Internet Anthropologist Think Tank

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Wednesday, November 05, 2008

    Obama's capaign computers hit by Rootkit/keylogger

    Photo by Gerald CR 2008

    EXCLUSIVE:
    Obama's capaign computers hit by Rootkit/keylogger:
    By Gerald; Internet Anthropologist Think Tank
    Oct 6 08
    This summer the FBI and Secret Service notified Obama's IT team
    it had been hacked. To be fair, they had more offices than any 
    other campaign ever, and security in that situation is a nightmare.
    ( SORRY GOOGLE's FORMATTING SCREWING UP )
    So his position papers as of mid summer are known to a foreign entity.
    There is a high probalibity the rootkit remains on the campaings PC's.
    Dispite their best efforts.

    And also a high probility some of their personal notebooks were and are also comprimised,
    and his staff will be moving inot the Whitehouse with infected notebooks and still infected PC's.

    They the intruders made it to ROOT,  it is almost impossible to guarantee those PC's are clean.

    And tracing the vector for infection is going to be very difficult, it could have been form an infected email
    or manually by a voulnteer, or even a direct assult on thier firewalls.

    Obamas policy and position papers will change as he is exposed to "Top Secret" data from the US Government
    Intelligence agencys. So the loss is not great, YET.

    NO COMPUTER HOOKED INTO HIS campaign SHOULD BE ALLOWED IN THE WHITEHOUSE, NOR SHOULD ANY OF HIS STAFF KEEP AND USE THOSE COMPUTERS.

    THOSE COMPUTER COULD HAVE ACTIVE ROOTKITS STILL INVISIBLE TO IT TECHS.

    The Whitehouse informed Obama's campaign chief David Plouffe, that it was a "foreign entity".
    ( CHINA )
    Paradigm Intel indicates the FBI, SS and the Whitehouse know it was the Chinese.

    I can't wait for the Air Force Cybers to get real cyber sidearms.

    Gerald
    Tactical Internet Systems analyst 

    .






     

    Labels: , , , ,

    Terrorist Names SEARCH:
    Loading

    Wednesday, October 22, 2008

    Observation: Process.


    ( sorry Google formating screwing up )

    Observation: Process.
    By Gerald: Internet Anthropologist Think Tank
    Oct 22, 08

    The world should not miss the commitment USA has to
    democracy/capitalism.

    USA has been pursuing a process known as Globalization.

    Which is lowering the standards of living in the USA and raising
    standards of living elsewhere.

    In joining the Global market place, USA has to compete on wages
    and prices.
    American workers have to compete with workers in China,
    Walmart is the paradigm.
    And the average American runs the Paradigm.

    Americans want cheap prices without consideration for who
    produces the goods.
    USA is lowering its standards of living and shifting wealth over
    seas.
    $40 billion in profits in China alone.
    My father was not competing with world labor, but enjoyed the
    highest blue colar wages in the world.
    BG, Before Globalization.

    Some criminals have gotten into the American economic
    system, thru 'sub-prime' paper,
    The scam is so large it threatens world markets, add to that the
    new record prices of recent oil, and the oil price increases alone
    will bring on a world recession. Now add oil prices to the Sub
    prime debacal and that is the makings of a big world recession.

    Note USA has not stolen the oil from Kuwiat, or Iraq, both still
    sell their oil thru OPEC, or prgged to OPEC prices. OPEC has
    shot its self in the foot, the OPEC nations will be hurt in this
    world depression.
    As prices and demand fall.

    Capitalism works best in a democracy.
    And global capitalism is self correcting, preserves peace and
    raises standards of living.

    My love afair with Global capitalism stems from a profit motive
    for social concepts. It will defeat the Russian mafia and
    American Lobbyist.

    I'm not taking about American capitalism, or Russian capitalism
    both are quite different, but draw from the same ecoomic
    system. Russian capitalism is rooted in a Mafia style capitalism.
    While USA is rooted in a lobbyist style system.

    There are problems in both systems.
    But the underlying model for both is capitalism.

    G. Capitalism doesn't want poor people, the poor don't buy
    many goods.
    G. Capitalism doesn't like war, it kills customers and workers.

    War between China and USA would ruin the Walmart paradigm,
    walmart doesn't want war.

    War destroys assets,

    Globalization looks at the worlds work force as the work force for
    G. capitalism, the worlds population as buyers, customers.

    It doesn't help sales figures when you kill your customers.

    That is the view of pure G. capitalism, with out an political over
    lay. Politics corrupts capitalism. Both in America and in Russia and
    in China.

