Internet Anthropologist Think Tank: 7/25/10 - 8/1/10

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Saturday, July 31, 2010

    Paki's top spy/fixer



    Colonel Imam Sultan Amir Tarar.


    Retired Pakistani military and Inter-Services
    Intelligence (ISI) officer, Paki's top spy and Fixer
    wants to go home, 4 months seems like a life time
    to him.

    Mullah Omar has extended his protection
    to Tarar. Its not likely he is in any real danger.
    And we don't believe they are keeping him in
    a basement  but he is under house arrest.

    The problem seems to lie with the prisioner
    exchange, and whom they want for him.
    And he knows plenty of secrets, and is
    sick of his "Guesthood". He is trying to
    pressure Paki to do the exchange.
    If he runs his mouth, he won't be
    coming back to Paki. They would be pissed
    and he would pay, hard.

    Gerald


    Complete English transcript as follows:
    “Today is July 24, and tomorrow, it will be July 25. I am Sultan Amir, son of Ghulaam Amir, and people know me as Colonel Imam. I am in the custody of Lashkar Jhangvi Al Alami, Abdullah Mansoor. I sent my statements and CD messages to the government several times, but no attention has been given until now.”
    “You know what mentality these people have and what are they up to. Khalid Khwaja has already been killed and we might receive an even harsher treatment, which will be damaging for Pakistan.”
    “They cannot be pressured by anyone. They are well organized. According to them, my previous statements have not been released to the media either. I appeal, Mr. President, Mr. Prime Minister, DG ISI Jahangir Gul and Jasim Baig, to accept the demands of Lashkar Jhangvi Al Alami as soon as possible.”
    “You people know about the services I rendered for my country. If the Pakistan government does not care about me, then I don’t have any reason to care about the nation either, and [I] will reveal all the weaknesses of our nation.”
    “Whatever game is being played with Afghanistan, India, Russia, and America, I know about all of it. It is now for the Pakistani government to decide. Four months have now passed but you don't care about me. I am fed up of spending my whole life all the time in a basement.
    “It should be conveyed to my family to pray for me and to take care of the children. I also want it to make it clear to my son Nauman Umar to resign from his government post. At the moment, they don't seem to care about me, so why would they make a fuss over him in the future either.”
    “Wasalam, your well wisher, Sultan Amir.”
    SOURCE:




    Enhanced by Zemanta

    Terrorist Names SEARCH:
    Loading

    Friday, July 30, 2010

    Inevitable Iran's nuke ops will be hit.

    Israel prepping for Iranian strike.



    Thwarted by Moscow's refusal to sell them S-300 interceptor missiles, Iran has given up on adequate air and missile defense shields for its nuclear sites and in the last couple of years has been blasting deep tunnels beneath mountain peaks more than 2,000 meters high for housing nuclear facilities. There, they were thought by Tehran to be safe from air or missile attack.
    The American and Israeli air forces have since been developing tactics for evading Iranian radar and flying at extremely low-altitudes through narrow mountain passes so as to reach the tunnel entrances for attacks on the nuclear equipment undetected. The drill in Romania took place at roughly the same altitude and in similar terrain that a US or Israeli air attack would expect to encounter in Iran.
    For such strikes, special missiles would be used that are capable of flying the length of a tunnel, however twisty, and detonating only when its warhead identifies and contacts its target.
    The entire maneuver is extremely hazardous. The pilots must be exceptionally skilled, capable of split-second timing in rising from low-altitudes to points opposite the high tunnel entrances without crashing into the surrounding mountain walls.


    The accident revealed to military observers that the Israeli Air Force is practicing long-distance flights not only by bombers, but also heavy helicopters, such as the "Yasour" CH-53, which would require in-flight refueling. These practice flights have been taking place in cooperation with Greece and Bulgaria as well as Romania, whose distance from Israel of 1,600 kilometers approximates that of Iran. American air bases in Romania and Bulgaria participate in the drills. The latest exercise with Romania, known as Blue Sky 2010, followed up on the five-day US-Israeli Juniper Stallion 2010 war game held off the coast of southern Israel from June 6-10.
    In that exercise,  60 F/A-18E/F Super Hornet bomber jets took off from the decks of the USS Harry S. Truman Carrier Strike Group several times around the clock to strike at simulated targets at Nevatim, the main Israeli Air Force firing range in the Negev.
    Squadrons of American F-16 fighter jets taking off from bases in Germany and Romania landed at Israeli air bases, refueled and took off with Israeli air force bomber squadrons for simulated long-range bombing missions over the Red Sea and the Mediterranean. Along the way, they practiced air-to-air combat encounters.
    The US Air Force has established its Romanian facility at the Mikhail Kogalniceanu Air Base on the Black Sea shore near the city of Constanta. And in Bulgaria, the Americans have the use of Bezmer Air Base, 50 kilometers from the southern sector of the Black Sea.
     SOURCE:


