Internet Anthropologist Think Tank

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Sunday, November 01, 2009

    Take out Kiddie porn.


    Take out Kiddie porn.


    Our Bot surveillance units, BSU's picked up an member of
    al Qaeda, and was tracking him over the Internet.

    He visited a porno site, and was viewing a kiddy porn
    video. We check the videos for steganography, encrypted files, hidden messages and malware. It said she was a adult etc, but there are certain
    anthropological bone ratios that can help in identifying a persons age.
    And the girl in this video to my judgment was a minor.

    We checked the site, it doesn't normally carry kiddie
    porn, was a corporation, and had venture fund involved
    even. That means they probably are not handing out malware.
    And have a system of checks and balances.

    But the site had no button to report the video.

    So we checked where to report kiddie porn.
    And the site with the most links to it is:
    "Missing Kids" a great site.

    And the link to report kiddie porno links
    asked for 3 pages of info about ME,
    the one reporting the porn site.

    I don't want to get into this beyond reporting
    the illegal video.

    They don't need my info to investigate the
    site or the vid or the perps.

    I was looking for a site where I could just
    paste a URL, simple, they can take care of it
    take it down or investigate them.
    Clean up the WWW.

    While I think kiddie pornographers should
    be prosecuted and I would rather just not have
    kiddie porn on MY WWW.

    Further recon found an porn industry
    site that will police and get kiddie porn taken
    down.

    The Porn is a multiple Billion dollar
    Industry, and the legal ones would like
    to keep kiddie porn off the net also for self preservation.

    And if they are making that much money
    that means alot of people go to porn sites.
    And I think many of them will report kiddie
    porn if it was safe and they see it.

    So I set up a private, secure way to report
    kiddie porn without getting your name or
    data associated with reporting it.


    Here is a link with the Proxy already built in
    HERE: ASACP, While reporting there probably
    won't get any arrests they will get the link down
    quickly, in the interest of Industry profits.
    And their form is shorter to fill out.

    But the longer form at "Missing Kids"
    may result in more arrests.

    Here is a safe anonymous link for them.
    Your choice.

    We can help get rid of kiddie porn on the net.
    REPORT IT.


    Gerald
    Anthropologist


    .

    Reblog this post [with Zemanta]

    Labels: , , ,

    Terrorist Names SEARCH:
    Loading

    Monday, November 24, 2008

    Malware at the Department of Defense


    Malware at the Department of Defense

    At the Pentagon, meanwhile, it is not clear how a virus got into the Department of Defense's (DoD) systems, even though its computer network is probed by outsiders millions of times daily, DoD spokesperson Lt. Col. Eric Butterbaugh said in an e-mail to InternetNews.com.

    "We are aware of a global virus for which there are recent public alerts," Butterbaugh said. "We have seen some of this on our networks, and are taking steps to identify and mitigate the virus." He declined to discuss the problem in detail, which has resulted in the Pentagon banning the use of removable media. He also declined to comment on specific defensive measures the DoD has in place or plans to take in response to the virus.......


    The Pentagon, meanwhile, has been forced to ban the use of removable media such as USB flash drives after its networks were hit by an unspecified virus.....

    Of course, malware is a persistent threat even for the most heavily protected networks -- one package, the Sinowal Trojan, has been around for three years and is particularly difficult to detect and defend against.

    This article was first published on InternetNews.com. To read the full article, click here.


    xxxxxxxxxxxxxxxxxxxx

    Paradigm Intel indicates the DOD thinks it got on its system from removable data.

    This assumption may not be correct.

    Internt anti-virus companys themselves are contributing to the problem,

    Some Security suites provide very little protection from Trojans or some vectors

    for infection, the entire Internet Security Industry is in disaray.



    Now one needs sweepers for malware, sweepers for rootkits, black lists for SLQ injection,

    keylogger blocks, Bot trackers, Firewalls, anti-virus, process guards, and another half dozen security programs to even feel secure.


    And still they get through, these are not uberhackers, but random drive by attacks.


    Even the biggest sites are not 100% safe, Google whos security I think is outstanding

    can infect your computer with just a visit, SLQ injection etc.


    As the Internet ages security has gotten worse not better..


    The Paradigm for this Internet security problem has always been lagging.

    The first efforts at making the Internet or WWW was focused on just making it work.

    That concept continues with new products developed today, security for new applications

    is an after thought, USA needs a mahatten type project to find a way to secure computers and

    the Internet. It just isn't getting enough research money.

    And the Bad guys find a way to get paid everyting they find an exploit.

    With the Criminal and Terrorist vectors crossing this is going to be an IMPERATIVE.



    Gerald

    ,Tactical Internet Systems analyst






    Labels: ,

    Terrorist Names SEARCH:
    Loading

    Saturday, August 30, 2008

    My Punjab Account frozen...NOT


    Indian bank with 3850 branches spread throughout the country.

    Phishers, guess I have an international following there too.
    A new source of terrorist funding?

    G

    .
    Reblog this post [with Zemanta]

    Labels: , ,

    Terrorist Names SEARCH:
    Loading

    Wednesday, August 20, 2008

    Rich harvest, malware bots

    Using a botnet to send spamImage via Wikipedia

    Malware Knows No Bounds

    How much information can be collected by a single piece of malware?

    According to a recent GCN.com article, one botnet alone harvested the usernames and passwords of:

    • 8,485 bank accounts
    • 3,233 credit card accounts
    • 151,000 e-mail accounts
    • 58,391 social networking site accounts
    • 4,237 online retailer accounts
    • 416 stock trading accounts
    • 869 payment processor accounts
    • 413 mortgage accounts
    • 422 finance company accounts

    That’s a wealth of information – nearly 500 gigabytes to be exact – and it represents only six months of operations. For more information on this specific botnet, take a look at the full article on the malware responsible for it, the Coreflood Trojan.

    USA on standby for Cyber whipping. G

    CYBERWARS's Pearl Harbour, G



    Reblog this post [with Zemanta]

    Labels: , , , , ,

    Terrorist Names SEARCH:
    Loading

    Monday, June 09, 2008

    Security:hyper endemic Epidemic:


    Malware on legit sites poses most risk to users
    Published: 2008-06-09

    The greatest risk of exposure to malicious code on the Web comes, not from fraudulent sites, but legitimate Web pages that have been compromised to include malicious programs, according to a study published last week by Web security firm ScanSafe.

    
The study, which compared more than 10 billion Web requests from May 2007 and May 2008, found that two-thirds of malicious software, or malware, comes from legitimate sites. While the company saw a 220 percent increase in Web-based malware in a year, software attacks launched from legitimate sites raced ahead, increasing more than 400 percent.

    "The compromise techniques being used now allow hackers to quickly 'colonize' thousands of legitimate sites, from big brand name sites like Wal-Mart, to smaller but equally legitimate sites," Mary Landesman, senior security researcher at ScanSafe, said in a statement.

    The study is the latest report to find that hackers have moved toward using legitimate sites as a point from which to infect unsuspecting Web visitors. A number of attacks on vulnerabilities Web-site databases and administration tools has allowed attackers to litter legitimate sites with malicious code. In January, Web security firm Websense announced that, for the first time, compromised legitimate sites accounted for 51 percent of all online points of infection.

    Browser makers have responded to the danger by incorporating anti-malware features into their software.

    The ScanSafe study also found that backdoor and password-stealing software had jumped more than 850 percent in the last year.

    If you have tips or insights on this topic, please contact SecurityFocus.

    http://www.securityfocus.com/brief/751?ref=rss


    http://snipurl.com/2es56

    XXXXXXXXXXXXXXXXXXXX

    My response:

    Your article:
    "Malware on legit sites poses most risk to users"

    HI I'm an anthropologist and run an anti-terrorist blog and 100 cyber troopers.

    In my research I have been calling this hyper endemic Epidemic:


    I have been warning about this Security Epidemic.
    There is only ONE security Vendor/program addressing it.
    Private Sector Foot-Dragging has allowed millions and millions of infections.

    SLQ injection epidemic, coupled with Exploiting Flash Zero Day Vulnerability and fast flus hosting.
    SLQ gives hackers access to your PC on infected "trusted" sites, trusted sites have lowered security
    levels. This is the most advanced successful sophisticated massive attack I have ever seen.

    This is a new NEW VECTOR EXPLOIT.( bots for everyone? )
    coming from a trusted site, " it " can walk thru all current security programs and Vista isn't even a constraint, nor are MACs. Coming from a trusted site there are many vectors to infect your PC/MAC. I HAVE SEEN EVIDENCE OF ROOTKITS ALSO.

    I hope my note results in a effective response by the private sector vendors.

    Our tracking capabilities indicate the Military are at risk also.

    http://warintel.blogspot.com/2008/06/we-told-you-so.html
    Please see both warnings posted on my page #1 and 2.

    Gerald
    Internet Anthropologist
    ad Magnum

    xxxxxxxxxxxxxxxxxxxx

    Our cyber recon teams have been protected since March.
    HAUTE SECURE

    G
    Zemanta Pixie

    Labels: , , , , , , ,

    Terrorist Names SEARCH:
    Loading

    Monday, January 07, 2008

    China LEAD toys and malware.


    Digital Hitchhikers Part Three
    Published: 2008-01-07,
    Last Updated: 2008-01-07 03:43:21 UTC
    by Marcus Sachs (Version: 1)

    Back on Christmas Day we published a diary about digital picture frames being purchased with malware installed on the built-in memory. Last Friday we did a follow-up diary after two more readers wrote to tell us that they also purchased malware-infected photo frames. In the second diary we asked readers to check any recently purchased devices that connect to a user's computer via a USB cable and appear to the operating system as a mounted drive. In years past this would have been limited to iPods and USB memory sticks but now it includes digital photo frames, GPS devices, external hard drives, and of course digital cameras.

    Several readers wrote back with their findings and here's what they told us.

    An reader who asked to remain anonymous said:

    I got bought a set of MP3 playing sunglasses for Christmas that came with an extra gift, infection, AVG called it PSW.OnlineGames. It was a hidden .scr file with a hidden Autorun.inf file .. Can't remember the name of the file or who sold it off-hand though since I'm not near my Inbox..

    I got in contact with the company that sold the device and they responded and investigated very quickly.. Seems something went wrong in China during Quality Control checks..MALWARE...
    SOURCE:


    China give and gives.
    More on chinas asymmetrical warfare.

    Gerald

    Labels: , , ,

    Terrorist Names SEARCH:
    Loading

    Sunday, October 28, 2007

    Malware Embedded Magazines

    A Portfolio of Malware Embedded Magazines

    This is perhaps my most important discovery of malware embedded sites farm in a while, at least in respect to the potential impact it is currently having on the unprotected visitors browsing the sites of Possibility Media's portfolio of online magazines, which are pretty weird content by themselves. Possibility Media's (now owned by GM Media Worldwide Inc.) 24 online publications are currently serving embedded malware in the form of IFRAMEs on each and every domain, a logical development given they're all hosted on a single server (216.251.43.11). The affected domains include the

    businesscomputingmagazine.com - Business Computing Magazine
    communicationsworldmag.com - Communications World Magazine
    spweekly.com - Service Provider Weekly
    webweekmag.com - Web Week Magazine
    pcnewsweeklymag.com - PC News Weekly
    itweekmagazine.com - IT Week Magazine
    communicationsweekmag.com - Communication Week Magazine
    ipworldmag.com - IP World Magazine
    networkweekmag.com - Network Week Magazine
    thebestpcmag.com - The Best PC
    technologyweekmag.com - Technology Week Magazine
    theinternetstandardmag.com - The Internet Standard
    securitystandardmag.com - Security Standard
    theitstandard.com - The IT Standard
    hostingweekmag.com - Hosting Week
    enterpriseweekmag.com - Enterprise Week
    computernewsmagazine.com - Computer News
    theinternetstandardmag.com - The Internet Standard
    ceweekmag.com - CE Week Magazine
    ebusinessmag.com - Ebusiness Magazine
    healthcareitmagazine.com - Health Care IT Magazine
    serviceprovidermagazine.com - Service Provider Magazine

    SOURCE Danchev

    Labels: , ,