Posted: 7th July 2015 by th3j35t3r in General
Tags: cyber, jihad
‘Never interrupt the enemy when he’s making a mistake’ ~ Napolean Bonaparte
I guess, if ‘ole Napolean was around today, and at the front of a ‘cyber-jihad’ the quote of his I placed directly above would rather read ‘never interrupt the enemy when he’s leeching off our constitutional rights’… and here’s why:
Today I watched a CSPAN hearing on “Social Media & the Next Evolution of Terrorist Recruitment”. (Side note I notice that Mubin, in the 1 hr 55th minute uses the quote “Be Like Water”, it’s probably a coincidence). That’s right, today, not last week, not last month, and not a couple of years ago. Today. I guess in a way I’m glad the threat and offensive counter-measures I’ve been conducting and documenting right here on this blog for 5 years is finally getting some ears to prick up.
Those who have followed me for the longest time will recall my strategy on dealing with the threat of jihadis radicalizing, recruiting and even training homegrown threats online. Back then, they weren’t nearly as prolific on social media as they are today. Partly b/c they now have large swathes of ‘Anonymous’ doing their cyber bidding for them. They had their own websites, forums and discussion boards hosted in ‘unfriendly nations and states’. They were managed by themselves and almost always had an English speaking section, for the US-based homegrowners to keep up with the latest techniques, tactics and procedures they were concocting.
Posted: 29th May 2015 by th3j35t3r in General
Tags: bill of rights, constitution
“The US Constitution doesn’t guarantee happiness, only the pursuit of it. You have to catch up with it yourself.” ~ Benjamin Franklin
There’s a a couple of common misconceptions regarding our Constitution that I keep running into as I navigate my plotted course through the internet. They are such common problems with some people, I am dedicating a blog post to clearing it up once and for all. Be advised, I can lay it out here, but no matter how hard I try, I cannot understand this stuff for you.
Let’s start with some basic facts
The First Amendment to the UNITED STATES Constitution prohibits the making of any law respecting an establishment of religion, impeding the free exercise of religion, abridging the freedom of speech, infringing on the freedom of the press, interfering with the right to peaceably assemble or prohibiting the petitioning for a governmental redress of grievances. It was adopted on December 15, 1791, as one of the ten amendments that constitute the Bill of Rights. Here’s the actual text “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.”
“Those who don’t know the value of loyalty, can never appreciate the cost of betrayal.” – Unknown Author
Recap. For those unfamiliar with my previous writings regarding ‘Wikileaks’ you can catch the heck up right here, here, and here, in that order. I really am trying to stop going on about Wikileaks and Assange, but the bloviating self-righteous shitbird just keeps on pulling stunts to endanger our personnel and, as of right now civilians too. Sidenote: Fig 1.0 Assanges OKCupid Pic >>
So what’s happened now?
Well, two weeks a go a ‘project’ popped up calling itself the ‘Transparency Toolkit’ (Website). The project (so far) created an unimpressive script to crawl Linkedin profiles looking for keywords such as ‘intelligence’, ‘military’, UAV’ drone’ etc on US citizens profiles. Once it found one or more of these pre-defined keywords it would pull everything about that Linkedin user (including resume, photo, name, location etc) into a database. They then released this database on Github in JSON format so that it could be mined and manipulated by anyone. So what, I hear you say, they just collected already public information on a particular demographic (if you are a member of Linkedin that is) and dumped it in raw data format. Here’s the three gimps behind it:
“There’s no respect for others without humility in one’s self.” ~ Amiel
When I set out on this ‘caper’ over five years ago I never imagined how things would turn out. A lot of positive things have occurred. Things like making the cover of both Newsweek, and Homeland Security Today Magazine, TV coverage on both MSNBC and NBC, my laptop being displayed in the International Spy Museum in Washington DC and much more.
And this week something else happened. I was ‘named’ in TIME Magazine’s list of the 30 Most Influential people on the Internet. Think about that for a minute. At the time of writing there are 3,079,544,187 (give or take) people using the internet in the world.
This list has just 30 people on it. I was and am still, totally stunned. TIME lists were first published in 1999 as the result of a debate among American academics, politicians, and journalists, the list is now an annual event. Although appearing on the list is often seen as an honor, TIME makes it clear that entrants are recognized for changing the world, regardless of the consequences of their actions. The final list of influential individuals are exclusively chosen by TIME editors with nominations coming from the TIME alumni and the magazine’s international writing staff.
“The ship of democracy, which has weathered all storms, may sink through the mutiny of those on board.” ~ Grover Cleveland – 22nd and 24th President of the United States of America
This is a recap of today’s events, surrounding Wikileaks, who I have mentioned on this blog previously both here and here, with ‘brevitized’ (yes I made that word up) backstory as follows;
You’ll recall that following the release of the movie ‘The Interview’, which cast crazy lil Kimmy, supreme leader of North Korea in a somewhat bad light there was a… let’s call it a… ‘cyber-response‘. This response boiled down to an attack on Sony’s ‘cyber assets’. The perps called themselves the ‘Guardians of Peace’ and the FBI was quick to announce the perps were in fact the North Koreans themselves, but many, me included, believe it to be the work of China AND the NORKS, while others believe Russia was involved. Either way, it was not some lame-ass ‘Anonymous’ or similar hit, it was, without doubt a state sponsored attack. This attack resulted in huge amounts of Sony records, emails and documents being stolen.
