Internet Anthropologist Think Tank: 7/17/11 - 7/24/11

  • Search our BLOG

  • HOME
    Terrorist Names SEARCH:

    Saturday, July 23, 2011

    Amy Amy Amy

    We miss you.



    Terrorist Names SEARCH:

    Browser Interactive AI radar: CONCEPT

    I know I give my Anti-virus vendor brothers 
    a lot of grief, but its because I know how good
    they are.

    And its always risky to put your money where
    your mouth is, but thats what I'm doing.

    My counter-surveillance guys are having a fit,
    threatened mutiny, for violation of Opsec.
    But I think this could result in safer browsing
    for everyone.

    I'm talking an Interactive, artificial Intelligence
    browser radar.

    Currently I have a HUD display that pops up a bubble
    on my browser that displays everything on the web page
    I'm landing on that wants to open.   
    It tells me also whats tracking me and how.

    And I use NOScript to control what opens and
    doesn't open, in bulk.
    For more refined control I trigger 
    gives me control over cross-site requests.
    And I turn ON just what I need to make
    the web page function. But this depends on
    me to know what I'm turning on, based on
    just the names of the programs.

    In high threat environments I will run the
    web sites thru Dr.Web, looking for problems

    I want a program (radar) that sweeps the webpages,
    for known problems, malware, etc,
    And an interactive function where users give feed
    back on problem issues and green light others.

    And an easy on off switch, a graphic showing progress
    of scan, and a Green light for "Known" probably ok
    Yelow, some unknown, which not to turn on.
    and RED light, Known problems.

    This is going to slow down my browsing, but
    saves me the headache of trying to figure out what
    not to turn on, The tab could even change color
    when the Radar is finished, allowing me to go on
    and work on something else on another tab.

    I have not disclosed other methods and programs
    we use for obvious opsec reasons, and keep my
    counter-surveillance staff happy.

    But this would be a good start on safe browsing
    just by combining known technologies.
    And cut down drive bys, and the many infected
    google pages.

    Just give me a life time subscription and some
    attribution and the Idea is yours.

    We will trade time for security.
    Try us, end users.

    Tactical Internet Systems analyst.

    That is just what Gerald does
    BEFORE he lands/opens on a web page.

    Counter-Surveillance leader
    Enhanced by Zemanta


    Terrorist Names SEARCH:

    Norway discloses new Threat

    We have been fearful of this paradigm for a few 
    years and have hinted at it since the DC sniper.

    The Norway terrorist killed 7 with the huge
    bomb, but 80+ with his small arms.
    In countries that make weapons illegal,
    this could become a significant threat. 
    A terrorist just starts shooting people
    until the police arrive, in a small town
    that could be problematic and leave a
    large death toll.

    In US they are both blessed and cursed.
    It is both legal and easy to get small arms.
    With the number of arms carried by US
    citizens a terrorist opening fire on a civilian
    population would soon be cut down.

    But to open fire on a children's camp  displays
    a special type of derangement,  and is very uncommon.
    The only other such type of attack I can think of is
    the one in Russia where the terrorist took over a
    school and killed so many kids.
    The mentally unbalanced will always be with us.
    And I hope Norway does respond with more democracy
    and not feel good actions that reduce citizens rights.

    That is what happened in the US under the patriotic acts
    Americans have lost their rights to privacy.  
    And even after this era of terrorism I doubt they will
    ever get those rights back.

    It looks like the terrorism in Norway may have more
    to do with a sick mind than some sick ideology.

    Our prayers go out to those families that lost love
    ones in this senseless act.
    May they all RIP.


    Enhanced by Zemanta

    Labels: ,

    Terrorist Names SEARCH:

    Friday, July 22, 2011

    US unleashes the most Professional trooper ever

    I've talked to several US troopers back from tour,
    Afghanistan, Iraq. 

    Even the Sergeant's impressed me with a quiet,
    They had an understanding of Islam even the
    different branches with in the Moslems.

    And a comprehension of the US mission in the
    GWOT. Beyond the shoot'em up, killer persona.

    To be sure they were very clear on the force of 
    power behind every solider and capability to kill.

    And that is not the first weapon of choice, killing
    is a weapon of last resort excepting eminent threats.

    There is something new, an underlying respect for
    the 'Other'. Someone of a different culture.

    In Vietnam and WWII there was a element of
    Psyops propaganda that the enemy was less than

    That paradigm seems to be missing in the current 
    conflict. And that is not to say the enemy is not hated
    and despised. But in the new paradigm there is a respect
    for their culture and an effort to understand the thinking
    behind the culture of the 'Other'.

    The military training has instilled a comprehension of
    this shift in the Military paradigm.
    In WWII they were carpet bombing civilian German
    cities in an effort not only to defeat Nazi's but the German
    people also.
    US Military no longer subscribes to the thought of bombing
    out the civilians will to fight or support the war.
    Now the wining of hearts and minds has filtered down
    to the grunts as the primary paradigm.
    With killing the enemy as a fall back position.

    Of course there are strategic exceptions, the Drone
    program for example, they target the enemy cadre leadership
    for death.

