Internet Anthropologist Think Tank: 9/5/10 - 9/12/10

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Saturday, September 11, 2010

    911 challenges



    911 remembrance:

    Geraldanthro 
    bin laden has abandoned his al qaeda cult, AWOL 5 yrs NOW. Praying to Allah in shame for forgiveness. G


    jricole 
    Top Ways 9/11 Broke Islamic Law http://ping.fm/Fg4U0




    US winning war on Terrorism:Click links on this page for proofs,G


    "  freedom to build a mosque at ground zero is the same freedom to burn a koran."


    Obama Calls for Religious Tolerance as Protests Persist, he asks Americans 
    to be tolerant, But not Muslims.?




    Gerald
    Internet Anthropologist
    Personal note: As a broker I worked in the 
    World Trade Center, S tower, 103, for Dean Witter, we
    had 2 whole floors.








     We are Cyber Warriors




    .

    Terrorist Names SEARCH:
    Loading

    Friday, September 10, 2010

    Pentagon believes extremists info war?




    Pentagon believes extremists info war?



    Is the White House and the Pentagon under the influence
    of the Islamic extreamists Info war?

    Scary thought, but are they buying into the media's hype?

    jricole 

    The Media as Security Threat to America http://ping.fm/B7oLP

    I'm thinking about reports of the Taliban resurgence,
    about last month being the highest casuality rate for
    the Afghan war so far, like the Taliban are doing much
    better than before?

    They aren't doing any better, they haven't gotten stornger
    or become better soldiers.
    The US just doubled the number of targets with a 130,000
    troop surge.

    They are no more effective now than before, but their
    odds just doubled with the surge.
    And the pressure on them also doubled.
    This doubling of pressure has lead to more cadre dead,
    increased PTSD and thoughts of suicide.
    Paradigm intel suggest their rate of actual suicide
    is close to double what the US is experiencing.

    DeptofDefense 

    Troops from the @USArmy @USAirForce @USNavyshare their stories about dealing with #suicidehttp://bit.ly/dui5k3

    And their main weapon is suicide bombers.
    They are capitalizing on their failure, instead of 
    getting treatment for their suicide case they strap
    bomb vests on them.
    And have convinced their following that suicide
    is a success.
    The doubling of suicide attacks speaks more to
    the Taliban and al qaeda failure in the theater of war
    than a resurgence of their strength.

    The increase in suicide attacks actually speaks to
    the increase of pressure and failure in battles.
    Leading to increased PTSD and increase in 
    suicide bombers.

    The other symptom is the burning the Quaran reaction.
    The Islamic extremists violence and the White
    House and Pentagon fold?
    Ask a US citizen to comply with extremists threats
    for fear of retaliation.
    Isn't American freedom what the troops are fighting 
    for?

    The Pentagon needs an independent assessment
    of their success in Afpak theater separate from
    media input. 

    Sometimes I think they think they are really loosing.
    And thats just not true.

    al qaeda threat still very real:


    al qaeda in hiding in fear.



    US not loosing GWOT.


    How its working and its effects:



    Gerald
    Anthropologist.


     Genius commentor:
    Obama should be pointing out the freedom to build a mosque at ground zero is the same freedom to burn a koran.

    He should then speak out against all of the violence done by muslims to people of other faiths or even other muslims.

    Here is a real moment to draw the distinction between freedom and terror and tyranny.

    And as far as the surge goes, he should be defending it just like Bush defended his surge when everyone was against him. There are a number of things Obama can't control, but he can control his message in the media. 

    Terrorist Names SEARCH:
    Loading

    Genius Readers 09.10.10

    Terrorist Names SEARCH:
    Loading

    The right to burn the Quaran



    In remembrance of 911 tomorrow its important
    to keep in mind who the bad guys are.
    The al qaeda Islamic cult.

    And while Binny, who has abandoned
    al qaeda was doing this in the name of
    Islam, it is not Islam that is behind him.

    And with Rev.Jones burning the Quran,
    while I don't agree with him it bothers
    me the the administration is asking him
    to curtail his freedoms.
    He has a right, freedom to burn the
    Quran.



    We need to keep in mind he is not the
    BAD guy, he is burning a holy book,
    not killing or threating to kill people.
    Freedom has a price.

    Many Muslims have threatened to burn
    the American flag if he burns the Quaran.

    Thats ok with me its a kind of "Quid pro
    Quo".

    I have a problem with those threating to
    kill people over this and the cartoons
    of Muhammad the prophet.

    This is again the fault of Islam, they
    teach the memorizing the Quaran,
    might it be better to teach what it
    means and says?

    Islam is the religion of Peace,
    but I have to keep reminding myself
    of that. Some times it doesn't feel
    like the religion of Peace.

    But Eid Mubarak to all our Muslim 
    friends.




    Gerald
    Anthropologist


    .

    Terrorist Names SEARCH:
    Loading

    Thursday, September 09, 2010

    Cyber weapons not indiscriminate



    There have been many comments about cyber weapons





    and how they are non discriminating, and problems with
    collateral damage.

    Attacks against a single terrorist website can cause damage to several servers across a number of countries. This is reportedly what happened in 2008 when an interagency task force attacked a U.S.-Saudi-created “honey pot” and took down 300 servers in Saudi Arabia, Germany and America with it
    SOURCE: http://www.wired.com/dangerroom/2010/09/this-september-11th-will-terror-sites-get-hacked-again/#more-30322#ixzz0z5ZoShnf

    Its just not true, unless your inexperienced or don't
    know what your doing. But there are accidents, we
    have had cyber weapons go off and wipe out one
    of our computers. They are dangerous. Rusty at
    Jawa knows about this incident.

    Cyber weapons are surgical, laser like in their
    targeting capabilities.
    You can take out a page on a site or an entire
    site, there is no need to take out a entire server,
    destroying every site on that server.

    We have left behind invisible programs that
    could check to see if the site/data/code is back
    and re-erase it, hourly, daily weekly of even monthly,
    depending on our operation.

    We tend to like the monthly option best, they
    get an entire month to reload everything, check it
    and get it running before we destroy it again.

    Penetrating the forums is another good approach
    causing dissension, and confusion and rampant 
    paranoia with in the Insurgents. 

    We were able to penetrate the al qaeda cult so 
    deeply they offered us Money, but the FBI 
    nixed the funding. Moles are very successful.
    And the threat of moles cut down on insurgent
    communication, trust and morale.

    The range, scope and power of cyber weapons
    is almost unlimited, untraceable and anonymous.
    They allow precision laser attacks and limit collateral
    damage.

    Our BSU's ( Bot surveillance Units ) have been of 
    incalculable value in tracking and tracing terrorists.

    Come to the night mare, come to me.
    deep down in the cyber dark,
    with the devil, PC and me.



    Gerald
    Internet Anthropologist
    Tactical Internet Systems analyst
    .
    PS all data related to cyber battles have been deleted to NSA standards.
    Nothing remains on any of our PCs.

    .Update:

    Stuxnet even uses a finger print to be sure of target.



    .
    .

    Terrorist Names SEARCH:
    Loading

    911 anniversary hack

    OK Insurgents hang on to your hats.( Turbans )


    911 NOT BURNING QURAN JUST TERRORIST SITES.
    More terrorist  sites to go belly up
    AGAIN, on 911
    but which ones?




    Gerald
    Internet Anthropologist

    Terrorist Names SEARCH:
    Loading

    Wednesday, September 08, 2010

    Visual look at US attacks





    SOURCE:





    US is ramping up pressure on the insurgents in Afpak.
    120,000 troop surge in Afghan, and increase in drone
    attacks in Paki by 33%.

    US Predators strike in Pakistan for fourth time in 24 hours http://bit.ly/9yxmTq

    The Taliban and the al qarda cult no longer have
    a safe place.

    This month alone has seen drone attacks almost
    daily, thats just the ones that make it to the news.
    The people of both Afghan and Paki have turned
    out in droves to report Talinan and al qaeda locations
    and operational plans, never in history has any
    insurgency faced this volume of indigenous spies.

    The pressure on the insurgents is really  hurting
    morale, both cadre and rank and file.
    Insurgent admin is in a panic over the drone attacks.
    Omar is trying an special war intel operation to try and
    raise morale, get the Taliban to hold together a little longer.
    "I assure you, our days of sufferings and hardship will not prolong furthermore."
    Taliban have no honor, "you should try to reform your conduct and deeds;" Mullah Omar.

    USA Today: Mullah Omar says Taliban victory 'imminent,' demands US withdraw - http://goo.gl/news/iWiB
    His message: Omar the LIAR. Brilliant propaganda piece, lot of lies and he points out the insurgent weaknesses.

