Internet Anthropologist Think Tank: 12/16/07 - 12/23/07

  • Search our BLOG

  • HOME
    Terrorist Names SEARCH:

    Saturday, December 22, 2007

    Threat Matrix

    Current Paradigm:


    Bot net: FBS:


    Internet Insurgents:
    Their Paradigm, MUST READ, soft power

    al-Zawahri's shoes have holes.

    Internet terrorists next moves.

    New vector:

    Script kiddies:

    Current terror web sites:

    Up to Israel, now.

    Background Noise: Nuke:

    Israel's response


    New Taliban leader: Expressed the KEY:

    Drug vector, "Taliban Cartel" Target:

    Taliban Stealth border:

    NO shortage of paranoia in Pakti ...

    Iraq and al Qaeda:

    China: Dollar, economics, bots, spying

    RED Alert

    International money market:




    Terrorist Names SEARCH:

    Taliban and the Drug Trade

    The Taliban and the Drug Trade

    Well, for those who have argued there is no smoking gun linking the Taliban to opium production, the jig is now up. NATO forces discovered 11 tons of processed opium in a Taliban stronghold in Afghanistan, meaning the opium was at the stage where it can be converted to heroin on about a one-to-one ratio. In other words, it was almost 11 tons of heroin.

    The Taliban had an ambivalent relationship with the poppy trade during its reign of terror in Afghanistan, and now appears to have done away with any pretense of not engaging in the lucrative trade.

    This explains in large part, as I have written about over the past year, why the Taliban and the Arab/foreign fighters allied with them, have greatly increased their firepower and tactical and communications capabilities.

    This is only the latest sign of the merging pipelines and blurring of the distinctions with terrorists and transnational criminal organizations. The great equalizer in this is the drug trade, which offers relatively easy access to huge amounts of money. Few seem able to resist it, from the thugs running Burma to the Central American gangs and criminal groups that control the Central America-Mexico pipeline.

    There has been a long-held predisposition in the intelligence community to believe that because Islam severely frowns on the use of drugs (particularly the kind of Islam espoused by the Taliban), the group did not really participate in the drug trade. If they execute people for drug possession, then how could they justify trafficking in the product?

    Well, the answer lies in creative theology. There have been several fatwas issued by Taliban theologians since 2001 allowing a Muslim to engage in activities that are harmful to the enemy (that would be us), even if they are actions that a Muslim normally could not take.

    It is not so different elsewhere, where ideology can be substituted for theology.

    Over the years we have seen the FARC lose all trace of ideology as the drug trade and its wealth has supplanted Marxism as a reason to fight the state. The Self-Defense groups, formed to fight the FARC, also devolved into cocaine trafficking organizations that reaped tens of millions of dollars.

    In both cases (and many others), the situation is complex. The Taliban, FARC and others allow people in the territories they control to benefit from one of the few economically viable activities that exist there. This, in turn, buys the Taliban or FARC a measure of goodwill from the population.

    Eradication efforts, while somewhat harmful to drug trafficking organizations, is far more costly for the government or state actor in the equation. The state is depriving people of their livelihoods, on top of not protecting them from the rebels/terrorist/bandits. Not a great way to build political capital or credibility among people who have no alternatives.

    But the cost of doing nothing is also high. Look at the Taliban’s gains to see what opium money has gotten them.

    The slide toward criminal activity is almost impossible to stop once it starts. Protecting poppy or coca plants soon becomes providing protection for drug trafficking organizations, which eventually becomes drug trafficking itself. Each step brings increasing profits, which are hard to forego.

    Once a group can plug into a pipeline that moves one illicit product, it is very little effort to diversify to put other products in the same pipeline. After all, the gatekeepers in the pipeline are the same, whether the product is drugs, guns, humans or diamonds.

    And once in the pipeline, it is very difficult to get out. The money is too good, the threats for leaving too great, the ideology or theology easily massaged to justify what is happening.

    The Taliban is well down a slippery slope that we will all pay a price for, none more than the long-suffering people of Afghanistan.

    Douglas Farah


    Somebody is buying the drugs from Taliban, exporting, refining and re-sale, to Europe, Russia and USA.

    So put a team on them, turn off the drug Faucet. Take out the next link, funders, distribution network. Some Callie like cartel in/around Afghan.

    Try turning the New anti-terrorism banking unit on these guys...."Taliban drug Cartel".



    Labels: ,

    Terrorist Names SEARCH:

    "NOISE" concerns & merry christmas

    A CIA Contractor Christmas


    Day One. Partridge in a pear tree: During the night-shift at the NSA, Booz Allen contractors suddenly have their online Christmas shopping interrupted when Booz Allen proprietary counterterrorist data-mining algorithms note an unusual spike in internet chatter of "persons of interest" using the term "partridge in a pear tree." Their NSA Contracting Officer's Technical Rep is alerted.

