Month: May 2013
Video Skid – Monty Python – Football
Memorial Day – Full Movie
The Files TV – IED bombs new Syrian rebel strategy
Monty Python – Upper Class Twit of the Year – Video Skid
The Distinguished Gentleman (1992) Eddie Murphy – Full Movie
Betreff: Geld von Fondsfirmen an “GoMOPa – “Peter Ehlers” mit dem Fondsvertrieb “SJB” verstrickt – Internet-Hacking-Attacken
Liebe Leser,
wieder einmal versucht die dubiose “GoMoPa” und deren Handlanger, Konsorten und Komparsen mutmasslich “Peter Ehlers” und “Nawito” von mutmasslich eigenen Taten abzulenken und mir perfide den “Schwarzen Peter” zuzuschieben.
Wie bereits im Falle meines angeblichen falschen Magistertitels, dem Fall Meridian Capital etc pp die Liste ist endlos.
Ein Sammelsurium von Kolportagen, Fabeln, Märchen und Latrinenpatrolen…
Dabei liegen die Beweis klar auf dem Tisch:
Der mutmassliche „GoMoPa“-Partner „Peter Ehlers“ ist auch Partner des „SJB“Fondsvertriebs -Chefs Gerd Bennewirtz und somit wohl in alle möglichen Aktivitäten und Interessenkonflikte verstrickt.
Die renommierten und etablierten Medien wie “ZEIT” und “Süddeutsche Zeitung” haben es aufgedeckt, was hier im Fall “S &K”/”GoMoPa” wirklich lief.
http://www.zeit.de/2013/11/Finanznachrichtendienst-Gomopa
http://www.sueddeutsche.de/geld/mutmassliche-anlagebetrueger-sk-die-akte-midas-1.1620191-4
Ich habe und hatte zu keiner Zeit irgendwelche Beraterverträge mit irgendeiner deutschen Firma.
Nachdem zahlreiche Internetangriffe nichts gebracht haben, nun wieder dieser Unsinn.
Hier noch einmal meine Stellungnahme zu der “GoMoPa”/Ehlers/Nawito-Absurdistan-Agit-Propaganda:
Dear Readers,
let me just briefly comment a mental cyberattack which should distract your attention from the real issues.
I have never had any consulting position or contract for any German company.
I have never worked for the Axel Springer Publishing House – not even as a freelance journalist.
These facts are clear and can be verified easily – just by calling Axel Springer.
The facts are
1) Dr. Rainer Zitelmann worked for the Axel Springer Company. You can esaily find out what happened there. I just mention the word “Auschwitz” in this context…As you see from his website and in the internet Zitelmann is in fact consulting many German companies.
2) “GoMoPa” had in fact a consultation contract with estavis and got in fact money from estavis and many various companies i.e. “S&K”
These contracts are known and 100% true and published by various media i.e. “ZEIT”, “MANAGER MAGAZIN”, “SUEDDEUTSCHE ZEITUNG” etc.
3) Meridian Capital was the subject of “GoMoPa”s articles.
4) “Nawito” whover or whatever it is did not even bother to contact us.
5) The “information” about one of our companies is false.
6) The “Nawito” informer “Peter Ehlers” did in fact attack Chancellor Merkel and the Minister of Finance Wolfgang Schäuble as “Deutschlands bekannteste Hehler” to name just one fact about “Peter Ehlers” or whatever his name might be who by the way got a lot of money from the bancrupt SAM AG which was also subject of “GoMoPa”‘s reporting and we know similiar cases of this endeavour.
7) The last editor who was attacked by such cyberattacks died in a very mysterious way, Heinz Gerlach. He might have been controversial but nevertheless – the truth is the truth.
He was the first journalist to publish the truth about the mysterious headquarter of “GoMoPa” in New York and their consulting contract with estavis and died suddenly and totally unexpected for most of us – not for all.
The circumstances of his death remain unsolved for me.
We are ready to proof this everytime and do not work with “colportations”.
Obviously cyberattacks on our websites since years are not enough to keep the truth down – defamation must be added – a wellknown STASI technique to irritate the public – MENTAL AND PYSICAL CYBERATTACKS done by the well-know suspects.
Sincerely your
Bernd Pulch
Magister Artium der Publizistik, Germanistik und Komparatistik
PS
COPIES OF PHYSICAL CYBER ATTACKS ON OUR SERVERS BY THE SUSPECTS AND “INFORMERS” OF “NAWITO”
The attacked website are for example:
http://www.investment-on.com
http://www.berndpulch.org
http://investment-magazin.com
http://www.investment-magazin.tv
and about 20 more.
