Internet Anthropologist Think Tank

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Tuesday, November 04, 2008

    New National Bank opening. no paper trail.



    This new National bank doesn't create a paper trail,
    NO reciepts,
    NO record of deposits

    ATM gives out no paper work.

    The new system is bsased on trust and honesty.

    You will have no way to prove you made deposits
    or withdrawls, you just TRUST the Bank.

    All disputes settled at the Banks decression.

    WHY DO YOU SETTLE FOR THIS TYPE OF SET UP IN VOTING MACHINES?
    ISN'T YOUR VOTE AS VALUABLE AS YOUR MONEY?

    In this era of hacking this method of voting is a huge target for hackers,
    manipulation.

    And it was designed by Dibold ( Diebold? ) the Banking machine manufacturer.

    Curious as to why they didn't build in a paper trail like they do for all their
    ATMs.

    Registration fraud is small potatoes compared to the risk involved
    in this voting method.

    At some point we will discover huge voter fraud from hacking.

    The system is rampant with holes and backdoors, the potential
    for fraud exceeds the sub-prime debacle.

    A key fundamental right is ar risk in America.


    Gerald

    .
    Reblog this post [with Zemanta]

    Labels: , , , , ,

    Terrorist Names SEARCH:
    Loading

    Wednesday, June 25, 2008

    al Qaeda hacking members



    Klickety ...CLICK...


    One of our cyber squads was on Recon on terrorist site.

    ( Cyber squad, at least 3 troops, leader and assigned specialists as per mission, cloaked and secure, linked by encrypted IM, and one member has a cyber side arm. Activation of side arm, alerts internal affairs, and a cyber heavy weapons squad, link on to encrypted IM and alerts me. I state we have a right to self defense if attacked. ( Demographic note: avg age of troopers is 40 )

    One of our squads found an al quada Media posting, with an upload, their security systems alerted them to an infected file, al Qaeda wanted members to download, which gave have a Q root access to everyone that downloaded the file.
    Recently analyzed Ebook entitled "The Al-Qaeda network's timely entrance in Palestine" distributed by the Global Islamic Media Front -

    They are looking at everything, credit card, info, bank passwords, blackmail material, emails, etc.

    al Qaeda meeds money and who is going to complain about al Qaeda extortion?
    Who would you file charges with?

    al Qaeda not only kills Muslims in real live but virtually also.
    al Qaeda is looking to kill on the web, Muslim ID theft, blackmail, maybe not actual death,
    but WORSE....to loose all ones money to al Qaeda....who you going to tell?

    I forwarded the download location of the file to Dan. His post.

    al Qaeda has posted this malware to three public sites.

    All info available to FEDS.
    InternetAnthropologistTT at gmail.com

    Gerald
    Director

    This team will receive commendations:

    You maybe seeing more in Public on our Operations, like this one, in the Future,
    depending on our Funding Paradigm. Slowly going broke
    .

    Zemanta Pixie

    Labels: , , , , ,

    Terrorist Names SEARCH:
    Loading

    Monday, June 23, 2008

    Sex, vampires, hacking, hacker on hacker violence

    Vampires, Chinese hackers, Treachery and Smoking Hacker Babe…Let’s face it, this post has it all!

    Published by Heike at 11:32 am

    New Chinese hacker program making the rounds called Chinese Vampire v2.2.1 (starving anti-virus) billed as a trojan downloader tool, ARP attack, QQ tail…etc. The screenshot below shows the downloader interface:

    From what I have read about the tool, it is very effective. So effective in fact, that another Chinese hacker calling himself Sadness, from the Black Wolf hacker group, stole it. Yes, he did. Look at the trackback URLs associated with this screenshot compared to the one above (circled in red). Notice that our thief has changed it to the Black Wolf website instead of the www.( NOT FROM ME, G) address.

    The true author of Vampire v2.2.1 runs the website pictured below and calls himself SKSgod…sigh. He was really unhappy with the theft of his property and posted a pretty nasty response to Sadness. Yeah, hacker on hacker violence doesn’t concern me in the least.