    Day Two. Two turtle doves. At the NSA, SAIC contractors discover a correlation between "partridge in a pear tree" and "two turtle doves." The NSA notifies the CIA. CIA analysts who are new to the job due to high Agency turnover do not recognize the turtle-dove/partridge-in-a-pear-tree pattern, but speculate that the combination of phrases indicates that a terrorist plan may have gone operational. The White House is briefed.

    Day Three. Three French Hens. Sources on the ground in Paris are unable to corroborate indications of French involvement. Officers in the National Clandestine Service suspect the French hens are a false-flag and secretly hope that the Russians are back in the game. Due to strong political pressure from the White House, CIA analysts concede that the Iranian involvement cannot be ruled out.

    CIA interrogators at a black site in Burkina Faso send a cable to Headquarters requesting permission to gut slap an al Qaeda detainee who may hold valuable information.

    Day Four. Four Calling Birds. At the behest of the Administration, AT&T, MCI, Sprint and Verizon all hand over their calling data to third-party data warehousing companies that do not face the same legal restrictions as the telcos, creating a rendition program of sorts for data. The data warehousers frantically sift through calls.

    CIA interrogators at the African black site are frustrated when Headquarters requests more details about potential information that could be acquired from the detainee if he is slapped. They curse the lawyers and compose a response. A senior contractor overseeing facilities management at the site quips that they should suggest the detainee may volunteer information about five golden rings, but he never thinks the kids running the interrogation would not get the joke. The 26 year-old case officer in charge of the interrogation cables Headquarters that the detainee likely holds information about five golden rings.

    Day Five. Five Golden Rings. New NSA intercepts discover "persons of interest" discussing "Five Golden Rings." With this new development, CIA analysts suspect terrorists are plotting to use five dirty bombs to radiate large areas of US metropolitan areas.

    The Deputy Director of National Clandestine Service is excited that one of the black site detainee may know about the golden rings. Over the objections of his Assistant General Counsel, the Deputy Director approves the slap.

    Day Six. Six Geese-A-Laying. A blogger who monitors al Qaeda internet sites and chat rooms contacts the Office of the Director of National Intelligence to alert them to a suspicious discussion among al Qaeda sympathizers about "six geese-a-laying." The ODNI passes the intel along to the CIA and NSA and as word of the sites spread among Intelligence Community members, the sites are slammed with new visitors




    Terrorist Names SEARCH:

    Friday, December 21, 2007



    END OF WAR....
    you can send usa home..


    HOW? Everybody would know..! NOT




    Terrorist Names SEARCH:

    Understanding:, is all we NEED

    There is a lot of space given to political correctness and this post isn't about that.

    This post is about UNDERSTANDING.

    USA wants the World to understand if Mainland USA is attacked, USA will kick their asses, 6 years after 911, and USA is still killing the people in the groups responsible. WAR.

    6 years later, Billions of dollars a year and the might of the USA armed forces still POUND the Enemy.

    USA will hunt them unto DEATH or arrest.

    End of Understanding.




    Terrorist Names SEARCH:

    China taps into U.S. spy operations

    China taps into U.S. spy operations

    By Bill Gertz
    December 21, 2007

    China's intelligence service gained access to a secret National Security Agency listening post in Hawaii through a Chinese-language translation service, according to U.S. intelligence officials.

    The spy penetration was discovered several years ago as part of a major counterintelligence probe by the Naval Criminal Investigative Service (NCIS) that revealed an extensive program by China's spy service to steal codes and other electronic intelligence secrets, and to recruit military and civilian personnel with access to them.

    According to officials who spoke on the condition of anonymity, China's Ministry of State Security, the main civilian spy service, carried out the operations by setting up a Chinese translation service in Hawaii that represented itself as a U.S.-origin company.

    The ruse led to classified contracts with the Navy and NSA to translate some of the hundreds of thousands of intercepted communications gathered by NSA's network of listening posts, aircraft and ships.

    NCIS agents discovered that the translation service, which officials did not identify by name, had conducted contract work for the National Security Agency facility at Kunia, an underground electronic intelligence post some 15 miles northwest of Honolulu that conducts some of the U.S. intelligence community's most sensitive work.



    Labels: ,

    Terrorist Names SEARCH:

    FBS's cell phone talking spam bots?