WIE MICH DIE “GoMoPa”-SCHEISSHAUSFLIEGEN MIT GOOGLE-EINTRÄGEN ERPRESSEN WOLLTEN
ERPRESSUNG VON MERIDAN CAPITAL DURCH DIE ANONYMEN “GoMoPa”-Scheisshausfliegen (Eigenbezeichnung)
DIE SÜDDEUTSCHE ZEITUNG, DAS HANDELSBLATT UND DIE FAZ ÜBER DIE ERPRESSUNGEN DER “GoMoPa”-Scheisshausfliegen (Eigenbezeichnung) BEISPIEL WIRECARD ETC
Neue Serverangriffe der vorbestraften Finanzbetrüger der “GoMoPa” und ihrer “Partner” mutmasslich “Peter Ehlers” und “Otmar Knoll”
Hier sehen Sie obenstehend den Beleg für die Internet-Attacken der er vorbestraften Finanzbetrüger der “GoMoPa” und ihrer “Partner” mutmasslich “Peter Ehlers” und “Otmar Knoll”
Das Urteil zu den vorbestraften Finanzbetrügern der “GoMoPa” wegen Betruges am eigenen Anleger finden Sie unter
These graphs below show the cyberattacks on our website initiated by the suspects we already mentioned and who even announced in an email that tehy would do this illegal internet crime. The email was by Otmar Knoll, Fairvesta, who announced the cybercrime. The suspected hackers are from “GoMoPa” and their thugs.
The graph shows the DDos attacks on our servers.
What is a DDos attack ?
Read here:
http://en.wikipedia.org/wiki/Denial-of-service_attack
These internet crimes are punished with longterm jail sentences and financial compensation..
Die obenstehende Graphik zeigen die Hackerangriffe auf unsere Webseiten, die seit Jahren durchgeführt werden im Ausschnitt. In einer Email an uns hat Otmar Knoll, Fairvesta, die Hackerangriffe, somit schwere Internetverbrechen angekündigt. Wir haben diese Emails bereits veröffentlicht. Mutmasslich arbeitet Otmar Knoll mit den üblichen Verdächtigen der “GoMoPa”, ihren Informanten und Hackern zusammen:
Die Graphiken zeigt die sogenannten DDos-Angriffe auf unsere Server.
Was ist eine DDos Attacke ?
http://de.wikipedia.org/wiki/Denial_of_Service
Lesen Sie hier:
Diese Vergehen werden mit langjährigen Freiheitsstrafen und Schadensersatz bestraft.
2001 A Space Travesty – Full Movie
Deuce Bigalow Male Gigolo – Full Movie
Deuce Bigalow: Male Gigolo is a 1999 comedy film starring Rob Schneider. Other cast members include Eddie Griffin, Amy Poehler, Oded Fehr, Arija Bareikis, and William Forsythe.
The story is about a hapless fishtank cleaner who goes into business as a male prostitute in an attempt to earn enough money to repair damage he caused while house-sitting.
Dracula – Dead And Loving It – Full Movie
TOP-SECRET – Defense Security Service Cybersecurity Operations Division Counterintelligence Presentation
Defense Security Service Cybersecurity Operations Division
- 33 pages
- For Official Use Only
- December 2012
DSS Supports national security and the warfighter, secures the nation’s technological base, and oversees the protection of U.S. and foreign classified information in the hands of Industry
CI Mission
DSS CI identifies unlawful penetrators of cleared U.S. defense industry and articulates the threat for industry and government leaders
Scope
-10K+ firms; 13K+ facilities; 1.2m personnel
-1 CI professional / 261 facilities
-10.5% of facilities reportCapability
• (U) 11 personnel conducting analysis, liaison, field support, strategic development and program management
• (U) Wide range of skill sets – CI, CT, LE, Cyber, Security, Intel, IA, CNO and more
• (U) Direct access to cleared industry across 25 DSS field offices nationwide
• (U) Large roles at U.S. Cyber Command, National Security Agency, National Cyber Investigative Joint Task Force and the Department of Homeland SecurityChallenges
• (U) Secure sharing of threat information with industry partners
• (U) Identifying and reporting suspicious network activity
• (U) Limited resources to execute for an quickly expanding mission area Significant Achievements and Notable Events
• (U) Since September, 2009 – Assessed over 3,000 cyber-related suspicious contact reports from Industry and the Intelligence Community; facilitating action on over 170 federal investigations/operations
• (U) Developed four benchmark product lines for Industry and the Intelligence Community to include the 3rd edition of the DSS Cyber Trends
• (U) Briefed at 24 venues and over 1,000 personnel in FY12 on the cyber threat
• (U) In FY12, delivered over 350 threat notifications to industry, detailing adversary activity occurring on their networks.…
(U) FY12 Industry Cyber Reporting
• (U//FOUO) 1,678 suspicious contact reports (SCR) categorized as cyber incidents (+102% from FY11)
• (U//FOUO) 1,322 of these were assessed as having a counterintelligence (CI) nexus or were of some positive intelligence (PI) value (+186% increase from FY11)
• (U//FOUO) 263 were categorized as successful intrusions (+78% increase from FY11)
• (U//FOUO) 82 SCRs resulted in an official investigation or operation by an action agency (+37% increase from FY11)
Hot Shots – Full Movie
Parody of “Top Gun” in which a talented but unstable fighter pilot must overcome the ghosts of his father and save a mission sabotaged by greedy weapons manufacturers.
