Internet Anthropologist Think Tank

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Saturday, November 01, 2008

    Coporate protection:



    Coporate protection:
    By Gerald; Internet Anthropologist Think Tank
    Nov.1, 08
    CONTACT
    InternetAnthropologistTT at gmail dot com

    I just read the speech and the author is doing genius work.
    In the areas he spoke about he had clear, out side the box
    action programs and cutting edge paradigms.

    Principal Deputy Director of National Intelligence

    Dr. Donald Kerr.

    In reviewing his speech he made several key points.
    His central theme was counterintelligence.

    He had a remarkable insight into the sub prime debacal.
    "It's harder today in this interconnected world that we're all part of. We like to think we're
    networked without boundaries. I think we've all just seen in the last few weeks that
    globalization really has happened. We only need to watch what's gone on in the financial sector
    to be reminded of that.
    And those who would point back at the United States and say, well, if you hadn't securitized all
    of those sub-prime loans, none of this would have happened around the world. Well, each
    morning we wake up and find out other people bought into the same things, did the same things,
    were driven by the same urge for high returns, and began to disregard the connection between
    value and risk in ways that they shouldn't have.
    Now, do we know how to fix it? That I don't know."

    We do know remove sub-prime deretivates from the money markets. G

    He stated; "Henry Ford once said, "There's nothing new, only the history you don't know." And when you
    focus on computer security and cyber attacks, that's probably a place where Henry Ford is right;
    we don't know the history there yet."

    And he pointed out some of our high risk areas.
    "But in fact our economy has subtly changed over the
    last two decades. And where we were once a manufacturing economy, we're today in fact very
    much a service economy. I'm not sure what the balance is today; there's still a lot of
    manufacturing in the United States, but in fact an awful lot of the value added in our economy
    today is in services and in information that we haven't foreseen before.
    It changes the game when we think about threats because we're not thinking about protecting
    high-value facilities in the same way we were. And in fact, you could argue some companies
    don't have high-value facilities and fixed assets; what they have is intellectual property."

    Unprotected assets:
    Kerr continues: "tell me what counterintelligence
    really means in the 21st century, that what we need to do is think about the changes in our
    economy, how that's reflected in our society and how that in turn leads us to think about how to
    best protect the most vital assets of our country.
    Have we crafted the right strategies to do that? I'd say it's work in progress. What are the most
    dangerous threats that we're going to face in the next three to 10 years? We're still getting a
    picture of that. If you had asked, for example, 12 months ago would we have had a financial
    crisis as we're having today, I don't think any of us in the room – well, maybe there's at least
    one person – would have predicted that, but I certainly wouldn't have."

      Paradigm Intel, and inductive reasoning indicates the possibility of a Global monetary cash flow problem. Currently focused on short term liquidity, it has the momentum to spread.""
    He says;
    "So it's fine to focus on government capabilities, but we also have to focus on those out there in
    our economy perhaps tied to university research programs, tied in some cases to large companies
    that take equity stakes. Or, looking into the audience I can't help but mention our own In-Q-Tel
    within the intelligence community, where we in fact take equity stakes in companies developing
    technical products that can be used for intelligence purposes. We are not writing contracts to get
    them to do a special project for us; we're in fact taking an equity stake to be the first user in the
    marketplace and be two or three years ahead of the competition in taking advantage of that.
    We have a responsibility, however, to help those companies, either the ones that we take an
    equity stake in, or those that are just out there in the U.S. economy protect the most valuable
    resource they have, their ideas and the people who crate them. I think that's going to put a new
    face on counterintelligence over the next few years as we realize that the real value added in the
    U.S. economy is in fact not just within the government sector but in fact within the private sector
    where in fact it's supported significantly more than by government R&D investments."

    He focuses on a key initiative:
    "It's an important problem, and we're going to make a lot of progress protecting .mil and .gov.
    And we just took care of maybe 2 percent of the most important information that's out there.
    The rest of it's out in .com. So how do we think about that? How do we make available what
    we learn trying to protect .gov and .mil, to that broader set of folks who need to protect their
    valuable information as well?"

    Maybe a civilian counterintelligence service, one that can monitor the entire WWW for any interest in 
    the .com. Some one who has demonstrated the ability to track al Qaeda cells and their actions .
    That can take out cyber attacks before they happen , A think Tank that can track and trace Taliban terrorist hackers ,
    That has bot surveillance units , That has an expert OSINT collection capablities, and can operate in the gray areas of the Internet.
    And not violate anti-hacking laws.

    A counterintelligence service that can tell your Corporation who is surveilling, tracking you, what countries and groups
    show an unwelcome interest in your company, A type of world wide recon for your company.G
    We, Internet 
    Anthropologist Think Tank does all this very well. Counterintelligence for your company.

    Kerr points out, "Well, it seems today if a lot of the assets of the company are tied up in intellectual property – if
    you will, intellectual capital"

    Internet Anthropologist Think Tank can provide a "Trip Wire" that covers the world, and gives you an early warning system, advance notice of unwanted interest in your company.

    Gerald
    Internet Anthropologist
    Tactical Internet Systems analyst 

      CONTACT
      InternetAnthropologistTT at gmail dot com


    Labels: , , , ,

    Terrorist Names SEARCH:
    Loading

    Sunday, July 20, 2008

    Loosing the Internet WAR



    Written in Spring of 2004, FOUR YEARS AGO.

    but the war against radical Islamic terrorism continues, and cyberspace is among its most active fronts. The Internet is host to thousands of websites run by terrorist groups and their supporters, with Al Qaeda exerting a dominant influence on their bloodthirsty content. After September 11, as Paul Eedle observed in Jane’s Intelligence Review, Al Qaeda launched an online campaign to win the hearts and minds of the Muslim world—to advance its ideology of total war with the West and discredit those few Muslim leaders who spoke out against terrorist jihad. Today, the jihadis clearly have the advantage in Islamic cyberspace: Radical Islamist websites have proliferated,....

    "Al Qaeda's use of the Internet is amazing," said Rita Katz, director of the Search for International Terrorist Entities Institute, in the New York Post. "We know from ... captured Al Qaeda fighters who say they joined up through the Internet ... that this is one of the principal ways they recruit fighters and suicide bombers."................

    The Editors of The New Atlantis, "Dot-Com Terrorism," The New Atlantis, Number 5, Spring 2004, pp. 91-93.

    http://www.thenewatlantis.com/publications/dot-com-terrorism

    http://snipurl.com/325fk

    XXXXXXXXXXXXXXXXXXXXXX

    So why are there more terrorist sites on the web today than 4 uears ago?
    BECAUSE THE US MILITARY HAS NOT ENGAGED THE ENEMY IN THIS DOMAIN.
    THE US MILITARY DOES NOT RULE THIS DOMAIN BECAUSE THEY FEAR IT, EVEN THOUGH THE TECHNOLOGY, AND MANPOWER IS AVAILABLE TO DOMINATE THE WWW.

    A junior officers should be assigned to every General officer to educate them on an ongoing daily basis.

    FOUR YEARS AND AL QAEDA'S C2 HAS GOTTEN STRONGER WITH EVEN MORE WEBSITES.

    THIS WILL COME TO HAUNT THIS GWOT.

    Gerald
    Internet Anthropologist

    .

    Labels: , ,

    Terrorist Names SEARCH:
    Loading

    Wednesday, April 02, 2008

    AIR FORCE INTERNET PARADIGM ERROR



    BUMPED SEE SECOND SECTION IF YOU HAVE ALREADY READ FIRST.



    FIRST SECTION:
    The Dogs of Web War

    By Rebecca Grant
    After years of claims and counterclaims concerning the severity of national security threats in cyberspace, the picture is at last starting to become clear. Recent jousting within cyberspace has provided clues about what to expect from combat in this new domain.

    EXCERPTed:

    The new Cyber Command will focus dedicated attention to the problem. Elder and others are working to lay the foundation for a cyberspace career path in the Air Force on a par with those for weapons systems and specialties. "We're looking to set up a professional cadre of cyber operators, and this would be enlisted and officer," Elder said.

    Investing now in survivability should help keep down the costs of buying new technology. A prime system is the Combat Information Transport System Block 30. "This is a system that is reducing our exposure to the commercial Internet," said Elder. "It's providing us much greater situational awareness in terms of being able to track the traffic on our networks.

    ( SURVIVABILITY? ? ?...I am aghast. The main mode of handling the cyber threat is "SURVIVABILITY". While this is crucial, its a poor paradigm. The Marines don't have as their main paradigm DEFENSE. THE main paradigm should be offensive. KILL THE ATTACKERS. G. )


    Already, however, Cartwright hinted at a greater freedom of action in the cyberspace commons. "Once you leave our shores, then the military authorities start to be present, and what we do is layer the defenses out as best we can to get the most warning, situation awareness that we can to protect our interests," he said.

    Given the constant probing, investing in survivability is a big priority. The cyber balance of power is "the most dynamic world we've ever seen," said a senior STRATCOM official. Software security fixes may just last for hours.

    ( NOTHING ABOUT OFFENSIVE CAPABILITIES, DESTROYING THE ATTACKERS WEAPON, THEIR server/PC. FOCUS IS NOT DEVELOPED YET. G )

    Investment will fund software tools to track vulnerabilities "before the hackers find them," said Elder, and insulate them with database wrappers that create portals to block incursions. The Air Force is also investing in extensive database encryption—a proven technique. "It's just much more difficult for someone to fool with your system when the data's encrypted," Elder said.
    Yet it may take an increased sense of strategic threat to force clarification of the cyberspace mission.

    Currently, there are classic divides. The intelligence community uses cyberspace in its tradecraft. Yet there is growing demand for operators to be able to exploit the same turf.

    Also yet to be determined is how much traction the Air Force is getting with its commitment to cyberspace.

    ( NOT MUCH TRACTION, GWOT HAS BEEN IN EFFECT FOR 6 YRS AND AIR FORCE DOESN'T EVEN HAVE ACTIVE CYBERWAR, WEB PAGE OR ACTIVE RSS FEEDS FOR THE WWW SERVICE, NAVY ( NNIC ) IS WAY AHEAD ON OSINT AND ITS VALUE/CAPABILITIES. They have a web page but I can't get into, no sec. clearance, which is ok, and no public face. G )


    US armed forces face "peer" adversaries in only one area—military cyberspace. ( NOT )


    More than ever before, cyberspace is on the minds of America's top leaders. Air Force Gen. Kevin P. Chilton, the new head of US Strategic Command, said during his confirmation hearing that "attacks impacting our freedom to operate in space and cyberspace pose serious strategic threats."

    Defending the nation from cyberspace attacks is STRATCOM's mission—but one of the big challenges is assessing the strategic threat and demarcating lines of response.

    It all begins with knowing the adversary. China is at the top of most lists of nations with advanced cyber capability—and the will to use it. ( The RBN has more advanced capabilities, G )

    Because of the overall tenor of military competition with China, every report of Chinese activity raises hackles. In fact, there's been a steady level of reported skirmishing in cyberspace this decade.

    Tactic No. 1 is near-constant pressure on US government systems. The goal of these attacks is to breach systems and leave behind malicious code capable of redirecting network activity or enabling access to stored data—to change it or steal it. "Cyber is all about 'protect it or steal it,'" Lt. Gen. Robert J. Elder Jr., commander of 8th Air Force and USAF's point man on cyber issues, said last year.

    "Estonia was kind of a wake-up call," said Marine Corps Gen. James E. Cartwright, vice chairman of the Joint Chiefs of Staff and previous head of STRATCOM. "We've got to make sure we have situation awareness at a scale commensurate with our equities."

    All doubt about Chinese culpability in these sorts of attacks vanished shortly after Russia's likely assault on Estonia. Pentagon sources acknowledged that a Chinese attack broke into an unclassified e-mail system used by the Office of the Secretary of Defense in June 2007. As reported by the Financial Times, the Pentagon attributed the attacks not only to Chinese server locations but to the People's Liberation Army itself.



    Air Force Lt. Gen. Daniel P. Leaf, deputy commander at US Pacific Command, told the Washington Times in November 2007 that computer attacks were a growing problem. "We're very concerned about that—for the information that may be contained on [the networks] or for the activities we conduct that are command and control and situation awareness related," he said.

    The attacks are of interest not for their fleeting effects—but for what they suggest about adversary intent, evolving capabilities, and the potential for debilitating breaches.

    ( I WANT TO HEAR COMPLAINTS FROM ATTACKERS ABOUT PC HARD DRIVES/SERVERS BEING DESTROYED, ABOUT THE USA MILITARY HARSH DEALINGS WITH HACKERS, G )

    "China has put a lot of resources into this business," said Elder. Communist China's public doctrine calls for dominating the five domains of air, land, sea, space, and the electromagnetic spectrum. Although "they're the only nation that's been quite that blatant," Elder said, "they're not our only peer adversary."



    The Air Force has recently taken bold action in this regard. In 2005, it elevated cyberspace to a level on par with air and space, when cyberspace was added to USAF's mission statement.
    Marine Corps Gen. James Cartwright (l) meets with USAF Lt. Gen. Robert Elder for a status brief on issues including the stand-up of Cyberspace Command.


    Rules of Engagement ( NONE )
    Elder himself oversaw the service's cyberwar capabilities during the time when the mission was being reinforced by the creation of a new Cyber Command, the Air Force's 10th major command.

    A larger policy problem rests with calibrating cyberspace operations to a scale of legitimate action. Over the last decade, rules of engagement for kinetic military operations—like targeting a terrorist safehouse in Iraq—have become highly refined.

    Theater-level rules of engagement, collateral damage estimation, and positive identification all must be observed before any strike takes place. Rules such as these keep responses proportionate to the political-military goals of an operation. It's a framework familiar to the hundreds of thousands of US troops operating around the world today.

    With cyberspace operations, that framework is not so prominent. German Chancellor Angela Merkel said recently that China "must respect a set of game rules."

    But what are those rules, and what constitutes a breach? Connecting cyberspace activities to the geographical norms of international politics is no easy task.

    ( YES IT IS, IF AN ATTACK COMES FROM XYZ SERVER, TAKE IT DOWN, USA HAS A RIGHT TO SELF DEFENSE, IF A SERVER HAS POOR SECURITY, AND IS COMPROMISED, USED FOR AN ATTACK, USA STILL HAS A RIGHT TO SELF DEFENSE, AND THE RIGHT TO TAKE OUT THE ATTACKING SERVER OR PC. WHICH WILL ALSO FORCE OWNERS OF THE SERVERS TO USE GOOD SECURITY AND VET USERS. G )


    For centuries, most international law has depended on the concept of sovereign borders and sovereign rights of states to gauge legitimacy. Everything from the Geneva Convention to the law of armed conflict is predicated on most offenses taking place between—or within—sovereign states. Rules of war also take for granted that events occur at a physical location tracing back to a nation-state.

    It is easy to tell when a state is using tanks or artillery against its neighbors or its own populace. With cyber attacks, it's unclear when and whether the state is involved.

    ( DOESN'T MATTER, IF IT IS STATE SPONSORED OR NOT, AN ATTACK IS AN ATTACK, USA HAS A RIGHT TO SELF DEFENSE. POLICE ARE NOT CONCERNED ABOUT OWNERSHIP OF A BUILDING A SNIPER IS IN, THEY TAKE OUT THE THREAT. G )

    Tracing attacks back to the originating Internet service provider does yield a physical location. (Cyberspace is projected from a physical infrastructure of servers, routers, and computers that have definite and sovereign physical locations.) However, cyberspace exists in a domain deemed independent of the nation-state.

    What's harder to establish is whether people conducting the attacks are hackers working on their own or at a government's behest. If a computer remotely "occupied" by hackers traces a physical location to China, that is not necessarily evidence that China is behind the scheme. The ambiguity works both ways, however. If China is behind an attack, it has built-in deniability.
    Estonian police use tear gas and truncheons to disperse a crowd protesting the removal of a bronze statue of a Russian soldier from the center of the capital city. The clash resulted in a massive cyber attack on government and private Web sites.


    A Fundemental Question
    "In this environment it's just very difficult to tell the point of origin," said Cartwright. "The source of the activity can be widely separated. Al Qaeda can live on a US ISP and execute from someplace else. How do we handle that?"

    ( TAKE OUT THE ATTACKING SERVER OR PC, THIS WILL IN THE LONG RUN HELP SERVICE PROVIDERS EXPAND SECURITY, FROM A BOTTOM LINE VIEW, G )

    It boils down to a fundamental question: When does an attack in cyberspace become a de jure attack? Even in the case of Estonia, protected by NATO's collective defense principle, the proper response to last spring's attack was open to debate.

    ( THERE WAS AN ATTACK, AND IT WAS TRACED TO SPECIFIC SERVERS, HOWEVER THE PERSONS CAUSING THE ATTACK WERE UNKNOWN, WHY WERE THE SERVERS NOT TAKEN OUT? G)



    Still undefined is the proper role for the US military. Inside the United States, legal precedent and direction limits what the military can do. According to Cartwright, "If it's inside the US, if we're to do anything about it, it's got to be on dot.mil" for the military to act. Most classified military networks are self-contained and rarely subject to the same barrage of attacks carried via the Internet.

    "If it's outside that and they want the military to do anything about it, then its military support to civil authorities just like we would do with a hurricane or anything else," he explained.

    In fact, it's the Department of Homeland Security that houses the key response teams for responding to Internet attack.

    Already, however, Cartwright hinted at a greater freedom of action in the cyberspace commons. "Once you leave our shores, then the military authorities start to be present, and what we do is layer the defenses out as best we can to get the most warning, situation awareness that we can to protect our interests," he said.

    Given the constant probing, investing in survivability is a big priority. The cyber balance of power is "the most dynamic world we've ever seen," said a senior STRATCOM official. Software security fixes may just last for hours.

    Expect to see an impact on Air Force budgets as service leaders fund the new mission. "What we're trying to do in '08 and '09 is to accelerate the programs that are tied to survivability of the Air Force portion of the global information grid," Elder said.

    The new Cyber Command will focus dedicated attention to the problem. Elder and others are working to lay the foundation for a cyberspace career path in the Air Force on a par with those for weapons systems and specialties. "We're looking to set up a professional cadre of cyber operators, and this would be enlisted and officer," Elder said.

    Investing now in survivability should help keep down the costs of buying new technology. A prime system is the Combat Information Transport System Block 30. "This is a system that is reducing our exposure to the commercial Internet," said Elder. "It's providing us much greater situational awareness in terms of being able to track the traffic on our networks."

    Serious money is going to the effort. "Some things we're trying to do with the CITS Block 30, for example, are in the range of half a billion dollars," Elder said.

    ( WHEN WILL THEY HAVE "RULES OF ENGAGEMENT" ABILITY TO GO ON THE OFFENSIVE? IF ATTACKED USA HAS A RESPONSIBILITY TO TAKE OUT THE ATTACKER. IF A SERVICE PROVIDER LOOSES A SERVER BECAUSE OF POOR SECURITY OR LACK OF OVER SIGHT ON WHOM THEY LET USE THE SERVER, THAT SHOULD NOT DETER USA FROM COUNTER STRIKING AN ATTACKING SERVER. G )

    Investment will fund software tools to track vulnerabilities "before the hackers find them," said Elder, and insulate them with database wrappers that create portals to block incursions. The Air Force is also investing in extensive database encryption—a proven technique. "It's just much more difficult for someone to fool with your system when the data's encrypted," Elder said.
    Yet it may take an increased sense of strategic threat to force clarification of the cyberspace mission.

    Currently, there are classic divides. The intelligence community uses cyberspace in its tradecraft. Yet there is growing demand for operators to be able to exploit the same turf.

    Creating Effects
    Many acknowledge the current US cyberspace strategy is "dysfunctional"—to use Cartwright's term from when he headed STRATCOM. But there's been only tepid enthusiasm for the Air Force's willingness to step up to the growing mission. Ultimately, the Air Force may be recognized as the chief force provider for cyber capabilities. Signs suggest it won't come without a period of debate.

    That debate will center first on the logic of cyberspace as a domain. To Air Force planners, the domain aspects have become self-evident. Cyberspace operations include activity to maintain the freedom to attack and freedom from attack in that domain. In fact, counterdomain operations are being defined, too.

    As Elder put it, "The better your cyber is, the [more] quickly you can do decision-making, [to] create effects." Degrading and slowing operations—especially to the point where "you can't operate anymore"—creates what Elder termed a "counterdomain effect."

    Not all accept cyberspace as a clear-cut domain like air, space, or the sea, however. Cartwright, for one, pointed out that it all turns in part on whether cyberspace is to be treated as a truly separate and co-equal area of warfare. "That's the huge debate," he said. "Should this be a domain or not be a domain?"

    ( ONLY A TROGLIDITE , WOULD CLAIM THE WEB ISN'T A DOMAIN, I THINK AL QAEDA HAS PROVED THAT HYPOTHESIS. G )

    Even as the pace of activity escalates, there's a sense of proceeding carefully. Part of the concern rests with a reluctance to lock in poor solutions.

    ( "LOCK IN " IS BS FOR LACK OF DECISION MAKING, NOTHING IS LOCKED IN, IT WILL BE TRIAL AND ERROR. G )

    Cartwright urged senior leaders to recognize how much there is to learn from the younger generation. "The Joint Staff is an old staff, demographically," he said. "So here we are, in charge of thinking our way through cyber without the 20-somethings."

    He warned against putting in place a rigid doctrine for cyberspace that might end up squashing the creative thinking that has always been a hallmark of the domain.

    "If we try to use our industrial-age Napoleonic decision structures, are we disadvantaging ourselves?" asked Cartwright. He saw "a lot of cultural issues that far outreach the technical issues and the organizational constructs. What I'm most concerned about is protecting the decision space and the opportunity space of the 20-somethings."

    But he stopped well short of handing over the cyber mantle to the Air Force. "Where we are right now, each of the services has found value," Cartwright said. The Air Force is making investments and letting its money "speak about their risk equations. We've got enough time to let that play out."

    ( EVENTUALLY EACH SERVICE WILL HAVE ITS OWN CYBER FORCE. G )

    Rebecca Grant is a contributing editor of Air Force Magazine. She is president of IRIS Independent Research in Washington, D.C., and has worked for RAND, the Secretary of the Air Force, and the Chief of Staff of the Air Force. Grant is a fellow of the Eaker Institute for Aerospace Concepts, the public policy and research arm of the Air Force Association. Her most recent article, "There When it Counts," appeared in the December 2007 issue.

    SOURCE:

    XXXXXXXXXXXXXX

    Its just so frustrating to see discussions of fiat acompli like they are NOT.
    Is the WWW a domain, is something that is self evident, to the Internet
    I don't want to hear from anyone that doesn't have a PC on his desk, and I suspect there are a lot of general officers that don't , and they should be replaced.


    "US armed forces face "peer" adversaries in only one area—military cyberspace." NOT. USA armed forces are 5 years behind, force projection on the www.

    This reminds me of, I think it was Doolittle, that exposed the air as a domain by bombing some battle ships to the bottom of the sea, to show air as force projection.

    The Internet itself is at sever risk NOW.
    The world is facing a Pearl Harbor www attack that could take out the Internet.
    And they are discussing if it is a domain?

    Hell: there is a new www WMD and we are still discussing if its a "domain" we are 5 years behind.

    The same logic that applies to coastal defenses applies to server and net defenses.
    Offense not defense. ( I'm not saying to drop defenses but we MUST have and use a offensive capability. Right now it takes an ok FROM BUSH, to take down a server.)
    Would any military service exist with out offensive capabilities?
    We acting with out rules of engagement on the WWW, USA IS AN EASY,SAFE
    TARGET.
    If USA used the rules of engagement in Iraq as they use on the WWW, USA would have surrendered by now.

    NSA is hiding all the cool www side arms.
    Our Intel paradigm on NSA remains confidential, their capabilities boggle the mind.


    Gerald


    "





    SECOND SECTION

    UPDATE:


    US reveals plans to hit back at cyber threats

    MY COMMENTS IN CAPS.G

    Tom Espiner ZDNet.co.uk

    Published: 02 Apr 2008 17:27 BST

    The US Air Force Cyber Command is developing capabilities to inflict denial of service, confidential data loss, data manipulation, and system integrity loss on its adversaries, and to combine these with physical attacks, according to a senior US general.

    Air Force Cyber Command (AFCYBER), a US military unit set up in September 2007 to fight in cyberspace, is due to become fully operational in the autumn under the aegis of the US Eighth Air Force. Lieutenant general Robert J Elder, Jr, who commands the Eighth Air Force's Barksdale base, told ZDNet.co.uk at the Cyber Warfare Conference 2008 that Air Force is interested in developing its capabilities to attack enemy forces as well as defend critical national infrastructure.

    "Offensive cyberattacks in network warfare make kinetic attacks more effective, [for example] if we take out an adversary's integrated defence systems or weapons systems," said Elder. "This is exploiting cyber to achieve our objectives."

    However, this is a double-edged sword, as adversaries will also attempt to develop similar capabilities, especially considering the US military's heavy use of technology, said Elder.

    NOW THIS IS A ONE EDGED SWORD, THEY MAY HAVE THAT CAPABILITY, USA DOES NOT AND WOULD NEED BUSH'S OK TO ENGAGE. G

    "Terrorists and criminals are doing the same thing. We depend so heavily as a military on the use of cyber, we have to be cautious about it," said Elder. "Cyber gives us a huge advantage but adversaries look at our capabilities and see areas they can undermine. We need to protect our asymmetric advantage — on the one hand by having people further exploit cyber, and on the other by having mission assurance."

    This problem is made more pressing by the military's reliance on the public internet to perpetrate cyberattacks. The infrastructure the US military uses to both launch and defend against cyberattacks runs through the public internet system. Military networks such as the Global Information Grid are linked to US government and critical national infrastructure systems, which in turn are linked to the public internet. Adversary systems are subverted by the US military through public channels — however, this also leaves the US military open to attack through the same channels, said Elder.

    ELDER IS MISSING A GOOD POINT HERE, IF THE PUBLIC INTERNET SYSTEM IS TAKEN DOWN WHAT HAPPENS TO THE C2 FOR THE MILITARY.G

    "The infrastructure on which the Air Force depends is controlled by both military and commercial entities and is vulnerable to attacks and manipulation," said Elder.

    Other causes for military concern include possible supply-chain vulnerabilities, where vulnerabilities are introduced into chipsets during manufacturing that an adversary can then exploit, and electronics vulnerabilities.

    "We need to make sure chips aren't manipulated — we're worried about information assurance just like everyone else," said Elder.

    Other problems being faced by the Cyber Command are centred around different Air Force and military units needing to improve their channels of communication before the autumn.

    "We have 10,000 people to do this, but the problem is they are stovepiped," said Elder.

    10,000 PEOPLE THEN WHY ARE THERE 5,000 TERROR WEB SITES STILL UP?
    WHY ARE WE ALLOWING THEIR C2 TO FUNCTION ON THE INTERNET?G
    I HAVE 100 AND WE ARE COMPILING LISTS OF TERROR SITES.
    MY TROOPS JUST VETTED 700 SITES IN 2 DAYS.G

    "Stovepiping" has two complementary meanings. In IT terms it describes information held in separate databases which is difficult to access due to its multiple locations — the UK equivalent term would be "siloed". In intelligence-gathering terms — the Eighth also serves as the US Air Force information operations headquarters — "stovepiping" refers to information which has been passed up the chain of command without undergoing due diligence.

    Elder said that, while he was satisfied with AFCYBER's covert operations capabilities and its demonstrable ability to remotely destroy missile defence systems, he wished to further develop its attack capabilities.

    "IT people set up traditional IT networks with the idea of making them secure to operate and defend," said Elder. "The traditional security approach is to put up barriers, like firewalls — it's a defence thing — but everyone in an operations network is also part of the [attack] force. We're trying to move away from clandestine operations. We're looking for real physics — a bigger bang resulting in collateral damage."

    MOVING AWAY FROM COVERT OR CLANDESTINE OPERATIONS ON THE INTERNET
    IS THE OPPOSITE OF A FORCE MULTIPLIER. FORCE REDUCER? BAD MOVE. THE INTERNET WAS MADE FOR COVERT OPERATIONS, AND USA HAS THE TECHNOLOGY AND POWER TO DOMINATE THE INTERNET LIKE THE AIR FORCE DOES THE AIR.
    THE PARADIGM AND EXPERIENCED LEADERSHIP IS MISSING.G

    For deterrence we have to clearly identify the attacker. We're working on rapid forensics to determine who the adversary is.

    WITH BOT NETS I DON'T THINK THIS IS POSSIBLE OR THAT YOU CAN DO IT WITH CURRENT TECHNOLOGY.G


    Lieutenant general Robert J Elder, Jr

    US Cyber Command also needs to develop the means to quickly pinpoint exactly where an attack is coming from, to be able to retaliate, and also to deter potential attackers.

    "We haven't done a good job in the cyber-domain just yet," said Elder. "We have to demonstrate the capability to do [rapid forensics] then message that to our adversaries. For deterrence we have to clearly identify the attacker. We're working on rapid forensics to determine who the adversary is."

    MESSAGE THE ADVERSARIES WE KNOW WHO AND WHERE THEY ARE?
    WOULD YOU DO THIS ON A BATTLE FIELD? THIS IS NUTZ, IT MAKES USA A SAFE TARGET AGAIN, YOU ENABLE THEIR ATTACKS WITH THIS PARADIGM. TAKE THE BASTARDS OUT.G
    WE ARE UNDER ATTACK. ELDER DOESN'T SEEM TO GET THAT.G

    While cyber-espionage was inevitable, said Elder, knowledge of the US military being able to pinpoint the source of cyberattacks could deter assaults on critical national infrastructure that use Supervisory Control And Data Acquisition (Scada) systems.

    "We're not going to deter cyber-espionage, but we might be able to deter attacks on Scada networks," said Elder.

    As well as developing forensics tools, Cyber Command is also coding tools to check for incursions, including a "Cyber Sidearm", which will monitor activity on the Combat Information Transport System — the US Air Force cyber-network.

    A CYBER SIDEARM DOES NOT MONITOR, A SIDEARM DOES DAMAGE, YOU DO NOT HAVE A CYBER SIDEARM IF IT ONLY MONITORS, YOU HAVE A DAMAGE RECORDER NOT A SIDEARM. I HAVE BEEN ISSUING CYBER SIDEARMS TO SELECT TROOPS SINCE MAR 22 IN OUR "C" COMPANY THAT CAN DO DAMAGE, QUOTE FROM OUR BLACK WIKI:
    "We will issue you a cyber sidearm, and rules of engagement.
    Violation of the rules of engagement could result in criminal prosecution, they are strictly for self defense only,
    (YOUR PC under attack.).
    Use of the small arms may automatically notify the Watch Officer, calling in backup, and alerts me to a situation.
    And activates Internal Affairs.

    Gerald"



    "We've been working to get the functionality built — we're supposed to have it in the next couple of months," said Elder.

    US Eighth Air Force said it was seeking partnerships with both public- and private-sector organisations to "secure cyberspace". The Department for Homeland Security's Strategy to Secure Cyberspace includes establishing a public-private architecture to gauge and respond to cyberthreats, and increase information-sharing between public- and private-sector organisations and the military.

    SOURCE:

    XXXXXXXXXXXXXXXXXXXXXXXXXXXXX

    AIR FORCE IS STILL A GENERATION BEHIND, AND WORKING WITH THE WRONG PARADIGM.

    WHEN AN ENEMY JET COMES UP AGAINST THE USA AIR FORCE, THEY RUN AWAY OR DIE.
    THAT IS THE PARADIGM FOR THE US AIR FORCE ON THE INTERNET.