    The Lobbyists in America have corupted the political system.
    The criminal element, Putin's Mifia has corrupted the political
    system in Russia and both political systems corrupted capitalism
    in both countries.

    Globalism is force of wealth re-distrabution based on value and
    the citizens choices.

    In the USA people chose to pay $4.00 for a gallon of gas,
    and $8.00 for a gallon for pepsi or coke or water..
    ( $1.00 per liter )

    The new criminal element in the USA has changed the customer
    paradigm from "the customer is always right
    ( we love the customer )
    to how hard can the customer be screwed, legally.
    ( usuary interest rates )
    Customers now are grist for the mill grind them up.
    Lobbyist have enabled this new criminal paradigm,
    changing the laws to redefine crime as legal.
    By legally bribing congressmen and women.
    To re-write bankruptcy laws so the criminal Credit card corps
    ( charging Interest rates that used to send the Mafia to prison, )
    can persue its usary victims to the Grave, attach wages for life.

    The power to make change lies with the workers and
    customers ( citizens ). Stop electing WHORES, force
    prosecutions of the Usuary Corp. criminals,
    Lobbyists and Congressmen.

    But the basic capitalism system ( un-corrupted ) wants
    fair pay for workers, ( customers )
    and happy customers,( workers ) higher production, more profits.

    Poor, unhealthy, uneducated people make for bad customers
    and workers. The old system tended to seperate customers and
    workers by national borders. Cheap labor in China, and wealthy
    customers in USA.

    Globalization tends to view the world as customer and worker.
    Wage Arbitrage still occurs, but its very nature is to balance the
    system. To equalize what ever is being arbitraged.

    USA is leading the world into Globalization even at its own
    detriment.

    Except for the American Indians USA has always given the
    defeated countrys back to their people with a democratic
    Government, and trusted its people.
    Japan, Germany, Iraq, Afghanstan. USA didn't make any of
    them the 51st state and steal all their natural resources,

    The world needs to reconize the sacrifices USA makes.

    The commitment to destroy those who kill civilians, women
    children bomb Mosques and market places.
    Even to the extent it threatens its own economy.

    USA screws up some, but it is not intentional.

    USA carpet bombed Germany and Japan during WWII, and has
    spent considerable resources to cut civilian deaths since..

    The world owes USA a debt for its leadership, even with the
    Lobbyest screwing things up.

    USA has always stepped up to fight EVIL/SATAN
    Hitler, Bin Laden etc.
    Not perfect but always there for support/fight.

    USA has been good for civilization, humanity,

    They are always trying even though they make mistakes.
    They have not given up.

    al Qaeda, Taliban, criminals in the sub-prime, and credit card
    debacal will not win.

    Eventually the world will be at realitive peace again and
    evil/satan will lose and its thanks to USA.



    Gerald




    Reblog this post [with Zemanta]

    Labels: , , ,

    Terrorist Names SEARCH:
    Loading

    Monday, August 11, 2008

    ETIM run from USA

    and


    Bot surveillance unit strikes again.....

    Internet Anthropologist Cyber Battalion is pleased to announce another victory in the ongoing cyber war. I am extremely proud of our troops valiant and exemplary performance exhibited throughout this exercise. Our PUBLIC company.

    East Turkestan Islamic Movement webmaster/strategist is run from the USA

    And I commend their efforts and continued tenacious dedication toward our mission; The pursuit of online terrorist targets.

    Today our Cyber troops have once again executed a successful strike on target.

    Remember al-jinan.org threat for a cyber attack on the USA ?
    We were there. We commenced exposing them on Infovald's forum.
    At TOI (time of incident) Bill directed and supervised the critical operation. Exhaustively, conducting a successful penetration of the target via, a broad based multi phased cy-ops initiative. This incorporated the development and dissemination of key Intel against Islam's chief hacker, while tracking and tracing him across the vastness of the Internet with precision.

    Our ethnographic studies were extremely effective in helping to develop the paradigm for taking down the web-site, and disabling and dismantling the group. We continue our cyber surveillance of certain group members in ongoing operations to date.
    In this instance we took the site down 3 days prior to their announced attack, and rendered their program usless and, as well, burned the chief hacker publicly.

    We have to date disclosed approximately 5% of our over-all special ops and the remaining are held classified.

    We have hundreds of active contacts within key IC agencies; FBI, CIA, NSA, DIA, Army, Air Force, Navy, Pentagon, Special Forces, State Department and our entrenched Civilian Corps.
    So Keep the tips coming.

    Today our new Bot Surveillance Units ( BSU's ) have yet claimed another enemy target.
    The web-master and tactician for His proxies and extensive security measures were for naught and have been strategically breeched and foiled.

    Note: This group may be connected with two videos threatening attacks on the Olympic Games in China.
    Two Americans were recently killed in China in an unprovoked act of violence.
    Breaking...more shortly
    standby: for IP and location:

    Islamic Party of Turkistan
    Location Houston, Texas, United States
    IP 70.84.48.66:4145
    IPS homestar.typein.net
    PC language: PC: zh-cn (Chinese/China)

    August 07, 2008

    Second Threat Against Olympics from Islamic Party of Turkistan Released on Youtube

    A group calling itself the Islamic Party of Turkistan has issued a second threat against the Olympic Games in Beijing. Laura Mansfield is working on a translation of the statement.

    What is interesting is that the threat was released on Youtube by a user calling himself mjawazi and the official Youtube Channel for this group, tipawazi

    SOURCE: Jawa

    xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

    China discovers al Qaeda in its backyard

    By Walid Phares

    In a video accusing China's Communist Government of "mistreating Muslims" a Jihadi group threatened to attack the Summer Games in Beijin. A spokesman of the Turkistan Islamic Party accuses China of "forcing Muslims into atheism and destroying Islamic schools. The "Turkistan Islamic Party" is most likely based across the border in Pakistan, where sources affirm it received training from Al Qaeda.

    Weeks ago the organization claimed responsibility for a bombings across the country. The latest video shows graphics of a burning Olympics logo and explosions. This week, attackers killed 16 police and wounded more than a dozen in the Xinjiang city of Kashgar using homemade bombs.

    SOURCE: CounterTerrorism Blog:

    xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

    New spasm of violence in western China as 7 die in wave of bombings
    By Jim Yardley
    Published: August 11, 2008


    BEIJING: The violence in the western Chinese region of Xinjiang rose sharply Sunday morning with the deaths of a security guard and at least six suspects after a daring series of bombings that began with a predawn assault on a police station, the state news media reported.

    The attacks, coinciding with the first weekend of the Beijing Olympics, occurred less than a week after what the Chinese authorities had previously described as China's worst terrorist assault in recent memory, in the Xinjiang city of Kashgar. Last Monday, two Uighur Muslims rammed a truck into a group of paramilitary officers who were doing their morning exercises, then attacked with explosives and knives. Sixteen officers were killed and several more were wounded.

    The violence came as the Chinese authorities have accused the East Turkestan Islamic Movement, or ETIM, of plotting terror attacks against the Olympics. The Chinese government and the United States State Department list the group as a terrorist organization, though some specialists on Xinjiang question its scope and potency. Some human rights groups have accused China of exaggerating the threat to justify its crackdown against Uighurs

    SOURCE:



    Gerald
    Internet Anthropologist
    How I work, Internet Anthropology and the GWOT


    Our Terrorist site search engine over 11,000,000 terror pages Indexed: Here

    Our warning to Lars Viks before the Death threat was made public.


    Zemanta Pixie

    Labels: , , , , , , , , , , ,

    Terrorist Names SEARCH:
    Loading

    Thursday, June 26, 2008

    Chinese word for Surprise....



