Internet Anthropologist Think Tank: 10/31/10 - 11/7/10

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Saturday, November 06, 2010

    EXCLUSIVE Printer Bomber FEDX

    Just in from our Intel Sources:



    From a source inside the Beltway we have found reliable before.G

    EXCLUSIVE: EXCLUSIVE:


    It seems that the UPS/FEDEX attack has historical roots and much more sinister tactics than have been disclosed.
    The address names on the UPS and FEDEX package were Pierre l'Ermite and Diego Gelmírez and the street address was that of only one synagogue in Chicago. ( ERROR IT WAS TWO,G ) Whom are they?
    Pierre l'Ermite, is AKA Peter the Hermit, 1050-1115, a French monk. In 1095 he instigated the First Crusade.  With help from the Byzantine emperor Alexius I he and his irregular band took Jerusalem.
    Diego Gelmírez of Santiago de Compostela conceived of a N African invasion route intending to unite the reconquest of Spain (from Muslims) with the Crusades to the Holy Land, forming a single Mediterranean-wide crusading theatre.  He was one of the most famous Spanish monk-warriors leading the expulsion of Muslims from Spain. 
    Why a package on two different carriers?   To increase the chance of success in case one was discovered, and, to double the potential effect of a tactic that would likely be closed off after the attack. 
    There were three layers of detonation. 
    SIM card Nokia phones were programmed to answer a call and detonate.  With both packages sent simultaneously by different carriers, they would arrive in the skies over Chicago on two different planes.  Knowing the packages "tracking number" and with online, easy access to arrival times, it would be easy for a caller to keep calling the detonator phone while the two planes flew into Chicago, hoping to down them over the city, causing great destruction below. 
    They knew approximately when the onboard package-carrying planes would be landing.  By simple calculation, the plotters walked that time backward to the final approach time over Chicago and programmed/wired the phones to detonate using the alarm clock feature. 
    Finally, if both of those methods failed, detonation would occur at the delivery site, a Jewish synagogue, as soon as the printer was plugged in. ( We reported this feature form our Paradign Intel, G )
    No way to stop the attack, no exposure to operatives, no hijackers needed, brilliant and efficient tactics, low cost with massive results.  The attack would be thought of as an accident until the second plane blew up, allowing operatives to escape.
    Obviously we have a highly capable, educated and thinking enemy.  The Jihadists are highly aware of their place in history and seek muslim hero status.  The current media portrayal of inept amateurs, driven by our government sources is, to say the least, highly underspoken.
    We fail to understand the historical context and haven't even developed a data base of historic enemies of Islam that could be cross checked against passenger lists and shippers.  How could we not have an overwatch that sounds alarms when anything is sent from Yemen to any synagogue in the US?
    Clearly the Jihadist are much more nimble and creative than we are.  We continue to be unable to put ourselves into the minds of Jihadists and we remain reactive rather than proactive.  This attack could have worked, attack by proxy.  We can't keep counting on luck or self-serving allies to save us

    ( Our Paradigm on their next Attack ,G )











    END OF FILE END OF FILE.


    CARTON CONTENTS INCLUDE:
    - personal clothing, ornaments, compact discs and papers.
    - one HP Laserjet printer containing an improvised explosive device.

    IF DETECTED, ASSUME THAT THE DEVICE IS FULLY FUNCTIONAL AND CAPABLE OF
    EXPLODING AT ANY TIME. CALL EOD.

    If detected, PETN and all other explosive material should be addressed by Explosive Ordnance Disposal
    (EOD). Pure PETN should be handled in accordance with an official Material Safety Data Sheet or Chemical
    Sampling Information (CSI) for PETN. An example can be found on:
    http://www.osha.gov/dts/chemicalsampling/data/CH_260110.html



    This threat is new, Using new paradigms,  its multiple phased and in-depth,
    and is backed by redundant systems.

    First Paradigm:
    NO suicide bomber to screw up this time,
    automated with redundant triggers.

    At least two bombs, same target,
    But multiple targets of opportunity,
    Phone call any time or where,
    Timed ignition,
    Plug in at destination, ignition.

    They went to great efforts and
    this is the first attack with this level
    of depth and redundancy.