    Russia's FSB vs Cybercrime

    In what looks like a populist move from my perspective, the FSB , the successor of the KGB, have "Pinch-ED" the authors of the DIY malware Pinch. A populist move mainly because the Russian Business Network is still 100% fully operational, the Storm Worm botnet was originally launched and is currently controlled by Russian folks, and the lack of any kind of structured response on who was behind Estonia's DDoS attack. Pinch-ing the authors is one thing , pinch-ing everyone that's now literally generating undetected pieces of malware through the use of the kit on an hourly basis is another :

    "Today Nikolay Patrushev, head of the Federal Security Services, announced the results of the measures taken to combat cyber crime in 2007. Among other information, it was announced that it had been established who was the author of the notorious Pinch Trojan - two Russian virus writers called Ermishkin and Farkhutdinov. The investigation will soon be completed and taken to court. The arrest of the Pinch authors is on a level with the arrests of other well known virus writers such as the author of NetSky and Sasser, and the authors of the Chernobyl and Melissa viruses."

    This event will get cheered be many, but those truly perceiving what's going on the bottom line will consider the fact that fighting cybercrime isn't a priority for the FSB, and perhaps even worse, they're prioritizing in a awkward manner. I once pointed out, and got quoted on the same idea in a related research, that, Pandora's box in the form of open source malware and DIY malware builders is being opened by malware authors to let the script kiddies generate enough noise for them to remain undetected, and for everyone to benefit from those who enhance the effectiveness of the malware by coming up with new modifications for it. I'm still sticking to this statement. If the authors behind Pinch weren't interested in reselling copies of the builder, but were keeping it to themselves, thereby increasing its value , they would have been the average botnet masters in the eyes of the FSB, but now that the builder got sold and resold so many times I can count it as a public one, the authors compared to the users got the necessary attention.......

    Don't forget that a country that's poised for asymmetric warfare domination in the long-term, will tolerate any such asymmetric warfare capabilities in the form of botnets for instance, for as long as they're not aimed at the homeland, in order for the country's intell services to acquire either capabilities or "visionaries" by diving deep into the HR pool available . The rest is muppet show.
    SOURCE:Dancho: he has more



    Talking Robot cell phone spam/voice, from bot nets.( DOS on phone services? )

    Random phone number ROBOT PHONE SEX.... LOL LO L H AA ha ha...I swear thats where the paradigm leads,..They call and start talking lol....... inductive reasoning...LOL ROF
    I swear.

    Its a valid hypothesis.

    Also to call and talk to people in certain nations, exchanges; recruiting .... donations, etc.


    Labels: , ,

    Terrorist Names SEARCH:

    OSINT, New value.

    ( gOOGLE blog is messing up formating, in compose mode this appears as normal paragraphs, sorry G }
    One result of this revolutionary change has been a newfound willingness on the
    part of the U.S. Intelligence Community to reexamine the extent to which it relies —
    or has failed to rely — upon open source information, which some have argued has
    been relegated to a “second class” status by many intelligence professionals who
    continue to value secret information above all else. As part of this reexamination, the
    Intelligence Community appears to be reassessing a number of open source issues,
    including the relative value of open source information compared to that of secret
    information; the impact and importance of the growing volumes of information
    unlocked by easy access to the Internet; the dampening effect that certain Community
    security practices may have had and may continue to be having on the use of open
    sources; the state of development of analytic tools necessary to effectively and
    efficiently collect, sift, analyze, and disseminate a vast volume of publicly available
    information when analysts are expected to also analyze increasingly large amounts
    of classified information; and, training issues relating to open source technology and
    If the global information revolution has sparked debate within the Intelligence
    Community over the value of open source information, the ongoing jihadist terrorist
    threat has sharpened its focus. In underscoring the strategic and tactical importance
    of open source information generally, and the role of the Internet specifically, one
    senior policymaker recently described the Internet as being America’s new open
    source battlefield.

    Ultimately, these observers suggest, the United States must develop the capability to understand and influence foreign populations — “not in their council of states but in their villages and slums” — if it is to effectively counter the threat posed by jihadists. In such circumstances, it is argued, the information that should matter most to policymakers can be derived from open sources.

    The debate over the relative value of open source information, compared to that
    of classified data, is occurring at a time when the global information environment is
    viewed by some as having reached a “post-modern” stage.3 In such an environment,
    secret information may be less important than the combination of open source
    information, information sharing, computer networking, and an ability to sift and
    analyze a dizzying volume of open source information. Indeed, one former senior
    intelligence officer suggested that whereas the 20th century was the century of
    secrets, the 21st century may well prove to be the century of global information. If the
    Intelligence Community as a whole accepts and understands this change, according
    to some observers, it may gain an edge in confronting current threats, particularly
    those posed by terrorism.

