Author Archive for Public Intelligence

Archistrategos.

Verisign Website Takedown Anti-Abuse Domain Use Policy

Abusive activity on the internet continues to rise, and public concern about the safety of the internet is clear. Verisign is aware that some reports have sought to portray the com/net TLDs as being at risk from maliciousness. All parts of the internet community are feeling the pressure to be more proactive in dealing with malicious activity. ICANN has recognized this and the new gTLD Applicant Guidebook requires new gTLDs to adopt a clear definition of rapid takedown or suspension systems that will be implemented. To address concerns over malware, Verisign is seeking to (i) provide a malware scanning service to assist registrars in identifying legitimate sites that have been infected and (ii) establish an anti-abuse policy to facilitate the takedown of abusive non-legitimate sites.

(U//FOUO) U.S. Army North Crips Targeting Uniformed Soldiers in Retaliation for Oklahoma Murders

On 21 Sep 11, USACIDC reported the CRIPS have put out an order to shoot any Solider in uniform on sight in retaliation for the shooting of their members by Soldiers earlier in the week. The Lawton Oklahoma Police Department has confirmed the CRIPS have threatened to kill soldiers in uniform. The threat stems from when the soldiers, in retaliation for drug rip off, entered the off-post residence of the CRIPS, robbed and subsequently shot some of the CRIPS members. Three of the victims were identified as members of the “107 Hoover CRIPS.”

White House “WikiLeaks” Executive Order on Improving Security of Classified Networks

This order directs structural reforms to ensure responsible sharing and safeguarding of classified information on computer networks that shall be consistent with appropriate protections for privacy and civil liberties. Agencies bear the primary responsibility for meeting these twin goals. These structural reforms will ensure coordinated interagency development and reliable implementation of policies and minimum standards regarding information security, personnel security, and systems security; address both internal and external security threats and vulnerabilities; and provide policies and minimum standards for sharing classified information both within and outside the Federal Government. These policies and minimum standards will address all agencies that operate or access classified computer networks, all users of classified computer networks (including contractors and others who operate or access classified computer networks controlled by the Federal Government), and all classified information on those networks.

Facebook Logged-Out User Tracking Patent

A method is described for tracking information about the activities of users of a social networking system while on another domain. The method includes maintaining a profile for each of one or more users of the social networking system, each profile identifying a connection to one or more other users of the social networking system and including information about the user. The method additionally includes receiving one or more communications from a third-party website having a different domain than the social network system, each message communicating an action taken by a user of the social networking system on the thirdparty website. The method additionally includes logging the actions taken on the third-party website in the social networking system, each logged action including information about the action. The method further includes correlating the logged actions with one or more advertisements presented to the one or more users on the third-party website as well as correlating the logged actions with a user of the social networking system.

(U//FOUO) U.S. Forces Iraq Base Transition Smart Book 2011

This is the Final Edition of the USF-I Base Transition Smartbook. Updated from the October 2010 edition, it provides a single-source, quick reference guide for the base transition process, and captures/de-conflicts updated and additional base transition guidance through the use of bold and strike-through text. The information in this Smartbook summarizes base transition Standard Operating Procedures (SOP), published US Forces-Iraq (USF-I) orders/ guidance, and lessons learned from past base transitions to facilitate honorable and successful transitions of remaining non-enduring bases and enduring sites. The USF-I Base Transition Smartbook is the guiding document for transitioning USF-I bases in the Iraq Joint Operations Area (IJOA) to the Government of Iraq (GoI). Guidance is intended to be flexible enough to fit a range of situations, and to ensure a base is transferred properly, in accordance with applicable laws and regulations. The Base Transition Smartbook is located on the USF-I J7 website. Revisions are summarized below and highlighted throughout the text.

(U//FOUO) Vermont Fusion Center Improvised Chemical Pressure Bomb Warning

An improvised chemical pressure bomb is a device that’s charge comes from a gaseous chemical reaction or phase change (such as when liquid changes to gas) in a confined area; the resulting buildup causes the container to rupture violently. There are several types of improvised chemical pressure bombs that can be constructed from easy to acquire materials.

Federal Reserve Bank of New York Sentiment Analysis and Social Media Monitoring Proposal

Federal Reserve Bank of New York (“FRBNY”) is extending to suppliers an invitation to participate in an Sentiment Analysis And Social Media Monitoring Solution RFP bid process. The intent is to establish a fair and equitable partnership with a market leader who will who gather data from various social media outlets and news sources and provide applicable reporting to FRBNY. This Request for Proposal (“RFP”) was created in an effort to support FRBNY’s Social Media Listening Platforms initiative.

Mahmoud Abbas Speech to the U.N. General Assembly Transcript September 23, 2011

It is no longer possible to redress the issue of the blockage of the horizon of the peace talks with the same means and methods that have been repeatedly tried and proven unsuccessful over the past years. The crisis is far too deep to be neglected, and what is more dangerous are attempts to simply circumvent it or postpone its explosion. It is neither possible, nor practical, nor acceptable to return to conducting business as usual, as if everything is fine. It is futile to go into negotiations without clear parameters and in the absence of credibility and a specific timetable. Negotiations will be meaningless as long as the occupation army on the ground continues to entrench its occupation, instead of rolling it back, and continues to change the demography of our country in order to create a new basis on which to alter the borders.

Boeing “Project Gemini” South Carolina 787 Factory Anti-Union Presentation

A presentation entered into evidence in a National Labor Relations Board lawsuit by the International Association of Machinists (IAM) against Boeing over the location of a new factory for constructing 787 Dreamliners in South Carolina. The presentation shows that Boeing determined a South Carolina location to be less profitable and more likely to fail, yet the company ultimately decided to locate the facility there to avoid unions and, according to IAM, to punish unions for past disagreements.

Occupy Wall Street Photos September 2011

Dan Nguyen – http://www.flickr.com/photos/zokuga/ Collin David Anderson – http://www.flickr.com/photos/collina/ Paul Weiskel – http://www.flickr.com/photos/31167233@N08/ Andrew Shiue – http://www.flickr.com/photos/djwerdna/ Occupy Wall Street – http://www.flickr.com/photos/occypywallstreet/6173632320/ David Shankbone- http://www.flickr.com/photos/shankbone/

Mahmoud Ahmadinejad Speech to UN General Assembly Transcript September 22, 2011

Who used the mysterious September 11 incident as a pretext to attack Afghanistan and Iraq, killing, injuring, and displacing millions in two countries with the ultimate goal of bringing into its domination the Middle East and its oil resources? Who nullified the Breton Woods system by printing trillions of dollars without the backing of gold reserves or equivalent currency? A move that triggered inflation worldwide and was intended to prey on the economic gains of other nations. Which country’s military spending exceeds annually a thousand billion dollars, more than the military budgets of all countries of the world combined? Which governments are the most indebted ones in the world?