    They wanted a "good" strike 
    against the US and this plan 
    assured them of success.
    Some place two bombs were
    going to go off, or so they 
    thought. With the expectation of
    a very high probability of success
    the package will be laden with
    finger prints and other forensic
    evidence.

    Somebody is very angry and 
    depressed. And their assurances
    for success are now a major 
    embarrassment.

    Just another Epic FAIL on a long
    line of attempted attacks.

    Second Paradigm:
    It still looks like they were using
    money mules to ship goods.
    And that maybe their weakness.

    RBN Russian Business Net, and
    the FSB are on them, and they
    don't adhere to the niceties the 
    US forces do.

    The Internet has turned out to be
    al qaedas Achilles heel.

    I still expect the bomber arrest 
    with in weeks.
    This is al Qaedas Stuxnet equivalent.
    The BEST they could do.
    It involved  the best minds
    al qaeda has, in terms of bombing
    technology and Internet savvy.
    Binny was assured of a success.
    And just got burned again.

    Given Bin Ladens personality disorders
    I expect the next attempt to be sooner 
    rather than later, and more straight forward,
    and simple, they are desperate for some 
    success. Binny's little cult has run up a 
    disappointing string of failures. Seems
    they can't do anything right.
    But then they are heavy on psychotics
    on the HR level.





    Gerald
    War Anthropologist.


    New Intel: paradigm and BSU's.
    The Internet Team, speaks english only
    as a second language, no formal training.

    High probability bombs made in Kitchen.
    US now has DNA samples.

    Terrorist Names SEARCH:
    Loading

    Tribute to Mahmoud Ahmadinejad

    Tribute to Lather , I mean Mahmoud Ahmadinejad









    G

    Terrorist Names SEARCH:
    Loading

    Run through the Jungle (Cyber )

    Run through the Cyber Jungle.


    Play this while reading:


    Our paradigm Intel for using cyber
    forces during an all out war.

    In some of the up coming war games
    the US will be involving a cyber component.

    The US plans for all contingency's, 
    One of the most interesting exercises
    is the Uran action, Uran being a mythical ME
    country.

    And the game goes something like this.
    A small nuclear devise has been smuggled
    into the USA and detonated on the Southern
    sea board.

    Small yield but very dirty, And the US is able
    to finger print the bombs production back
    to Uran.

    The Pentagon get the order from Obama
    to terminate the leadership of Uran as fast
    as possible and with extreme prejudice.

    NSA is first to strike, with cyber arms,
    shutting down the entire country,
    knocking Uran off the WWW, disabling
    phones, radios and TV and cable.
    Urans command and control is now limited
    to hand carried notes.

    NSA and satellites are tracking Uran's leaders.

    In the hour after the Uran nuke goes off in the
    US the US Navy launched submarine cruise 
    missiles at major cities, all with EMP warheads.
    No one killed from the EMPs.
    The following denotations brings all trucks cars,
    planes to a stop and burns out 90% of the computers
    and anything with PC chips in it.

    NSA re targets Urans weapons thru a cyber virus,
    hitting their own defense forces.

    Urans Military are grounded, blind, deaf and leaderless.
    The US Air force launches air strikes in the following days
    destroying all tanks and Armour in the country.
    http://www.youtube.com/watch?v=a00Spe8U6PM
    Because Uran has been supplying IEDs to terrorists.

    A week after the attack USA has CIA delta force teams
    ranging through the country backed by A1 M1s, and Black hawks
    killing Urans leaders on site and collecting DNA .


    20,000 targets in 24 hrs
    This time there is to be no nation building, they have taken out
    90% of the leadership and just pull out, using drones to hunt 
    the remaining 10%.

    There have been very few civilian deaths from the war,
    but many die from lack of services.

    A few of the autos from the 1950's still work , and the country
    has been removed back to the 1950's technology.
    And the banking system has been wiped out, all PC's
    toasted, and only a few land lines without chips working.
    US Forces estimate Uran will be functioning on a subsistence
    level for 5 years, and will take 10 to 15 years to build the country
    back to the 2010 levels.
    Total Cost about same as one month of Afghan ops.

    All nuclear buildings have been destroyed. Above and
    underground.