    Intelligence professionals generally agree that open source information is useful
    and that such information should be collected and analyzed, just as is data derived
    from classified sources. They disagree, however, over its value relative to that of
    clandestinely-collected secret information, and thus the amount of time, attention,
    and resources that should be devoted to its collection and analysis remains in dispute.
    For a brief case study of open source intelligence, see Appendix.

    There generally are three different prevailing views regarding the of relative
    value of open source information. The first holds that policymakers simply derive
    less value from such information than from clandestinely-collected secrets. While
    open source information can complement, supplement and provide context for
    classified data, such information, it is suggested, rarely provides insight into an adversary’s plans and intentions. ( This would suggest they are not employing Paradigm Intel at all? Gerald )Policymakers tend to view such information as being critically important to policy deliberations, and attach to it the highest value.
    For that type of insight, it is argued, the Intelligence Community must discover and
    collect secrets. It therefore is entirely appropriate that the Community target the
    preponderance of its resources to that end. As the Director of Central Intelligence (DCI) reportedly stated in 2005, “I only have money to pay for secrets.”..................................................(Bad news for USA.G)

    The second view asserts that open source information should be viewed not only
    as an important contextual supplement to classified data, but also as a potential
    source of valuable intelligence, in and of itself. Proponents of this view tend to cite
    the as-Sahab Institute, al-Qaida’s sophisticated Internet-based messaging and
    propaganda multimedia production facility, as an example of why open source
    collection and analysis is so important in today’s technology-driven and globalized
    world.5 Others cite al-Qaida’s ability to use virtual space to recruit, proselytize, plot,
    and plan with impunity.6 According to one observer, “al-Qaida is right on the cutting
    edge of the adoption of new technologies. They grab hold of the new stuff as soon
    as it becomes available and start using it.”7 Another commentator suggested that
    gaining an understanding of the inner workings of the as-Sahab Institute may provide as an effective way as any “to get close to bin Laden and Zawahiri.”8 According to one former senior intelligence who believes that the Intelligence Community continues to undervalue open source information, “[Open source information] is no longer the icing on the cake, it is the cake itself.”

    Proponents of the third view adopt a “middle-ground” position, arguing that
    open source information probably will never provide the “smoking gun” about some
    issue or threat, but that it can be instrumental in helping analysts to better focus or
    “drive” clandestine collection activities by first identifying what is truly secret. Open
    sources therefore should be viewed as an analyst’s “source of first resort.” Although
    these adherents tend to champion the relative value of open sources, their supports
    appears to be measured. While generally believing that the Intelligence Community
    should devote additional resources to collecting and analyzing open source
    information, they appear wary of over-selling its value. “We don’t have the
    confidence yet,” according to one senior intelligence officer, in explaining such


    We view as clandestine info and OSINT a screw drivers, one flat head and the other philips. It is just a question of what you need.

    And we just heard that the CIA doesn't use philips screwdrivers?

    The value we see to our OSINT OPs is that of up-to-date info, bots feed you what your interested in, in real time.


    Labels: , ,

    Terrorist Names SEARCH:

    Thursday, December 20, 2007

    Internet terrorists next moves.

    new study from the Pew Internet & American Life Project finds that the next generation at least is switched on and producing content.

    According to the study, 59% of all American teenagers engage in at least one form of online content creation. Of those 35% of all teen girls blog, compared with 20% of online boys, and 54% of girls post photos online compared with 40% of online boys. Boys however like their video, with 19% of boys posting video online vs. 10% of girls.

    Other figures from the study:

    • 39% of online teens share their own artistic creations online, such as artwork, photos, stories, or videos
    • 33% create or work on webpages or blogs for others, including those for groups they belong to, friends, or school assignments
    • 28% have created their own online journal or blog, up from 19% in 2004.
    • 27% maintain their own personal webpage
    • 26% remix content they find online into their own creations

    Interestingly the presumed dominance of social networking sites (such as Facebook and MySpace) amongst teens was not reflected in the study, which found that only 55% of teens online use a social networking site. The flip side to that is that the presumption that sites such as MySpace may have peaked may be untrue if 45% of teens aren’t using one of these sites already.

    The full study is available here (pdf).




    Labels: , ,

    Terrorist Names SEARCH:

    USA civilians waiting for Hamas at home

    USA civilians waiting for Hamas at home, there was talk of Hamas attacks in USA if Iran was attacked.
    ....They might have thought a small town without police would be an easy target?
    Just civilians. Any village in America will give them a warm welcome, just like the passengers on the third plane on 911.


    Labels: ,

    Terrorist Names SEARCH:

    Never know when,

    I have seen so many vids of after action, the Insurgents ambush, and then run, and USA has assets on site to track the perps, verify involvement, and in this case watch them hid their weapons.
    Movement of around 3,000 feet from ambush, hide weapons and one even sets down to wait for the straggler. When their world ends, payment for their deeds. Never even knew it was coming, they were in the process of congratulating themselfs on a successful attack and retreat, and then all dead. They were not ready for martyrdom. They were being tracked by an invisible ghost that took their breath.