    By Chuck Goudie(WLS) -- A Chinese spy was caught "red-handed,"
    according to federal authorities, as she was about to board a plane
    at O'Hare bound for Beijing.
    Hanjuan Jin says she worked as a computer engineer for
    Schaumburg-based Motorola, a global leader in communications technology.
    Federal agents say Jin was also working as a spy for a Chinese
    company, and she has been charged in a corporate espionage case that
    reflects a growing national security problem.
    She doesn't look much like the villainess in a James Bond film. But
    the FBI says 37-year-old Hanjuan Jin played the spy role in real life.
    Jin, a Chinese-born American citizen and graduate of the Illinois
    Institute of Technology, had been working at Motorola headquarters in
    Schaumburg since 1998. She was a software engineer, living in a
    comfortable townhouse not far from her job.
    Two years ago, according to a federal indictment handed up in April,
    Jin went on medical leave from Motorola.
    Despite claiming to be deathly ill, investigators say, she traveled
    from Chicago to Beijing where she agreed to work for a Chinese tech
    company that allegedly recruited her to steal Motorola secrets.
    "The federal government is saying basically that you're a corporate
    spy. What about that?" the I-Team's Chuck Goudie asked Jin.
    "No, I'm not. I'm not. I'm not," she responded.
    "You're not a spy?" Goudie asked.
    "They made a mistake," Jin said.
    According to the indictment, a Chinese executive told Jin, "You
    should share in the fruit of our collective effort," once she'd
    stolen top-secret Motorola files, schematics and military communication plans.
    When Jin returned to Motorola from medical leave in February of 2007,
    authorities say, she did just that, downloading hundreds of
    confidential documents from the company's supposedly secure internal
    network, including documents related to public safety organizations
    in Africa, the Middle East and Europe.
    Two days later, she arrived at O'Hare Airport with a one-way ticket to Beijing.
    "What were you doing at O'Hare Airport with a one-way ticket to
    China?" Goudie asked.
    "No, I go to visit my mom. My husband and my mom are China," she said.
    Hanjuan Jin was just a few steps away from boarding a United 747
    non-stop to China. It was only a routine check of passengers by
    customs agents that revealed she was carrying $30,000 in cash after
    declaring she had only $10,000.
    "Why were you on a one-way ticket?" Goudie asked.
    "Because I can buy it cheaper to China," Jin said.
    "They say you're a spy," Goudie said.
    "They say that, but it's not true. They make mistake. They're
    paranoid. They wrongly accuse me. I have fatal disease," Jin said.
    "What is the fatal disease?" Goudie asked.
    "I have TB and meningitis," Jin said.
    "You have tuberculosis?" Goudie asked.
    "I almost died," Jin responded.
    During the search of Jin and her bags at O'Hare, federal agents say
    they found a laptop computer and more than 30 compact data storage
    devices containing stolen Motorola files.
    Jin told Goudie the files had been given to her by a supervisor at
    Motorola to refresh her memory from the medical leave.
    "He assigned me too much work. I couldn't do it," Jin said.
    "So you were gonna take and do it in China?" Goudie asked.
    "That's OK," Jin responded before getting into a car.
    On its Web site, Motorola touts the company's internal security but
    declined an invitation from the I-Team to explain how an employee
    just off medical leave could nearly board a plane to Beijing with
    $600 million in corporate secrets. That is Motorola's own estimate
    quoted by the FBI.
    In a brief, generic statement, Motorola cited its "extensive
    policies, procedures and training in place to protect the security
    and confidentiality of the Company's intellectual property."
    Motorola isn't alone. This month, Illinois Senator Dick Durbin asked
    for an investigation of whether senate computers are among dozens of
    government devices hacked into by the Chinese. And national security
    agencies are now warning all Americans attending the Beijing Olympics
    this summer to leave cell phones and laptops at home because, they
    say, there is a 100 percent likelihood that Chinese agents will scan
    and steal the contents.
    The FBI, apparently unimpressed by American corporate security,
    recently increased counterintelligence against Chinese infiltration
    of U.S. companies. FBI director Robert Mueller says he has
    "substantial concerns" that China is using scientists, students and
    "front companies" to steal U.S. military secrets, and that poses a
    threat to our national security.
    In the past year, there have been at least a dozen criminal cases of
    Chinese espionage brought in the U.S.

    http://abclocal.go.com/wls/story?section=news/local&id=6228552

    Zemanta Pixie

    Labels: , ,

    Terrorist Names SEARCH:
    Loading

    Wednesday, June 04, 2008

    Chinese Whaling, Where the CEO is the Whale

    http://www.cdnn.info/news/eco/whaling_japan_250375e.jpg


    Whaling, Where the CEO is the Whale.

    Arguh ther be Whalers huntin fer the CEO's hide and gut$.

    They be using a tax court Email fer the bait and
    Spear him hard n fast, if he takes the bait.

    Chuming with:
    Notice of Deficiency
    Fake VeriSign certificates.

    Spears be:
    certificate for a root CA (certificate authority)

    The active.php page attempts to install an ActiveX control. The ActiveX control comes packaged as a Microsoft CAB file. The CAB file is signed with a certificate fraudulently using the name Adobe Systems Incorporated, issued by the CA represented by the bogus VeriSign certificate.

    Rhifrem Trojan, also known as Fireming,

    klog: keylogger data



    Who be these Whaling pirates?
    221.195.42.67, a virtual hosting server in IP address space administered by China Network Communications Group in Beijing. DNS for the domain was provided by "4everdns" nameservers in Beijing and Shanghai.

    If you be lampooned be contacting yer legal Maties not GreenPeace.

    We be Shanghai-ing info from here.