    And once Uran is down US turns to healing its wounds.
    Drones continue to fly over Uran hunting for leaders for
    the next 5 years.

    Thats how cyber forces integrate with conventional forces
    during war time.



    Gerald
    War Anthropologist


    Terrorist Names SEARCH:
    Loading

    Friday, November 05, 2010

    Live Fire cyber Shield, "HOT"

    DEFCON 18: Live Fire Exercise: Baltic Cyber Shield 


    Genius stuff. Very Impressive.

    "Hot Award" for Internet Power. G

    Well thought out, comprehensive, representative structure.
    Amazing results, concise lessons learned, there are white
    hats and WHITE HATS.

    A lot to chew on well worth the watch.

    Raised my morale significantly.
    Nude sessions would take some getting used to.
    LOL.

    Sandia has a forest of super PC's 
    HINT hint, infrastructure, almost unlimited.










    Two paradigm concerns.

    "Rampant destruction" should be kept in the Game.
    The White team represents the Gov. trying to
    track just whats going on, and gives them
    practice in functioning and managing in a
    reality situation.

    Second is the ability for the BT to
    counter attack, Jeeze this should be
    encouraged. As a policing action on real time
    attacks.Just sitting there and taking it,
    I hope isn't realistic.

    I was in awe these guys, the Blue Teams
    were dropped into an insecure environment,
    unknown to them, without complete documentation,
    And one team managed to lock it up WORKING PART
    TIME on the exercise.
    God Damn IMPRESSIVE.


    Gerald
    Internet Anthropologist
    Tactical Internet Systems analyst.

    Hat tip: Cyber Arms
    http://cyberarms.wordpress.com/2010/11/06/live-fire-exercise-baltic-cyber-shield-2010-defcon-18/#comment-798
    My comments there are from viewing only the first of these three sections.

    .

    Terrorist Names SEARCH:
    Loading

    Pirates, illegal, criminal

    Terrorist Names SEARCH:
    Loading

    Cyber force of will?

    I've read many articles about why the terrorist sites
    can't be taken down.

    About the rampant cyber crime, $100 M a year from
    Banks..

    About Malware hacker attacks, and only about "defending"
    against them.

    About 100,000 probes an hour on DOD nets.

    Its hard to control a domain if your 100% defensive.

    It looks like the Cyber Domain is not dominated
    by the US Military, like the Air Force dominates
    air space, when it desires.

    It looks like the many terrorist sites that remain up
    as command and control for insurgents is beyond
    the power of the new Cyber Command.

    The Terrorist web sites are the gardens for home
    grown terrorists.

    WHAT HAVE THEY DONE?

    And the new US Cyber command are mounting very
    strong defenses against them IF they attack.

    But even during War time the terrorist sites seem enjoy
    a certain impunity from the US Cyber Command,
    But maybe their mission isn't to dominate Cyber
    Space ? Maybe their mandate is only to defend?
    ( But then who is responsible for dominating Cyber Space,
    during a time of War? )

    They should be renamed, "US Cyber defense Command"

    All the Terrorist sites can be taken down if there is the WILL.



    Gerald

    IS COLLECTING INTEL MORE IMPORTANT
    THAN STOPPING ATTACKS?


    COUNTER POINT Anyone? PLEASE..
    How have I got this wrong?
    .

    Terrorist Names SEARCH:
    Loading

    Jahddies controlling YouTube?

    There is something very strange going on a You Tube.

    Terrorist vids stay up, even though Obama and MI6
    have asked for them to be removed.

    But Breast Cancer is taken down?


    According to the CDC, breast cancer is the most common form of cancer in women. LivingFuelTV produces a weekly program revealing the truth about such major health issues. A recent segment, posted to YouTube October 14, was about how breast cancer can be prevented, while the Pink campaign was promoting early screening and treatment. Within hours of posting the show on YouTube, the entire LivingFuelTV health education channel was disabled, with a general message posted stating the company had violated YouTube's "Community Guidelines."[..] ( Dangerous Boobies, G )
    Repeated calls and emails from Living Fuel and its attorneys to YouTube and YouTube parent Google for three weeks have not been returned.


