Internet Anthropologist Think Tank: 12/5/10 - 12/12/10

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Saturday, December 11, 2010

    Genius Readers & index 12.11.10

    Terrorist Names SEARCH:
    Loading

    Stockholm bomber vid

    This blog set to diaplay 20 days of posts. Sorry Blogspot only shows 3 days, waiting for a Google fix, G


    Stockholm bombers: 'Stop your stupid war on Islam': Swedish journalists receive taped warning before cars filled...

    UPDATE:
    The bomber is in the car, it blew up on him. Watch vid.



    Warning do not stay and film, if it has real explosives
    the concussion WILL KILL YOU. LEAVE THE AREA.
    These people filming are IDIOTS.

    G


    Al Qaeda spy in Google:


    .

    Terrorist Names SEARCH:
    Loading

    Wikileaks, Anonymous burning supporters

    This blog set to display 20 days of posts. Sorry Blogspot only shows 3 days, waiting for a Google fix, 


    Anonymous is passing out a dos tool that is easily tracked back to 
    the PC using it. Used a lot in the Iran protests wars. 
    It was fine to use in the Iran battle no one cared if
    IPs were tracked back to the US. But here, oops.

    Its called the "Low Orbit Ion Cannon".
    Kind of a suicide dos attack.
    Should have used the Hi orbit Gun.


    Paradigm Intel indicates the FBI will be seizing PCs
    running this malware in dos attacks..
    Some Arrests have already been made.

    Dutch Team High Tech Crime arrests secondAnonymous suspect in relation to pro-WikiLeaks DOS attacks 






    Wikileaks supporters are actully turning their PC's
    over to 14 yr olds from http://boards.4chan.org

    They just have to push a button.
    It launches dos attacks from their PC
    which are easily traced.

    Click on image for larger.

    Wikileaks is burning its own supporters?

    Uh oh, the Low Orbit Ion Cannon leaks. 

    Wikilleaks "hacktivist" attacks not so anonymous, their software, "Low Orbit Ion Cannon" leaks IP addresses 

    Maybe to solicit more donations?
    Last year Wikileaks took in $1 million USD.
    No accounting for the money and 
    they are on track for much more this year.
    Where is the money going?

    Many supporters are going to find this
    a painful experience.


    Gerald

    UPDATE:
    From Anonymous:
    Anyone with wifi has deniability; just need to DoD-clean PC. Instructions Monday.
    OK  you do that.




    .

    Terrorist Names SEARCH:
    Loading

    Google

    This blog set to display 20 days of posts. Sorry Blogspot only shows 3 days, waiting for a Google fix, G







    CLICK image TO ENLARGE
    Who is the Biggest Intelligence Prize/target in the World? 
    And the easiest to penetrate?
    Al Qaeda spy in Goolge: Huge National Security Risk.
    The Worlds largest DATA repository. Dwarfs even NSA.

    Paradigm Intel and BSU reports.
    Google HAS been penetrated.
    20,000+ employees world wide.
    More BSU's deployed
    Engaged.
    Spying on Whom? EveryOne, EveryThing.

    Gerald
    Internet Anthropologist, ad Magnum

    Googles Youtube promoting terorist recruiting vids.



    Why would al Qaeda have a spy in Google?
    Or other Intelligence Agencys, Iran, Russia, China
    have spys in Google?
    Its understandable why they would have a spy
    in CIA, FBI and the US Army.
    Ali Mohamed. He infiltrated U.S. intelligence agencies,
    including the CIA and FBI, and joined the U.S. Army.



    Triple Cross: Bin Laden's Spy in America Natl Geo.

    But why would al Qaeda want a spy in google?
    What does Google know about you?
    EVERYTHING?



    What could they see?
    Profile, 
    Alerts, 
    Search history,
    all the sites you visit,
    Blogger, 
    Calendar, 
    Contacts, 
    Custom search engines, 
    Docs, 
    Finance, 
    Friend Connect, 
    Gmail, 
    Health, 
    iGoogle, 
    Latitude, 
    Mobile Sync,  
    Reader, 
    Shopping List, 
    Talk, 
    Tasks, 
    Voice, 
    Web-history, 
    YouTube. 

    Android
    cookie-based data 
    Google TV


    Can U trust Google?Probably, its employees are a big Q, 
    It's data bases prime target all Intelligence agencys in world

    .

    Terrorist Names SEARCH:
    Loading

    Friday, December 10, 2010

    New Era of Cyber WAR, NOT

    This blog set to display 20 days of posts. Sorry Blogspot only shows 3 days, waiting for a Google fix, G





    We are entering a new era of Internet warfare,NO,  no new paradigms.
    In 2001 I said:
    "New uses and discoveries for the INTERNET will center on "PROCESS" & "ORGANIZATION".
    Stuxnet and Anonymous are not new, just re-applied old paradigms, in new processes and
    organization.