    The US military is trying to run a SysAdmin program,
    along with a Infowar to try and win the hearts and minds.

    The Troopers know XYZ is Taliban, but still try and
    work with him, looking for common ground, options
    other than killing him. 
    They are able to set aside their hatred for an enemy with
    out honor, the Taliban to try and work out some solutions.

    The Infowar has really stepped up in Afpak, but still falls
    short. In running our Infowar operations we have been
    studying what we believe to be the worlds best and top
    Info-warriors, the GOP, the Republican in American 
    politics. They are the worlds experts.
    And we have been testing their methods and tactics,
    and turning them against the GOP. its an easy metric
    for us to track and measure.

    While we are not going to expose what we have learned
    from the GOP, the force multiplier effect is remarkable and
    very effective, way beyond our expectations.

    Coupled with our covert cyber operations, used in unison
    and our Paradigm Intel all falling back on a field of applied
    anthropology has yielded some very remarkable results.
    And our BSUs (Bot Surveillance Units) for metrics and 
    covert Cyber operations makes us a formidable successful 

    A bothersome issue is discovering where and when to apply
    this force, and foreseeing the outcome of the law of untended

    Which has stayd our hand on many issues and opportunities.

    The Military is working on a new Infowar paradigm but basing
    it on outdated theories. The new social media is instant,
    and very powerful. But the Military is not know for instant
    responses in the political arena.
    Their current paradigm prohibits the "BALLS" to be successful
    in a social media Infowar.

    An example is the Taliban get out news reports about 
    terrorist attacks on US forces with in 15 min of actual 
    attack sometimes, the US Military responds with in
    two weeks most of the time.
    The Taliban is eating the US Military's Infowar lunch.

    The instant Taliban social media response over the
    US Military's two week response allows a huge advantage
    to the insurgents, for two weeks the public and news outlets
    are pumping the Taliban lies and propaganda as truth,
    as it is the only version of the story in the cyber domain.

    Two weeks later the truth comes out and its too late.
    Many times the Instant Taliban version is accepted
    as the truth and the real story never catches up to the
    lies that have been circulating for two weeks.
    When the Taliban releases their instant version it is
    NEWS. Two weeks later its "PAST NEWS". Old hat.
    Not of immediate interest.

    The Military still regards the WWW as a security risk,
    not as a major weapon of war.
    Pakistan has 91,000 Twitter accounts.
    Direct access to the hearts and minds of influential
    Pakistani civilians, yearning for the truth, a way to
    peace, and ignored by the US Military.

    ISI is running a program of Infowar of disinformation
    and obtuse irrational conspiracies to keep the civilian
    population confused.
    Read some of the crap they put out:
    One of the ISI sock puppets:
    Ahmed Quraishi of
     Navy is running ISI's media wing. Rear Admiral Adnan is the head, with Commodore Khalid Pervez the deputy. Running a covert hate America Infowar campaign.

    And these lies go unanswered except for the Civilian
    irregular cyber troops grinding away on these lies day in
    and day out.

    An effective Infowar doesn't need a thousand sock puppets controled
    by an computer program, it needs a trained cadre with rules of engagement
    operating 24/7 to counter the lies and disinformation, in an instant.
    Not too little, to late, two weeks later.

    Opsec prevents me from going into operational details of methods
    and strategies. But they are based on getting the truth out there, NOW.

    The anthropology of Infowar in social media is clear, effective and a 
    tremendous force multiplier, is not being applied by American Military.

    The Infowar force could use a General with a hacker background
    and in depth background in social media.

    A while back the Military was peanalizing those troops
    with a background in social media with a lower security

    They are working on it, give them credit for that.

    War Anthropologist

    Post Script:

    Inside Darpa’s Secret Afghan Spy Machine.
    By Noah Shachtman

    Darpa's Nexus 7 should look at Tweets with "#Pakistan" and key tweeters.
    And other social media. As well as post on Key forums.

    Nexus 7 sounds like a system to correlate vast amounts of data.
    And they don't know what they will find, but the effort sounds promising.
    And would also be useful in an Infowar.

    Enhanced by Zemanta

    Labels: , , ,

    Terrorist Names SEARCH:

    Tuesday, July 19, 2011

    Rupert Murdoch and his News Corporation

    Rupert Murdoch and his News Corporation.

    Paradigm Intel points to a long investigation
    and many yet to be burned.
    Two heads of Scotland Yard resign, sacrificial offerings.

    More to come,  Murdoch paid for legal defense of
    ex-employee, if it was working in England it
    was used in USA. FBI on the trail.
    Will it lead to Fox News?
    Wall St Journal?
    All owned by Murdock,
    Wall St Journal did a piece in defense
    of Murdock, shameful.
    One of the whistle blowers against Murdock DEAD.

    Intel points to his son, not the old man that is behind the
    phone hacking, or at least had knowledge of it, suspect
    old man was told they were "eavesdropping" on phone calls.
    ( Wasn't my intention to indicate we had any connection
    between the death and son, "thought grammar TYPO" G )

    Alot more to come out, News Corp the
    real first Lulsec, public even paid to read
    the Lulz.

    This is going to get good need more
    whistle blowers.