    "I am concerned about who is monitoring and controlling YouTube content... legitimate breast cancer prevention information is taken down and a suspected terrorist can use the site as his personal speaking platform?" explained Craichy. "Something is wrong with this situation and we invite YouTube to correct it for the good of everyone involved."[More..}

    Aptly named JihadTube.
    SOURCE JAWA
    4,000 videos of al Awlaki up at YouTube. JAWA




    This makes one wonder just who is in control
    at YouTube? Could YouTube have been infiltrated,
    is there a mole high up in YouTube?

    More transparency from Google could be very helpful.
    Just how and who are making these decisions?
    AND WHY?

    Does Youtube have blood on its hands?

    The gifted student jailed for life for trying to assassinate MP Stephen Timms told police she had wanted to die as a martyr after watching more than 100 hours of video sermons from the extremist cleric Anwar al-Awlaki which she had come upon on YouTube.

    I'm sure Google has a very reasonable answer.

    Gerald
    Anthropologist


    .


    Terrorist Names SEARCH:
    Loading

    Dems; political Info War; MIA




    Obama blames poor communication elections rout http://t.co/GX3m4gm 
    BS Dems Info WAR MIA, 
    Examples:
    $700B? Tax cut Billionaires or health care for poor?

    Republicans pushing:
    No min Wage.
    NO unemployment benifits
    No health care for the Poor, let them die.
    Republican Paradigm hamstringing US Economy.
    The Government helped the economy,
    spending the way out of a depression.
    That was the choice, or let the economy Crash.



    Republican Congressmen got on average $2 million 
    From Wall St Banks. What did the Banks get?

    The same banks responsible for:

    Sub-prime debacle.
    Near crash of credit system World Wide.
    Loan Sharking, 30% credit cards, 460% payday loans.
    Flash Crash, dark pools operating without regulation.
    Switching from Investing to Gambling.
    Banks got $700B bail out from Tax payers.
    Banks got $2 trillion from Federal Reserve.
    Banks paid Billions in bonuses.
    And foreclosed on all the tax payers with
    sub-prime mortgages.
    Are allowed two sets of books:
    One public listing sub-prime paper at 100% value,
    Private Books with sub-prime paper at 30% value, true value.

    Republicans were and will be the "NO" party.
    They tried to blocked anything Obama tried to do.

    The Democrats just laid down and let Republicans steam roll them.
    Dems did not have an "Info WAR" ( spin control, fact correction, 
    exposing the Republicans ).

    Jeeze I really try and avoid politics, 
    just wanted to report on the GWOT.
    Hell I was a Bush Republican.

    Bush left and the Republican party reverts
    to schoolyard paradigms.
    Look at the leadership of the Republican
    party. I mean just look at who they are.

    Obama and the Dems have NO chance
    in the next presidential election on this basis.
    Dems got their heads up their collective asses,
    with an unfocused, sporadic effort.
    They got the power and almost ran scared.

    Here comes Palin...
    And the country and Republicans deserve it.



    This election cycle has given the Terrorist hope.




    Gerald
    Internet Anthropologist

    .



    Terrorist Names SEARCH:
    Loading

    Google Support ERROR REPORT


    ONLY 5 DAYS SHOW UP ON MAIN PAGE.

    PLEASE FIX.


    GERALD
    ANTHROPOLOGIST


    To the Power that is Google:

    Terrorist Names SEARCH:
    Loading

    Thursday, November 04, 2010

    TERRORIST SITES NO DANGER.


    WHY THEY DO IT.

    The gifted student jailed for life for trying to assassinate MP Stephen Timms told police she had wanted to die as a martyr after watching more than 100 hours of video sermons from the extremist cleric Anwar al-Awlaki which she had come upon on the internet.




    The effect of listening to and viewing the cleric's video was such that, despite the fact that Choudhry never met or had any contact with him, she chose to withdraw from contact with her friends and ended her studies, quitting as the top student in her course at King's College London on 27 April this year before carrying out her attack on 14 May.
    She began listening to his sermons in November 2009, and finished the last in the first week of May, days before she carried out the attack. "I downloaded the full set of Anwar al-Awlaki's lectures," Choudhry told police, saying that she listened to more than 100 hours of them.
    Police believe Choudhry is the first Briton to be inspired by al-Qaida to try to assassinate a public figure on British soil.