    Now the truly exciting part of this post, there is also a female hacker involved in the marketing of this fine product named Jiajia (佳佳). Hmmm, you say…that name sounds familiar? Well it should! It is the same name as one of the members of the Six Golden Flowers.

    Jiajia of the Six Golden Flowers

    Is the same Jiajia? I don’t think it is but not sure. On her blog, this Jiajia claims that due to the controversy over the stolen program, there are only two legitimate sites to download Vampire v2.2.1. One is her site and the other at SKSgod’s. Yes, there was a picture associated with Jiajia’s website:

    Now this girl certainly doesn’t look like Jiajia number one and she appears to be a bit younger. Also, the characters next to the picture said “Sleepless Night.” Hell, this could be the picture off an album cover (and yes I did try to see if I could find a record called Sleepless Night) for all I know. She may just be the Brittany Spears of China. Thought I would include it anyway…sue me.


    SOURCE:

    XXXXXXXXXXXXXXXXXXXXX



    OUR BARB SAYS IT CAN BE DANGEROUS TO EVEN VISIT THESE HACKER PAGES,

    ESPECIALLY IF THEY ARE FEUDING.


    Photos here: http://www.thedarkvisitor.com/2008/06/vampires-chinese-hackers-treachery-and-smoking-hacker-babelets-face-it-this-post-has-it-all/#comments

    G 09.30.09

    Zemanta Pixie

    Labels: , , , , , , ,

    Terrorist Names SEARCH:
    Loading

    Tuesday, December 18, 2007

    Cyber Jihadist Hacking Teams

    Dancho Danchev's Blog - Mind Streams of Information Security Knowledge


    These groups and fractions of religiously brainwashed IT enthusiasts utilizing outdated ping and HTTP GET flooding attack tools, represent today's greatly overhyped threat possed by the cyber jihadists whose cheap PSYOPS dominate, given the lack of strategical thinking, and the lack of sustainable communication channels between them, ruined all of their Electronic Jihad campaigns so far. Religious fundamentalism by itself evolves into religious fanaticism, and with the indoviduals in a desperate psychological need for a belonging to a cause, ends up in one of the oldest and easiest methods for recruitment - the one based on religious beliefs.....

    The teams, and the lone gunmen cyber jihadists in this post are : Osama Bin Laden's Hacking Crew, Ansar AL-Jihad Hackers Team, HaCKErS aLAnSaR, The Designer - Islamic HaCKEr and Alansar Fantom. None of these are known to have any kind of direct relationships with terrorist groups, therefore they should be considered as terrorist sympathizers......

    ( I understand Dan's classification, and agree they have no known connections to known terrorist groups, but our classification is different, the expression of terrorist objectives and diligent working towards those ends with attempted attacks, qualifies some of them as terrorists, the rest, everybody watch. We have over stated the case in previous posts and need to clean it up. G)


    The bottom line, script kiddies cyber jihadists dominate, PSYOPS fill the gaps where there's zero technical know-how, mentors are slowly emerging and providing interactive tutorials to reach a wider audience, localization of knowledge from English2Arabic is taking place the way propaganda is also localized from Arabic2English, and there's also an ongoing networking going on between cyber jihadists and Turkish hacktivists converting into such on a religious level. Case in point - MuslimWarriors.Org defacement campaigns with "anti-infidel" related messages.
    SOURCE:
    xxxxxxxxxxxxxxxxxx

    At this time the E-jahiddies are a nuance, cute. If someone could have spotted Bin Laden
    as a boy and influenced him who knows; he might not be killing Muslims, women and children, bombing Mosques and Market places.

    The gold fish could benefit from some influence.
    The sharks are open game.
    The Internet is an area of high risk and high reward for the terrorist.
    This is an area of grave concern.
    Old Chinese curse:
    "May interesting things happen in your life"
    they will, they will....


    Gerald


    .

