COUNTER TERRORISM PROJECT

AN OPEN SOURCE VIRTUAL INTELIGENCE SHARING PORTAL TO COUNTER THE GLOBAL THREAT OF TERRORISM THROUGH INNOVATIVE APPROACHES

Friday, April 18, 2008

Internet Usage in the Middle East

Internet Usage in the Middle East

Recent and predicted future changes in the leadership of many Middle Eastern and North African countries, most notably Morocco and Jordan, and Syria and elsewhere have led media pundits to note the coming of an “Internet Leadership” in the region. The term alludes to the fact that the new and up and coming leadership in the region is relatively young, educated in the US or Europe, recognizes the key role that technology in general and ICT (information and communication technology) in particular play in national development. Despite the perceived risks from joining the global computer network, non-democratic regimes have not shunned this technology because it promises to be the key to development, prosperity, and influence.

Thursday, April 17, 2008

Iran training media for Israel-Syria war

Iran training media for Israel-Syria war


The Islamic Republic of Iran Broadcasting Corporation (IRIB) has begun a training course for war journalists, who will be sent to Syria and Lebanon in case these countries engage in war with Israel, the Iranian news agency 'A'sr Iran reported.

The course, titled "Training Reporters in Crisis," will be taken by 20 radio and TV reporters.

After graduating the course, the journalists will be placed on call and would be sent to Syria and Lebanon if war breaks out there.

Syrian President Bashar Al-Asad gave a speech on Wednesday, where he emphasized that while his country was preparing for war with Israel, he felt the odds for war were not high.

"We know that there are those in the American administration who want this war and so we are preparing for the worst," Al-Asad nevertheless added.

The Syrian president said further that the US wanted a civil war in Lebanon and for there to be war between the Arabs and Iran.

For his part, Prime Minister Ehud Olmert has recently told the Israeli daily Yedioth Aharonot that Israeli and Syria were exchanging messages.

"I can assure you that with regard to the standing issues between us and the Syrians, they know what I want of them, and I know well what they want from us."

www.themedialine.org

Wednesday, April 16, 2008

NEOHAPSIS - Peace of Mind Through Integrity and Insight

Peace of Mind USCCU CHECKLIST


GCN Staff
04/26/06

A small office of the Homeland Security Department has released a
draft cybersecurity checklist intended to help enterprises focus on
the real-world consequences of security breaches.

The U.S. Cyber Consequences Unit was created by DHS to provide
analysis of economic and strategic consequences of cyberattacks on
critical infrastructure and to evaluate the cost-effectiveness of
countermeasures. As part of this work, director and chief economist
Scott Borg and research director John Baumgarner began on-site visits
to evaluate systems in critical industry sectors.

"We started seeing huge vulnerabilities," Borg said Wednesday at the
GovSec conference in Washington, where the draft document was
released. Most of the systems were compliant with current security
checklists and best practices. "And portions of those systems were
extraordinarily secure. But they were Maginot Lines," susceptible to
being outflanked.

The problem is that existing best practices are static lists based on
outdated data. The new USCCU list shifts the focus from perimeter
security to monitoring and maintaining internal systems. The problem
with perimeter security is that there is always some way to circumvent
it, Borg said.

"We are way into diminishing returns on our investments in perimeter
defense," he said. "To deal with it now, you have to think of the
problem of cybersecurity not from a technical standpoint, but by
focusing on what the systems do, what you could do with them and
what... the consequences [would] be."

The list is based on real-world experience and on economic analysis of
breaches. Surprisingly, the researchers found that simply shutting a
system down is not the biggest threat in most areas of critical
infrastructure.

"Shutting things down for two or three days is not that costly," Borg
said. The larger threat is disruption of systems in ways that are not
immediately evident.

The checklist contains 478 questions grouped into six categories:
hardware, software, networks, automation, humans and suppliers.

"All of the things we are talking about are already under way," Borg
said, but some of the items in the checklist have no cost-effective
commercial solutions. Borg said he hopes industry will step up to the
plate to create solutions, and that government will adapt its
acquisition policies to create incentives for these developments.

Borg said there is no schedule for final DHS approval of the draft.
Additional information about the checklist is available from Borg at
mailto: scott.borg (at) usccu.us.

*=========================

Tuesday, April 15, 2008

Newsmax.com - Analysis: Prepare for a Cyber War on U.S.

Newsmax.com - Analysis: Prepare for a Cyber War on U.S.

WASHINGTON -- At the height of the Cold War, a Soviet oil pipeline blew up in an explosion so huge that the American military suspected a nuclear blast. A quarter of a century later, the incident serves as an object lesson in successful cyber warfare.

The pipeline blew up, with disastrous consequences for the Soviet economy, because its pumps, valves and turbines were run by software deliberately designed to malfunction. Made in the U.S. and doctored by the CIA, it passed into Soviet hands in an elaborate game of deception that left them unaware they had acquired "bugged" software.

"The pipeline software ... was programmed to go haywire, after a decent interval, to reset pump speeds and valve settings to produce pressures far beyond those acceptable to pipeline joints and welts. The result was the most monumental non-nuclear explosion ever seen from space," Thomas C. Reed, a former air force secretary, wrote in his 2004 memoir.

Wednesday, April 09, 2008

Internet Haganah::Haganah b' Internet

IThe Way To Rescue Palestine

OBL latest speech from about a week ago.

I don't the Koran mentioned Palestine once.