    Stuxnet isn't new, no new paradigms just old ones carried to the extreme.
    The full extension of the old paradigm.
    Costing millions in programing and planning and execution.
    Stuxnet is a covert way to deal with Iran, N Korea, Burma 
    and Syria, while burning through their treasurys for pseudo 
    nuclear weapons. An anti-proliferation weapon.


    Anonymous is the mob swarm we have seen in so may previous variations and lives.
    The current swarm of anonymous are not dangerous, just
    miscreant boys, in your neighborhood the ones that might
    trun over your full trash cans.


    Click to enlarge:

    Not dangerous but a pain in the ass.
    Taking down Visa and mastercard doesn't speak
    to their hacking abilities so much as poor security
    at those companies. They never expected or prepared
    for a heavy dos attack. Note they 
    have now mitigated all dos attacks. 
    Anonymous is subject to penalty taking down their
    with web page. And burning them individually is an option.
    Prosecute them one by one, if they get out of hand.
    Tracking them isn't that hard.
    But they are also the future of the WWW. Paradigm future of WWW, 
    Athenian secret democracy, Individuals grouping to take action against 
    perceived wrongs, Counter is Info war with the Truth.
    A force sadly lacking in US Repertoire.



    Twitter is another example, they were hit by a
    dos attack also, the users saw the site page do
    a heavy filcker and in 7 min countermeasures were
    deployed, end of flicker, most users never even 
    noticed. Twitter had a lot of experience with dos
    attacks when Iran tried to take them down.



    Each Anonymous group is different, compiled of different
    members and different levels of expertise.
    Each group can be as different as one corporation is
    to another.

    Jester is one person albeit a Genius, and our Paradigm Intel indicates
    he has some Government connections. And has had the
    same effect as the entire Anonymous mob group.
    With their 44,000 down loads of DOS tools.
    Jester vs Anonymous



    Wikileaks isn't when it comes to the US Government.
    So far their releases have revealed good intentions 
    and some bumbling. The first release of the chopper
    killings in Iraq was quickly revealed the group of
    "civilians" were carrying RPGs, and the reporter never
    reported he was with the insurgents. And wikileaks
    much to their detriment and loss of integrity continue
    to ignore the RPGs when reporting the insurgents as
    civilians even today.
    See photos of RPG

    Wikileaks have seeded their own end in the violation
    of their own paradigm. Lying about the data they release.
    The wars wikileaks is reporting on have gone on for twice
    the time as WWII and several magnitudes of fewer civilian deaths.

    Wikileaks demise lies in the spin they run on the releases.
    They can't be trusted. So far with few exceptions their
    'Releases' amount to gossip, and boring.
    Wikileaks attempted war on the US is apparent,
    transparent and loaded with spin.
    And firing blanks.
    Much like Ahmed Quraishi's poor propaganda.

    Something wikileaks didn't expect to deal with
    is Julians personal proclivities and arrest.
    Wikileaks took in over a Million dollars in donations,
    $1,000,000.00
    last year, and I think that in time an audit will 
    reveal the main motive in Julians shenanigans.
    And Julians profit motives and misleading his
    followers may lead to more prison time for fraud.
    Wikileaks defrauding donors.




    This wikileaks mess is also an outcome of Obama's
    personality, desire not to confront, we have seen this
    in action with the Republicans and the Billionaires Tax
    break. There is an uneasy feeling Obama even as
    a last resort will back away from direct confrontation.

    US new cyber command has been made into a eunuch.
    Their scope and range have been limited, reduced and
    limited to a level of locking the cyber doors, but no weapon
    use. Only in War, and only in kinetic wars.
    None of this defending cyber space or the WWW.

    Wikileaks would have happened Republican or Democrat
    was in office, just poor cyber policys. And this debacle will
    limit future intel sharing as an example of risks involved.

    US does need a "cyber security policys Czar."

    They are all forced to share except NSA, without
    a security review of the other partners.
    Something the State Dept should have got
    with the Army system.



    Breaking a spy in Google?

    While not a world changing events,
    all parties are dancin much harder than usual.



    Gerald
    War Anthropologist

    .

    Terrorist Names SEARCH:
    Loading

    Why would al qaeda have a spy in Google?

    This blog set to diaplay 20 days of posts. Sorry Blogspot only shows 3 days, waiting for a Google fix, G


    Why would al Qaeda have a spy in Google?
    Its understandable why they would have a spy
    in CIA, FBI, NSA and the Army.
    Ali Mohamed. He infiltrated U.S. intelligence agencies,
    including the CIA and FBI, and joined the U.S. Army.




    Triple Cross: Bin Laden's Spy in America Natl Geo.

