Results 1 to 20 of 119

Thread: How do you change the perception?

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Council Member BILL's Avatar
    Join Date
    Dec 2007
    Posts
    41

    Default New hacker trainer: New threat




    36 downloads, trainees?

    Hacker Trainers name "Kasper"
    They are using Rats now, RATs are remote administration programs that have been embedded into an unsuspecting victim's computer. This is the most dangerous of all hacking tools as it allows complete and total control of the infected computer.
    And "MultiDropper-NF"

    We are pursuing.
    From Arabic forum.

    B

    We tried to report additional Intel on this to the CIA, AND THEIR FORM still isn't working.
    We typed in email name and text and copied URLs. all was rejected, note it says in red the Message field won't be cleared, it was.




    .
    Last edited by BILL; 01-04-2008 at 08:44 AM.

  2. #2
    Council Member BILL's Avatar
    Join Date
    Dec 2007
    Posts
    41

    Default

    Islamic Forum devoted to hacking:

    Partial contents: ( links removed )

    # Section applications programmes encrypted encryption special versions special
    # مــــنــــتـــدى اخــــتــــراق الايــــمـــيـــل Forum penetrate email
    #

    * قـسـم خــــاص لأســئــلـــة الأعــضـــاء واسـتـفـسـاراـتـهـم حـــول الاخـــتـــراق A special section of questions and requests for information about members penetration

    # مــــنــــتــــدى اخــــتـــراق الاجـــهـــزة Forum penetrating devices
    #

    * قـسـم خــــاص لأســئــلـــة الأعــضـــاء واسـتـفـسـاراـتـهـم حـــول الاخـــتـــراق A special section of questions and requests for information about members penetration
    * الـبـرامـج الـــمــشـــفــرة والــحـــصـــريــة Encrypted programmes and exclusive

    # مــــنـــتــــدى اخـــتـــراق الــمـــواقع والـــمــنـــتـــديـــات Forum penetrate sites and forums
    #

    * قـسـم خــــاص لأســئــلـــة الأعــضـــاء واسـتـفـسـاراـتـهـم حـــول الاخـــتـــراق A special section of questions and requests for information about members penetration
    * ::Local Root Exploit :: :: Local Root Exploit::

    # قــســـم أخـــتــــراق شــبــكـــات الــويــرلــــس & LAN Section penetrate networks Aloyrls & LAN
    # مــنـــتــدى انـــــجــــازات الـــهـــكر Forum achievements Alhecr
    #

    * قسم أدوات و اندكسات الاختراق Tools section and penetration Andquisat
    * مكتبة الثغرات Library gaps

    # مـــنــــتـــــدى اخـــــتــــراق الـــــجــــوال Forum mobile penetration
    # مـــنـــتـــدى اخــــتــــراق الـــمحـــادثـــة Forum penetrate conversation
    # منتدى تعليم الهكر Education Forum Alhecr
    # قسم الدورات الاحترافية Section professional courses
    # قسم تعليم الاختراق بالفيديو Education Section breakthrough video
    # قسم E-book Section E-book
    #

    * قسم الطلبات Section applications

    # مـــنــــتـــــدى الـــــفـــايــــروســــات Forum VIRUSES


    The West has an advantage, in technological abilities, an attempt to close this gap, with forums like this.

    Bill



    From hacked site:


    .
    Last edited by BILL; 01-05-2008 at 09:33 PM.

  3. #3
    Registered User
    Join Date
    Jan 2008
    Location
    Indiana
    Posts
    8

    Default Iw

    I want to dip my toe into this pool in a very limited way. I am a Navy Reserve CPO and have some interest in this field. My take is that perception management is but one part of an overall strategy to bring down the West. They use a distributed open source warefare model that the West will find very difficult to emulate. We seem to be at a point where we cannot go beyond looking to a central authority (Government Agencies like EPA, the Supreme Court, Operations that require deniability, etc) to adjudicate problems, authorize "hunting liscenses" and so forth. This will necissarily make any attempt to create a flexible, dynamic IW effort lugubrious and prone to, at best, defensive measures.

    IW including cyber warfare will exist in an area the US has been reluctant to involve itsel in such as plausible deniability, independent and interdependent teams with alot of independence and seizing control through bots of many platforms. This is a threat we currently face and will face more in the future (see Russian Business Network).

    I do not think we can manage perception but can manage the strength of the message getting out about what the jihadis really are about, their threat to us and how they manage our perceptions of them. If you take my first statement about open source warfare and apply it to perception management to me combined civilian network and DOD efforts may work. Using the German General Staff concept of "Marching Orders" that of giving general goals to be met and leaving the meeting of them to the teams. However, if we do not get beyond the central authority model I don't think we will have much success. I think the USAF new IW command will fizzle and fizzle badly because of this problem.