    Labels: , , , ,

    Terrorist Names SEARCH:
    Loading

    Saturday, April 28, 2007

    EVIDENCE "SILVER JIHAD" HACK

    and here:porno وAnd this cached page: One of our bots found it.

    translated:
    Some porno connection I think:

    http://tinyurl.com/2xftvv

    Je t'aime1 watch participants ask more clarification because I'm not understand how to attack and the results obtained etc. how the attack was that the member / struggling program downloads from the site. For the site to be destroyed, it appears in bare automatically and it will be signed by the Department. As for the results of this attack, the Administration put the results in this place, so members know. I hope that I have raised you say you and the Islam and God's mercy and blessings _______________________________________— proved you do not read and deport....
    ........
    Enter the conversation will only in times of attack-formal important observations-1-please members not write quickly and only when necessary 2-conversation divided into rooms can accommodate every one of 20 members so as not to burden Members of pregnancy when 3-not each member to enter the conversation that number does not reflect inside never the number of attackers, at least we attack the attackers as a statistical program through the site 150 assailant, but the conversation did not exceed 50. Note : If not catch a joint list in conjunction jihad oath page ready to attack : 1 - Download main program used in the attack, and the operation to make sure it works well. Important Note : If this program that the virus do not worry, Qum and supports Balsmahazeh attack Islam and Muslims.....
    MORE:


    http://tinyurl.com/25s8fz

    el_fatak@hotmail.com
    AND:

    Magda forums> public forums> Public Forum> now join jihad mail :
    PDAPDA

    مشاهدة نسخة كاملة : الآن : الالتحاق بالجهاد الإلكترونيWatch the complete copy now : enrollment Jihad mail : اشرف.Ashraf.
    12 -08 -2006, 01:47 PM12-08-2006, 1:47 PM بسم الله الرحمن الرحيمThe name of God the Merciful مجموعة الجهاد الإلكترونيJihad Group
    http://www.3awda.com/vb/serv_pal/na...r/navbar_04.gif

    MORE:


    http://tinyurl.com/34jxpp

    This maybe an entirely different "el_fatak@hotmail.com", but:

    A complete copy of the program : how do much to modify the same file exe designed Alvijoal Bezeq-Please answer برمجة - شبكات - كمبيوتر - منتديات الفريق العربي للبرمجة > منتديات لغات البرمجة العام > منتدى مبرمجي لغة Microsoft Visual BasicProgrammable computer networks - - - forums Arab Team for programming> forums programming languages General> Forum Programmers Microsoft Visual Basic language الفتاكDeadly
    Apr 24 2002, 12:13 AMAt times very 24 2002, 12:13 AM السلام عليكم ورحمة الله وبركاتهPeace be upon you and God's mercy and blessings إخواني العنون مختصر لذا صعب فهمهFellow above heading brief therefore difficult to understand كيف أقوم بعديل كود ملف exe حسب رغبتي بحيث أن الملف مصمم بلغه الفيجوال نفسهاHow do Badel exe file code according to our desire, so that the file is determined the same language Alvijoal وأرغب بتعديل جزء بسيط منه عن طريق برنامج آخرAnd I want to amend a fraction of it through


    MORE:
    http://tinyurl.com/26s2nf

    Tracked, penetrated, Burned

    Gerald

    Labels: , , ,

    Terrorist Names SEARCH:
    Loading

    Thursday, April 26, 2007

    USA's MILITARY's CYBERFORCES STRAPPED

    Paradigm Intel Report:

    USA's cyber forces strapped, running 24 hours a day, and 6 and a half days a week, work only the richest targets, huge backlog of hacking targets go waiting.

    Hacked Server data combed by software awaits reading, backlog.

    Huge farm of Bot nets.

    Sections that download targeted computers with rootkits,
    and cross reference a "c" drives of archarived uploaded hacked c: drives
    ( super computer ).

    Copies of WWW archived twice a day.
    Super computer allows linear travel with in daily archives.

