Terrorist. 1 Ibrahim Hassan Asiri Saudi guy 2
    إبراهيم سليمان حمد الحبلين سعودي 2 Ibrahim Suleiman Hamad Saudi thin ice ...

    Internet Anthropologist Think Tank: Rewards $200000 to $20000 ...

    Oct 1, 2007 ... A U.S. ``most-wanted'' list of a dozen elusive Taliban and al-Qaida. leaders fueling a surge in bombings and suicide attacks in ...

    Internet Anthropologist Think Tank: Rid Islam of Biny and remain secret...

     INTERNETANTHROPOLOGISTTT@GMAIL.COM


    g

    .
    Enhanced by Zemanta

    Terrorist Names SEARCH:
    Loading

    jAPAN Whaling fleet has no Honor



    Shonan Maru No. 2 rams
    small boat 20 miles from
    Antarctica in freezing water.
    A criminal act.
    They intentionally turned
    into the small boat.
    Hitting the small boat
    almost amidship.
    The Japan Whaling fleet
    operates under a subtrufudge
    of research, and profits from
    the sale of whale flesh and
    oil. 507 whales harpooned.


    This is a criminal act, attempted
    murder of members of the small
    boat.

    The Japanese whaling fleet brings
    dishonor on all of Japan.

    Gerald
    Anthropologist

    .

    Enhanced by Zemanta

    Terrorist Names SEARCH:
    Loading

    Taliban attacks on civilians 2010

    TALIBAN HAVE NO HONOR:


    _ July 15: Suspected suicide bomber kills five people and wounds 58 in Mingora, the main city in the Swat Valley.
    _ July 9: A pair of suicide bombers kills 102 people and wounds 168 in the Mohmand tribal region.
    _ July 2: Twin suicide bombers attack Pakistan's most revered Sufi shrine in the eastern city of Lahore, killing 47 people and wounding 180.
    _ May 29: Two teams of seven militants armed with hand grenades, suicide vests and assault rifles attack two mosques of the Ahmadi minority sect in Lahore, killing 97 and wounding dozens.
    _ April 19: A suicide bomber apparently targeting police at a conservative Islamic party rally in the northwestern city of Peshawar kills 23 and wounds more than 30.
    _ April 18: Two burqa-clad suicide bombers attack refugees lined up to register for food and other relief supplies in Kohat district in the northwest, killing 41 people and wounding dozens more.
    _ April 5: Militants unleash a car bomb and grenade attack against the U.S. Consulate in Peshawar, killing four people.
    _ April 5: Hours before the consulate attack, a suicide bomber attacks a rally of an anti-Taliban political party in Lower Dir district, killing 45 people and wounding more than 70.
    _ March 13: Two suicide bombers targeting army vehicles in Lahore kill more than 55 and wound more than 100.
    _ Feb. 18: A bomb tears through a mosque in the Khyber tribal region, killing 29 people and wounding 50 more.
    _ Feb. 5: Two bombs targeting the Shiite Muslim minority sect in southern Karachi city kill 33 and wound 176.
    _ Feb. 3: A suicide bomber kills three U.S. servicemen and three civilians in the northwest's Lower Dir region.
    _ Jan. 1: A suicide bomber drives a truckload of explosives into a volleyball field in Lakki Marwat district in the northwest, killing at least 97 people and wounding more than 100.

    Lost the  SOURCE sorry.


    The classical Islamic law of war forbids sneak attacks. It forbids the killing of non-combatants. It forbids the killing of women and children. War is a collective duty declared by the duly constituted authorities, not an individual duty, and so not just any Ahmed or Moustafa can wake up in the morning and declare war on, say, Europe. See Khaled Abou El Fadl.
    Al-Qaeda cultists reject these principles of Islamic law and they have been roundly condemned for doing so by all the major Muslim authorities– the rector of Al-Azhar Seminary in Egypt, Grand Ayatollah Ali Sistani in Iraq, television preacher Yusuf al-Qaradawi in Qatar, Tahir al-Qadri in Pakistan, etc., etc., etc.
    SOURCE:

    Enhanced by Zemanta

    Terrorist Names SEARCH:
    Loading

    Sunday, July 18, 2010

    Our Intel: OSINT in Twitter

     Eyes of Steel and my gaze is long
     I've been Dumping some my Intel OSINT
    feed into Twitter . I think its very Good.
    Bots running 24/7 .

     Its labor intensive and will try and keep 
    it up if you like it.


    G

     .
    http://twitter.com/Geraldanthro

    .