    One of them might have been filming, and the film could end up on Internet, looking like a very successful attack, with no mention of all killed after ambush.


    Tracked mortar team, drive away, go home. ALL dead.



    Labels: , , ,

    Terrorist Names SEARCH:

    al Qaeda pisses wrong guys off.

    al Qaeda pisses wrong guys off.
    caution adult lanugage, after and during ambush and counter attack, adult.

    The Platoon poors it on steady for 3 min and 39 sec, HARD:

    Labels: , , , ,

    Terrorist Names SEARCH:

    al-Zawahri's shoes have holes.

    Ayman al-Zawahri latest rant, there have been so many recently, is about public relations for al qaeda.
    Where is his Eid Message to the Ummah?
    During the most important Muslim holiday of the year, there were calls for peace and Qaeda; not so much.
    Too much about al aqeda, not enough about Allah, the Hajj.


    Can they do a chat room ?


    Labels: , , ,

    Terrorist Names SEARCH:

    Wednesday, December 19, 2007

    Auto shotgun, recoiless, 300 RPM

    Auto shotgun, recoiless, 300 RPM

    Labels: , , ,

    Terrorist Names SEARCH:

    Lap top Nuclear Reactor

    Lap top Nuclear Reactor...well ok its not, yet
    But will fit into THE coal bin.

    This is so bad and good on so many levels....
    End of oil shortage?
    Start of homemade nukes?

    Toshiba Builds 100x Smaller Micro Nuclear Reactor

    Toshiba has developed a new class of micro size Nuclear Reactors that is designed to power individual apartment buildings or city blocks. The new reactor, which is only 20 feet by 6 feet, could change everything for small remote communities, small businesses or even a group of neighbors who are fed up with the power companies and want more control over their energy needs.

    The 200 kilowatt Toshiba designed reactor is engineered to be fail-safe and totally automatic and will not overheat. Unlike traditional nuclear reactors the new micro reactor uses no control rods to initiate the reaction. The new revolutionary technology uses reservoirs of liquid lithium-6, an isotope that is effective at absorbing neutrons. The Lithium-6 reservoirs are connected to a vertical tube that fits into the reactor core. The whole whole process is self sustaining and can last for up to 40 years, producing electricity for only 5 cents per kilowatt hour, about half the cost of grid energy.

    Toshiba expects to install the first reactor in Japan in 2008 and to begin marketing the new system in Europe and America in 2009.

    Bots found more:

    You kids get your fingers out of that lithium-6, if I come down there.


    Good bye OIL at $100 a bbl.


    Labels: , , ,

    Terrorist Names SEARCH:

    Taliban, high or drunk

    4th Platoon D Company getting ambushed on the KOP Road.
    Korengal Valley 1-32 Inf 10th Mountain.

    They shoot all day and can't hit a damn thing.
    Stationary targets and still miss again and again.
    Is it honorable for USA to fight idiots?
    USA is ashamed to fight the likes of these.
    It is harram.

    8 RPGs
    Insurgents 0
    USA 5 to 10 ( the way the camera man fell and
    their position was hit. )
    They have to be buzzed to keep firing at same position and never adjust.

    Taliban has to hire addicts and/or Idiots.

    Astounding fire power display.


    Labels: ,

    Terrorist Names SEARCH:

    Robotic Interrogators Deployed

    Robotic Interrogators Deployed
    December 12, 2007: A scary new intelligence collecting tool has shown up in Russia. The new threat is a program that can be set loose in chat rooms of dating services, and convincingly flirt with people, getting them to reveal information about themselves (that can then be used for identity theft type crimes.) So far, the CyberLove program only works in Russian, but the rumor in the hacker underground that this is just beta testing, and that the system will be for sale in February (in the largely hidden hacker market), just in time for Valentines Day.

    This kind of social engineering software is nothing new. The first of these programs, "Eliza" was created in the 1960s, on a dare, to imitate an online therapist. It worked better than its creators expected. While an experienced software engineer, or just a good conversationalist, could quickly figure out that Eliza was not a real person, many people could not.

    CyberLove is a lot more convincing, although converting it to work in other languages (with their different social rules) or on different types of chat rooms (like those frequented for military personnel) will require a lot of work, it won't take a particularly huge effort to do this.