    Where is the American General's Message of Felicitation on the Eve of Eid-ul-Fitr, in
    answer to Omar's Lies?

    Great job guys.


    Gerald
    Anthropologist



    .


    Terrorist Names SEARCH:
    Loading

    US building a Cyber Maginot Line.

    Maginot Line WHICH during WWII the Germans just walked around.


    US building a Cyber Maginot Line.
    MY COMMENTS IN CAPS, FOR EASE OF READING. G

    However it seems that the US is too concerned with the problem of cyber defense in comparison with other countries. On April 26, the CIA unveiled its plans to new initiatives in the fight against Web-based attacks. The document outlines the plans for the next five years and director of the CIA Leon Pannetta said that it was “vital for the CIA to be one step ahead of the game when it comes to challenges like cyber space security". (2) 
    CORRECTION THE NUMBER OF AND DEPTH OF PENETRATIONS INTO MIL AND GOV AND COM DOMAINS INDICATE USA AND SECURITY VENDORS HAVE BEEN ONE STEP BEHIND HACKERS FOR 10 YEARS.






    “Our statistics show that Trojans and rogueware ('fake' antivirus programs) amounted to almost 85 per cent of all malware activity in 2009. 2009 was also the year of Conficker, though this belies the fact that worms ranked at just 3.42 per cent of last year's malware creation”, the magazine read.
    “The Conficker worm has caused serious problems in both domestic and corporate environments, with more than 7 million computers infected worldwide, and it is still spreading rapidly”.(1)
    CONFICKER ISN'T EVEN TRYING, 3.42% OF MALWARE, AND  7 MILLION ZOMBIES.


    The report outlined a new comprehensive framework to facilitate coordinated responses by government, the private sector, and allies to a significant cyber incident. CIVILIAN AND GOVERNMENT DOMAINS RELYING ON SECURITY 





    VENDORS  ARE  DEFRAUDing. THERE IS NOT EVEN ONE SECURITY SUITE THAT PROVIDES COMPREHENSIVE SECURITY AGAINST KNOWN, AGAIN I REPEAT KNOWN EXPLOITS AND THREATS.






    AT BEST THEY PROVIDE SPORADIC PROTECTION AGAINST KNOWN EXPLOITS, NOT ONE SECURITY VENDOR PROVIDES PROTECTION AGAINST BOTS, KEYSTROKERS, ROOTKITS, ALL  KNOWN EXPLOITS, MALWARE AND VIRUS. NONE. WE NEED GOVERNMENT REGULATION OF THE SECURITY VENDORS, TO PRODUCE MINIMUM STANDARDS OF REAL PROTECTION.
    “Our statistics show that Trojans and rogueware ('fake' antivirus programs) amounted to almost 85 per cent of all malware activity in 2009. SECURITY VENDORS ARE NOT CAPABLE OF PROTECTING EVEN THEIR OWN TURF.
    When commenting this article analysts point out that “The capabilities being sought would allow U.S. cyber-warriors to "deceive, deny, disrupt, degrade and destroy" information and computers around the globe”.(5)
    Gen. Keith Alexander, the head of the Pentagon's new Cyber Command (ARFORCYBER) said: "We have to have offensive capabilities, to, in real time, shut down somebody trying to attack us," Earlier Keith Alexander compared cyber attacks with weapons of mass destruction and according to his recent statements the US is planning offensive application of the new warfare.
    AND YET 3 YRS AFTER CONFICKER THEY CAN'T TOUCH IT DESPITE THE INVOLVEMENT OF TOP SECURITY VENDORS AND SECURITY MINDS FROM ACROSS THE CYBER DOMAIN. WHERE ARE THOSE OFFENSIVE CAPABILITIES? 
    SECURITY PROGRAMS ARE A 





    Cyber Maginot Line.






    THEY ARE NOT A DETERRENT.
    OFFENSIVE OPERATIONS ARE, AND HAVE NOT BEEN DEPLOYED.

    In May 2009, the White House approved Cyberspace Policy Review (3), submitted to the US president by the members of a special commission. The document summed up the state of things in the US cyberspace and national information security.  It was proposed to a appoint cyber security policy official responsible for coordinating the US cyber security policies and activities.
    Numerous publications in the US mass media show that the reform of the national cyber defense forces as well as the introduction of the doctrine and strategy of the cyber war are soon to be completed.