    WHAT HAVE THEY DONE?
    by Brian Michael Jenkins at RAND:



    Between September 11, 2001, and the end of 2009, 46 publicly reported cases of domestic radicalization and recruitment to jihadist terrorism occurred in the United States;

    13 of those cases occurred in 2009.

    Most of the would-be jihadists were individuals who recruited themselves into the terrorist role. Some provided assistance to foreign terrorist organizations; some went abroad to join various jihad fronts; some plotted terrorist attacks in the United States, usually with little success because of intervention by the authorities. 

    The threat of large-scale terrorist violence has pushed law enforcement toward prevention rather than criminal apprehension after an event — or, as one senior police official put it, “staying to the left of the boom,” which means stopping the explosions or attacks before they occur. 

    This shift toward prevention requires both collecting domestic intelligence — always a delicate mission in a democracy — and maintaining community trust and cooperation.
    Posted on 28 May 2010 @ 01:47
    XXXXXXXXXXXXXXXXX

    HOW ARE THEY CONNECTED?

    JIHADI BLOG LINK ANALYSIS
    The UK's Home Office recently posted the research paper Estimating network size and tracking information dissemination
    amongst Islamic blogs
    . It is good as far as it goes, and well worth your time to read, though I would have liked to see more data about the linkage between each of the subject blogs. Inspired by it I took a quick look at the blog of Somali-Canadian shaheed Mohamed Elmi Ibrahim, examining which sites link to it, which sites link to those linking sites, and then which of the latter sites link or are linked to any of the other sites in the resulting list. The network that emerges looks like this:





    Where are they?


    JIHADIS WHO USE BLACKBERRYS
    In a recent sample of 411 IP addresses from a jihadi forum, 25 were found to be Blackberry users. These individuals were traced to the following countries (listed from high to low in order of occurance):
    • Egypt
    • Kuwait
    • Morocco
    • Sudan
    • Libya
    • Somalia
    I think it safe to assume that at least some of these individuals are using Blackberrys so they may better avoid detection and identification. Those of you in the audience who have the capability will want to take a close look at traffic originating from the following netblocks:
    217.20.243.1 - 217.20.243.63
    41.95.0.0 - 41.95.255.255
    41.91.0.0 - 41.91.255.255
    41.152.64.0 - 41.152.127.255
    41.206.144.0 - 41.206.159.255
    41.153.64.0 - 41.153.127.255
    196.12.254.0 - 196.12.254.255
    41.208.82.0 - 41.208.82.127
    213.132.255.0 - 213.132.255.255
    94.128.0.0 - 94.129.255.255*
    94.128.0.0 - 94.128.127.255*
    * yes, I know, there's some overlap here. I'm just calling it as I see it - you sort it out.
    SoFIR: The Poor Man's NSA™
    Posted on 03 November 2010 @ 14:55

    Why US can't just take sites down?


    By Devost
    American officials have to convince their foreign counterparts that removing a particular site hosted in their territory is both legal under the host country’s laws and necessary. 


    ‘You have to make some pretty specific legal arguments,’ says Devost. These requests can run up against sensitivities over national sovereignty and complicated issues of free speech, a difficult issue even here in the United States. 


    Some governments simply aren’t receptive to begin with. ‘You can’t go after every site in every country because some countries just won’t cooperate,’ Devost tells Danger Room.”


    WE ARE AT WAR: 
    I WOULD ARGUE THESE SITES ARE LEGITIMATE TARGETS.
    THEY CAN BE SHUT DOWN,
    EVERY TIME THEY GO DOWN THEY LOOSE MEMBERS,
    loose pages and hurts moral.
    They can be effectively targeted by Cyber
    forces. 


    BUT THE TERRORIST SITES ARE STILL UP.


    SEEMS SOMEONE THINKS:
    TERRORIST SITES PRESENT NO DANGER.


    ARE THE INTELLIGENCE AGENCYS 
    CODEPENDENT ?
    IS COLLECTING INTEL MORE IMPORTANT
    THAN STOPPING ATTACKS?


    COUNTER POINT Anyone?




    Gerald
    Anthropologist


    .