    But why would al Qaeda want a spy in google?
    What does Google know about you?
    EVERYTHING?
    Your name and e-mail address, where you live, your contacts, the documents you worked on and shared, your e-mail correspondence and people you talked with through Gmail, the tasks you wrote down - they are all there.

    The Dashboard includes data gathered only from Google services that you access with your Google account (Account & 
    Profile, 
    Alerts, 
    Search history,
    all the sites you visit,
    Blogger, 
    Calendar, 
    Contacts, 
    Custom search engines, 
    Docs, 
    Finance, 
    Friend Connect, 
    Gmail, 
    Health, 
    iGoogle, 
    Latitude, 
    Mobile Sync,  
    Reader, 
    Shopping List, 
    Talk, 
    Tasks, 
    Voice, 
    Web-history, 
    and YouTube. 
    For cookie-based data you should check out the Ad Preference Manager.

    You can check here. Google Dashboard,

    HOW

    A Google spy could have access to any of that info.

    Google fired engineer for privacy breach 
    David Barksdale, an engineer in Google's Seattle offices, used his position as a key engineer evaluating the health of Google's services to break into the Gmail and Google Voice accounts of several children.

    So an al qaeda spy wouldn't be interested in you,
    but think about those in the Military or Government
    or in JEDO their info could be crutial to al Qaeda.

    OK the paradigm is possible,
    but is there any evidence the is an al Qaeda spy
    in Google?

    Google has no problem keeping boobies or
    illegal music off YOUTUBE.
    But it seems they just can't keep up
    with the Terrorist recruiting videos.
    Some how they just can't manage it.

    Jawas Report and “"YouTube Smackdown”
    were running hundreds of members to
    notifying Youtube of all the Terrorist vids
    that were promoting violent terrorist actions.



    And they still couldn't manage to get the
    recruiting videos down.
    Almost as if somebody on the inside
    of YOUTUBE was protecting the terrorist.

    Maybe there is.
    There is Motive,
    The penetration of FBI,NSA and CIA
    and Army proves the capability.
    And indication its happening.

    Google needs to dig the spy out
    before the Government decides to
    get involved.




    Gerald
    War Anthropologist.

    .






    Terrorist Names SEARCH:
    Loading

    Thursday, December 09, 2010

    Google penetrated by al Qaeda

    This blog set to diaplay 20 days of posts. Sorry Blogspot only shows 3 days, waiting for a Google fix, G


    Paradigm Intel Google

    The Google algorithm just about pulled
    the Internet Anthropologist out if its
    search engine.

    Two months ago if you searched
    "Anthropologist" We were listed
    in the Top 10, But now we are not
    even in the first 20 pages of search
    results.

    I was depressed, what had we done
    wrong to PO Google.
    I was wracking my brain and reviewing
    all the posts.

    Too bold, to abusive to Congressmen?
    Too ..to what?

    So I cranked it thru our Paradigm engine.

    Surprise. Surprise Surprise.




    The US Military was penetrated by
    an al Qaeda spy.
    Ali Mohamed. He infiltrated U.S. intelligence agencies,
    including the CIA and FBI, and joined the U.S. Army.


    Triple Cross: Bin Laden's Spy in America Natl Geo.


    YouTube is either directed by US Intelligence Agencys
    not to take down Terrorist recruiting vids or YouTube
    has been penetrated by al Qaeda.
    YouTube can keep Boobies off its vids but
    some how can't managed terrorist content.

    So right now the FBI or CIA or NSA know
    if they ordered the Terrorist content to stay
    up, if they didn't then they need to be hunting
    al Qaeda spies at Google.
    The worlds greatest search engine, and
    the ability for al Qaeda to influence searches,
    content, even sites rankings in the search engine.
    A virtual GOLD MINE FOR AL QEDA.

    Tried hacking a site, attacking, dosing it with bot nets,
    threatening webmasters, all to no avail.
    Then attack those sites from inside,
    some Google employees are allowed to
    tweak sites search engine rankings.
    If they got someone into CIA, NSA , FBI
    AND US ARMY.
    How hard is it to get "their GOOD  (jahiddie)
    Muslims" into Google?

    Not to mention snooping in Gmail, tracking
    Military searches, it would be a variable Gold
    mine of intelligence.

    And we think we have Prima facie evidence
    of Penetration of Google by insurgents or jahiddies.

    The YouTube Epic Fail on terrorism vids



    and
    My blog post. Google doesn't do political Censorship

    There needs to be an Investigation by Google to
    correct these problems or others will.
    UPDATE:04.07.11
    Google has had months to address this issue and hasn't
    Time for an Official investigation into google penetration
    by terrorists.



    Gerald
    War Anthropologist.





    Enhanced by Zemanta