    They will have to pry that company out of
    Murdock's hands.
    Huge losses in stock price, any more big
    hackers hits and price will crumble.

    WWW security so bad News papers hacking

    Who is next?


    Terrorist Names SEARCH:

    Embrace your loss of privacy

    Do you have an alternative?

    "Privacy policy" subject to change
    without rhyme or reason.
    We are like mindless zombies.
    Ahh yes Facebook: let me give
    you my address, and list of all my friends,
    let me include photos of my friends and tag
    them all for you.

    Relationships? Oh yes check my email,
    everything I'm doing and who with is
    in there.

    My thoughts, sure here they are on twitter.
    What I think, and about what and when.!/Geraldanthro

    Porn, sure in the Browser history.
    And My ISP logs every site I connect to.

    Google has my phone records, even recordings
    of some calls, my spread sheets and all the papers
    I've wrote, all my search words for the past 10 yrs,
    Copies of my emails, blog, even my music choices,
    and videos I watch on youtube.

    Money: Credit cards carefully track every penny spent,
    and even debit cards are connected back to you.

    There will be no presidential candidates at some specific
    date in the future.
    The Internet never forgets, saves everything.

    Mr. candidate is it true that when you were 14 you
    called a bad juggler in clown face paint, a Mexican ass
    in a Youtube comment? and used 14 "Z"s in spelling

    Our entire lives are being slowly placed in the cloud,
    for all eternity. There is no privacy.
    The good part is we are all human, every one
    at some time or other has watched porn on the
    Internet, smoked a dubie, ETC, including all the Feds.

    They can't put everyone in jail, but they can be
    petty and use the low hanging fruit to prosecute
    almost anyone.

    There is not much one can do about it,
    You could quit the WWW and your beloved PC.
    Stop your world wide connections and relations
    pull into your shell and become a hermit.

    But now the FBI has legal paperless search warrants.
    In most cases don't even need a warrant, just an email
    with the force of law forcing your unprivate data out
    of the cloud, even forbidding those charged with
    securing your data from disclosing the Feds have
    even seen your data OR asked for it.

    So we stumble along with false expectations and
    assumptions about "PRIVACY" in America.
    We are all naked, its just a question of who
    "THEY" want to look at.

    And currently we have no way of correcting bad
    data, or of even knowing "THEY" have looked
    at your data.

    Now if we apply the Lulzsec paradigm to this
    circumstance, we are looking at hackers secretly
    creating "BLACK LISTS" no one even knows
    about. If a hacker falsifies your "private" data
    in the cloud, changes your interests stored in the
    cloud to something unsavory, YOU would never
    know, and could be circulating secretly with the
    force of law prohibiting anyone from telling you.
    And the Feds believing it, even acting on it.

    I've been writing on the lack of security on
    the WWW, and now I'm pointing out there
    is No privacy either.

    So if you are on the WWW and love your
    computer, embrace the lack of privacy,
    run your life accordingly.

    I can't foresee a paradigm where we get
    our privacy back from the Government or
    For the Government its addictive, now to control:
    Terrorism, Crime, later who knows how it will be
    corrupted? But Law Enforcement is not going to give
    privacy back to you.
    For Corporations it means profits, EXAMPLE:
    Google knows exactly which ads to place on the web pages you
    visit to the tune of $ 9 billion this QUARTER.

  • Intimately knowing YOU is very profitable and highly desirable and addictive.

  • We know how much time you spend
    on "Tube" About your Affairs,
    and that little SECRET.


    Terrorist Names SEARCH:

    Monday, July 18, 2011

    Taliban TTP video execution of 15 police

    Where to begin?
    A Taliban leader from Pakistan, gives
    a speech in Pashto.

    The leader.
    Note the butt of his weapon, two bars?

    Calling 15 men with hands tied behind them
    police men accused of a execution style
    killing of 6 children.

    Several of the bound men object.
    As 4 or 5 masked men open up with AK47's
    Emptying clips of 308 Cal. rounds into the bodys
    at about 10 feet.

    Then as the dying men moan the leader walks
    down the line doing face shots and head shots.
    The moaning stops, but the sound of a gaping 
    face wound can still be heard.
    Again the leader marches down the line hunting
    for the body making the bubbling gasping face
    wound noises as the body still trys to breath.
    And again he pumps round after round into
    the heads trying to stop the noise.
    The camera man points out other bodies
    that need to be shot again, at close range,
    12 to 6 inches.
    As he and the camera man discuss which body
    it might be making the noise in calm hushed tones 
    one might use in Church when discussing the weather.
    All the violence and brutality executed with the same
    emotional response one might exhibit if hoeing the 

    Note the shadow of a well know type of camera he is using.

    The killers:
    Our sources tell us this was video taped as evidence to collect
    a bounty. Proof they were killed.

    This is what ISI "Defense in depth" has wrought.
    These are the men ISI has supported trained and
    protected, now killing Pakistanis.

    I fear Google would delete my blog if I posted the video:
    Video here:

    ISI needs to be brought under Paki civilian control
    tore down and rebuilt to answer to the Paki Gov.
    Internet Anthropologist Think Tank: How to change ISI