    I welcome your comments and the opportunity to at least get my muddled thoughts on this subject in some kind of order.

  4. #4
    Council Member BILL's Avatar
    Join Date
    Dec 2007
    Posts
    41

    Default One approach...

    Excellent analysis:

    Yes as I understand it, it requires an order/ok from Bush to take down a server, and that kind of offensive is forming, ON THEIR SIDE, I could be wrong, and hope I am.

    There doesn't seem to be any rules for engagement for Gov, MIL, NAV, etc.?

    The civilian sector lacks organization, direction and instruction..
    AND FUNDING, This effort currently runs us about $12,000 out of pocket, all work is pro-bono.

    While it is not my intention to tell anybody how to do this, we wanted to show what the civilians have done and are doing.

    A Russian hacking team just announced placing keyloggers on some terrorist PC's. And exposed the Porno visits of the Jaddiees.

    Civilians provide deniability but run the risk of prosecution without a letter of Marq, all our limits are governed by, directed by CI paradigm, nothing illegal, of course we have the potential of developing those capabilities, but the risk of prosecution constrains us.

    If al Qaeda can manage perception, I think USA is also capable of same.
    They have managed to convince the Ummah that all the insurgent DEAD, is GOOD....Martyrs. Dying = winning. ???
    The value of OSINT may not be fully appreciated.


    Our OSINT picked up the "Arabic Hacker" Trainer.
    Some civilian sectors are well versed in OSINT, Competitive Intelligence rely on it.
    Off the top of my head, some of the fundamental methods we use, in general.


    Basic: Up todate bio info , facts, etc, culled from OSINT and filed.

    Analyzing if Target is in deception mode.
    These usually will become apparent as a linear, in depth paradigm is developed, and as the incident/action/writing deviates from the paradigm. Lies will appear as a spike on the paradigm model, the question becomes 'is it a paradigm shift' or 'deception'. the test is the future, the News/blogs/forums.Did it happen like the target says or not, paradigm shift indicator if it checks out, or possible deception if its false. The value is you know something different is going on, and can analyze it.
    Of course we deal with public reports related to the target.

    One can track 'talk' vs 'actions', And develop a pattern. Major changes in the pattern can point to paradigm shifts which can be useful in forecasting.

    One can track what they say they are going to do vs what happens ( check the news a month later see if it happened; or the appropriate time frame ). Looking for patterns which can reveal deception, or if 'it ' continues a shift indicator.

    Collecting Geographic Intel ( everything about a Geographic area/state/town ) also can reveal links/connections.


    Eventually you have a Paradigm for the target, a history, understanding, knowledge of target and idiosyncrasies.

    With our paradigm we start to measure action, statements, reports against the paradigm.

    We call this Paradigm Intelligence. A long form of inductive reasoning, confirmed by repetition.
    Then we we check items against the Paradigm mostly deductive reasoning/logic.

    Ontological problem with ' Paradigm Intel ' is its seminal fault "Just because you can forecast actions doesn't mean you understand whats going on." ( Example: Ptolemy and his theory of the planets, Earth-centered Ptolemaic system, LOOPING Planets. He could forecast position of the planets, but his understanding of the system was very wrong.)

    While you forecast with Paradigm Intel, one can have multiple hypothesis of the cause of the "action at a distance",

    Utilizing this method it is possible to get a look inside a closed cell.( This link will give you some background and context, On that page click on the "Internet Anthropologist Link, we were able to peak into the USA and Taliban closed cells/Paradigm, both attempting to deceive the other ).

    Paradigm Intel is good a developing alternate hypothesis, and testing them.
    A useful tool in the arena of forecasting asymmetrical threats in war.

    CONTEXT and Cultural familiarity: Can be definitive also.
    Patki news services tend to down play number of Taliban or al Qaeda killed and over state the number of Patki troops dead. Often they will state total number deaths, with no break down between insurgent and government troops. And the tend to use the word "dead " rather than "killed". As one denotes facts, dead, while the other denotes actions, killed.Patki news semantics are very exacting and aim for neutrality as they consider all killed on both sides as Pakistanis first and government or insurgents second.
    There is a taste of killing your enemy without offending their/our culture.
    If the KIA are related to as "Killed" This can be a message the ummah hear that others may miss.
    The use of the term "Killed" instead of "dead" is meant to be offensive to the ones killled in this instance.
    Coupling OSINT with sub-rosa investigations and social engineering also give an options for checking details.