Internet Haganah::Haganah b' Internet

Internet Haganah::Haganah b' Internet

When the free world is losing sleep over how to deal with shia fundamentalist in Iran: Fundraising for Hizballah On a server in the United States.

With a domain name registered through an American company.

What's not to like...

Yes, those are bank account numbers.

Name: wa3ad.org, Hizballah, Lebanon
Address: 208.64.29.122
Network access provider: versaweb.net, USA
Domain name registrar: GoDaddy.com, USA

Internet Haganah::Haganah b' Internet

Internet Haganah::Haganah b' Internet

Geert Wilders is a Zionist Plot?

For the latest in radical Islamist conspiracy theories, see the video released by the Arab European League and hosted by archive.org.

Thursday, April 03, 2008

Russia, The War of The Pipelines - JRL 5-19-07

Russia, The War of The Pipelines - JRL 5-19-07

Russia Profile Weekly Experts Panel: The War of The Pipelines
Introduced by Vladimir Frolov
Contributors: Sergei Shishkarev, Andrei Lebedev, Andrei Tsygankov, Andrei Zagorski

This week, Russian President Vladimir Putin personally engaged in some high-stakes diplomacy in Central Asia to ensure that the bulk of hydrocarbon exports from the three Central Asian nations of Kazakhstan, Turkmenistan and Uzbekistan go through Russia rather than bypass it.

Putin spent a total of five days in Kazakhstan and Turkmenistan working on an agreement to build a major gas pipeline running along the coast of the Caspian Sea through Turkmenistan and Kazakhstan and then merging with Russia’s Gazprom pipeline system to carry Central Asian gas, the bulk of which would come from Turkmenistan, to European markets. Gazprom will invest in the construction of the new Caspian Pipeline System, which will reach a capacity of 30 billion cubic meters a year. Construction will start in the second half of 2008.

Tuesday, April 01, 2008

Know Your Enemy


Military Review: Ayman Al-Zawahiri's Knights under the Prophet's Banner: the al-Qaeda Manifesto

To understand al-Qaeda, one must read the books of Ayman Al-Zawahiri, al-Qaeda's principal ideologue and chief strategic thinker. After Osama bin-Laden, Al-Zawahiri is the most-wanted Middle Eastern terrorist. The FBI has a $25 million reward for information leading to his capture or arrest.

In 2001, Al-Zawahiri published Knights under the Prophet's Banner (Fursan Taht Rayah Al-Nabi) even as the empire he built with Bin-Laden, and Taliban leader Mullah Omar crumbled under the weight of U.S. air, special operations forces, as well as the Northern Alliance assaults. (1) Initially serialized in the Al-Sharq Al-Awsat newspaper in 12 installments beginning in early December 2001, Knights under the Prophet's Banner can now be found in the back alleys of any major Arab city. (2) The word "knights" in the title refers to the members of the jihadist movement while evoking the image of the knights of the crusades.

The book begins with Al-Zawahiri saying: "I have written this book ... to fulfill the duty entrusted to me towards our generation and future generations. Perhaps I will be unable to write afterwards in the midst of these circumstances and changing conditions." According to Al-Zawahiri, the 11 September 2001 terrorist attacks were just an opening salvo against the Christian and Jewish "infidels."

Al-Zawahiri sees the United States, Israel, and Israel's Western and Arab allies as the "first force" and Islamic militant movements that depend on God alone the "second force." He believes the United States is removing Islam from power through rigged elections, brutality, and force. He views treaties, peace negotiations, and bans on weapons as steps in the direct occupation of Muslim land by U.S. forces. To Al-Zawahiri, jihad is an ideological struggle for survival--a war with no truce. He believes the Islamic jihadist movement should strike Islam's enemies, using the Luxor incident of 1997 as the means and as an example) He supports the growth of jihad among youths and numbers his success in the tens of thousands of young men in Arab prisons around the Middle East.

Al-Zawahiri says the jihad has not stopped, and the movement is either attacking or preparing an attack. He asserts Egyptian President Hosni Mubarak's replacement of six interior ministers is proof of jihadist success. He also says acts of violence, beginning with the Egyptian Islamic jihad attack on the Military Technical College in 1974 and the agitation in Southern Egypt of the early 1980s, were poorly planned, emphasizing that deriving lessons from mistakes and improving the potency of jihadic operations should be hallmarks of Islamic militant movements.

From a U.S. military force-protection perspective, Part Seven of Al-Zawahiri's book reveals that the 1999 joint U.S.-Arab military exercise, Bright Star, was designed to keep fundamentalists from seizing political power, equating the exercise to the Napoleonic invasion of Egypt in 1798. (4) He claims the timing of Bright star was not an accident; it was timed to observe the 200th anniversary of the French occupation of Egypt. To him, U.S. troop commitments are evidence of a victory for jihad forces. He combines his interpretation of Islam, Egyptian history, and news reports on U.S.-Egyptian military exercises to weave his own conspiratorial web to encourage youth to embrace his political objectives through violence and terror.

Al-Zawahiri dreams of a future jihad in the southern Russian Republics, Iran, Turkey, and Pakistan to unite a nuclear Pakistan and the gas-rich Caspian region to serve jihad. Al-Zawahiri identifies the following targets for al-Qaeda and its affiliates:

* The United Nations.

* Arab rulers.

* Multinational corporations.

* The Internet.

* International news and satellite media.

* International relief organizations, which he believes are covers for spying, proselytizing, attempted coups, and weapons transfers.