    YOU DOMINATE YOUR DOMINION BE IT AIR OR CYBER.

    GERALD ( WITH ARMS OPEN )
    INTERNET ANTHROPOLOGIST
    DIRECTOR OF "C" COMPANY

    .

    Labels: , , , , ,

    Terrorist Names SEARCH:
    Loading

    Wednesday, March 19, 2008

    Internet Anthropologist replys to Bin Laden


    In the name of Allah, the most compassionate, the most merciful…

    To the intelligent ones in the Middle East:

    Peace be upon he who follows guidance.

    This talk of mine is to you and concerns the Bobming of Mosques, Moslem killing Moslem and women and children and beheading civilians and your neglicgence in spite of the opportunity presented to take the necessary measures to prevent their being repeated.

    To begin, I tell you: hostility between human beings is very old, but the intelligent ones among the nations in all eras have been keen to observe the etiquettes of dispute and the morals of fighting.

    This is best for them as conflict is ever changing and war has its ups and downs.

    However, you, in your conflict with us, have abandoned many of the morals of fighting in practice, even if you hold aloft its slogans in theory.

    How it saddens us that you target Mosques, market places wonem and children with your bombing: those modest mud villages which have collapsed onto women and children.

    You do that intentionally and I am witness to that.

    All of this [you do] without right and in conformity with your oppressive ally who – along with their oppressive policies – the Taliban

    And it is no longer hidden from you that these savage acts haven't ended the war, but rather increase our determination to cling to our right, avenge our people, and expel the terrorists from these countrys.

    And [you also know now] that these massacres are never erased from the memory of the peoples and the effects of this are not hidden. Islam and Allah will remember Bin Ladens connection to Satan.

    Although our tragedy in your killing of Moslem women and children is a very great one, it paled when you went overboard in your unbelief and freed yourselves of the etiquettes of dispute and fighting and went to the extent of beheading civilians.

    This is the greater and more serious tragedy, and reckoning for it will be more severe.

    And I bring your attention to a telling matter, which is that despite your beheadings , you haven't seen any reaction from the three and a half billion non-Muslims, they have beheaded no moslems (peace and prayers be upon him).

    We believe in all of the Prophets (peace and prayers be upon them), and Allah said: "The punishment of those who wage war against Allah and His Messenger, and strive with might and main for mischief through the land is: execution, or crucifixion, or the cutting off of hands and feet from opposite sides, or exile from the land: that is their disgrace in this world, and a heavy punishment is theirs in the Hereafter." 33:Al-Maeda .

    And here it is worth pointing out that there is no need to use as an excuse the sacredness you accord of your laws and and how you lie and twist the Qaraan.

    If so, then on what basis were the terrorist exempted from being subject to your laws of sharia.

    And on what basis do you suppress those who cast doubt on the statistics of an historical event

    In addition, you know that there is one man who can put an end to these beheadings, Mosque bombings,Moslem killing Moslem women and children, turn in Bin Laden.

    To sum up, then, the laws of Allah the Most High are not null and void, are sacred, and matter to Moslems, but not al Qaeda or the Taliban.

    In closing, I tell you: if there is no check on Bin Ladens insults to the Qarran, then let your hearts be open to the pain you inflict on Moslems by your actions.

    And it is amazing and to make light of others that you talk about tolerance and peace at a time when your soldiers perpetrate murder even against the weak and oppressed in our countries.

    The world denounces al Qaeda, and Bin Laden even Islam rejects them.

    And all of that is confirmation on your part of the continuation of the way as well as a testing of the Muslims in their religion: is the Messenger (peace and blessings of Allah be upon him) more beloved to them than Bin Ladens bloodlust for power?

    The answer is what you see, not what you hear, and may our mothers be bereaved of us if we fail to help the Messenger of Allah (peace and blessings of Allah be upon him).

    And peace be upon he who follows the guidance.

    Gerald



    .

    Labels: , , ,

    Terrorist Names SEARCH:
    Loading

    Friday, March 07, 2008

    Military Hates the Internet, Maybe


    The Army cracked down on soldier-bloggers and Youtube. The Air Force blocked blog-access on official networks. All this despite the military paying lip service to New Media, the open-source phenomenon and information warfare. Now the Coast Guard, America's smallest military branch, is finally checking out this whole internet thing -- and last week it totally panicked, maybe.

    Join the Civilian Cyber Forces: HERE.

    .

    Labels: , , , ,

    Terrorist Names SEARCH:
    Loading

    Monday, February 04, 2008

    5TH Internet cable cut:, 1.7 million

    IRAN: thru singapore





    xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx









    USA needs a "Internet protection force"

    DUBAI - An estimated 1.7 million Internet users in the UAE have been affected due to the recent cable cuts, an expert said on February 4, quoting recent figures published by TeleGeography, an international research website.

    Internet data was majorly affected as it is the biggest capacity carried by the undersea cables. However, all voice calls, corporate data and video traffic were also affected.

    Two du experts briefed the media on the current methods being undertaken by the telecom provider to re-route the Internet traffic to provide normalcy to the users.

    Quoting TeleGeography and describing the effect the cuts had on the Internet world, Mahesh Jaishanker, executive director, Business Development and Marketing, du, said, "The submarine cable cuts in FLAG Europe-Asia cable 8.3km away from Alexandria, Egypt and SeaMeWe-4 affected at least 60 million users in India, 12 million in Pakistan, 6 million in Egypt and 4.7 million in Saudi Arabia."

    A total of five cables being operated by two submarine cable operators have been damaged with a fault in each. These are SeaMeWe-4 (South East Asia-Middle East-Western Europe-4) near Penang, Malaysia, the FLAG Europe-Asia near Alexandria, FLAG near the Dubai coast, FALCON near Bandar Abbas in Iran and SeaMeWe-4, also near Alexandria.

    The first cut in the undersea Internet cable occurred on January 23, in the Flag Telcoms FALCON submarine cable which was not reported. This has not been repaired yet and the cause remains unknown, explained Jaishanker.
    More SOURCE:

    xxxxxxxxxxxxxxxxx

    We first mentioned this new paradigm here, New threat to GWOT. 02.01.08 2:05 pm EST

    And followed up with New WMD, related to this situation. 02.03.08 10:16 pm EST

    Whom ever it is cutting these cables can work under water, even a diesel sub, with a special ops team or special munitions could be doing this.

    How is it that both Flag Telecomand
    SEA-ME-WEA 4 cables
    (above and below) were severed within hours of each other, although
    Marseille, France and Alexandria, Egypt, are hundreds of miles apart?

    AT LEAST 2 SUBS.

    ( ArabianBusiness.com was told on Sunday by unofficial sources that the problem is related to a power system and not a physical break in the cable, as is thought to be the case in three international incidents earlier in the week. ??? unconfirmed )

    Cutting the ME off from the Internet would hamper the Military forces in the region.

    I expect USA is marshaling all the anti-sub forces in this region to this region.

    This is cut number 5 and there is no reason to expect it will stop soon.
    As slow as they are going they must have great confidence in their invisibility and
    or defensive capabilities.
    And taking them out maybe a signal for the next phase.
    Almost 90 per cent of Internet traffic is routed through undersea cables and only 10 per cent is done through the satellite.

    We enter a new phase of Internet WAR.
    Whether this is an attack or not, it is known and must now be planed for.
    Who needs to be watched?
    Any one with a sub force ( +300 subs? )that can range the world and take out enough cables simultaneously to take down the web.
    OR:
    Subs in combination with bots.

    Gerald

    TeleGeography is proud to announce a new edition of its popular Submarine Cable Map. The 2008 edition includes information for over 120 submarine cable systems, including major systems that are in service as well as announced cable systems expected to join a reinvigorated cable market. All data contained in the map is drawn from our Global Bandwidth Research Service, our definitive guide to the supply, demand and pricing of international bandwidth.
    SOURCE:

    The history and explanation can be founded here: submarine communication cable.

    high-res pdf of global submarine fiber optics: http://www1.alcatel-lucent.com/submarine/refs/World_Map_2007_LR.pdf

    Map most impacted countrys.

    The FLAG cut is reported to have taken place 8.3 kilometers (5.2 miles) from
    Alexandria beach in northern Egypt.

    The SEA-ME-WEA 4<http://en.wikipedia.org/wiki/SEA-ME-WE_4_%28cable_system%29>cable
    was damaged
    in the waters off Marseille,
    France<http://www.news.com/Two-communication-cables-in-the-Mediterranean-are...>,
    reports C/Net. The two cables, which are separately managed and operated,
    were damaged within hours of each other.
    <http://www.vsnlinternational.com/map/>

    How is it that both Flag
    Telecom<http://en.wikipedia.org/wiki/Fiber-Optic_Link_Around_the_Globe>and
    SEA-ME-WEA
    4 <http://en.wikipedia.org/wiki/SEA-ME-WE_4_%28cable_system%29> cables
    (above and below) were severed within hours of each other, although
    Marseille, France and Alexandria, Egypt, are hundreds of miles apart? At
    this point, details are sketchy and the cause is still unclear.
    <http://www.vsnlinternational.com/map/>

    VSNL has a terrific interactive global cable
    map<http://www.vsnlinternational.com/map/>(above), while the
    SEA-ME-WEA 4 map <http://www.seamewe4.com/> (below) shows the distance to
    France. VSNL <http://www.vsnlinternational.com/map/>,

    Cable cut History:


    The magnitude 7.1 earthquake was followed by one of the largest disruptions
    of modern telecommunications history.
    <http://www.dailywireless.org/2008/01/14/fiber-crosses-the-pond/>

    Nine submarine cables in the Strait of Luzon, between Taiwan and the
    Philippines, were broken thus disabling vital connections between SE Asia
    and the rest of the world. China
    Telecom<http://en.wikipedia.org/wiki/China_Telecom>reported that
    several international submarine communications cables had been
    broken, including:

    - CUCN <http://en.wikipedia.org/wiki/CUCN_%28cable_system%29> and
    SMW3<http://en.wikipedia.org/wiki/SEA-ME-WE_3_%28cable_system%29>,
    which was damaged at December 26<http://en.wikipedia.org/wiki/December_26>,
    2006 <http://www.dailywireless.org/wiki/2006> 20:25
    UTC+8<http://en.wikipedia.org/wiki/UTC%2B8>approximately
    9.7 km away from landing point in Fangshan, Pingtung
    County<http://en.wikipedia.org/wiki/Pingtung_County>,
    Taiwan <http://en.wikipedia.org/wiki/Taiwan>;
    - APCN 2 <http://en.wikipedia.org/wiki/APCN_2_%28cable_system%29> S3,
    which was damaged at December 27<http://en.wikipedia.org/wiki/December_27>,
    2006 <http://en.wikipedia.org/wiki/2006> 02:00
    UTC+8<http://en.wikipedia.org/wiki/UTC%2B8>approximately 2100 km away
    from landing point in
    Chongming <http://en.wikipedia.org/wiki/Chongming>,
    Shanghai<http://en.wikipedia.org/wiki/Shanghai>,
    China <http://en.wikipedia.org/wiki/People%27s_Republic_of_China>;
    - APCN 2 <http://en.wikipedia.org/wiki/APCN_2_%28cable_system%29> S7,
    which was damaged at December 27<http://en.wikipedia.org/wiki/December_27>,
    2006 <http://en.wikipedia.org/wiki/2006> 00:06
    UTC+8<http://en.wikipedia.org/wiki/UTC%2B8>approximately 904 km away
    from landing point in
    Tanshui <http://en.wikipedia.org/wiki/Tamsui_Township>, Taipei
    County<http://en.wikipedia.org/wiki/Taipei_County>,
    Taiwan <http://en.wikipedia.org/wiki/Taiwan>;
    - FLAG Europe
    Asia<http://en.wikipedia.org/wiki/Fiber-Optic_Link_Around_the_Globe>,
    the segment between Hong Kong <http://en.wikipedia.org/wiki/Hong_Kong>and
    Shanghai <http://en.wikipedia.org/wiki/Shanghai> was broken at December
    27 <http://www.dailywireless.org/wiki/December_27>,
    2006<http://en.wikipedia.org/wiki/2006>04:56
    UTC+8 <http://en.wikipedia.org/wiki/UTC%2B8>;
    - FLAG North Asia
    Loop<http://en.wikipedia.org/wiki/Fiber-Optic_Link_Around_the_Globe>,
    the segment between Hong Kong <http://en.wikipedia.org/wiki/Hong_Kong>and
    Pusan <http://en.wikipedia.org/wiki/Pusan> was broken at December
    26<http://en.wikipedia.org/wiki/December_26>,
    2006 <http://en.wikipedia.org/wiki/2006> 20:43
    UTC+8<http://en.wikipedia.org/wiki/UTC%2B8>,
    severely damaging the communications within the Asia-Pacific region and with
    the United States <http://en.wikipedia.org/wiki/United_States> and
    Europe <http://en.wikipedia.org/wiki/Europe>.
    From Google group SOURCE:

    Update: 02.05.08 6:14 pm est

    Work begins to repair severed net (BBC)

    - 3 hours ago
    XXXXXXXXXXXXXXXXXXXXXX

    Al Qaeda deep sea divers!

    They hide in underwater caves!


    XXXXXXXXXXXXXXXXXXXXX

    Cable repair ships, photos

    xxxxxxxxxxxxxxxxxxxx

    REPAIR SCHEDUAL

    Behalf Of Sanghani, Bijal
    Sent: Tuesday, February 05, 2008 1:26 AM

    Subject: [menog] FLAG Cable Cut - Update

    Dear All,

    Thought I'd give you all an update on where we (FLAG) are with the cable cuts -

    FEA Segment D - The Cable ship CS Certamen is now expected to arrive at the Alexandria repair ground on Wednesday 6th February. A Permit for the repair is currently being expedited with the Egyptian authorities.


    FEA Segment M - The cable ship CS Asean Restorer has been booked for this repair. It is currently out on an APCN repair and with current plan will be ready to start any work on our cable on or after 11th Feb. We have the OTDR traces from Penang and see that the fault is around 28km out from the station.


    FALCON Segment 7b (Bandra Abbas - Al Seeb) - E-Marine continues to await the permit to enter the Iranian waters and current forecast for the ship to start a work is around 19th February.


    FALCON Segment 2 - Fault 1st February 41km from repeater, which is between the first two repeaters out of Dubai toward Muscat (Al Seeb). The ship has left Abu Dhabi and is on route to the repair ground. The repair is expected to start in the next 12 hours (weather permitting).


    FALCON Segment 7a - Fault 1st February between BND (Bandar Abbas, Iran) and KWI (Kuwait), we are waiting for ship to go out and it maybe fixed before going out the fault on 7b - to be confirmed.

    I hope this helps,

    Regards,

    Bijal Sanghani

    Sr. IP Technical Support Engineer

    Technical Services Group

    FLAG Telecom

    Tel. +442 082 *** ***

    www.flagtelecom.com


    -----BEGIN PGP SIGNATURE-----
    Version: PGP 8.1

    iQA/AwUBR6hEeb/UEA/xivvmEQL5YgCg9tX2lZmq937MhRd65qm0wk9EYP UAniED
    VAxSCsr92aysSkrs6dGspaVm
    =45sb
    -----END PGP SIGNATURE-----





    FALCON is a submarine telecommunications cable connecting India and several countries in the Persian Gulf. The cable is operated by India's Flag Telecom, a fully-owned subsidiary of Reliance Communications.

    Landing points are:[1]

    XXXXXXXXXXXXXXXXXXXXXXXXXXX

    Strange:


    DEBKAfile
    Hasn't even mentioned this.

    XXXXXXXXXXXXXXXXXXXXXXXX

    Abandoned Anchor Cut Gulf Internet Cable
    FLAG says a 5.5 ton anchor found near cable break is believe to be the cause for one cable break. But the others...?
    .
    ..

    .

    Labels: , , , , ,

    Terrorist Names SEARCH:
    Loading

    Iran's Internet OUT: NOT


    by Dylan Bowman on Monday, 04 February 2008
    INTERNET DISRUPTION: The Falcon network runs from Egypt to India, linking 11 countries in the region.

    "It seems now to be way beyond the realm of coincidence that a further 4th critical international communications cable should break within seven days," one ArabianBusiness.com reader commented.

    "Clearly Iran, who was most affected, would gain nothing from such an action and is perhaps the target of those responsible," said another reader.

    Those theories were fuelled further on Monday when Egypt said damage to the cables in the Mediterranean Sea was not caused by ships, as previously thought.

    Egypt's Transport Ministry said footage recorded by onshore video cameras of the location of the cables shows no maritime traffic in the area when the cables were damaged.

    "The ministry's maritime transport committee reviewed footage covering the period of 12 hours before and 12 hours after the cables were cut and no ships sailed the area," a statement by the Communications Ministry said.

    "The area is also marked on maps as a no-go zone and it is therefore ruled out that the damage to the cables was caused by ships."

    It is not clear how badly Iran's internet access has been affected by the cable breaks.

    The Iranian embassy in Abu Dhabi told ArabianBusiness.com that "everything is fine", but internet connectivity reports on the web, citing a router in Tehran, appear to indicate that there is currently no connection to the outside world.

    Two intercontinental cables connecting Europe and Asia were cut off the coast of Egypt on Wednesday, followed by breaks in two more cables off the UAE coast on Friday. Flag owns two of the affected cables.

    The initial breaks affected internet access and international calls in Egypt, the Gulf and south Asia, while disruption resulting from damage to the latter two was centred around the Gulf region. The location of the breaks and short space of time in which they have happened has sparked fears the cables were intentionally damaged by the US and Israel to deprive Iran of internet access.


    Internet problems continue with fourth cable break
    Services in Qatar seriously disrupted by damage to cable linking Gulf state to UAE.

    Internet crisis deepens
    Third undersea cable break between UAE and Oman adds to web woes after two breaks just days earlier.


    SOURCE: FROM EMAIL:

    BACKGROUND

    The economic problems this will cause Iran are enormous.
    It also restricts their command and control of Qods.
    They are opperating BLIND in many cases now.
    And must find other means for com.
    In country, Iranian connection should work fine.

    INTERNET STATUS:

    UPDATE: All of Iran not down, rerouted and slow.
    http://www.nic.ir/
    http://www.iranet.ir/
    http://www.sharif.ac.ir/

    Several Iranians have checked in Internet working fine.
    But it is being rerouted through Singapore...

    cable infographic
    1 Polyethylene cover
    2,4 Stranded steel armour wires
    3,5 Tar-soaked nylon yarn
    6 Polycarbonate insulator
    7 Copper sheath
    8 Protective core
    9 Optical fibres
    Not to scale





    Gerald
    5 cable cuts
    Cable damage hits one million Internet users in UAE
    Asma Ali Zain (Staff Reporter)

    4 February 2008

    SOURCE:
    A total of five cables being operated by two submarine cable operators have been damaged with a fault in each. These are SeaMeWe-4 (South East Asia-Middle East-Western Europe-4) near Penang, Malaysia, the FLAG Europe-Asia near Alexandria, FLAG near the Dubai coast, FALCON near Bandar Abbas in Iran and SeaMeWe-4, also near Alexandria




    Labels: , ,