    William Lynn III in his article "The Pentagon's Cyberstrategy", published in Foreign Affairs journal (September/October 2010), outlined five basic principles of the future strategy:
    - Cyber must be recognized as a warfare domain equal to land, sea, and air;
    - Any defensive posture must go beyond “good hygiene” to include sophisticated and accurate operations that allow rapid response;
    - Cyber defenses must reach beyond the department’s dot-mil world into commercial networks, as governed by Homeland Security;
    - Cyber defenses must be pursued with international allies for an effective “shared warning” of threats; and
    - The Defense Department must help to maintain and leverage U.S. technological dominance and improve the acquisitions process to keep up with the speed and agility of the information technology industry. 
    YEARS LATE AND MILLIONS OF DOLLARS SHORT. ( DAY LATE AND DOLLAR SHORT )
    The command - made up of 1,000 elite military hackers and spies under one four-star general - is the linchpin of the Pentagon's new strategy and is slated to become fully operational Oct. 1. - Washington Post reports (6). The Defense Department has “15,000 networks and 7 million computing devices in use in dozens of countries, with 90,000 people working to maintain them and it depends heavily on commercial industry for its network operations” (7). Attracting allies and private companies working in the sphere of IT and security the US plans to establish the new order in the global cyber space. 
    PRIVATE COMPANIES AND IT SECURITY? THE SAME SECURITY VENDORS PIMPING ALL OF US WITH THEIR INCOMPLETE, PARTIAL, UNIMPRESSIVE, FRAUDULENT CRAP SECURITY PROGRAMS.
    I HAVE ONE THING TO SAY  "LONG TERM PERSISTENT ROOTKITS".
    THE SECURITY VENDORS NEED TO BE HISTED ON THEIR OWN PETARDS. 
    LACK OF RESPONSIBILITY AND INTEGRITY IN THE SECURITY VENDOR INDUSTRY PUTS THE WWW AT RISK.
    PROTECTION AGAINST ALL KNOWN THREATS AND EXPLOITS SHOULD BE A MINIMAL STANDARD, BUT SADLY, CURRENTLY IS THE QUEST FOR THE GOLDEN SHROUD. AND SOME HOW BEYOND SECURITY VENDORS?


    GERALD
    Internet Anthropologist
    Tactical Internet Systems analyst.
    GOOGLE FORMATTING STILL SCREWING UP , WTF?
    .  


    Terrorist Names SEARCH:
    Loading

    Tuesday, September 07, 2010

    War Think Tank NOT



    Think Tank NOT
    International Institute for Strategic Studies (IISS) forgetting its history.
    ...David Cameron, that the presence of thousands of British troops in Afghanistan is necessary to prevent al-Qaida from returning and thus increasing the threat to the UK.


    "It is not clear why it should be axiomatically obvious that an Afghanistan freed of an international combat presence in the south would be an automatic magnet for al-Qaida's concentrated reconstruction," the IISS director-general, John Chipman, said.
    Al-Qaida is now "engaged in Pakistan in very small numbers", not remotely comparable to the situation in Afghanistan pre-September 2001, Nigel Inkster, an IISS director and former deputy chief of Britain's Secret Intelligence Service, said. No such threat is likely to come from al-Qaida elsewhere, including Yemen and Somalia, he added.


    mMkAY, Lets see, al qaeda ended up in Afghan in small numbers, 
    and launched 911, US helped run Russia out of Afghan and then
    withdrew support for Afghan, and the Taliban moved in and took 
    control and sheltered al qaeda resulting in phenomenal growth.
    Current US and British operations has beat al qaeda down to
    less threating proportions. So the current paradigm has brought
    some success and safety and they want to withdraw, leaving Afghan
    to the tender mercy's of the Taliban?
    al qaeda cult is deployed very similar to the situation pre 911.
    I don't know what leads IISS to the conclusions they have made?
    al qaeda is and has been making International threats and operations
    situation is very comparable to pre 911. 


    automatic magnet for al-Qaida's concentrated reconstruction,
    A better question is why he doesn't think the situation would
    be repeated if pressure is withdrawn from al qaeda?

    I see no reason it wouldn't repeat, and no reason to think
    an with drawl wouldn't lead to an automatic magnet for 
    al-Qaida's concentrated reconstruction.

    Nigel doesn't back up his conclusion with any substantiation.
    Just an opinion without data. A think tank not thinking?
    Forgetting history?

    Gerald
    Internet Anthropologist Think Tank

    .