    We set up a baby feed for the "cyber troops", everything they need, and fully customizable, by user on anything. The feeds are supplied by 1,000 spider bots per Trooper, using as many or few as they need, that search the Internet 24/7 and feed it to the troop, so they have a real time ( Internet ) knowledge ( News, blogs,forums,groups,docs,excel, all translated ) of their arena.

    Knowledge in depth, historical and current.

    And sets up a frame work for a 'social change engine' and propaganda ops.


    A Question we had to address was how to run propaganda with out interfering with any 'OFFICIAL' Ops.
    We found a solution on a Pakti forum:
    Our efforts have been guided by Pakti Intelligence manual .
    "Psychological warfare is an art adopted to defeat the enemy's will to fight. It predominantly aims to win the battle before it starts. It is aimed at convincing the enemy that:-
    ( Our operations have been designed around these three concepts )
    a. Your equipment and war assets are obsolete. ck5 shoulder fired rocket, martyr maker
    b. You are being commanded by inefficient commanders. new leader of al Qaeda.
    c. Your basic human rights are being suppressed." suicide bombers dance, for al Qaeda

    One person on a forum can affect morale of the Jahiddi community. We have.

    This is "our" version of a "Info War" cyber Troop,
    And we have been running this for around a Year,

    Our concept includes other "cyber troops" that are not 'Info war' oriented but performing other duties.

    Its one concept of a Cyber Warrior..

    Bill & Gerald
    Last edited by BILL; 01-08-2008 at 10:27 PM.

  5. #5
    Council Member Ken White's Avatar
    Join Date
    May 2007
    Location
    Florida
    Posts
    8,060

    Default Bill, just a suggestion

    If you'd keep your posts a little shorter and concentrate on one topic at a time while not using the various styles and sizes of type, you might encourage more responses. Your posts are sort of hard to follow due to length, mixed subject matter and erratic type fonts.

    Take care,
    Ken

  6. #6
    Council Member BILL's Avatar
    Join Date
    Dec 2007
    Posts
    41

    Default Connections

    "Al-Qaida's MySpace": How Suicide Bombers Are Being Recruited Online

    By Evan Kohlmann

    This morning, the Combating Terrorism Center at West Point released the second issue of its Sentinel journal, including my new piece on "Al-Qaida's MySpace"--which tracks a growing number of case studies in which users on extremist Internet forums such as Al-Ekhlaas have been vanishing off the forums, only to suddenly re-appear later as suicide bombers in the service of Al-Qaida in Iraq. The report includes both testimonials gathered from the forums themselves, and never-before-seen evidence uncovered during the British investigation of "Irhaby 007" (a.k.a. Younis Tsouli). Tsouli's former headquarters on the web--the Muntada al-Ansar forum--was a major center for such online terrorist recruiting. In August 2005, a senior Muntada al-Ansar administrator broke the “good news” to fellow users about a “meeting of Ansar forum members” inside Iraq:....

    "This story is fascinating and emotional because it is closely linked to… the Ansar forum… One of our brothers who was a member on the Ansar forum and was originally from a country adjacent to Iraq decided to leave and fight in the cause of Allah. Allah made it possible for him to meet with an additional five brothers from other countries who had all come to fight in the cause of Allah… Later, after talking with one another, they all realized that they were fellow users on the Ansar forum, and that made them very happy. They began crying and their love for Allah increased… I also inform you that one of the brothers who is a member on the Ansar forum will soon rejoin his beloved comrades in the land of jihad and martyrdom, the land of Mesopotamia, and he will also participate in a suicide operation."

    SOURCE:

    100 Jahiddies on Facebook

    Bill

    I think this thread demonstrates how we adopted Competitive Intelligence methods over the past year to Counter Intel.
    And hope it is usefull, we are user friendly and available.
    Last edited by Jedburgh; 01-19-2008 at 01:33 AM. Reason: Edited links. No e-mail addresses in posts.

  7. #7
    Council Member BILL's Avatar
    Join Date
    Dec 2007
    Posts
    41

    Default Just released today

    New Jahidiie encryption program.
    and
    We have the Computer IP forTaliban webmaster, Adil Watanmal (aka Murchal), and location.

    B
    Last edited by BILL; 01-19-2008 at 04:41 AM.

  8. #8
    Registered User
    Join Date
    Jan 2008
    Location
    Indiana
    Posts
    8

    Default Iw

    Thanks for the reply Bill. One correction I would like to make is that the General Staff concept is Saddle Orders not Marching Orders. No coffee no wakee.

  9. #9
    i pwnd ur ooda loop selil's Avatar
    Join Date
    Sep 2006
    Location
    Belly of the beast
    Posts
    2,112

    Default

    Bill your concepts of cyber warfare are about 20 years out of date. Cyber-warfare is a sexed up term to refer to a "terrain". Much like land warfare, or naval warfare, or air warfare. Computers are tools used for good purposes and bad purposes much the same as tanks and trucks. Metaphorical analysis of cyber warfare will only carry you so far and the over use of the term rather than realistic terms only prejudices people against the topic.

    There is terrorism, it occurs through a variety of devices and techniques, and some of those devices are communications and computer networks. Information warfare uses computers much like it uses mass media but they are not inextricably linked. Command, control, communication, and coordination using information technology (C4IT) can be simplified as "computer mediated". What is missing from your posts (and I must admit the variety of fonts and incoherence of the posts makes them nearly unreadable) is a basic understanding of commodity computing and computer convergence. These two basic concepts enlighten and inform the conflict scholar about how computers are used and why they are used.

    A simple understanding of convergence and commodity tools might help. The ubiquitous refrigerator allowed for fresh foods and longer time in transit for foods. This created a more nutritious and higher value food source for soldiers. Those armies that had access and the resources to use refrigeration had a tactical advantage over their adversaries. Yet we never coined or used the term refrigeration warfare. When high value information technology assets were converged into military supply trains along with refrigeration capability the just in time supply line became a reality for food stuffs. Yet again we did not define war based on just in time inventory or it's convergence with refrigeration.

    C4IT is a converging communication paradigm that is both a tactical tool as well as a strategic terrain.
    Sam Liles
    Selil Blog
    Don't forget to duck Secret Squirrel
    The scholarship of teaching and learning results in equal hatred from latte leftists and cappuccino conservatives.
    All opinions are mine and may or may not reflect those of my employer depending on the chance it might affect funding, politics, or the setting of the sun. As such these are my opinions you can get your own.

  10. #10
    Council Member BILL's Avatar
    Join Date
    Dec 2007
    Posts
    41

    Default Greatful for everyone's replys and paradigm testing

    Thank you for your reply.

    Quote Originally Posted by selil View Post
    Bill your concepts of cyber warfare are about 20 years out of date.

    I am glad to hear that, somebody is 20 yrs ahead of us. That pleases me.

    Cyber-warfare is a sexed up term to refer to a "terrain".

    YES, exactly, we now have the Navy, Air force, Army to handle those "terrains", where are the "cyber forces", In this Terrain USA seems to be MIA.


    Much like land warfare, or naval warfare, or air warfare. Computers are tools used for good purposes and bad purposes much the same as tanks and trucks. Metaphorical analysis of cyber warfare will only carry you so far and the over use of the term rather than realistic terms only prejudices people against the topic.

    We have tried to demonstrate the practical application of our concept of a "cyber troop", I think the Theory is still being worked out.
    They are at war with the USA on the Internet, we reacted.

    There is terrorism, it occurs through a variety of devices and techniques, and some of those devices are communications and computer networks. Information warfare uses computers much like it uses mass media but they are not inextricably linked. Command, control, communication, and coordination using information technology (C4IT) can be simplified as "computer mediated". What is missing from your posts (and I must admit the variety of fonts and incoherence of the posts makes them nearly unreadable, some replys have been culled form our Internal docs.I will try and watch it, Thanks) is a basic understanding of commodity computing and computer convergence. These two basic concepts enlighten and inform the conflict scholar about how computers are used and why they are used.

    A simple understanding of convergence and commodity tools might help. The ubiquitous refrigerator allowed for fresh foods and longer time in transit for foods. This created a more nutritious and higher value food source for soldiers. Those armies that had access and the resources to use refrigeration had a tactical advantage over their adversaries. Yet we never coined or used the term refrigeration warfare. When high value information technology assets were converged into military supply trains along with refrigeration capability the just in time supply line became a reality for food stuffs. Yet again we did not define war based on just in time inventory or it's convergence with refrigeration.

    But we were not fighting on refrigeration trains, we are fighting on the Internet. I think it is a terrain deserving of troops.

    C4IT is a converging communication paradigm that is both a tactical tool as well as a strategic terrain. I agree.


    USA has run this type of paradigm before, and the result was the Air Force, separated from the Army.
    The sooner the USA spins off a "cyber force" the sooner USA will dominate that Terrain also.

    All Armed Forces will need to maintain a "cyber" capability dedicated to use of their service.

    Bill


    Last edited by BILL; 01-09-2008 at 12:49 AM.

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •