Internet Anthropologist Think Tank: 6/19/11 - 6/26/11

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Saturday, June 25, 2011

    Load your Hunny Pot with Ebola



    White hats need to think like Black hats.
    They Have APT Advanced Persistent Threats,
    Invisible persistent, regenerative Rootkits,
    And delivery systems to put them on your
    PC's, networks and servers.

    They steal and plunder, rape and pillage
    Networks, stealing intellectual property.

    We need to look at this problem as a hacker.
    We do not have to deliver the nasty to their
    PC or network. They will steal it.
    And move it on to their own properties.

    We have proof of concept, in the anti-computer
    theft programs. When someone steals your note
    book the program is turned on and it phones home
    even turning on the camera or mics, recording
    the perp.

    Lost or stolen computer/laptop world-wide tracingsoftware

    Your hunny pot could have some of these type
    programs hidden in it, even your own persistent
    rootkit, even a nuke.

    If it turns out the untraceable hacker can't be
    prosecuted, you can nuke his equipment.
    You don't track hacker, your stolen files
    phone home.

    But I get ahead of my self, one no longer has
    to track the hacker, just have the payload
    he stole call home and report its location,
    IP, email adr, personal name, phone number,
    Bank accounts, screen names and copies of 
    all emails and his associates names sent back
    to the victim.

    If they live in a country where they can't 
    be prosecuted, kill his computer equipment.

    Destroy the server he stores his stolen booty
    on and let him explain to the host what happened.

    This system would have several fail safes built in,
    where by it couldn't be ignited on owners system.
    And there are multiple methods to do this.

    Soon we would see cyber theft drop significantly. 
    As they realize the risk they run of stealing a remotely
    detonated and infecting their systems with a rootkit.
    Let them steal a rootkit from you, let your immigration
    run wild with the payloads you could equip it with.

    You could spot hacks and thefts you did not even
    know about, just turn on the call home feature and
    see if a stolen payload responds.
    Chinese proxy, I don't care I can now see who is
    holding my stolen pay load, and can surgically
    target them and use the rootkit to collect exacting
    foolproof evidence for prosecution or expose them
    to the worlds press.

    The US cyber wet teams may even get a work out.

    Turn the forces of darkness against the hackers.
    Stolen payloads self destruct by remote command.

    Huge opportunity for AV vendors.



    Gerald
    War Anthropologist
    Tactical Internet Systems analyst.



    Internet Anthropologist Think Tank: US Intelligence not recruiting blackhats  Why? they won't come.G

    'U.S. to Respond to Computer Sabotage With Military Force' We called it in 2010= 
    rootkits That can self-heal and reinstall after a system has been cleaned .  




    Terrorist Names SEARCH:
    Loading

    Friday, June 24, 2011

    #Pakistan Mil between Rock & Hard place.

    Family Photos


    Pakistan's Military is scared.
    They have seen the writing on the wall.
    And are scrambling to cover their tracks
    burying evidence and tunning every screw
    to stir up anti-Americanism and all the
    conspiracy theories they can Imagine
    for cover and divert attention from them.

    The new evidence about the OBL cover
    up is just the tip of the Iceburg.


    Cellphone Clues:
    Harakat-ul-Mujahedeen hiding OBL and supporting him
    and had called a Pakistani ISI Colonel.
    A Pakistan General appointed this Colonel
    to handle the ISI side of the arrangement to
    hide and protect OBL.

    And keep all details to himself, even from
    the General, giving him reasonable denyability.

    OBL always had supported HeM. Infact, when  
    was splitting HeM in favor of Masood Azhar's JeM - 
    OBL sent out money & SuV's 2 Faisalabad

    Add to that the recent ISI Killing of the Reporter :
    And  brigadier general arrested for his ties 
    to a radical Islamist group, Hizb ut-Tahrir.

    Our source in the ISI reported they are paranoid,
    and are taking extreme Security measures both 
    with Computers, some have just unplugged them
    and others only making calls from outside phones.

    The ISI has been destroying evidence on the 

    Under the Pakistan  Constitution, ISI has NO powers 
    of arrest. All ISI arrests are illegal. False arrests.

    And they not the civilian Government make foreign policy.

    The collusion with the terrorist and hiding OBL
    and Mullah Omar. and Mumbai could subject the 

    For their own protection they even arranged
    to kill the Abottabbad commission, as the ISI 
    knows where it would lead.

    A loss of confidence in the Pakistan Military
    and ISI could lead to an Egyptian type demonstration
    and removal of Generals.

    And further crushing damage to the Military morale.

    If Pakistan were to produce Mullah Omar and 
    Ayman al-Zawahiri it would make them
    heros again, and back off the Americans.

    How the Pakistan people can change ISI:

    The question becomes how ISI and the Pakistan Military
    will change, from the Inside by their own will,
    or
    From the outside pressured by the Pakistan people.

    The choice is up the the Pakistan Military,
    but it will be one or the other.


    Gerald
    War Anthropologist

    Group Project  Co D:  Counter propaganda, anti-corruption,Pro-Reporters,Pro-democratic Pakistan 


    Welcome patroits:"S" wing members, ISI. Weary of killing Pakis?Encrypted,cloaked com channel set up 4 U  


    #Pakistan has gone 24 days without ISI killing a reporter, G 

    Cloaked encrypted com channels very successful ie Lulzsec demo of concept, even from FBI, NSA, CIA, We have em. G

    We welcome Informants, SPYS, TTP,Taliban members,ISI. Secure,encrypted,cloaked com channel set up 4 U 

    WHO KILLED : INFORM HOW= INFORM WHY=  G ANTHROPOLOGIST Hid OBL? 

    Internet Anthro TT: Paradigm Intel: 's assassin NAMES.  Which is Psyco sexual serial killer, G Anthropologist

    .

    Terrorist Names SEARCH:
    Loading

    Wednesday, June 22, 2011

    @Lulsec alternate Paradigm & other Intel, Ops Intel.

    #1
    An alternate paradigm for Lulzsec is out there,
    but explains the CIA, NSA FBI, impotency.
    But as carefully as the FBI guards its reputation
    it feels doubtful.

    From a source inside Gov.
    "Hacker groups attract lone wolves, the most dangerous 
    and unpredictable kind and we need that kind of bait.  
    You'll see individual perps busted as needed when they 
    get publicity.  The rest get left alone to provide a bait platform.

    Remember the surveilled hackers unknowingly provide 
    valuable intel on our weaknesses and the weaknesses of 
    our enemies............for free. "

    But they are THIS SMART?
    i WANA believe it but never seen this kind of guts and smarts in
    Gov agency before. G

    #2
    The spy game:
    Iran regime thinks they busted a big spy network.
    Story broken:


    From another Gov source:

    Globalization and the money-making ventures, that are web 
    connected, make the whole world a very small place.

    Iran is also a very paranoid place that tries to balance 
    global economic connections with internal security and 
    it's a losing game for them.

    The others: Hobertson Advisors, Deon Capital, & Nuevara 
    International are legit businesses.

    The others:
     Technical Hiring, Engineer One, Marketing 
    Research Association are likely bogus names.

    Email me for rebuttal.

    G

    #3
    Reliable source in Pakistan:
    Shahzad led an extraordinarily risky life.  I am amazed he lived this long.  When he outed the Pak Navy, they almost certainly ordered the hit through ISI-connected operatives.  This was a Pak Navy move, very unlikely the orders came from ISI.

    ISI has a lot of contractors, paid hitmen that work for anyone and live in the shadows. 

    He was beaten to death with clubs.  No other kinds of injuries.
    The puncture wounds were caused by broken ribs.  He died a slow painful death.  It was something personal and meant to intimidate others.

    BTW, somebody erased Shahzad's phone call log from the cell providers system. 

    #4

    From new untested international source, FYI.

    Turkey has had it with Kurds PKK attacking them and running to Syria to hide.  US has the goods on Syrian nuke weapons.  Looks like a run up to taking out Assad when Libya settles down.  Turkey is very afraid that the Syrian refugees will bring protests to Turkey so they are setting up some very comfy refugee camps for long term and boxing them in, no travel and there is a news blackout on all the camps.

    Secret planning for Turkey to invade Syria, lots of Syrian troop mutiny.  Sunnis hate the Alawite command.  Pressure cooker there.

    Rumors that Hamza bin Laden made it to Syria to Latakia to his mother's family the Ghanems and is organizing the Sunnis there with $ and help from the Muslim Brotherhood out of Egypt cooperating with Z.

    3 way fight coming Sunnis, Alawites and Shias.


    END END END



    Gerald
    War Anthropologist

    More coming waiting for Opsec clearance.




    Facebook group, counter-surveillance spotted 20 of you,
    all using same Proxy,  Tracking BSU's deployed.
    G


    .

    Terrorist Names SEARCH:
    Loading

    Tuesday, June 21, 2011

    Who is Lulzsec?



    Jester and some others are trying to Dox Lulzsec
    and time will tell if they have met with success.
    There seem to have been some arrests, of fellow
    travelers. but no good evidence so far.
    LulzSec exposed  Arrests will confirm if its for real or not, G

    We are running NO OPS against Lulzsec,
    we are doing Paradigm Intel exercises.

    SOME OF MY TWEETS ON LULZSEC:

    Paradigm Intel:Lulzsec ability to hide,plain sight,points to a Gov white hat,Inside knowledge,NSA methods,techniques, opsec  

    Why can't NSA, CIA, FBI dox lulzsec? They Jelly. He is one of them, ROGUE, G


    Who is Lulzsec,Paradigm Intel points to Gov Hacker,has been wrote up for exceeding authority,mission creep,but very successful,labeled rebel


    Who is Lulzsec,Paradigm Intel points to Gov Hacker,has been wrote up for exceeding authority,mission creep,but very successful,labeled rebel


    Black,White hat war building to Pinnacle? Lulzsec called up irregular reserves? attacks across the board, Whats CIA,NSA FBI doing? G


    White hat vs Black hat War, Blacks have the momentum and prizes, New boss on the WWW? Lulzsec mocking NSA,FBI,CIA, awaiting response, G


     distraction:getting to close to Lulzsec, calling for security Riot, Turns investigation efforts to defense efforts, Interesting, G


    LulzSec so far has been fairly benign, they haven't declared war, or attacked Utilities, but they provide a proof of concept demonstration LulzSec Paradigm. 

    Lulzsec has perfected "Cat herding" With a phone number. Using kids as a Phone dos resource. G New cyber weapons/paradigms.


    Civilian Irregulars in Battle now, Lulzsec vs th3j35t3r, US Mil, CIA, NSA weighing in.G


    Internet Anthropologist Think Tank:  OpESR 



    IF YOUR NOT READING OUR TWEETS
    YOUR ONLY GETING HALF THE INTEL.
    https://twitter.com/#!/Geraldanthro




    Gerald
    War Anthropologist

    Previous posts: