Internet Anthropologist Think Tank

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Friday, February 01, 2008

    New Threat to GWOT


    From a members only group:
    Emails:

    > > http://www.cnn.com/2008/WORLD/meast/01/31/dubai.outage/index.html
    > >
    > > failure hits two continents
    > > Story Highlights
    > >
    > > Extensive Internet failure has affected much of Asia, the Middle
    > > East, north Africa
    > >
    > > A telecommunications provider blames the outage on a major cable failure
    > >
    > > It has caused major disruptions to business, television and phone services
    > >
    > > Several reports say damaged cable in the Mediterranean could take

    xxxxxxxxxxxxxxxxxxx
    From CNN's Elham Nakhlawai and Mustafa Al Arab
    > >
    > > DUBAI, United Arab Emirates (CNN) -- Large swathes of Asia, the
    > > Middle East and north Africa had their high-technology services
    > > crippled Thursday following a widespread Internet failure which
    > > brought many businesses to a standstill and left others struggling to cope.
    > >
    > > One major telecommunications provider blamed the outage, which
    > > started Wednesday, on a major undersea cable failure in the Mediterranean.
    > >
    > > India's Internet bandwidth has been sliced in half, The Associated
    > > Press reported, leaving its lucrative outsourcing industry trying to
    > > reroute traffic to satellites and other cables through Asia.
    > >
    > > Reports say that Egypt, Pakistan, Saudi Arabia, Qatar, the United
    > > Arab Emirates, Kuwait and Bahrain are also experiencing severe problems.
    > >
    > > Nations that have been spared the chaos include Israel -- whose
    > > traffic uses a different route -- and Lebanon and Iraq. Many Middle
    > > East governments have backup satellite systems in case of cable failure.
    > >
    > > An official at Egypt's Ministry of Communications and Information
    > > Technology, speaking on condition of anonymity, said it was believed
    > > that a boat's anchor may have caused the problems, although this was
    > > unconfirmed, AP reported. He added that it might take up to a week to
    > > repair the fault.
    > >
    > > Rajesh Chharia, president of India's Internet Service Providers'
    > > Association, explained that some firms were trying to reroute via
    > > Pacific cables and that companies serving the eastern US and the UK
    > > were worst affected, AP added.
    > >
    > > Besides the Internet, the outage caused major disruption to
    > > television and phone services, creating chaos for the UAE's public
    > > and private sectors.
    > >
    > > There were contradicting reports on the real cause behind the
    > > disruption, but Du, a state-owned Dubai telecom provider, attributed
    > > it to an undersea cable cut in the Mediterranean Sea between
    > > Alexandria, Egypt and Palermo, Italy.
    > >
    > > A Du internal memo, obtained by CNN, called the situation in Dubai
    > > "critical" and stated that the cable's operators did not know when
    > > services would be restored.
    > >
    > > "This will have a major impact on our voice and Internet service for
    > > all the customers," the memo stated. "The network operation team are
    > > working with our suppliers overseas to resolve this as soon as possible."
    > >
    > > The outage led to a rapid collapse of a wide range of public services
    > > in a country which proudly promotes itself as technological pioneer.
    > >
    > > Sources from Emirates Airlines confirmed to CNN Arabic that the
    > > outage did not affect its flight schedules -- a statement which
    > > assured hundreds of travelers worried after rumors about the
    > > possibility of rescheduled flights due to the faults.
    > >
    > > However, Dnata, a government group in charge of providing air travel
    > > services in the Middle East and ground handling services at Dubai
    > > International Airport, acknowledged facing problems because of the
    > > outage, sources from its technical department confirmed to CNN Arabic.
    > >
    > > The outage heavily crippled Dubai's business section, which is
    > > heavily reliant on electronic means for billions of dollars' worth of
    > > transactions daily.
    > >
    > > Wadah Tahah, the business strategies and development manager for
    > > state-owned construction company EMAAR, told CNN Arabic that it was
    > > fortunate the outage started Wednesday, when there had been only
    > > moderate activity in the UAE markets. He said that softened the blow
    > > to business interests.
    > >
    > > But Tahah warned that if the outage continued, "such a situation
    > > could create problems between brokers, companies, and investors due
    > > to loss of control."


    World Class, Professional, Ethical, and Competent Bug Sweeps, and
    > > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
    > >
    > ------------------------------
    ----------------------------------------------------------------------
    > > James M. Atkinson Phone: (978) 546-3803
    > > Granite Island Group Fax: (978) 546-9467
    > > 127 Eastern Avenue #291 Web: http://www.tscm.com/
    > > Gloucester, MA 01931-8008
    > >
    > ----------------------------------------------------------------------------------------------------
    > > We perform bug sweeps like it's a full contact sport, we take
    > no prisoners,
    > > and we give no quarter. Our goal is to simply, and completely stop the spy.

    xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

    At 08:57 PM 1/31/2008, kondrak wrote:

    >They're now claiming it was "fishing trawlers", I'll wait to see where
    >the cuts are exactly, if they're close to shore I can buy the fishing story.
    >Seems we will have to wait a week is to find out.
    >
    >James M. Atkinson wrote:
    > > Two similar mid span cable cuts... massive service outages,
    > > suspicious circumstances.
    > >
    > > I would suspect that a grapple hook was involved and that someone
    > > went fishing for this cable just so that they could cut them to
    > > disrupt communications infrastructure.
    > >
    > > The ideal threat model is would be two boats grappling for one cable,
    > > which they cut is two places about a mile apart. The two more boats
    > > grappling for the cable on the secondary path(s) which they also cut
    > > in two locations separated by about a mile. The "floating" one mile
    > > segment that they isolate would then be towed some distance way from
    > > the main cable and then dropped back to the sea floor thus leaving a
    > > huge gap ensuring the outage lasted months, not days.
    > >
    > > By targeting both the primary and secondary cables (both sides of the
    > > rings) the saboteurs could have completely blinded everything in the area.
    > >
    > > One major cable outage in a region can be blamed for an accident, two
    > > in the same region is highly suspect.
    > >
    > >
    > > -jma

    xxxxxxxxxxxxxxxxxxxx

    This brings up the possibility of even deisel powered subs torpedoing Internet cables around the World. How do we protect the cables? Harden them? replicate them with satellites?

    Add this type of attack to a Internet Pearl Harbor attack, and we have a problem Huston.

    Gerald
    Internet Anthropologist

    .

    Labels: , , , ,

    Terrorist Names SEARCH:
    Loading

    Saturday, January 19, 2008

    USSOCOM: new multiple language web sites.


    I was studying "Civilian Irregular Information Defense Group" and posted a comment on
    'Trans-Regional Web Initiative' Friday, 18 January 2008 by cannoneerno4.
    ( Excellent article )

    USSOCOM: new multiple language web sites.

    They are outsourcing the effort to build websites in different languages to counter the Terrorist propaganda, lies, and present USA efforts in balanced terms in support of U.S. Special Operations Command (USSOCOM) in the Global War on Terrorism (GWOT).

    And I suspect the military are scared as hell of it, will blanket it with all variations of rules, regulations and red tape.

    A blogger in the Military must get permission of 5 or 6 officers before they can post, and each post must be reviewed. These reviews come from Officers in theater in combat, and have much better use for their time. And instead of thousands of Blogs in real time from US military personnel they have close to none.

    The Military's concept of the Internet is utilitarian communications channel, suspect, dangerous
    and high risk.
    They tend not to view the Internet as the ultimate war weapon.
    Intead of viewing the Internet as a "Social Change Engine", a hearts and minds access tool: the Military consensus is the INTERNET is a leak vector, career killer, mine field.
    But it is a start, they will no longer be MIA on the Internet.

    What bench mark would I use to gage its sucess?
    A million hits a year to an Arabic website.

    If you have that kind of traffic they you are hitting the mark/interest of your surfers.
    And you then have an audience to influence, a real chance to connect to the hearts and minds.

    A consideration would be a forum, dual english/arabic, where the Jihadiies can talk directly to
    USA Info warriors. I don't fear what the terrorist say, I fear not answering their lies.
    The expectation is not to convert the hard core, but to influence the 'Lurkers' the visitors who don't post but just read, they out number the posters by at least 4 to 1.
    And your demographic will be the same as the terrorist use to recruit.

    The main site would have an automated news feeds related to Arabic interest in the Middle East.
    VOA type commentary, Drudge type breaking news, and hot viral videos.

    A huge draw would be to match up Terrorist videos, with US videos of same incident, a chance to see the action from both sides. This alone would flood the site with visitors.

    I'm a member of some Military forums, both covert and in the open.
    And the experience has been generally disappointing.

    Innovation, breaking free, exploring new uses, and utilizing the full potential, and concepts of social change are not the de-rigeur, rule bound and archaic web concepts are usually the rule of the day.

    The aspects of the Internet as a social weapon, the context for the concept is generally lacking.
    Process is key to deployment.
    The faulty paradigm is that generally the USA would be un able to influence opinion.
    This thought co-exists with that of a man in a cave running the worlds biggest, and most successful Brand of social change engine in the world, out maneuvering the worlds Greatest multi media force, USA culture.

    This Internet operation is going to be very difficult to engender a success.
    The mixing of the Militarys Oil ( control/order ) with civilian Water, ( savvy/Innovation ) is going to take a very strong civilian counter part to stand against the built in risk aversion/fear attitude the Military has towards the Internet.

    I am defining Internet Anthropology in this case as the study and research of the interactive interfacing of human culture with this technology.

    Observation, synthesis and action are the essence of applied Anthropology.

    Internet Paradigms
    ( From a paper I wrote in 2000 )


    5 Internet Paradigms

    Depth and Breadth of Internet.

    Paradigm #1) Biological paradigm.

    The Internet almost seems alive, it not only knows when someone touches it, but who touched it (IP adr) when and for how long. And ( I'm taking some license here) but can tell me when the data on my web page has passed over the light receptors in your brain. It seems almost alive in terms of telling us when it is being used, where person is, what country, time on site, pages visited, length of time on each page, how they got to my web pages.

    Paradigm #2)

    Law of supply and demand.

    There ARE many examples of new Internet processes. Lets look at a few. The "Wall ST. Journal", January 1, 2000 had an extensive Issue on 'So long Supply and Demand' and 'the New Economy'. As a veteran stockbroker I feel the laws of supply and demand ARE eternal, but ARE they? Lets look and see are these laws slipping?

    1. The Industrial companies of the S&P 500 during the 1990's created $245 BILLION dollars of new wealth by converting atoms to bytes as in software. They send copies of the program over the Internet and rearrange the bytes on your computer. There is almost an unlimited source of atoms & limited demand, and as the software improves it becomes more valuable ($). Under the old laws of supply and demand they worked something like this, supply + demand = price. If there is a small supply the price tends to go up and if there is small demand the price tends to go down. But we have almost a reverse of Supply and Demand, We have an unlimited supply and limited demand. The Internet is presenting us with new paradigm a New Process.

    2. Free.

    Computer programs are given away free over the Internet, (winamp.com, equal to a $200 stereo system, Free) because they make more money selling cheap but great UPGRADES, and from advertising than if they sold the original product. Another example is giving away Internet service, 100 megs bytes of computer space, because they make more from the advertising they sell on these pages, than if they charged for their products.

    Once you write a computer program each additional copy is almost costless. This is a new process to make money by giving away your base product. These Internet companies carry very little inventory unlike General Motors or a manufacturing corporation, they just move bytes on your computer into the form of their program via the Internet. New corporations with unlimited product supply, computer programs, no inventory, instant delivery, and potential world wide market is a NEW paradigm. We will have stock market corrections, but we are playing with a new economic paradigm. And we have not seen the new mega Internet corps. yet, only the seeds of germination of their seeds, forms and concepts. ( Google went public in 2004 at $100 per share, Friday it was over $600)

    Paradigm #3)

    Third world internet usage.

    It used to be that one had to know a specific computer language just to get a program to run, "msdos", now it is point and click. Even the African, Bushmen in south Africa, ARE helping in a conservation project with 'palm pilots', which have had a Global positioning System added. When they see an animal the push a icon key that relates to that animal, they are able to track herd movements, sizes, directions, deaths etc. even though they don't know any computereese.
    ( Bushmen and jahidies both learned the WWW )

    New process.

    And there ARE many translation programs available that automatically translate a document or web page on the web.

    Paradigm #4 )

    Arbitrage.

    Arbitrage used to be used only in financial and commodity markets. When there were market imbalances, buy low on one market and sell higher on another market. But it now applies to labor markets, Lucent Technologies and Consolidated Edison have turn to India and Ireland for software testing, because of cheaper labor. Just these two points present a potential new process, for a capitalistic motive to place Internet backbone and computers in third world countries for Free because of a profit motive from labor arbitrage.

    Icon oriented programs or translation programs and labor arbitrage opens the door for the possibility of profit from outfitting the third world with computers. Which would also allows the developing world to market finished products world wide via the Internet not just export raw goods with the help of IMF and the World Bank.

    It also places in their hands tools for their own concepts in 'social change engines'. I have seen news reports that Bill Gates has plans to orbit 300 satellites for world wide wireless Internet.( This was 7 years ago )

    5th paradigm,

    What is the internet?

    A book, telephone, magazine, stereo, movie, typewriter, mail, news, stock trading, catalogs, bulletin board, diary, meeting place, business, fax, library, photo album, radio, search engine, etc. No it IS none of these and IT CAN BE ALL OF THESE!

    "New uses and discoveries for the INTERNET will center on "PROCESS" & "ORGANIZATION". ( ie terrorism, process and organization, I didn't see terrorist using it 7 years ago though )

    Using these paradigms we see the Internet is (sic) almost alive, has changed the laws of economics, and will probably encompass the entire world for economic reasons, and its uses and functions are limited only by our imaginations. The point I want to get across is that by putting "intelligence (data)" into a paradigm and tracking its growth our understanding is far more broad and comprehensive and immediate, than just by looking at facts and data. This is very important concept when trying to understand the Internet. There are now more pages on the internet than have been printed since the invention of the printing press.


    Web pages are NOT like: Newspapers, magazine's, video, photo albums, radio, CD's, US mail, telephone, games, library or graffiti. Web sites can be like all of these combined.

    An example of a successful 'social change engine' used only one of these, a book! Upton Sinclare's book "The Jungle" also was a prime example of applied anthropology, there were great changes in the meat packing industry sanitation and for workers conditions as a result of this book.

    Could the Internet be used as a Social Change Engine like Sinclare's book?

    Hegel (1770-1831) may have expressed it best. In his terms, we discover an antithesis and develop a thesis out of which emerge a synthesis, and this dialectical process continues as each generation becomes more enlightened. We seek rational insight not just the ambition to amass a mere heap of facts, an encyclopedia. Like Hegel we believe in the unconquerable faith that reason does exist. However truth exist only as a possibility, a potential. It is only when this idea is accompanied by action that this idea as well as abstract characteristics generally, are realized or actualized. For in and of themselves facts are powerless. A WEB PAGE WITH OUT HITS, followed by action, IS JUST A PILE OF WORDS AND GIFS, images, encyclopedia.

    By Adapting Professor Keyan Tomselli's concepts of semiotics, as presented in his book " Appropriating Images" we are able to track a web sites many messages, i.e. the conceive text, the produced text, and received text. We can track levels of understanding, orders of significance, and any discrepant decoding. And review the pages ORGANIC's, how alive the page is. HOW I can connect it to the visitor, and improve this communication connection to the point of action on the part of the visitor.

    Observation, synthesis and action are the essence of applied Anthropology.
    I am defining Internet Anthropology in this case as the study and research of the interactive interfacing of human culture with this technology, to the point of action.

    Al Qaeda understands this concept and is currently running the Internet Paradigm.Below
    From 6/16/2007 11:06:00 PM
    al Qaeda is different than ever before.
    They have morphed from a controlled corporate structure to a free form franchise.
    Moved on from a centrally controlled payroll to affiliations under the same BRAND.

    They have suffered many defeats which has caused them to switch battlefields
    and methods. They have opened new fronts in Lebanon, Algeria, London, Germany, China, and many other locations because they are loosing troops, cadre in Iraq, but the major shift has been to the Internet.

    The USA is allowing al Qaeda to control the Internet paradigm.
    USA controls the battle field but al Qaeda controls the Internet and consequently the hearts and minds.

    If USA kills them it is called a victory of martyrs.
    If they are jailed they plead torture and disrespect,
    and then they produce videos of them beheading civilians.

    They show videos of USA attacks and claim civilian casualties.
    They show videos of their attacks and claim all USA troops were killed.

    Al Qaeda hide in the shadows and attack easy targets, and call them selves brave.
    USA patrols the most dangerous parts of Iraq protecting the public and AQ call them
    infidels.

    AQ videos an attack with their cell phone, email to their media section and they have it out on the Internet in 30 min. of the attack.

    On balance,
    USA's losses are very good, any KIA, is sad.

    But compared to WWII rates the USA army is doing a remarkable job.

    Around 150,000 troops at WAR, and KIA are 3 or 4 a day.
    And they are not setting around is some safe fort,
    they are out on patrol looking for AQ.

    Hunting AQ, snipered, IED, Shaped charges.

    AQ instruction manuals say to be like dust or a gas, unnoticed and just disappear,
    to always seek a safe easy target.

    USA troops are trying NOT to kill civilians,
    AQ is trying TO kill civilians, Market bombings.

    USA troops are trying to stop a civil WAR.
    AQ is trying to start a civil WAR.

    USA troops are trying to build a country.
    AQ is trying to destroy the country.

    USA troops patrol the streets.
    AQ hides in shadows.

    USA troops are trying to give the Umma the VOTE.
    AQ is trying to KILL the Umma.

    AQ says fighting the USA troops is like trying to run in STEEL RAIN.

    AQ IS BASTARDIZING ISLAM.
    USA troops know the difference between AQ and Islam.

    ( Al Qaeda has managed to brand the USA as the bad guys even in light of ll the above. )

    And USA is loosing the media war, loosing the hearts and minds to al Qaeda...

    They have suffered many failures, many of its top cadre killed, failures in
    attempted take overs of Egypt, Jordan, Saudi Arabia, and attempted
    establishment of government in Somalia.

    By by corrupting the Koran al Qaeda has established a base of followers world wide
    who are subject to his brand of propaganda, even though it violates the very basic principles of the Islamic religion.

    By effectively using the Internet he has established a a cadre of members in Europe, England
    the Maghreb, far and near East and Asia.

    His "Brand " labels him as the primary symbol of terrorism, in the West and the successful
    symbol of resistance in the Muslim world.

    His primary goal is to establish a caliphate and destroy Israel, Jordan, Pakistan,and Saudi Arabia.

    But he mis-calculated on his strategy with the USA, he thought he could lure them
    into a short war in Afghan and defeat them much like the Russians.

    So far USA has focused on attacking al Qaeda not its ideas, or the false brand
    of Islam they have established, which has allowed world wide recruiting.

    Al Qaeda's hypothesis is its Achilles heel, it is in violation of Allah's word the Koran

    And AQ is not being attacked in this quarter.

    AQ media arm is recruiting via the www more wannabees, their social change engine is running at full speed, and the rest of the world has yet to field any social change engine other than military.

    AQ media arm promotes its propaganda daily, and are moving into a NEW PHASE OF PROPAGANDA PROLIFERATION and recruitment and funding. ( Breaking )

    AQ is being defeated militarily every day, but their propaganda proclaim their continually victory.
    The number of their deaths, defeat by western standards, are celebrated as victory's of martyrs.
    While the West talk of pull out.

    The media arm of AQ is more dangerous than AQ in Iraq, The media arm is the deep well for the suicide bombers, cannon fodder and homegrown terrorist, wiping them out will go along way to stopping recruitment and home made wannabes.

    They are not being engaged on the Internet, they are winning on the WWW with USA as a "no show".

    USA needs to deploy the mother of all "Social Change Engines".

    al Qaeda has Weaknesses:

    Pakistan has arrested more high level AQ than any where in the world, because Pakistan is the seat of AQ.
    They still have a base of operations in Pakistan and continue to erode that government.

    When USA does pull out of Iraq all the AQ assets will shift to Afghanistan.

    AQ has become a criminal enterprise with kidnappings, extortion and Bank robberies, They have so much money in Iraq now they can send money back to AQ in Pakistan.

    AQ is trying to create a new state in Western Iraq, in effect seceding form Iraq.

    Hamas has carried out dozens of suicide attacks against Israeli.
    The founder of Hamas supported AQ, but refused an alliance with them.
    Hamas has been independent, and realizes it is an national case not international problem.
    Hamas has rejected the sectarian violence AQ espouses,
    And Hamas won the elections last year and AQ then became critics of Hamas,
    stating they had sold out for wining using a political movement.

    AQ has apologized for Hamas for their surrender to the political answer
    to the violence in Gaza.

    AQ fears a solution to the Arab-Israeli war movement, as it removes a leg of their
    logic in recruiting.
    The Israeli Arab problem is a basic recruiting tool and they do not want an answer, they want cannon fodder, recruits, financing not peace.

    AQ may view Hamas as an enemy if they move towards peace with Israel.
    Any move in that direction will bring Hamas under attack by AQ.

    Iran and AQ have "convergence of interests." and inclined to co-operate, on a temporary basis. When USA leaves Iraq they will become mortal enemies.
    Fighting to corrupt the soul of Islam....

    al Qaeda is vulnerable, these vulneriblities need to be exploited and USA needs to be setting the Internet Paradigm, not al Qaeda. The ammunition is there, use it.

    USA is building civil projects ( water systems ), and inside on their PC they read "the baby killers are building their water system" . NO wonder USA is loosing the war for minds and hearts.
    From 6/16/2007 11:06:00 PM


    Gerald


    "Iraqi Insurgent Media: The War Of Images And Ideas" by RFE/RL
    The book-length report, "Iraqi Insurgent Media: The War Of Images And Ideas" by RFE/RL regional analysts Daniel Kimmage and Kathleen Ridolfo, provides an in-depth analysis of the media efforts of Sunni insurgents, who are responsible for the majority of U.S. combat deaths in Iraq.
    The popularity of online Iraqi Sunni insurgent media, the authors contend, reflects a genuine demand for their message in the Arab world.
    The entire report

    Gerald
    Godspeed on the USSOCOM: new multiple language web sites.

    Paradigm Hunters/Engineers

    al Qaeda setting the Internet terrorism Paradigm

    Labels: , , , , , ,

    Terrorist Names SEARCH:
    Loading

    Saturday, January 05, 2008

    Hackers and forum





    # Section applications programmes encrypted encryption special versions special
    # مــــنــــتـــدى اخــــتــــراق الايــــمـــيـــل Forum penetrate email
    #

    * قـسـم خــــاص لأســئــلـــة الأعــضـــاء واسـتـفـسـاراـتـهـم حـــول الاخـــتـــراق A special section of questions and requests for information about members penetration

    # مــــنــــتــــدى اخــــتـــراق الاجـــهـــزة Forum penetrating devices
    #

    * قـسـم خــــاص لأســئــلـــة الأعــضـــاء واسـتـفـسـاراـتـهـم حـــول الاخـــتـــراق A special section of questions and requests for information about members penetration
    * الـبـرامـج الـــمــشـــفــرة والــحـــصـــريــة Encrypted programmes and exclusive

    # مــــنـــتــــدى اخـــتـــراق الــمـــواقع والـــمــنـــتـــديـــات Forum penetrate sites and forums
    #

    * قـسـم خــــاص لأســئــلـــة الأعــضـــاء واسـتـفـسـاراـتـهـم حـــول الاخـــتـــراق A special section of questions and requests for information about members penetration
    * ::Local Root Exploit :: :: Local Root Exploit::

    # قــســـم أخـــتــــراق شــبــكـــات الــويــرلــــس & LAN Section penetrate networks Aloyrls & LAN
    # مــنـــتــدى انـــــجــــازات الـــهـــكر Forum achievements Alhecr
    #

    * قسم أدوات و اندكسات الاختراق Tools section and penetration Andquisat
    * مكتبة الثغرات Library gaps

    # مـــنــــتـــــدى اخـــــتــــراق الـــــجــــوال Forum mobile penetration
    # مـــنـــتـــدى اخــــتــــراق الـــمحـــادثـــة Forum penetrate conversation
    # منتدى تعليم الهكر Education Forum Alhecr
    # قسم الدورات الاحترافية Section professional courses
    # قسم تعليم الاختراق بالفيديو Education Section breakthrough video
    # قسم E-book Section E-book
    #

    * قسم الطلبات Section applications

    # مـــنــــتـــــدى الـــــفـــايــــروســــات Forum VIRUSES



    The West has an advantage, in technological abilities, an attempt to close this gap, with forums like this.

    Bill



    From hacked site:


    .

    Labels: , ,

    Terrorist Names SEARCH:
    Loading

    Friday, December 21, 2007

    OSINT, New value.


    ( gOOGLE blog is messing up formating, in compose mode this appears as normal paragraphs, sorry G }
    One result of this revolutionary change has been a newfound willingness on the
    part of the U.S. Intelligence Community to reexamine the extent to which it relies —
    or has failed to rely — upon open source information, which some have argued has
    been relegated to a “second class” status by many intelligence professionals who
    continue to value secret information above all else. As part of this reexamination, the
    Intelligence Community appears to be reassessing a number of open source issues,
    including the relative value of open source information compared to that of secret
    information; the impact and importance of the growing volumes of information
    unlocked by easy access to the Internet; the dampening effect that certain Community
    security practices may have had and may continue to be having on the use of open
    sources; the state of development of analytic tools necessary to effectively and
    efficiently collect, sift, analyze, and disseminate a vast volume of publicly available
    information when analysts are expected to also analyze increasingly large amounts
    of classified information; and, training issues relating to open source technology and
    techniques.
    If the global information revolution has sparked debate within the Intelligence
    Community over the value of open source information, the ongoing jihadist terrorist
    threat has sharpened its focus. In underscoring the strategic and tactical importance
    of open source information generally, and the role of the Internet specifically, one
    senior policymaker recently described the Internet as being America’s new open
    source battlefield.

    Ultimately, these observers suggest, the United States must develop the capability to understand and influence foreign populations — “not in their council of states but in their villages and slums” — if it is to effectively counter the threat posed by jihadists. In such circumstances, it is argued, the information that should matter most to policymakers can be derived from open sources.

    The debate over the relative value of open source information, compared to that
    of classified data, is occurring at a time when the global information environment is
    viewed by some as having reached a “post-modern” stage.3 In such an environment,
    secret information may be less important than the combination of open source
    information, information sharing, computer networking, and an ability to sift and
    analyze a dizzying volume of open source information. Indeed, one former senior
    intelligence officer suggested that whereas the 20th century was the century of
    secrets, the 21st century may well prove to be the century of global information. If the
    Intelligence Community as a whole accepts and understands this change, according
    to some observers, it may gain an edge in confronting current threats, particularly
    those posed by terrorism.

    Intelligence professionals generally agree that open source information is useful
    and that such information should be collected and analyzed, just as is data derived
    from classified sources. They disagree, however, over its value relative to that of
    clandestinely-collected secret information, and thus the amount of time, attention,
    and resources that should be devoted to its collection and analysis remains in dispute.
    For a brief case study of open source intelligence, see Appendix.

    There generally are three different prevailing views regarding the of relative
    value of open source information. The first holds that policymakers simply derive
    less value from such information than from clandestinely-collected secrets. While
    open source information can complement, supplement and provide context for
    classified data, such information, it is suggested, rarely provides insight into an adversary’s plans and intentions. ( This would suggest they are not employing Paradigm Intel at all? Gerald )Policymakers tend to view such information as being critically important to policy deliberations, and attach to it the highest value.
    For that type of insight, it is argued, the Intelligence Community must discover and
    collect secrets. It therefore is entirely appropriate that the Community target the
    preponderance of its resources to that end. As the Director of Central Intelligence (DCI) reportedly stated in 2005, “I only have money to pay for secrets.”..................................................(Bad news for USA.G)

    The second view asserts that open source information should be viewed not only
    as an important contextual supplement to classified data, but also as a potential
    source of valuable intelligence, in and of itself. Proponents of this view tend to cite
    the as-Sahab Institute, al-Qaida’s sophisticated Internet-based messaging and
    propaganda multimedia production facility, as an example of why open source
    collection and analysis is so important in today’s technology-driven and globalized
    world.5 Others cite al-Qaida’s ability to use virtual space to recruit, proselytize, plot,
    and plan with impunity.6 According to one observer, “al-Qaida is right on the cutting
    edge of the adoption of new technologies. They grab hold of the new stuff as soon
    as it becomes available and start using it.”7 Another commentator suggested that
    gaining an understanding of the inner workings of the as-Sahab Institute may provide as an effective way as any “to get close to bin Laden and Zawahiri.”8 According to one former senior intelligence who believes that the Intelligence Community continues to undervalue open source information, “[Open source information] is no longer the icing on the cake, it is the cake itself.”

    Proponents of the third view adopt a “middle-ground” position, arguing that
    open source information probably will never provide the “smoking gun” about some
    issue or threat, but that it can be instrumental in helping analysts to better focus or
    “drive” clandestine collection activities by first identifying what is truly secret. Open
    sources therefore should be viewed as an analyst’s “source of first resort.” Although
    these adherents tend to champion the relative value of open sources, their supports
    appears to be measured. While generally believing that the Intelligence Community
    should devote additional resources to collecting and analyzing open source
    information, they appear wary of over-selling its value. “We don’t have the
    confidence yet,” according to one senior intelligence officer, in explaining such
    wariness.
    SOURCE:

    xxxxxxxxxxxxxxxxxxxxxx

    We view as clandestine info and OSINT a screw drivers, one flat head and the other philips. It is just a question of what you need.

    And we just heard that the CIA doesn't use philips screwdrivers?

    The value we see to our OSINT OPs is that of up-to-date info, bots feed you what your interested in, in real time.
    AND YOU CAN PULL DATA/INFO FROM A CLOSED CELL WITH OSINT, PARADIGM INTEL.

    Gerald
    Anthropologist





    Labels: , ,

    Terrorist Names SEARCH:
    Loading

    Wednesday, October 03, 2007

    Iraqi insurgents announce new coalition

    By MAAMOUN YOUSSEF, Associated Press Writer 45 minutes ago

    CAIRO, Egypt - Nearly two dozen previously unknown Iraqi insurgent groups announced a new coalition to fight foreign occupation but it also set conditions for talks with the U.S. in a statement on a Web site affiliated with the country's deposed Baath party.

    The 22 groups said their leader is Izzat al-Douri, the highest ranking member of Saddam Hussein's former ruling party still at large.

    In the nearly half hour video message, an unidentified man, face blurred, was shown sitting behind a table with an Iraqi flag on his right side reading a statement announcing the formation of the new alliance called "The Jihad and Liberation."

    The new alliance laid down a series of conditions for talks with the U.S. It demanded an unconditional withdrawal of foreign forces from Iraq, immediately or within a short timetable, the release of all detainees, return of the security forces to their status before the occupation and a halt to all operations against the people.

    "If the enemy wants to withdraw and save face, they should sit down and speak directly with the resistance to discuss implementing these sacred principles. Otherwise, the only alternative is their collapse and flight," the statement said.

    Ayad Allawi, Iraq's first post-Saddam prime minister, has recently said he held talks with members of the Baath party loyal to al-Douri, for which he was severely criticized by Iraq's current prime minister, Nouri al-Maliki.

    The statement made no mention of al-Qaida in Iraq, but it contained slogans praising Arab nationalism and the Arab nation's great past. Al-Qaida's extremist ideology does not recognize nationalism, but calls for an Islamic state.

    Labels: , , , ,

    Terrorist Names SEARCH:
    Loading

    Friday, September 07, 2007

    Bin laDEN TRANSCRIPT, NEW VIDEO 9.7.07



    Bin laDEN TRANSCRIPT

    He says its against Islam to burn humans, even ants, but he obtained a fatwa to kill 10 million Americans with a nuke?

