Internet Anthropologist Think Tank: 3/14/10 - 3/21/10

  • Search our BLOG

  • HOME
    Terrorist Names SEARCH:

    Saturday, March 20, 2010

    The real James Bond is Pashtun

    The real Majhadeen are Pashtun.

    The holy spies working against the al Qaeda cult
    and the Taliban are the Pahstoons, the real 007's.

    They risk their and their families lives daily to
    kill the al Qaeda cult members and the Taliban.

    ISLAMABAD (AP) - Hundreds of tribesmen from Pakistan'ssemiautonomous regions near the Afghan border ended a rare tribal council meeting Saturday with a declaration calling for the army to crush the Taliban.
    The meeting, held in the northwestern city of Peshawar, was called by an umbrella group of aid organizations and political parties in an effort to bring together people from the violence-battered region.

    Participants called for the army to escalate its attack against the network of Islamist militants across the tribal regions, dismissing Pakistan'searlier offensives as "military dramas."

    Syed Alam Mehsud, said the meeting was a way to bring together people from the area that is suffering most in Islamabad'swar against the militants.
    "We have just tried to unite people for the sake of peace," he said.
    Participants said they had little faith in the U.S.-Pakistan alliance, and that Washington and Islamabad were more worried about internal political issues than dealing with the deepset social issues at the root of much of the violence.
    "If we do not address the mindset of the terrorists, we will not be able to eliminate terrorists," said Mehsud.
    The tribal leaders urged the government in Pakistan to reach out to the militants—but also to crush those unwilling to negotiate.

    "We tribesmen are more patriotic than anybody else," said one participant, Din Mohammad Khan, who had come South Waziristan,where a government offensive that began last fall is thought to have killed hundreds of people—militants and civilians.

    "Pakistan is ours. We are for Pakistan," he said.


    Why We Fight from Tyler Ginter on Vimeo.


    "Terrorism is terrorism, violence is violence, and it has no place in Islamic teaching and no justification can be provided for it."




    Terrorist Names SEARCH:

    Ops and Intel update 03.20.10

    Google formating sucks, highlight to read post...G

    Fingertips Leave A Bacterial Fingerprint

    Zeus Botnet Activity Down but Far from Out

    Microsoft action on Waledac botnet saw between 70,000 and 90,000 users taken off the network, but computers remain infected and half are still trying to send spam.

    Microsoft's takedown of 277 websites that hosted the Waledac botnet has severed almost 100,000 computers from the network.
    The shutdown of the websites last month in what it called ‘Operation b49' saw a federal judge grant a temporary restraining order that cut off traffic to Waledac at the ‘.com' or domain registry level.
    Jeff Williams, director of the malware protection centre at Microsoft, said that this served as a new phase of exploration in combating botnets, which it calls Project MARS (short for Microsoft Active Response for Security). He said that the company is still analysing and investigating the impact of this action, but early data from Microsoft and other researchers indicate that the actions have ‘effectively decimated communications within the Waledac bot network'.

    Fatwah Issued Against Terrorism

    "Terrorism is terrorism, violence is violence, and it has no place in Islamic teaching and no justification can be provided for it."

    The al-Qaeda-after-next is not to be feared, merely scheduled

    SECURITY | ISLAM: "Terror Has a New Name; Lashkar-e-Taiba--the Pakistani militant group that perpetrated the 2008 Mumbai attacks--Is Getting Ready to Go Global," by Jeremy Kahn, Newsweek, 15 March 2010.
    The roster is always going to be shifting.
    That's why we call it the long war.
    How long? Until globalization is truly global--simple as that.

    MIT Keeps System Online During Cyber Attack

    Previously, when a system was under cyber attack, the only solution to mitigate the threat was to take the server offline. However, there may now be another option. MIT researchers have developed a system that allows servers and computers to continue to operate even while under cyber attack.

    To Battle Computer Hackers, the Pentagon Trains Its Ow
    "We are creating cyber-bodyguards," says Sanjay Bavisi, president of the 

    council. "We're not creating combat people." But as the world becomes 
    increasingly interconnected via the Internet, the stakes have become too 
    high to rely on static defenses alone to protect the immense flows of 
    vital information that operate the world's financial, medical, 
    governmental and infrastructure systems. "The bad guys already have the 
    hacking technologies," Bavisi says. "We can say, 'Tough luck. The bad 
    guys play by different rules, and you can't do anything about it, so 
    just go lock your doors.' Or we can tell the good guys, 'We will arm you 
    with the same knowledge as the bad guys, because to defeat the hacker  

    you need to be able to think like one.'"

    ( GOOD LUCK, We are looking at selling a new cyber sidearm,
    details to be released soon. G )



    Terrorist Names SEARCH:

    Friday, March 19, 2010

    Blacks can't fight, US Civil War

    Blacks can't fight, US Civil War

    Dutch reject contention that gay troops undermined military

    Los Angeles Times - ‎2 hours ago‎
    After retired US Gen. John Sheehan criticized the Dutch policy, linking it to the Srebrenica massacre in 1995, the Netherlands' defense minister calls the comments 'unworthy of a soldier.


    During the US Civil War there were some Generals that thought
    the same way about blacks. G

    the resistance to black soldiers was the result of racist beliefs that African Americans were mentally and temperamentally unsuited for military service. Whites accepted this myth in spite of the participation of black men in the Revolutionary War and the War of 1812

    Read more: Black Civil War Soldiers



    Labels: ,

    Terrorist Names SEARCH:

    New wave of Terrorists?

    New wave of Terrorists?

    Pakistani police captured him with a truckload of laptop computers, video cameras, jihad training videos and semiautomatic weapons.

    ( Computers were given equal space as AK 47's. G )

    The tools this particular terrorist had adopted to accomplish that goal were not suicide bombs or sniper rifles, but laptop computers and other high-tech equipment. The purpose of his Taliban cell was to reach potential recruits online over the Internet.

    What I was hearing in the spare interview room would shed light on how the Taliban and al Qaeda in Pakistan and Afghanistan reached potential recruits around the world.

    "We video our fights with American forces and keep records of our martyrs," he said when I asked him about the laptops and video equipment found by police. "We want to get the message out to the world so they will see what is being done to us."
    He added, "We see the Internet, media reports about what is going on here. We see that it is lies, what the Americans and the British portray. We use our means to get the message out, the truthful message about what is happening here, and our war."
    Pakistani counterterrorism officials said in meetings last week that al Qaeda and the Taliban factions "have been recruiting more technologically savvy persons that can get their message out on the Internet."

    A Pakistani counterterrorism official said the Taliban and al Qaeda are stepping up efforts at online recruiting. "This is not endemic to Pakistan. They are feeling pressure and are now using the Internet even more to get their message across. It is their new tool in the war and a way to gain new recruits worldwide."
    In an earlier interview that day with North Western Frontier Province's Inspector General Malik Naveed Khan, whose men captured the young fighter, he said that these groups are "waging war against the world, not only with weapons but through the Internet and other media."

    Read more at the Washington Examiner:

    The Real Terror War Is On the Internet

    Terrorists and rogue states are moving their battle to the Internet in a virtual war against liberal democracy. For too long, the United States and its allies have ignored the incitement and violent propaganda from Internet platforms operated by violent Islamist extremists.
    Today, such neglect is not an option. As we have been warned by Harry Wingo -- a former Navy SEAL who now serves as Google's Washington, D.C. policy counsel-- "the code is mightier than the sword."
    Internet code is an operational weapon used by terrorist groups to indoctrinate, recruit, train, and finance the next generation of terrorists. Terrorist groups like Al Qaeda, Hezbollah, and Hamas (with support, in some cases, from rogue states like Iran) use a vast and anonymous terrorist Web network as another front in their war against the West. These Web outlets should be treated as indistinguishable from the terrorist organizations that use them.
    Is the threat real? A declassified U. S. National Intelligence Estimate concludes: "The radicalization process is occurring more quickly, more widely, and more anonymously in the Internet age, raising the likelihood of surprise attacks by unknown groups whose members and supporters may be difficult to pinpoint. We judge that groups of all stripes will increasingly use the Internet to communicate, propagandize, recruit, train and obtain logistical and financial support."

    What a wonderful smell you've discovered! JAWA

    Tactical Internet Systems analyst.



    Terrorist Names SEARCH:

    Thursday, March 18, 2010

    DHS secret level 4

    DHS Cyber Threat to the U.S.

    Remote Cyber Threat 3 Levels
    ( They missed level 4. G )

    Homeland Infrastructure Threat and Risk Analysis Center (HITRAC)

    Threat Level 4
    ( Paradigm Intel )

    Religious Fanatic, terrorist, Uber Criminal

    High order skills

    Well financed

    Target Internet nodes

    Use Bot herds

    Super DDos kind of attacks

    Detectable impossible to trace
    Bring down the WWW

    End of Gobalization,
    Expand the Gap away 
    from the core
    Black Mail

    Internet Anthropologist
    Tactical Internet Systems analyst.




    Terrorist Names SEARCH:

    Wednesday, March 17, 2010

    Dems sing "Cum bi ya"

    Political Paradigm Intel.

    The Republicans were preferred for 
    the initial GWOT.

    But the GWOT has matured.
    And the Public swept in the
    Democrats, a President,
    Majority in both the Senate and

    The two main issues have
    been Health Care,
    and Banking.

    The Republicans gave
    the keys to congress
    to the Bankers and 
    rescinded most Banking

    And the Republicans did the 
    same for the Health Insurance

    Paradigm Intel indicates
    the Democrats will maintain
    power directly in proportion 
    to what they do related
    to these issues.

    Americans are fed up with both
    the Republicans and Democrats.

    And the old parties are presenting
    good cases for a new third party.

    While the Banks and Insurance Cos
    control congress and the related laws
    thru lobbyists and legal bribery.

    American still control who is elected
    to Congress.

    The Democrats seem to be willing to
    leave Consumer Protection with

    The Federal Reserve has failed at 
    consumer protection, a total failure
    and almost allowed the Banks to
    bring the world to its knees in a credit

    And still NOTHING  has been done
    to curb the Banks criminal activities.
    30% interest on Credit cards and 460%
    interest on pay day loans. Mafia vig
    rates on loan sharking.

    Its up to the Democrats to grow some
    balls and confront the Banking and Insurance
    regulations, or they too will be out.

    Everyone ready for a Third party 
    find some to run.

    Internet Anthropologist



    Terrorist Names SEARCH:

    Initiative will be punished, investigated

    Initiative will be punished, investigated.
    Force protection be damned.

    NYT reporter rats out team protecting US troops on battle field.
    Intelligence columnist indeed, speculation passes for news.

    On Monday, the Times ran a story about Michael Furlong, the Defense Department official being investigated over an ad hoc spy ring. The piece raised more questions than it answered, and Washington Post intelligence columnist David Ignatius is now filling in some of the blanks.
    In a column today, Ignatius distills the story. “Under the heading of ‘information operations’ or ‘force protection,’ he writes, “the military has launched intelligence activities that, were they conducted by the CIA, might require a presidential finding and notification of Congress. And by using contractors who operate ‘outside the wire’ in Afghanistan and Pakistan, the military has gotten information that is sometimes better than what the CIA is offering.”

    Read More


    Instead of giving Michael Furlong a medal, and honors
    they are serving him up as scapegoat.

    New successful methods and techniques result in 
    witch hunt.

    New SysAdmin force paradigm:

    "force protection atmospherics", 

    The military has been frustrated by a general lack of  understanding about the social and cultural landscape of Afghanistan and Pakistan. And in its quest for ground truth, it has turned to nontraditional sources to fill in the gaps on cultural knowledge and the local scene.

    Read More

    General David McKiernan, the former top U.S. commander in Afghanistan, greenlighted AfPax Insider to help provide open-source assessments of the local situation in areas where coalition forces were operating. It was part of an effort to improve information flow — as well as respond to reports of civilian casualties, among other things.

    Smells like a turf war?
    Looks like active real time OSINT in situ.
    Feels like a GREAT idea.


    Labels: ,

    Terrorist Names SEARCH:

    Tuesday, March 16, 2010

    Cyber Threat Branch (CTB)

    Division, Office of Intelligence & Analysis (I&A), U.S. Department of Homeland Security
    (DHS). The mission of I&A is to provide a full range of synchronized intelligence to support
    the Secretary and Department, as well as DHS partners and customers to protect the homeland.
    This position performs a range of substantive intelligence operations duties associated with cyber
    threats by applying a knowledge of intelligence gathering and dissemination methods and
    techniques through utilization of multiple forms of information technology to address complex
    projects and issues.  The incumbent is responsible for supporting ongoing complex research collection and dissemination activities through assessments of information and data secured from various cyber sources. Concurrently, incumbent identifies cyber threats indentified with systems and technology vulnerabilities and risks by storing and providing access to the information and data under study.

    Related Posts: Cyber Threats.

    New threat:

    Old continual Threat:

    Defensive Measures:

    Internet Anthropologist, ad Magnum
    Tactical Internet Systems analyst.



    Terrorist Names SEARCH:

    New cyber Side Arm

    New cyber Side Arm:

    Click on Image

    You have all seen the Blue screen of death at
    some time or other, and it states to prevent
    damage to your PC it has been shut down.

    Well what if the blue screen of death shut
    was shut off, and the PC wasn't shut down?

    Say "Hmmm"




    Terrorist Names SEARCH:

    Monday, March 15, 2010

    What is Paradigm Intel?

    What is Paradigm Intel?

    There are many forms, we will be looking at one form today.
    Action vs Text.

    The actions vz what they say.

    If you follow the news one might think the Taliban are
    successful or even wining the Insurgent war in Afpak.

    Attacks show Pakistan's Taliban are far from defeated

    In reality the truth is far different.

    The Taliban are loosing big.
    They face defeat any time they battle US forces.
    Drones are attriting their upper level cadre on a regular
    They are funding their activities with drugs.
    They have spun death losses as a positive thing,
    The populations in Afpak are turning on the Taliban.
    Their biggest weapons are suicide bombers and IEDs.
    They lose every battle.
    There are thousands of Muslim spy working
    against them.
    There are two on going fronts in the heartland of the Pashtoons.
    Both in Afghanistan and Pakistan.

    Operating in the heartland of the Pashtun Tribe.
    Bring it home to the Taliban.
    All because of the al Qaeda cult.
    #1 is Marjeh, Helmand, Afghanistan a US major push.
    #2 is N and S Waziristan, Paki Army major push.
    Time for a Joint Af-Pak Mil cross border force.

    So what is the cause for the "Text" view of the Taliban sucess?

    Kanna-machi, Japan

    The United States military, has struggled with how to manage media coverage of the war in Afghanistan – and even the most basic approaches to an effective public-relations campaign.

    A haphazard approach causes significant harm to the war effort: Coverage of repeated televised apologies overshadows progress made by troops on the ground, and effective Taliban propaganda continues without adequate repudiation. With an effective media/public relations policy, the military could leverage news organizations to be an invaluable resource in fighting the Taliban.
    Despite what polemicists on both sides claim, the media has not been motivated by political bias in its coverage of Iraq and Afghanistan. Rather, ratings – and the advertising dollars they command – have been the driving force shaping media coverage.
    As the public’s attitude toward the mission in Afghanistan has soured, so, too has the tone taken by the media in its coverage of the war. News coverage is dominated by stories of corrupt Afghan officials and the newest trend, civilian deaths, leaving coalition commanders to engage in an endless cycle of public apologies.
    Even during the fierce fighting last month in Marjah, Afghanistan, the media was filled with stories of civilian casualties, forcing repeated apologies and pledges of restraint from Gen. Stanley McChrystal.
    Therein lies the first problem with the US military’s media strategy: It is impossible to win a war if one spends half the time apologizing. Compounding this, pledges to avoid civilian deaths, short of a stop to all military operations, are unfeasible. What the military ends up with is a public relations disaster and essentially “wins the battle, but loses the war.”
    Coalition troops may have scored a solid tactical victory in routing the Taliban from Marjah, but that triumph was overshadowed, even characterized, by coverage of civilian deaths and Gen. McChrystal shamefacedly appearing on TV to apologize. Worse, it will be another asset for the Taliban to use in its propaganda and recruiting campaigns.

    As it stands now, however, the military’s PR incompetence makes the media akin to a lead weight on the shoulders of a marathon runner.
    The second problem is the Taliban’s savvier use of propaganda. Unlike NATO forces, they don’t allow reporters virtually unfettered access, so they can make wild propaganda claims that go unchallenged, both by the media who eagerly report them, or by the military.

    To deal with Taliban propaganda, the US must forcefully denounce claims of exaggerated civilian/coalition troop deaths, or inflammatory accusations by the Taliban. At the same time, the military must do a better job of framing body counts, positively rebuilding stories, and particularly highlighting heroic efforts by military personnel for a media that desperately wants high ratings and online traffic.
    It is simply unacceptable for a rag-tag, poorly funded group such as the Taliban to so handily deliver one public relations defeat after another to arguably the most powerful force on earth. A revamped media/PR strategy is essential to bring the war in Afghanistan to a successful conclusion. And that would be the best story of all.

    A LIE:
    Posted enough times
    Over a long enough period,
    to enought sites,
    Without equal refutation
    over an equal time frame
    and as many sites,
    will become the Truth 
    on the Internet.

    They can win the Info war just
    by out posting the Truth.

    Internet Anthropologist