    Did Iran attack Japanese oil tanker in Strait of Hormuz?


    US strike on Iran likelier than ever, former CIA chief says


    Is Obama Set on an Iran Strike?

    Iran says it has 100  vessels targets for each US warship


     Its inevitable Iran's nuke ops will be hit.


    G


    .
    Enhanced by Zemanta

    Terrorist Names SEARCH:
    Loading

    Thursday, July 29, 2010

    Wanted cyber warriors NO



    Wanted cyber warriors NO, not really.

    The nation faces a severe shortage of information security savvy talent. The pool of candidates dwindles even more when considering such constraints as the ability to receive a Top Secret clearance, possession of U.S. citizenship, desire to undergo repeated drug tests, and, in some circumstances, ability to pass a polygraph exam. The combination of a highly competitive job market and a relatively small pool of candidates require the military to actively create a culture that attracts, not repels, talent. So how do potential cyber warriors perceive the military? It isn’t a pretty picture.

    Perceptions of the Military by Potential Cyber Warriors
    In order to gauge the perception of the military by the technical community we posed the question “How has the military treated you and your technical friends?” on Slashdot.org. Slashdot is arguably the most popular technical news website and is an ideal location to gain a sense of the technical community’s perception of the military. The posting drew 415 responses, some quite detailed.1 The online discussion focused on a variety of themes:

     Limited creativity – “The very things that make us valuable -- the ability to think critically, take the initiative, and not be weighed down by conventional thinking is exactly the thing the military seems to weed out.”
     Inflexibility – “The military is not setup to advance and reward those with technical ability. It is setup to have standard sized cogs.”
     Recognition – “The military doesn't recognize the existence (or need for) a different type of person to fight their new battles.”
     Unfair pay – “I looked at the 3 stripes on the arm of the guy flipping my burger. I then looked at the 3 stripes on my own arm, realizing we both get paid the same. At that moment my mind was made up and I chose not to reenlist.”
     Limited meritocracy – “There is no mechanism for payment or reward based on technical skill level.”
     Lack of a technical career path – “I think one of the things that the Army did wrong was to completely eliminate that secondary path to advancement. If we're talking about highly technical specialties with little to no relationship to direct combat, then the idea to make everyone a capable sergeant doesn't fit so well.”
     Bias against non-combat personnel - “In USAF's officer corps, if you don't turn and burn for a living, you're somewhat less than a man.”
     Technically ignorant leadership – “[The Colonel’s] eyes glazed over after 3 or so minutes as he could not follow what I had done at all”
     Low pay – “I can walk into any DoD security contractor out there with my DD214 and make 10 times what I did when I was discharged”
     Danger – “I hope those guys tell their wives that they are lawful military targets”

     Distrust – “We are talking about handing the keys to America's entire computer security infrastructure over to military intelligence agencies like the NSA”
     Anti-intellectual bias – “I attended West Point and was in the top 10% of my class. One of my tactical officers once told me that I needed to get my priorities straight. No one wanted someone who was too smart, he said. He'd rather have someone in his unit who could ace the physical fitness test than someone who studied.”
     Lack of career advancement – “Its great if you're just in for the college money, sucks later on if you decide to make a career out of it.”
     Lack of tolerance of alternative lifestyles – “Many of us live alternative lifestyles and conventional military thinking is that we're a security risk.”
     Compulsory management responsibilities – “The system itself isn't designed to handle individuals that have technical ability, but who aren't ready/don't want to command lower level troops.”
     Misutilization – “The government sent me to six months training in 29 palms. Yet, when I finally got the chance to deploy, I was a glorified MP.”
     Hazing (or worse) – “Nerds were treated with a bar of soap wrapped in a towel, routinely beat on, robbed from, cast out, and had their opinions dismissed.”

    Without attracting the best possible cyber warriors, by definition, we will create a second-rate organization.

    ...it is important to note that Cyber Command does have a good thing going for it in its close partnership with the National Security Agency. The Secretary of Defense set it up this way, directing that the Commander of Cyber Command be dual-hatted as the Director of NSA, to allow Cyber Command to leverage the power of NSA’s Cryptologic platform – its cyber intelligence collection capabilities and its information assurance expertise. NSA hosts our nation’s greatest concentration of crypto-mathematicians and some of the world’s best minds in information technology; roam its basements and you may in fact find a pink-mohawked research engineer or an intricately-tattooed code breaker. This relationship, in which a good portion of CYBERCOM’s military forces are embedded in NSA’s offices, should help encourage and facilitate the culture of innovation so critical to the development of a successful military cyber force. ( I don't believe it G )

    Each cyber warrior will be a member of the Army, Navy, Air Force, or Marines. Perhaps at some point the Nation will create a new branch of service for Cyber, but not for the foreseeable future.2. However, we are not without specialized, thriving cultures within the Military. Ask yourself, what would an organization that combined the best attributes of Google and the Special Forces, look like? By answering this question, we will be much closer to an agile and effective culture that will excel in the military, and in cyber war. We should study lifestyles, culture, organizations, and other practices of elite military organizations, because Cyber Command must become an elite organization. Do not misunderstand us, elite doesn’t mean exclusionist or an organization filled with prima donnas. To us elite means world class, quiet professionals. To be elite will help us create the right culture, protect our cyber warriors from misuse, and attract the best possible people.
    SOURCE:

    Our experience with the Cyber Military and Intelligence agencys has been mixed, mostly we are treated like mushrooms, kept in the dark, covered with manure probed and prodded and one way lines of communication, mistrusted, even feared. Like a relative with measles.
    Working with them isn't one of my fav things. 
    Poor communication skills, inability to move out of their
    comfort zone, either mentally or operationally.
    Tendency to substitute aggressiveness for intellect. 
    Inability to give or receive feedback.
    What they seem to want is an in the Box,
    run of the mill, factory produced, cyber grunt. 
    Not world class cutting edge cyber professionals they
    can direct. They view non-traditional and black box
    technologies as a threat, not as an asset to be deployed.
    Their context, frames of reference remain outdated,
    fixed and closed.  
    And we will crawl through mud for good contacts,
    enlightened leadership and willingness to innovate.



    Gerald
    Internet Anthropologist
    Tactical Internet Systems analyst.


    .

    Terrorist Names SEARCH:
    Loading

    Wednesday, July 28, 2010

    24 hr warning expired, part 1 of a series.

    24 hr warning expired, part 1 of a series.






    The penetration program.



    It has to work on all systems, platforms, OS.

    I will have a 'walk around" for all security

    programs, and exemption from system restore

    points.



    It will not be identified as malware.

    It will not use virus vectors.

    There will be no identifible spy/virus.malware strings.



    It will use other programs for cover to

    set up surveillance, any review of the

    system will only find authroized programs

    running.



    It will make copies of key text files

    and transmit them ( until July 26, 2010 was

    not encrypted, sent in the clear. G )



    It will collect URLs used in any VPN,

    Other URLs collected from ISP.

    It collects key strokes without a

    keyloogger. It collects files

    pre-encryption.



    What program is the "master program"?

    What program transmits data, undetected?

    Whom is running this?

    And how wide spread is this?

    What is the only method effective

    for spotting the penetration?



    Part one of a series.





    Gerald

    Check with the Air Force on who designed 
    this little gem.
     
     
    .

    Terrorist Names SEARCH:
    Loading

    Tuesday, July 27, 2010

    Restart the WWW

    These smart cards are the actual keys to the Internet. There are seven of them and they hold the power to restarting the world wide web "in the event of a catastrophic event."
    SOURCE:


    Internet Anthropologist Think Tank: CYBERWARS's Pearl Harbour

    If the WWW is down planes may not be flying. 

    One of the key holders is in Britan,

    about 6 days by ship from USA.

     

    Six days to re start the WWW?

     

    Seems like we could do better?

    Gerald

    Internet Anthropologist

     

    .

    Enhanced by Zemanta