    Convincing chat room bots open up big opportunities for intelligence agencies. With thousands of chat rooms devoted to Islamic, and other forms of, terrorism, CyberAgent software could collect a lot more information than is currently being grabbed by just monitoring these chat rooms. Some believe that U.S. intel agencies have already developed bots for this purpose, as this technology has been intermittently developed, and deployed, since Eliza first appeared. CyberLove, however, is the most powerful program of this type to ever show up.


    The business sector did a passive version Here.

    The criminals are inovationg faster than the business sector that means they have bought the better brains.

    USA is falling behind on another front.


    Labels: , ,

    Terrorist Names SEARCH:

    Tuesday, December 18, 2007

    Cyber Jihadist Hacking Teams

    Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

    These groups and fractions of religiously brainwashed IT enthusiasts utilizing outdated ping and HTTP GET flooding attack tools, represent today's greatly overhyped threat possed by the cyber jihadists whose cheap PSYOPS dominate, given the lack of strategical thinking, and the lack of sustainable communication channels between them, ruined all of their Electronic Jihad campaigns so far. Religious fundamentalism by itself evolves into religious fanaticism, and with the indoviduals in a desperate psychological need for a belonging to a cause, ends up in one of the oldest and easiest methods for recruitment - the one based on religious beliefs.....

    The teams, and the lone gunmen cyber jihadists in this post are : Osama Bin Laden's Hacking Crew, Ansar AL-Jihad Hackers Team, HaCKErS aLAnSaR, The Designer - Islamic HaCKEr and Alansar Fantom. None of these are known to have any kind of direct relationships with terrorist groups, therefore they should be considered as terrorist sympathizers......

    ( I understand Dan's classification, and agree they have no known connections to known terrorist groups, but our classification is different, the expression of terrorist objectives and diligent working towards those ends with attempted attacks, qualifies some of them as terrorists, the rest, everybody watch. We have over stated the case in previous posts and need to clean it up. G)

    The bottom line, script kiddies cyber jihadists dominate, PSYOPS fill the gaps where there's zero technical know-how, mentors are slowly emerging and providing interactive tutorials to reach a wider audience, localization of knowledge from English2Arabic is taking place the way propaganda is also localized from Arabic2English, and there's also an ongoing networking going on between cyber jihadists and Turkish hacktivists converting into such on a religious level. Case in point - MuslimWarriors.Org defacement campaigns with "anti-infidel" related messages.

    At this time the E-jahiddies are a nuance, cute. If someone could have spotted Bin Laden
    as a boy and influenced him who knows; he might not be killing Muslims, women and children, bombing Mosques and Market places.

    The gold fish could benefit from some influence.
    The sharks are open game.
    The Internet is an area of high risk and high reward for the terrorist.
    This is an area of grave concern.
    Old Chinese curse:
    "May interesting things happen in your life"
    they will, they will....



    Labels: , , , ,

    Terrorist Names SEARCH:

    Monday, December 17, 2007

    Paradigm shift, war to police action.

    Paradigm Intel: War status.
    There is some evidence that the struggle has or will switch from a "War"
    to a "Police Action". After Iraq.

    A "running hammer,( snipers and special squad )" and "burn ( Battalion; ready for air drop )" may be more effective, and put fewer troops in the field. Ability to hit "them" 24/7 with snipers and supper supported squad.

    Snipers allow pin point, individual, targeting with almost no collateral damage. Engage them anywhere, anytime.

    Drop in a squad of 4 to 8 in support of sniper teams.

    The squad, like the CIA team that fought the WAR of Afghan, would have the backing and power of a battalion, and full air support, gunships, c-130, B-52's, drones, arty everything..
    Snipers take out some Taliban and when the rest come after the snipers
    use air power to take out rest of Taliban.

    Taliban take over a town drop in 4 sniper teams backed by the special squad.
    Start shooting Taliban: quit when they are all dead. Use the burn for blocking.

    5 to 10 of these special squads with snipers could run the Taliban to ground.

    Use the sniper teams as bait and grind al Qaeda and Taliban up.
    Don't react to village take overs, chase them, switch from reaction to chasing.

    They don't have enough forces to protect every village,
    but do have enough forces to chase them 24/7.
    Switch snipers and 'team' out every 12 hours.
    Hot teams running them all the time.


    USA is facing maybe 20,000 terrorist world wide, minus guns for hire.
    Afghan its a third of that at most, mostly farmers,
    about half with any Military training, very little medical support.
    Problems with addiction, poor performance and high turn over rates
    internal fighting, language problems, payroll and food supplies and keeping morale up. Freezing and their leader is hiding in a cave.

    They switched context, USA hasn't yet.

    Is anyone checking the suicide bombers remains for drugs???