    Captian Gerald
    With eye patch in place.

    Rumint China
    .



    Zemanta Pixie

    Labels: , , , , , , , , , ,

    Terrorist Names SEARCH:
    Loading

    Thursday, May 29, 2008

    RUMINT, China


    This just in: Authorities in three West European countries have arrested ten individuals whom they believe to have links to Islamic Extremist factions in Uzbekistan. It is reported that those arrested were obtaining funding for a militant group within Uzbekistan that allegedly has ties with al-Qaida.

    Yuldeshev and his Uzbeks are going to be trouble, many are Russian Army trained, very disciplined and they play rough. Rumors are that the Chinese are terrified of them regarding the Olympics, talk of a dirty bomb there. The Uzbeks would do it and they have all the access they need with the Tibetans

    SOURCED Co C.

    xxxxxxxxxxxxxxxxxx

    Excerpts:
    China's Cyber Militia

    by Shane Harris

    One prominent expert told National Journal he believes that China's People's Liberation Army played a role in the power outages. Tim Bennett, the former president of the Cyber Security Industry Alliance, a leading trade group, said that U.S. intelligence officials have told him that the PLA in 2003 gained access to a network that controlled electric power systems serving the northeastern United States. The intelligence officials said that forensic analysis had confirmed the source, Bennett said. "They said that, with confidence, it had been traced back to the PLA." These officials believe that the intrusion may have precipitated the largest blackout in North American history, which occurred in August of that year. A 9,300-square-mile area, touching Michigan, Ohio, New York, and parts of Canada, lost power; an estimated 50 million people were affected.....There has never been an official U.S. government assertion of Chinese involvement in the outage, but intelligence and other government officials contacted for this story did not explicitly rule out a Chinese role. One security analyst in the private sector with close ties to the intelligence community said that some senior intelligence officials believe that China played a role in the 2003 blackout that is still not fully understood.
    ..............

    The Central Intelligence Agency's chief cyber-security officer, Tom Donahue, said that hackers had breached the computer systems of utility companies outside the United States and that they had even demanded ransom. Donahue spoke at a January gathering in New Orleans of security executives from government agencies and some of the nation's largest utility and energy companies. He said he suspected that some of the hackers had inside knowledge of the utility systems and that in at least one case, an intrusion caused a power outage that affected multiple cities. The CIA didn't know who launched the attacks or why, Donahue said, "but all involved intrusions through the Internet."

    ......................
    "Cyber-networks are the new frontier of counterintelligence," Brenner emphasized. "If you can steal information or disrupt an organization by attacking its networks remotely, why go to the trouble of running a spy?"

    Stephen Spoonamore, CEO of Cybrinth, a cyber-security firm that works for government and corporate clients, said that Chinese hackers attempt to map the IT networks of his clients on a daily basis. He said that executives from three Fortune 500 companies, all clients, had document-stealing code planted in their computers while traveling in China, the same fate that befell Gutierrez.


    .................

    Private Sector Foot-Dragging

    There is little indication that cyber-intrusions, however menacing, have severely impaired government operations for very long. So why are so many officials increasingly sounding the alarm about network attacks, Chinese hacking and espionage, and the advent of cyberwar?

    Part of the answer lies in officials’ most recent appraisals of the cyber-threat. They cite evidence that attacks are increasing in volume and appear engineered more to cause real harm than sporadic inconvenience. Without naming China, Robert Jamison, the top cyber-security official at DHS, told reporters at a March briefing, “We’re concerned that the intrusions are more frequent, and they’re more targeted, and they’re more sophisticated.”

    “In terms of breaches within government systems, it’s something that has happened quite a bit over the last six, seven years,” says Shannon Kellogg, the director of information-security policy for EMC Corp., which owns RSA, a top cyber-security research firm. “But the scale of these types of breaches and attacks seems to have increased substantially.”

    Government officials are more concerned now than in recent years about the private sector’s inability, or unwillingness, to stop these pervasive attacks. When Donahue, the CIA cyber-security officer, warned the gathering in New Orleans about foreign hackings of power plants, some saw it as a direct challenge to American companies.


    .......................

    The Air Force is in the process of setting up a Cyberspace Command, headed by a two-star general and comprising about 160 individuals assigned to a handful of bases. As Wired noted in a recent profile, Cyberspace Command "is dedicated to the proposition that the next war will be fought in the electromagnetic spectrum and that computers are military weapons." The Air Force has launched a TV ad campaign to drum up support for the new command, and to call attention to cyberwar. "You used to need an army to wage a war," a narrator in the TV spot declares. "Now all you need is an Internet connection."


    SOURCED: MUCH MORE:

    xxxxxxxxxxxxxxxxx

    Internet Anthropologist cyber team has pointed out that the WWW is currently at risk.

    And emailed DHS's NICC information on a new NEW VECTOR EXPLOIT.
    and have yet to hear back from them, " it " can walk thru all current security programs and Vista isn't even a constraint, nor are MACs.

    Our sources place the number of Chinese hackers in the 11,000 range.

    Paradigm Intel indicates we are in the middle of a massive invisible infection, motive unknown.
    To see the evidence on your PC down load "Haute secure".
    ( we have no connection to this compan.)


    Gerald
    Internet Anthropologist, ad Magnum

    .


    xxxxxxxxxxxx

    Chinese perspective (w/corrections ) American Economy


    China's actions should trigger SEC. Investigation Insider Trading...


    China hackers penetrate Pentagon ...


    China blackmailing USA, China ...



    Beijing will not do Anything against Iran's Interests

    Pearl Harbor of cyber war

    China is presenting some NEW dangerous paradigm threats in asymmetrical warfare.
    ( and don't forget space weapons, and their new supersonic evasive missiles, ie aircraft carriers )

    Labels: , , , ,

    Terrorist Names SEARCH:
    Loading

    Tuesday, May 13, 2008

    China's new secret NUKE base

    NASA composite satellite photoImage via Wikipedia

    Reports of a massive new naval base in southern China have fueled more concerns in the West and Asia about the rapid rise of China's military.

    The underground base can reportedly hold up to 20 submarines, including new nuclear-armed submarines. It is also apparently big enough to hold future aircraft carrier groups if China decides to build them.

    Military analysts say that the base is part of China's long-term plan to beef up its naval and nuclear might. They say the expansion is aimed at deterring Taiwan from making its de facto independence permanent, better protecting China's seaborne energy supplies, and projecting Chinese power far beyond its shores.

    China is also replacing about 20 silo-based intercontinental ballistic missiles (ICBMs) capable of hitting the US with a new strategic force that includes road-mobile nuclear ICBMs and submarine-launched, nuclear-tipped ballistic missiles, which are less vulnerable to attack. Jane's Intelligence Review, the British-based defense periodical, reported that commercially available satellite imagery had confirmed China's construction of the new base near Sanya, on China's southern Hainan Island. Military sources knew about the planned base since 2002.

    China's nuclear and naval build-up at Sanya underlines Beijing's desire to assert tighter control over this region. China's increasing dependence on imported petroleum and mineral resources has contributed to an intensified Chinese concern about defending its access to vital sea lanes, particularly to its south. It is this concern that in large part is driving China's development of power-projection naval forces such as aircraft carriers and long-range nuclear submarines.

    China has pursued this build-up at Sanya with little fanfare, offering no public explanations regarding its plan to base nuclear weapons or advanced naval platforms there.

    China's foreign ministry refused to confirm or deny the report about the base, according to Reuters.

    "China is going down the road of peaceful development. China's national defence policy is defensive. Other countries have no reason to fear, or make a fuss about it and be prickly," [Foreign Ministry spokesman Qin Gang] told a regular news conference.

    Meanwhile, some US experts are calling for a strengthening of alliances in the region to counter the growing military challenge from China, reports Agence France-Presse. Arthur Waldron, of the University of Pennsylvania, said the US should strengthen alliances with Japan, South Korea, Taiwan, the Philippines, and Singapore to contain China's military strength.

    James Lyons, an ex-commander of the US Pacific Fleet, said the US should use the same tactics it used to contain the Soviet Union during the cold war. One of Lyons's suggestions: increase US ties with the Philippines by leasing fighter jets and Navy vessels to the island nation.

    The revelations about the base near Sanya come as the Pentagon is seeking to forge better ties with its military counterparts in China. The Christian Science Monitor reported earlier this year that US-China military relations still lag behind the two countries' diplomatic and economic relations. The Pentagon hopes that better communication can help clarify the intent behind China's rapid military buildup.

    The new base is also raising concerns in India, reports the Asia Times from New Delhi. It said Indian defense experts view China as a long-term military threat, since the two countries have overlapping interests in the Indian Ocean. India recently tested its own Agni III ballistic missile, that will be capable of hitting Beijing and Shanghai.

    Indian Express reports that the new Jin-class submarine deployed at the base carries 12 nuclear-tipped ballistic missiles. It notes that the new base in Hainan is 1,200 nautical miles from the Malacca Strait, through which some of China's energy supplies pass from the Indian Ocean.

    The new base could help provide China with the ability to cut off commercial traffic through the strait in a crisis. It said China's new base could also spur India to accelerate its own nuclear submarine program. Sea trials for the first sub are set for next year.

    The Times of India reports that the extent of the new Chinese base has "jolted the Indian defence establishment." India has nuclear weapons, too, but has yet to develop its own nuclear-armed submarines, a deficiency that "has long troubled defence planners."

    While an adversary can take out missile silos and airbases in pre-emptive strikes, it's difficult to target nuclear submarines which can remain underwater for prolonged periods.

    The sheer importance of the underwater nuclear deterrent can be gauged from the fact that even the US and Russia will ensure that two-thirds of the strategic warheads they eventually retain, under arms reduction agreements, will be in the shape of SLBMs [submarine-launched ballistic missiles].

    Writing in the Federation of American Scientists' Strategic Security Blog, Hans Kristensen strikes a skeptical note. He says that the Chinese have very little experience in operating ballistic missile submarines, so it's not clear yet how strategically significant the new base will be. He suggested that the US could easily monitor Chinese movements from the base, which is near deep water.

    The U.S. navy has several decades of experience in trailing Soviet SSBNs [nuclear-powered submarines armed with ballistic nuclear missiles] in the open oceans; shallow waters are much more challenging. And the South China Sea is a busy area for U.S. attack submarines, which have unconstrained access to the waters off Hainan Island. And I'd be surprised if there were not a U.S. "shadow" following the Jin-class SSBN when it arrived at Hainan Island.

    The Daily Telegraph quoted a leading arms control expert in saying that China was giving its nuclear forces a major overhaul.

    Bates Gill, head of the Stockholm International Peace Research Institute (Sipri), said that [China] was developing more flexible delivery systems, including from submarines, as well as the capacity to use multiple warheads.

    SOURCE:

    "Among the major nuclear powers China stands out in its effort to modernise, expand and improve its nuclear weapons capability," he said in Beijing today.

    "We see some very interesting and quite dramatic changes in the way its nuclear deterrent operates."

    But the Telegraph says China's arsenal is still the smallest of the five big powers – also including US, Russia, Britain, and France – at only 100 to 200 warheads.

    Labels: , , , , , , ,

    Terrorist Names SEARCH:
    Loading

    Tuesday, April 29, 2008

    Who reads Internet Anthropologist

    The lives of 87 fallen CIA officers are represented by 87 stars on the CIA memorial wall in the Original Headquarters building.Image via WikipediaOnly the smartest people.

    156.33.126.# (U.S. Senate Sergeant at Arms)
    ISP U.S. Senate Sergeant at Arms

    143.231.249.# (Information Systems, U.S. House of Representatives)
    ISP Information Systems, U.S. House of Representatives

    134.11.14.# (The Pentagon)
    ISP The Pentagon

    army.mil ? (Military)
    IP Address 192.172.8.# (USAISC-CECOM)
    ISP USAISC-CECOM

    fbi.gov ? (U.S. Government)
    IP Address 204.255.127.# (MAS/FBI-NIPC-17)

    relay7.ucia.gov IP Address 198.81.129.---
    Date 11 Feb, Mon, 16:56:13 Net Speed Corporate/T1
    Organization Central Intelligence Agency

    nsa.gov ? (U.S. Government)
    IP Address 144.51.215.# (National Computer Security Center)
    ISP National Computer Security Center

    navy.mil ? (Military)
    IP Address 199.211.178.# (Bureau of Medicine and Surgery)
    ISP Naval Ocean Systems Center

    dhs.gov ? (U.S. Government)
    IP Address 129.33.119.# (IBM)
    ISP IBM

    centcom.mil ? (Military)
    IP Address 214.13.201.# (Naval Ocean Systems Center)
    ISP Naval Ocean Systems Center

    nato.int ? (Unknown)
    IP Address 208.75.63.# (Supreme Allied Commander, Atlantic (SACLANT))
    ISP Supreme Allied Commander, Atlantic (SACLANT)

    163data.com.cn ? (China)
    IP Address 222.172.---.# (CHINANET Yunnan province network)
    ISP CHINANET Yunnan province network

    usmc.mil ? (Military)
    IP Address 138.162.128.# (Navy Network Information Center (NNIC))
    ISP Navy Network Information Center (NNIC)

    af.mil ? (Military)
    IP Address 137.9.---.# (SSG/SIN)
    ISP SSG/SIN

    treas.gov ? (U.S. Government)
    IP Address 63.167.255.# (Sprint)
    ISP Sprint

    cdc.gov ? (U.S. Government)
    IP Address 158.111.4.# (The United States Centers For Disease Control)
    ISP The United States Centers For Disease Control

    northcom.mil ? (Military)
    IP Address 164.236.233.# (NORAD-USSPACECOM/J6D)
    ISP Naval Ocean Systems Center

    army.mil ? (Military)
    IP Address 192.188.205.# (Headquarters, USAAISC)
    ISP Headquarters, USAAISC

    ncsc.mil ? (Military)
    IP Address 144.51.215.# (National Computer Security Center)
    ISP National Computer Security Center

    disa.mil ? (Military)
    IP Address 164.117.144.# (DISA Information Systems Center)
    ISP DISA Information Systems Center

    socom.mil ? (Military)
    IP Address 209.22.224.# (Naval Ocean Systems Center)
    ISP Naval Ocean Systems Center

    And the State Department.




    The US Government and 3rd world reads Internet Anthropologist.
    Not an easy demographic to target.
    Inside view, up todate, news others don't know or report.
    Paradigm Intel and forecasts.
    Backed by Company C.

    Gerald
    Anthropologist

    al Qaeda Killing Moslems, bombing Mosques market place killing women, children in the name of Allah.

    Internet Anthropologist Think Tank: Kudos while we were down
    .

    Labels: , , , , , , , ,

    Terrorist Names SEARCH:
    Loading

    Monday, January 07, 2008

    China LEAD toys and malware.


    Digital Hitchhikers Part Three
    Published: 2008-01-07,
    Last Updated: 2008-01-07 03:43:21 UTC
    by Marcus Sachs (Version: 1)

    Back on Christmas Day we published a diary about digital picture frames being purchased with malware installed on the built-in memory. Last Friday we did a follow-up diary after two more readers wrote to tell us that they also purchased malware-infected photo frames. In the second diary we asked readers to check any recently purchased devices that connect to a user's computer via a USB cable and appear to the operating system as a mounted drive. In years past this would have been limited to iPods and USB memory sticks but now it includes digital photo frames, GPS devices, external hard drives, and of course digital cameras.

    Several readers wrote back with their findings and here's what they told us.

    An reader who asked to remain anonymous said:

    I got bought a set of MP3 playing sunglasses for Christmas that came with an extra gift, infection, AVG called it PSW.OnlineGames. It was a hidden .scr file with a hidden Autorun.inf file .. Can't remember the name of the file or who sold it off-hand though since I'm not near my Inbox..

    I got in contact with the company that sold the device and they responded and investigated very quickly.. Seems something went wrong in China during Quality Control checks..MALWARE...
    SOURCE:


    China give and gives.
    More on chinas asymmetrical warfare.

    Gerald

    Labels: , , ,

    Terrorist Names SEARCH:
    Loading

    Friday, November 02, 2007

    Chinese military boosts hacking


    Chinese military boosts hacking


    By Bill Gertz
    November 2, 2007




    HONOLULU — Senior military commanders at the U.S. Pacific Command here said China's recent test of an anti-satellite weapon and increased computer-hacking activities prompted increased defenses for U.S. forces in the region and in space.



    "U.S. space capabilities are an asymmetric advantage that we have to maintain," said Air Force Lt. Gen. Daniel Leaf, deputy commander of the U.S. Pacific Command.



    "There has been significant discussion and activity to assess the impact of [the anti-satellite test] and other [Chinese] space developments, and how to protect our extraordinarily important space capability," he said in an interview at the command's headquarters at Camp H.M. Smith.



    Pentagon officials have said Chinese military hackers in recent months carried out computer-based attacks on Pentagon and U.S. military and civilian government computer networks, as well as on foreign government networks.



    Without naming China, Gen. Leaf said the problem of computer attacks is growing.



    "We're very concerned about that — for the information that may be contained on [the networks] or for the activities we conduct that are command and control and situational awareness related."



    Details of recent computer attacks, including those on Pacific Command networks, are classified, Gen. Leaf said. But the issue was raised in meetings with Chinese military officials.



    "We expect actions that are consistent with the professed desire for a peaceful, responsible rise of China as a more significant player on the Pacific and world stage," he said.


    SOURCE:



    To be fair China is the one under the heaviest attack.


    Gerald



    .



    Labels: ,