    What I got from a first reading is that they don't plan on using a nuke in USA,
    Binny took alot of grief from peers and religious leaders for not giving USA the proper warning before 911, chance to convert to Islam. This is an Islamic warning.

    And he seems to be doing so now, WHICH MAY FORTEL an attack soon.

    Update:
    The vid title is "The Solution"
    The BLACK beard is a sign of being at war.
    He has no gun in view.
    His hands are in front of him in a non threatening way.
    He argues USA joining Islam from the indigenous point of view, ie lower taxes.
    An sincere attempt to convert USA, using argument based on our interests.
    He in effect says there are no innocent in USA.
    But have we had the offer of truce yet?
    His last video I believe.
    Binny sounds almost sad.

    Feels like something big.

    ODD video graphic freezes at 1:54, while audio goes on ( you can hear the beep beep as the video battery goes dead)? ( use zoom feature )

    Gerald

    Update: The accoustic signature indicates it was recorded in a cave or cave like structure and made with poorly maintained equiptment, there is a drive wheel that
    squeeks all the way through the vid in the background, all indications Binny himself
    made the tape. made both with audio recorder and video recorder.
    VHS from the sound of the squeaking drive wheel.

    At 9:35 they switch the Arabic sub-title to English.

    Video:

    Full length video:


    Thanks to Howie at MYPETJAWA for the video
    If embed above doesn't work here is LINK

    Analysis of video

    Reply to Binny

    Its a fake see analysis.

    Labels: , , , , , , ,

    Terrorist Names SEARCH:
    Loading

    Monday, August 06, 2007

    New al qaeda video a JOKE, admission of faliure.



    BUMPED


    the high quality links for the english version don't work atm

    Password is : fdv908

    Ok they have a video in three languages, arabic, english and urdu,
    And the English files don't work, to 600+ different locations.
    http://clearinghouse.infovlad.net/showthread.php?t=8478

    AQ must think this is important.

    Look at who they chose for the cover pic.
    A dead man Binny,
    Dead man walking: al Zawahiri

    And a boy toy chub: Gaddahn ( with make up, a kiffer living among them )
    link.
    Zawahiri stills refuses to be on screen with the american Gaddahn, no public display.
    Its a kitchen list of complaints, threats and cartoon of car blowing up.

    And most important notice the field of depth in the photo, Gaddahan is first.
    An indication of the NEW al Qaeda leadership.
    OBL is looking AWAY, Zawahiri is in the BACKGROUND, and in the FOREGROUND
    the heir apparent: Gaddahn. The NEW al Qaeda leader.



    Hell al Qaeda can't even run their own Jihad,
    they have an American do that for them..


    al Qaeda keeps looking for softer targets as they are running out of men.
    Now they threaten embassies.

    1 hour, 17 minute video waste of time.

    They are loosing it and trying to remain relevant.
    This video is just sad. Well done, but no content, all flash.

    Their demand is "Stop the Crusade and leave the Muslims alone."
    Ole binny should have thought of this before he did 911.

    And a lengthy whine from a suicide bomber that took the easy way out.
    Seems it was a very IMPORTANT suicide bomber, but not important enough
    to send a camera to film his suicide, they had to make a cartoon about it.

    The video continues to glorify Muslim killing Muslim, women, children and bombing Mosques and market places, an abomination to Allah and the Koran.

    They should consider surrender and then USA would pull out.

    All this hoopla and then this 1 hour and 17 min whine.
    Gaddhan came to limelight in 2004 when he threatened in one such video, "Allah willing, the streets of America will run red with blood." 2 years later and no blood in streets, Gaddhan not a reliable source.

    An analysis of the attacks carried out in the past two years reveals a curious fact. In 43% of the bombings conducted last year and in 26 of the 57 bombings traced in this study up to June 15 this year, the only death caused by the bombing was that of the bomber himself. This means that, astoundingly, about 90 suicide bombers in this two-year period succeeded in killing only themselves.

    There was one period in the spring of 2006 (February 20 to June 21) when a stunning 26 of the 36 suicide bombers in Afghanistan (72%) killed only themselves. This puts the kill average for Afghan suicide bombers far below that of suicide bombers in other theaters of action in the area (Israel, Chechnya, Iraq and the Kurdish areas of Turkey).

    Such unusual bomber-to-victim death statistics are, of course, heartening both for coalition troops.

    Expected more.
    Full video here

    This is AQ Begging for suicide bombers....to take the EASY way out.

    Request continues to go unheeded, for good reason.


    G

    Labels: ,

    Labels: , , , ,