    Labels: , ,

    Terrorist Names SEARCH:

    al Qaeda uses the suicide bombers for a "MEDIA DANCE"

    al Qaeda uses the suicide bombers for a "MEDIA DANCE"
    al Qaeda, " Dance you dumb bastards", "DANCE for the Media".
    Suicide bombers wanted, iraq,afghan,pakti. martyr needed . for media, film,video,

    DANCE , dance you poor dumb bastards. قد يغفر الله لهم.
    The artist is a "GENIUS"....

    anyone know where I can download this?

    Labels: , , ,

    Terrorist Names SEARCH:

    Al-Zawahiri Threatens Iran, Iraq and USA.

    Even al Qaeda knows the value of an American in their leadership.

    Al-Zawahiri Threatens Iran, Iraq and USA.

    Al-Zawahiri called "the rise of the avant-garde of the mujahideen of the Islamic nation, ( Sorry al Qaeda has already gone through first, second and third levels of the Islamic avant-garde, like small candles. G) " the the most important development in the Islamic world, saying that it had "become a fact in the world as a result of the growing Islamic awakening" across the Muslim world. He said that Iraq was the most important jihad front today, and that the jihad fighters' strength was on the rise ( Is that why you say there is no al Qaeda left in Iraq today? Yes it is the most important Front today and al Qaeda has lost. G) while the Americans were weakening, and added that their exit from Iraq was only a matter of time - and proof of this is was U.K.'s decision to flee.

    Al-Zawahiri called on the jihad fighters to fight the Iraqi government and security apparatuses, which he termed murtadoun (i.e. those who renounce their religion). ( Who has renounced ISLAM? Killing Muslims,women and children, bombing Mosques and Market places? G) With regard to the Iraqi tribes' collaboration with the Americans, he stated that these tribes were mere riffraff that the Americans had bought and paid for in order to sow civil war among the Muslims, and stressed that the honorable tribes supported jihad and that many of their sons were fighting in its ranks. He called on the tribes to purge themselves of this riffraff, and threatened that their day would come; the Americans would soon leave and would not be able to protect them forever.

    Al-Zawahiri noted that there was now nothing called Al-Qaeda in Iraq, since the Al-Qaeda organization in Iraq would be merging with the other jihad groups in the Islamic State of Iraq (ISI), which has become a shari'a Imara (a shari'a-based Imara, i.e. under an Amir) and had received a vow of allegiance from most of the jihad fighters and tribes in Iraq. He rejected accusations that the ISI was killing innocent people, and claimed that in any case, when Muslims fought with the enemy against jihad fighters it was a very grave crime.

    Al-Zawahiri accused the global media of manipulating Osama bin Laden's most recent recording, by omitting its most important parts and by misinterpreting bin Laden's statements. Al-Zawahiri said that bin Laden's criticism was not directed against the ISI alone, but against all jihad fighters in Iraq, and that the jihad had shattered the monopoly held by the government and media that pretended to be independent, such as the BBC, and that the jihad was today directing "the most important media battle against the Crusader-Zionist enemy" and exposing the world to facts to which it had not previously been exposed. He added that the jihad had triumphed in this ideological battle just as it had triumphed in the battle over the Internet websites.( The JHIDDIE WEB SITES ARE CLOSED DOWN AT WILL. G )


    al Qaeda now has no FRIENDS, except for the Taliban, that saya a lot.



    Labels: , , , ,

    Terrorist Names SEARCH:

    USA Air Force says it needs more F-22's

    USA Air Force says it needs more F-22's.

    I remind the Pentagon that not ONE USA troop has been killed by an enemy Plane in 25 to 30 YEARS.....


    We would like to see the Air Force get the F-22's in view of their record.



    Labels: , ,

    Terrorist Names SEARCH:

    Rid Islam of Biny and remain secret

    "Labeik, Allahuma, labeik"

    Could one rid Islam of the Satan who is Bastardizing Islam,
    and remain completely anonymous, secret?

    Allah is great,

    Those who believe, fight in the Cause of Allâh, and those who disbelieve, fight in the cause of the (false moujadeem), Tâghût (Satan). So fight you against the friends of Shaitân (Satan). Ever feeble indeed is the plot of Shaitân (Satan the false Moujahedeen ). ] al-Nissa:76.

    And collect a reward Allah has made available through the USA.

    $25 million dollars?

    Do a good deed, collect and remain secret, completely ANONYMOUS?

    It is possible.
    (or Baitullah Mehsudif, $50,000 usd )
    you know where Binny is and want to rid Islam of this curse,
    We could form our own Hawala.
    #1) Tell us where Binny is, including proof Photo, etc.
    #2) we collect
    #3) and put your half in a SWISS Bank
    #4) and email you the Encrypted password.
    We work to insure your anonymous, forever.
    We don't want to know who you are, for our Protection and your Protection.
    We deal with the Government and collection process.
    Rewards for Justice, has paid $77 million in rewards to more than 50 people.

    Allah said : (Allah has promised, to those among you who believe and work righteous deeds, that He will, of a surety, grant them in the land, inheritance (of power), as He granted it to those before them; that He will establish in authority their religion -the one which He has chosen for them; and that He will change (their state), after the fear in which they (lived), to one of security and peace: 'They will worship Me (alone) and not associate aught with Me. 'If any do reject Faith after this, they are rebellious and wicked.) 55,AlNOOR.

    Allah said: "The punishment of those who wage war against Allah and His Messenger, and strive with might and main for mischief through the land is: execution, or crucifixion, or the cutting off of hands and feet from opposite sides, or exile from the land: that is their disgrace in this world, and a heavy punishment is theirs in the Hereafter." 33:Al-Maeda .

    Question is; how soon someone collects this ....

    Email us at:
    Barb.andrews at
    or use comments BELOW, I alone read them and ok or DELETE any comments (Secret messages I DELETE).
    Or use "tip form" to the right.

    al Qaeda who kill Muslims, women and children bomb Mosques and market places.
    THE Islamic Umma ARE IGNORANT so says al Qa'ida.
    al Qa'ida has attacked the mausoleum of Imam Ali Bin Abi Talib, may God honor him.
    And can the mujahedeen kill all of the Shia in Iraq? So says al Qa'ida.
    And why kill ordinary Shia considering that they are forgiven because of their ignorance?
    al Qa'ida has ordered Muslims killed even if they announced Shahadateen and this rule is agreed upon by all Muslims.

    The Crescent Star of Islam

    Anthropologist, ad Magnum
    Asking the Lord to accept. The overall objective of this bulletin : Brothers and sisters urged to publish this article to relatives and friends, and in the mosques, and every person standing on the Internet Through the printing and distribution of the bulletin, and read on boards and also through sent by e-mail and e-mail Different groups, and chat rooms. , and other ideas that have the positive impact.

    Photos: Taliban:


    $200,000 to $20,000 ...

    Using a throw away phone call: 1-(734) 619-0424 ( in USA )
    To Keep your phone number secret! USE:

    Labels: , , , ,

    Terrorist Names SEARCH:

    Chat with Zawahri...Really

    AL-QAEDA sympathisers have been asked to send in their questions for the terror network's second in command, which he will then answer in an online interview next month.

    The bizarre stunt was announced in a new video posted on the internet in which al-Qaeda's number two, Ayman al-Zawahri, mocked today's British handover of security in southern Iraq to local forces as a sign that insurgents are gaining the upper hand.

    The video, carried by Islamic websites, was issued as Britain handed over security to Iraqi forces in the last of four provinces it once patrolled, effectively marking the end of nearly five years of British control of southern Iraq.

    The websites invited readers to send in questions during the next month for Zawahri to answer in an "open interview". How the interview would work was not immediately clear.

    Actually this may be doable :

    A proxy to a chat room, or IRC,
    They are probably Internet savvy enough to pull it off.
    And this will cost lives, increase morale and recruitment.
    Again USA is caught by surprise, asymmetric warfare, in the Info war, for the minds and hearts.

    But what will the wanabees ask?

    "How can I join al Qaeda?" They can't !

    "How much does al Qaeda pay?"

    "Why does al Qaeda suck at fighting?"

    "Why does al Qaeda have such high turnover, and NO retirement plan?"

    "will al Qaeda continue to kill other Muslims, women and children, bomb mosques and market places during Hajj?"



    Labels: , ,

    Terrorist Names SEARCH:

    Sunday, December 16, 2007

    Afghan languages, physical locations?

    How can a country the size of Afgahn, have so many languages?

    Languages of Afghanistan

    From an anthro stand point I would hypothesize it is because the different villages truly are physically isolated, in the mountains for many years to develop different languages.
    It gives one thought as to the difficulty of fighting in such areas.
    And the difficulty in the battle for the hearts and minds through some contact, news papers, FM radio, AM radio?, internet?
    ( The Taliban seem to have over come the language difficulty. )
    Any one know of any reports?



    Labels: , , ,

    Terrorist Names SEARCH:

    Afghan Striker PAD

    Afghan background and geo. data: Barkhan District

    Villages in Afghanistan

    Volcanoes of Afghanistan

    Afghanistan geography stubs

    Government of Afghanistan

    See also: #Politics of Afghanistan

    Afghan heads of state

    Afghan monarchs

    Emirs of Afghanistan


    Miangul Aurangzeb

    Anthropolgist ad Magnum


    Labels: , , , ,