    Manhattan type project huge budget all in BLACK.
    http://tinyurl.com/2b8fx8

    TEAMS crashing servers real time on demand.

    Who is running this?
    ( The Internet was originally developed by DARPA, the Defense Advanced Research Projects Agency.)
    http://wiki.answers.com/Q/Who_invented_the_Internet

    Douglas Maughan, an official with the Department of Homeland Security's Science and Technology Directorate
    http://tinyurl.com/2q6s2c

    Jim Christy,
    THE DEFENSE Cyber Crime Center, or DC3, occupies a low unmarked brick building just off Highway 295, the Baltimore-Washington Parkway.
    http://tinyurl.com/yxyes8

    Michael W. Wynne, Air Force Secretary and
    Gen. T. Michael Moseley, Chief of Staff, announced a plan to form a new Cyber Command to be established by Lt. Gen. Robert J. Elder Jr., head of 8th Air Force. Its purpose: Organize, train, and equip forces for cyber-war.
    http://tinyurl.com/3dfucb

    Marine Brig. Gen. John Davis, who heads a military command located at the National Security Agency. "You should not let them operate uncontested" on the Internet and elsewhere in cyberspace, The command was established to develop ways to attack computer networks.
    Davis and other officials declined to say whether the military has actually attacked any networks, which would require presidential authorization. The techniques are highly classified.
    http://www.toptechnews.com/story.xhtml?story_id=51045

    The CIA:
    https://www.cia.gov/cia/dst/index.html

    And NSA,
    http://www.nsa.gov/research/

    A civilian corporate IT defense Supervisor told me of some amazing work they did on "Jihad Silver" program. But I that is all he will let me tell you for right now.

    update:
    On 4/28/07, xxxxxxx wrote:Private sector Sources have seen an exploit within the Hackers DOS programs allowing an authority to monitor and track the wanabe Jihadist hackers back to their nest right around their proxys.

    While the flaw doesn't allow access to root, it has lead to a collection of VERY interesting IP addresses,

    In the silver dos program the login authentication routine for the program does not properly sanitize entered information or the credentials that are transmitted, opening the MySQL database and PHP scripts to compromise, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
    in turn putting all login data and ongoing user xxxxxxxxxxxxxxxxxx activity that the database stores opening it to the authority. Also the transmission of login data is not properly encoded or encrypted and someone xxxxxxxxxxxxxxxx using the proper packet sniffer captured login packets and stole and recorded the users login data.

    This means that an "authority" has captured this data and they have isolated the true location and have a record of them logging in and engaging in "terrorist activities".

    There is a fake email associated with this el_fatak@hotmail.com, which they are back tracking.

    A privacy vulnerability exists in the applications interaction xxxxxxxxxxxxxxx with the Windows firewall and how it authorizes itself for use. One of the methods is xxxxxxxxxxxx value to the ProxyEnable key in the registry xxxxxxxxxxx. If you are using a proxy for any purpose but especially for anonymity, the xxxxxxxxxxxxxxxxxxxxxxxxxx of this registry key will temporally disable your proxy and leave your raw IP visible.

    The ones that track back to Internet cafes, the security cams, available on the Internet are used to collect photos of the "terrorist hackers"

    The IP's have been collected and processed. Their is nothing the terrorists can do but wait for the knock.

    After analyzing that program and data someone worked with two pro-Muslim, Christian sites and just recently worked with the Radio Vatican site informing them of impending attacks and who and where the attackers are..

    .They monitor their program and activities then proactively notify and work with target sites to mitigate any potential outages and loss. Eventually they will take down the program distributors and users, PRISON or worse.

    The wanabe jihadist have exposed their entire network, IPs, passwords, Emails, even some photos. Just a matter of time. Nice work fascists hackers.

    They know about the exploit which is why membership is currently almost dead, and they go begging.

    MORE:
    turning the Snort 2.6.1 DCE/RPC flaw into a working exploit.
    http://www.securityfocus.com/bid/22616


    more Breaking.

    Gerald

    Labels: , , , , , , ,