“Propaganda, to be effective, must be believed. To be believed, it must be credible. To be credible, it must be true.” ~ Hubert H Humphrey
I’m going to give you a heads up. There is a VERY important message in this blog post, and I’ve been trying to get it across for 4 years now and now shit’s getting real. So, Less than 24 hours ago the so-called ‘Islamic State Hacking Division’ dumped scores of what appeared to be US military personnel names AND addresses they claimed to be from a ‘hacked database’ and mirrored it all over the web.
What (another) GIANT pile of steaming rhino shit.
This has been so badly executed I really don’t know where to start disassembling this utter bullshit. But, I am sure as hell gonna try.
Posted: 17th March 2015 by th3j35t3r in General
Tags: openssl cve cyber counter measures
“It’s an ill wind that blows nobody any good” ~ Unknown
Yesterday I was reading a really interesting (to me at least) thread on Twitter (right here) that posed a relevant question (to me anyway) asking ‘does the text of the new CISA bill allow for ‘hacking back’, or as I prefer to call it ‘surprise adoption’ in the context of offensive cyber countermeasures.
You may or may not be aware of the fact that aside from the obvious threat from online radicalization of homegrown terror actors, US assets, not just government assets, but private, corporate infrastructures, your assets and my assets are under attack CONSTANTLY. And I mean constantly. If you don’t believe me and you want a LIVE real-time view of who and what’s hitting this nations cyber ‘stuff’ right now all you need to do is CLICK HERE on any given Sunday, or right now if you are feeling adventurous.
For those who don’t like clicking links here’s a screenshot from 2 seconds ago as I write this post:
Posted: 2nd February 2015 by th3j35t3r in General
Tags: bloopers, cyber jihad
“Opportunities multiply as they are seized.” – Sun Tzu
I’ve been talking about how jihadis have been using the internet to conduct radicalization, recruitment, propaganda operations and even the training of homegrown threats for years. Recently it seems that other people, not least the mainstream media are finally catching on. There’s a lot of hyperbole too, with phrases like ‘ISIS hackers’ and ‘Cyber Jihad’ being tossed around. This post will demonstrate by way of example the current general skill set levels of your average online jihadist forum administrator.
For this demonstration I’ll be using the jihadi forum ‘http://alfidaa.biz‘ which has been around since 2010, specifically Thursday May 27th at 20:37pm 2010. It’s currently hosted in Portugal by RedeVF Tecnologias de Informacao and sits on an Apache web server on IP 126.96.36.199. It appears to be a dedicated VPS (not shared) as the only other domains pointing to this IP address are variations of their own, namely www.al-fidaa.com and www.alfidaa.info. This tells us it’s not a free provider, they have money, and someone is paying for the box. More on who later in this post.
THEIR FIRST MISTAKE
Posted: 28th January 2015 by th3j35t3r in General
Tags: lizardsquad, team p0ison
“Never interrupt your enemy while he is making a mistake” ~ Napolean
I’ll start off with a Public Service Announcement – brace yourself, this post is nothing to do with ‘hacking’ it’s a lesson in patience, you are about to witness the sad mental state that has possessed far too many of our young peoples’ minds, since…. well, since ‘LulzSec’. Many of us remember ‘Lulzsec’ and what became of them so I won’t bother boring us all with that shit. But since then I can’t help but notice that their asshattery has spawned a whole generation of children, and talentless nobody’s whose sole purpose is to abuse and fuck with people on the internet, and then cry about it for eons when someone turns around and out-asshats or simply blocks them. We’ve seen them try everything, but essentially they’re real lonely and all they want is ‘e-fame’ and they don’t care what they do to get it. And lately it’s getting worse. Most of their achievements in ‘hacking’ amount to downloading a mod pack for their latest XBOX title. It really pisses me off when the media crown people who send bomb threats to airlines over twitter as ‘hackers’. Seriously? WTF? I’ve worked hard for my questionably good (or depending how you look at it, bad) name and I like many other relatively normal people don’t want to be tarred with their cheeto-dust stained brush.
TAKE THIS MORNING FOR EXAMPLE:
Recently the current most hated and reviled ‘hacker’ crew – known as @LizardMafia for some reasons known only to a few lost access to their domain ‘lizardmafia.com‘ which included their IRC server on ‘chat.lizardsquad.com‘. I received some intelligence from a credible source that these ‘Lizards’ and some of the remnants of the old Team P0ison gang of halfwits were ‘teaming up’ and they were hanging out on Team P0ison’s little IRC server since their own had errrm, well, become no longer viable for them. It’s cunningly hosted at the very incognito ‘irc.p0ison.org’ on port 6667 – and yes if you click that link it’ll take you right there, so when you’re finished reading this feel free to drop by and ‘say hello’ to these fools, or something.
Posted: 16th November 2014 by th3j35t3r in General
Tags: beheadings, execution, ISIL, ISIS, kassig, syria
“Propaganda does not deceive people; it merely helps them to deceive themselves.” ~ Eric Hoffer
After watching with absolute disgust ISIS latest video release, featuring the executions of 18-20 ‘Syrian Nusayri Officers and Pilots’, and former Army Ranger Peter Kassig, I noticed some subtle and not-so-subtle differences compared to the previous videos. So I’m going to take the liberty of sharing them right here.
PRODUCTION QUALITY – THEY’VE GOT A BRAND NEW GEEK
All the previous ISIS video releases, while better than the prior videos from AQ and others are no match for the effort and skillset that went into creating this latest one. They must have a new shithead (probably this guy
) working on the post-production and effects which this time included, slow-motion, and overlaid sound effects, all synced perfectly with what appears to be well-rehearsed footage (more on that later).
RELEASE TIMING – THEY’RE TRICKLE-DRIPPING