Revealed – DHS and FBI Bulletins on OpUSA Tools and Tactics
The following bulletins were released May 6, 2013 by the National Cybersecurity and Communications Integration Center and FBI in anticipation of the OpUSA campaign. A DHS bulletin on the campaign was released May 2, 2013 by computer security journalist Brian Krebs.
National Cybersecurity and Communications Integration Center OpUSA: Potential Tools | May 6, 2013 | 4 pages | Download |
FBI Liaison Alert System #C-000007-DD | May 6, 2013 | 1 page | Download |
Multiple groups, and individual hacker handles have claimed their intent to attack U.S. websites as part of OpUSA. As seen in many hacktivist operations (Ops), willing participants have posted free tools to assist other like minded individuals in their attack efforts. Often, more coordinated attacks will name a specific tool, target, day and time for the attack. That has not been the case for OpUSA thus far. Individual hacker groups seem to be conducting attacks independently, each claiming responsibility for individual defacements and data breaches that have supposedly recently taken place. Below you will find some of the tools being posted in conversations about OpUSA and links to US-CERT sites which provide background on the vulnerabilities exploited by these tools as well as mitigation advice for computer network defense actions.
Structured Query Language (SQL) injection
The following is a sampling of tools being offered to willing members interested in using SQL attacks during OpUSA.
- Havij: Automates SQL Injection attacks. It allows the attacker to ‘fingerprint’ the database, retrieve Database Management System users and password hashes, dump tables and columns, retrieve specific data from the database, run SQL statements, and access the underlying file system and execute commands on the operating system.
- SQL Poison: This exploit scanner tool incorporates automated Google Dorking methods to look for SQL vulnerabilities. Once the vulnerability is discovered, it performs an SQL injection attack.
The following US-CERT advisories offer further information:
- US-CERT SQL Injection: http://www.us-cert.gov/security-publications/sql-injection
- US-CERT Securing Your Web Browser: http://www.us-cert.gov/publications/securing-your-web-browser
Distributed Denial of Service (DDoS)
DDoS tools are often used by hacktivist so users may voluntary botnets. These are a list of the available DDoS tools via Open Source:
- Low Orbit Ion Cannon (LOIC): Floods servers with TCP or UDP packets with the intention of disrupting service.
- High Orbit Ion Cannon (HOIC): Can attack as many as 256 sites simultaneously and can target subdirectories of the main page using “booster packs” that enable traffic with multiple user-agent strings, referrers, and headers.
- HTTP Unbearable Load King (HULK): Also referred to as HULK DDoSser. Generates unique requests for each and every request generated, which bypasses caching engines and impacting the server’s load directly.
- Slowloris: Attempts to keep multiple open connections to the target web server and keep them open as long as possible.
- DDos Notepad: Attackers can create a simple Batchfile DDoS echo script using Notepad.
- ByteDOS: Windows desktop DOS application that is a standalone executable file and doesn’t require any special installation on the attacking machine. It is equipped with embedded IP resolver capabilities that allow the tool to resolve IPs from domain names. It also supports SYN Flood and ICMP flood.
- Turbinas: Also referred to as VOLKS TURBINAS.EXE, which are associated with Cloaked Malware group designed to evade security detection systems.
- Syn Flood DOS: Attack in which the actor sends a number of consecutive SYN requests to a target attempting to consume server resources.
- Jays Booter: A customized shell booter, which can be instructed to attack a specific IP for a period of time in an attempt to boot the target off of the internet. There are three types of shells: POST, GET, and SLOWORIS.
- HTTPFlooder: Program that attempts to flood the HTTP layer through GET and POST requests.
- TORSHAMMER: A Slow POST DOS tool written in Python. It can be run through the TOR network, which will anonymize the attacker. It can impact unprotected web-servers running Apache and IIS.
- R.U.D.Y: Also known as R-U-Dead-Yet. This is an HTTP POST DOS attack that allows the attacker to choose the forms and form fields that they want to use for the POST attack.
- OWASP HTTP Tool: A Slow POST DOS tool that allows the attacker to generate a customized number of connections, connection rate, timeouts, and even the content length.
- Anonymous DOSer: A customized DOS tool put together in visual basic. It is very simple to use and can be used for HTTP floods or UDP floods.
- Windows_DNS_Attack_Tool: DNS Amplification tool. It uses open DNS resolvers and source address spoofing to create large denial of service attacks.
- Goodbye: Similar to HTTPFlooder and R-U-Dead-Yet DDoS tools.
The following US-CERT advisories offer further information:
- US-CERT Anonymous DDoS Activity: http://www.us-cert.gov/ncas/alerts/TA12-024A
- US-CERT Understanding Denial-of-Service-Attacks: http://www.us-cert.gov/ncas/tips/ST04-015
- US-CERT DNS Amplification Attacks: http://www.us-cert.gov/ncas/alerts/TA13-088A
Password Crackers/Stealers
Several password crackers and stealers were spotted on related forums. Some of which are found below:
- Backtrack 5: A Linux based penetration testing tool. The most recent edition was synced up with the new release of KaliLinux. This toolkit provides easy-to-use tools such as port scanners, metasploit, Nmap, Browser Exploitation Framework, Hydra, Aircrack-ng, and Ophcrack. Aircrack and Ophcrack are password crackers.
- Hash Cracker: Refers to multiple free applications designed to crack MD2, MD5, SHA-1, SHA-256, SHA384, and SHA-512 using bruteforce techniques or using a rainbow table/dictionary attacks.
- CpanelBruteReiluke: Bruteforce password cracking tool designed by a developer known as Reiluke. Reiluke also has made his blind SQL, email brute force, and exploit scanner tools available via open source.
- Gmail_Hacker: Labeled as a free Gmail-specific password cracking tool which is advertised as taking less than 2 minutes to retrieve passwords.
- Firefox Password Stealer: Provides details on how an attacker can turn their Firefox browser into a password stealer. This is not a tool, but rather direction for end users.
- ICQ Steal0r: Program seems to be dedicated to stealing passwords of ICQ users. ICQ is an instant messaging application popularized by Mirabilis.
The following US-CERT advisories offer further information:
- US-CERT Password Management: https://www.us-cert.gov/sites/default/files/publications/PasswordMgmt2012.pdf
Proxy Servers/Anonymizers
In additional to options like the onion router (TOR), OpUSA members have advertised the following to assist actors in obfuscating their activity.
- CYBERGHOST: A Virtual Private Network (VPN) simulator which sets up a proxy server allowing anonymous activity with 128-bit AES encryption. It also has the most server locations available in the US and a number of countries in Europe.
- TunnelBear: This VPN simulator also circumvents Geoblocking, which is geographically blocking internet users from certain web services.
- SumRando: This VPN simulator allows users to generate random IP addresses, which can obfuscate attribution.
- Real Hide IP: Hides the IP address of anyone employing the application.
- Hotspot Shield: Hides the IP address of anyone employing the application.
Other Tools Mentioned
Hacker groups have mentioned the following tools among several others that don’t fit the above categories.
- Net Tools: This could refer to any number of items, but c|net offers a network toolbox that has network sniffing and scanning tools.
- Pack Del Hacker: This is a simplified, online-based file-sharing service.
- EmailScraperWizardv06b: This is noted as one of the more successful email scrapers on the internet. It can extract email addresses from websites.
- IP Port Scanner: This could refer to multiple tools dedicated to scanning, mapping and discovering open ports.
- IP Scanner: These types of tools can scan networks, detect devices, wireless devices, routers, and can find HTTP, HTTPS, and FTP folders.
- DHCP_IP_Forcer: This allows an attacker to essentially scan a network and detect IP addresses and MAC addresses on a network. Some DHCP Force components allow the attacker to reconfigure modems.
Summary
While it is difficult to assess the specific tools that may be used against targeted organizations, this product is intended to provide organizations with an idea of the type of free tools that may be employed against them, so they may better prepare mitigation strategies during OpUSA or similar hacktivist operations. As always, NCCIC reminds users and administrators of the importance of best practices to strengthen the security posture of their organization’s systems. Critical Infrastructure Key Resource (CIKR) owners and operators should work toward a resilient network model that assumes such an attack will occur against their enterprise. The goal is to minimize damage, and provide pathways for restoration of critical business functions in the shortest amount of time possible.
The Files TV – The Hidden Costs of Hamburgers
Americans love hamburgers — we eat about three burgers a week. But what are the hidden environmental costs? See sources from the Center for Investigative Reporting.http://cironline.org/reports/hidden-c…
Directed and produced by Carrie Ching, Reported by Sarah Terry-Cobo and Carrie Ching, Illustrated and animated by Arthur Jones.
This animation is part of The Food for 9 Billion series, a yearlong look at the challenge of feeding the world at a time of social and environmental change.
http://cironline.org/projects/food-fo…
For more great stories, subscribe to The I Files:http://www.youtube.com/subscription_c…
Like The I Files on Facebook: http://fb.com/theifiles
Follow us on Twitter: http://twitter.com/ifiles
Reblog us on Tumblr: http://theifiles.tumblr.com
Repin us on Pinterest: http://pinterest.com/theifiles
+1 us on Google+: http://gplus.to/ifiles
Video Skid – Monty Python’s Flying Circus: Brontasauraus Theory
Das Betrugsurteil gegen “Gomopa”-President “Klaus Maurischat” und Partner wegen Betruges am eigenen Anleger
Neue schwere Straftaten wohl wieder von “Gomopa” im Auftrag ihrer “Partner” – mutmasslich “Peter Ehlers” und “Otmar Knoll”
Liebe Leser,
obenestehende Graphik zeigt die tagelangen, schweren Internetatatcken wohl immer wieder der Hacker der “GoMoPa” im Auftrag von mutmasslich “Peter Ehlers” und “Otmar Knoll” auf unsere Server – wie sie es auch bei Heinz Gewrlach machten – kurz vor seinem für fast alle überraschenden Tode.
“Otmar Knoll” von “Fairvesta” hat diese Angriffe uns gegenüber schriftlich angekündigt, ebenso wie “Peter Ehlers”, verstrickt mit der Fondsfirma “SJB” seines Parners “Gerd Bennewirtz”, uns mit Mordanschlägen gedroht hat !
Wür den Sie diesen Charaktern vertrauen und Ihr Geld anvertrauen ?
Sie sehen, mit welchen Figuren wir es hier zu tun haben…
Hier noch einmal die wichtigsten Infos zu diesen schweren Straftaten:
Neue Serverangriffe der vorbestraften Finanzbetrüger der “GoMoPa” und ihrer “Partner” mutmasslich “Peter Ehlers” und “Otmar Knoll”
Hier sehen Sie obenstehend den Beleg für die Internet-Attacken der er vorbestraften Finanzbetrüger der “GoMoPa” und ihrer “Partner” mutmasslich “Peter Ehlers” und “Otmar Knoll”
Das Urteil zu den vorbestraften Finanzbetrügern der “GoMoPa” wegen Betruges am eigenen Anleger finden Sie unter
These graphs below show the cyberattacks on our website initiated by the suspects we already mentioned and who even announced in an email that tehy would do this illegal internet crime. The email was by Otmar Knoll, Fairvesta, who announced the cybercrime. The suspected hackers are from “GoMoPa” and their thugs.
The graph shows the DDos attacks on our servers.
What is a DDos attack ?
Read here:
http://en.wikipedia.org/wiki/Denial-of-service_attack
These internet crimes are punished with longterm jail sentences and financial compensation..
Die obenstehende Graphik zeigen die Hackerangriffe auf unsere Webseiten, die seit Jahren durchgeführt werden im Ausschnitt. In einer Email an uns hat Otmar Knoll, Fairvesta, die Hackerangriffe, somit schwere Internetverbrechen angekündigt. Wir haben diese Emails bereits veröffentlicht. Mutmasslich arbeitet Otmar Knoll mit den üblichen Verdächtigen der “GoMoPa”, ihren Informanten und Hackern zusammen:
Die Graphiken zeigt die sogenannten DDos-Angriffe auf unsere Server.
Was ist eine DDos Attacke ?
http://de.wikipedia.org/wiki/Denial_of_Service
Lesen Sie hier:
Diese Vergehen werden mit langjährigen Freiheitsstrafen und Schadensersatz bestraft.
The Files TV – Captive Radio
This excerpt from Lauren Rosenfeld’s documentary profiles the families of kidnapping victims in Colombia who use a weekly radio program to communicate with loved ones held hostage in the jungle. Winner of the 2012 Hearst Documentary Award, UC Berkeley Graduate School of Journalism.
Part of our New Voices series, featuring the next generation of video journalists.
The FBI – Organizer of International Securities Fraud Ring Sentenced to Prison for Using Hackers
TRENTON, NJ—The central organizer of a worldwide conspiracy to manipulate stock prices through a botnet network of virus-controlled computers was sentenced today in Trenton federal court to 71 months in prison, New Jersey U.S. Attorney Paul J. Fishman announced.
Christopher Rad, 44, of Cedar Park, Texas, was previously convicted, following a nine-day jury trial, of six counts arising from the fraud scheme: conspiring to further securities fraud using spam; conspiring to transmit spam through unauthorized access to computers; and four counts of transmission of spam by unauthorized computers.
The sentence was imposed by U.S. District Judge Joel A. Pisano, who also presided over the trial.
“Christopher Rad’s use of hackers to drive his pump-and-dump scheme illustrates a trend toward the modern mechanization of old-school scams,” said U.S. Attorney Fishman. “Law enforcement is constantly anticipating and adapting as criminals operate in a more virtual—and more global—world. As a result, Rad will spend years in prison for manipulating our markets to steal his millions.”
According to documents filed in this case and statements made in court:
Rad conspired with stock promoters in a scheme to manipulate the price and volume of dozens of particular stocks, including stocks with ticker symbols RSUV, QRVS, VSHE, SVXA, and ASIC, in order to later sell them at an artificially inflated price—a practice known as a “pump and dump” scheme. The scheme began as early as November 2007 and continued through February 2009.
As part of the scheme, Rad organized others to manipulate the stock prices. He sought out and engaged spammers and then sent them precise language to include in their spam campaigns.
The spammers included two individuals who distributed spam through botnets. To create a botnet, viruses were sent out to infect computers around the world, creating a virtual army of hijacked computers. The spammers then caused the botnets to distribute spam to promote the stocks Rad wanted to manipulate. Infected computers were found in New Jersey, Europe, Russia, and elsewhere. The botnet was controlled from command and control servers located overseas, including in Russia and China.
Rad, who went by the alias “billy_sack,” communicated with the spammers by Skype, in most instances knowing them only by their aliases. During the 22-month conspiracy, Rad paid the spammers more than $1.4 million, making payments through e-Gold—an electronic monetary payment system—and money wires. Payments intended for a botnet operator in Russia were made through at least eight different countries. The wire instruction notations included false information such as payments for “Dell Monitors,” “touch panels,” and “transportation services.”
Rad also agreed with others to engage in bad-faith purchases of RSUV to create the impression among spam recipients that there was active trading in the stock.
At the same time, hackers hacked into the brokerage accounts of third parties, liquidated the stocks in those accounts, and then used the accounts to purchase shares of some of the stocks the scheme sought to manipulate. This increased the volume of shares being traded and created an impression that the stocks were worth purchasing.
In all, Rad made approximately $2.8 million from his schemes.
In addition to the prison term, Judge Pisano sentenced Rad to serve five years of supervised release and ordered him to pay a $30,000 fine. Restitution will be determined at a later date.
Rad’s co-conspirators, Doyle Scott Elliott and James Bragg, previously pleaded guilty to securities fraud and transmission of spam through falsely registered e-mail addresses. They await sentencing.
U.S. Attorney Fishman credited special agents of the FBI, under the direction of Special Agent in Charge Aaron T. Ford in Newark, with the investigation. He also thanked the U.S. Securities and Exchange Commission’s Division of Enforcement, led by Acting Director George Canellos.
The government is represented by Assistant U.S. Attorney Andrew S. Pak, of the Computer Hacking and Intellectual Property Section of the U.S. Attorney’s Office Economic Crimes Unit (ECU); Christopher J. Kelly, Deputy Chief of the ECU; and Erez Liebermann, Deputy Chief of the Office’s Criminal Division in Newark.
This case was brought in coordination with President Barack Obama’s Financial Fraud Enforcement Task Force. The task force was established to wage an aggressive, coordinated, and proactive effort to investigate and prosecute financial crimes. With more than 20 federal agencies, 94 U.S. Attorneys’ offices, and state and local partners, it is the broadest coalition of law enforcement, investigatory, and regulatory agencies ever assembled to combat fraud. Since its formation, the task force has made great strides in facilitating increased investigation and prosecution of financial crimes; enhancing coordination and cooperation among federal, state, and local authorities; addressing discrimination in the lending and financial markets; and conducting outreach to the public, victims, financial institutions, and other organizations. Over the past three fiscal years, the Justice Department has filed nearly 10,000 financial fraud cases against nearly 15,000 defendants including more than 2,900 mortgage fraud defendants. For more information on the task force, please visit http://www.stopfraud.gov.
The Files TV – City of No Illusions
Nearly one in six homes in Buffalo, NY is vacant, overwhelming the cash-strapped city. But residents of its most blighted neighborhood are taking matters into their own hands. Produced in 2011 by Vanessa Carr at UC Berkeley’s Graduate School of Journalism. Part of our New Voices series, featuring the next generation of video journalists.
Cryptome – Uncle Fester Decries Copyright Infringement
Uncle Fester Decries Copyright Infringement
A sends:
Date: Tue, 30 Apr 2013 18:55:23 -0700 (PDT)
Subject: uncle fester decries copyright infringement
“Steve Preisler” = Uncle Fester.
I am amazed that his name is public. His personal story is sympathetic personally. But I think his attitude towards “piracy” is biassed because he’s a “content creator”. If you don’t recognize his pseudonym, please read all the way through. His “piracy” opinions are to be excused in the Grand Scheme because of his other saintly behaviors, and also, they’re just his opinion.
Summary: the premiere author of accurate practical clandestine chemistry books does not like Kim Dot Com because the latter supports “theft” of the former’s publications. Overall though Steve Preisler seems brilliant, articulate, and as effective as say Julian or Jim Bell or Kim.com or Dread Pirate Roberts or even yourself 🙂 as an Army of One cultural destabilization / freedom fighter.
First, enjoy this:
“The worst thing of all about the net is the prevalence of copyright piracy. People have come to expect the right to steal! That is one way to get valid information on controversial topics off the net. Just download a stolen copy of a genuine book on the subject you are interested in. The people who run these download sites are repulsive in every way. Take the example of Mr. Dotcom who ran Megaupload. Fat-assed, pimple-faced and cowardly are just some of his better traits. I would simply love to be locked inside a cage with him for a few weeks. We would have one-on-one counseling sessions as I would teach him about the evils of stealing other people’s work.” –Uncle Fester
Now some background and I suggest that googling “Steve Preisler” will amaze.
He gets pissed at being jailed for applied chemistry so he opens Pandora’s Box. For two decades and some change, the underground writer known as “Uncle Fester” has been writing genuinely influential books. While his name may not come up in graduate dissertations and intellectual salons, the import of Fester’s oeuvre can be descried in the hand-written labels of sealed evidence bags and in the photo-documented environs of police-cordoned clandestine drug labs all over the globe.
Although they present information that can be gleaned from standard chemistry texts, books like Home Workshop Explosives, Silent Death, and of course, Secrets of Methamphetamine Manufacture are perennial candidates for state censorship. Indeed, the mere existence of such literature can be enough to disturb the sensibilities of otherwise stalwart defenders of the First Amendment.
It may not help that Fester is a competent and damn entertaining writer who knows his shit and does his homework. A onetime National Merit Finalist who repeatedly aced his SATs, Fester double majored in chemistry and biology at Marquette University, graduating with a BS degree and a bright future. It was around this time that a taste for tweak landed Fester then known as Steve Preisler behind bars, a fateful turn out of which, like Sade and Genet, he would find his true calling, and have his revenge.
FEMEN TV – Femen – Kill Kirill!
Patriarch Kirill was attacked!!!
Sex assault on the priest Gundyaev was committed by the activist of movement FEMEN Yana Zhdanova near the ramp of the patriarch’s personal aircraft. During the briefing on the occasion of the arrival Gundyaev at Kiev, topless terrorist attacked the Blessed shouting \”Go to Hell!\” in order to grab claws in the exhausted by fasting and prayer saint body.
FEMEN action KILL-KIRILL calls for the moral destruction of mummers scumbag Gundyaev and all smelled Putin\’s Legion with him.
FEMEN blames unscrupulous grandfather, named Cyril, in anti-state activities aimed to draw Ukraine into evroasian \”Canaan\” that threatens Ukraine with collapse and civil war.
FEMEN imputes Gundyaev the illegal arrest of anti-Putin activists who were betrayed to the shameful court, with the insane screams of Kremlin bigots.
FEMEN debarred the the Moscow fingered priest the moral right to make didactic visits to free of evroasian patriarchal crap European countries.
TOP-SECRET – UNODC Afghanistan Opium Survey 2012
United Nations Office on Drugs and Crime Afghanistan Opium Survey 2012
- 112 pages
- May 2013
Afghanistan cultivates, produces and process narcotics that are a threat to the region and worldwide. However, the international community also needs to understand that Afghanistan itself is a victim of this phenomenon. The existence of hundreds of thousands of problem drug users, as well as decades of civil war, terrorism and instability are all related to the existence of narcotics in the country.
According to the findings of this survey, the total area under cultivation was estimated at 154,000 hectares, an 18 per cent increase from the previous year. Comparisons of the gross and net values with Afghan’s licit GDP for 2012 also serve to highlight the opium economy’s impact on the country. In 2012, net opium exports were worth some 10 per cent of licit GDP, while the farmgate value of the opium needed to produce those exports alone was equivalent to 4 per cent of licit GDP.
On the basis of shared responsibility and the special session of the United Nation’s General assembly in 1998, the international community needs to take a balanced approach by addressing both the supply and the demand side equally. In addition, more attention needs to be paid to reduce demand and the smuggling of precursors as well as provide further support to the Government of Afghanistan.
…
- The total area under opium poppy cultivation in Afghanistan in 2012 was estimated at 154,000 hectares, a 18% increase from the previous year.
- The vast majority (95%) of opium cultivation took place in nine provinces in Afghanistan’s Southern and Western regions, which include the country’s most insecure provinces. In mirroring the polarization in the security situation between the lawless south and the relatively stable north of the country, this confirms the link between security and opium cultivation observed in previous years.
- Hilmand remained Afghanistan’s major opium-cultivating province, followed by Farah, Kandahar, Uruzgan, Nimroz, Nangarhar, Badghis, Badakhshan, Kunar, Day Kundi, Hirat, Laghman, Zabul, Kapisa, Ghor and Kabul.
- Opium cultivation increased in most of the main poppy-cultivating provinces, including in Hilmand itself (19%). However, relatively less poppy was cultivated inside the Hilmand “Food Zone”, where agricultural support programmes are implemented, than in the rest of the province.
- Based on preliminary results from other countries, opium cultivation in Afghanistan represented 64% of global cultivation in 2012.
- Total eradication of opium poppy increased by 154% in 2012 due to an increase in Governor-led eradication (GLE) in all regions, which accounted for 9,672 hectares.
- Even though the area eradicated was the equivalent of less than 6.5 % of the total area under opium cultivation, with a total of 102 fatalities and 127 injured, the human cost of the eradication campaign was far higher in 2012 than in the preceding year.
- Average opium yield amounted to 23.7 kilograms per hectare in 2012, which is 47% less than in 2011 (44.5 kilograms per hectare). This was due to a combination of a disease of the opium poppy and adverse weather conditions, particularly in the Eastern, Western and Southern regions of the country.
- Potential opium production was estimated at 3,700 tons in 2012. While a 36% decrease from the previous year, based on preliminary results for some countries and regions, this figure represented 74% of global potential production.
- The opium yield and production estimates of the years 2006 to 2009 were revised downward after a careful review revealed data quality problems which had led to an overestimation of the per-hectare yield.
- Accounting for 69% of national production, the Southern region continued to produce the vast majority of opium in Afghanistan in 2012. The Western region was the country’s second most important opium-producing region, with 23% of national production.
- At US$ 0.73 billion, or the equivalent of roughly 4% of the country’s estimated GDP, the farm-gate value of opium production in 2012 fell by 49%.
- The gross export value of opium and heroin/morphine exports in 2012 was US$ 2.0 billion (US$ 2.6 billion in 2011). The net export value of Afghan opiates in 2012 was US$ 1.94 billion. Far smaller, the gross value of the domestic market for the drugs was estimated to be US$ 0.16 billion.
- A comparison of these gross and net values with the licit 2012 GDP of Afghanistan (US$ 18.95 billion) shows the magnitude of the Afghan opium economy. In 2012, net opium exports were worth some 10% of licit GDP, while the farm-gate value of the opium needed to produce those exports alone was equivalent to 4% of licit GDP. The net value of the domestic market for opiates is small by comparison, but still worth approximately 1% of licit GDP.
- On average, poppy-growing households in Afghanistan continue to have a higher cash income than households that do not grow poppy.
- Between 2011 and 2012, per-hectare gross income from opium cultivation decreased by 57% to US$ 4,600, virtually the same level as in 2010. Farmers reported average expenditure corresponding to 28% of gross income, leading to a net income of US$ 3,300 per hectare.
- In 2012, opium prices remained very high but decreased slightly in all regions of Afghanistan, though in the Eastern, Western and Southern regions, in particular, they showed signs of stabilization at a high level. There is thus a clear incentive for Afghan farmers to continue cultivating opium.
- In general, opium-growing villages are situated significantly further from the nearest agricultural market than non-opium-growing villages, suggesting that market accessibility and farmers’ options for cultivating legitimate agricultural produce and to cultivate opium are issues that needs to be addressed.
- The link between opium cultivation and lack of development is shown by the fact that while over 90% of non-poppy-growing villages have a boys’ school and almost three quarters a girls’ school, these proportions drop to 61% (boys’ school) and 19% (girls’ school) in poppy-growing villages. The possible negative long-term effect of having less access to education than their contemporaries, and the absence of schools for girls in over four fifths of poppy-growing villages in particular, is worrying.
- Cannabis cultivation is closely related to poppy cultivation: 71% of poppy-growing villages reported cannabis cultivation in 2012, while only 2% of poppy-free villages reported it.
Monty Python and the Holy Grail – Knights Who Say Ni – Film
TOP-SECRET-Recovering a Secret Spy Satellite Capsule from 16,400 Feet below the Pacific Ocean
An Underwater Ice Station Zebra: Recovering a Secret Spy Satellite Capsule from 16,400 Feet below the Pacific Ocean [PDF 6.1MB *]
The Trieste II (DSV-1), the Navy’s most advanced deep sea submersible at the time, surfaced about 350 miles north of the Hawaiian Islands in the pre-dawn hours of 26 April 1972 after recovering a mysterious item. Publicly called a “data package,” the object was actually part of a U.S. spy satellite, codenamed HEXAGON. Before today’s digital technology, photoreconnaissance satellites used film, which returned to Earth in capsules ejected from the satellite. The capsules, called “buckets,” reentered Earth’s atmosphere and deployed a parachute to slow their descent. During the first HEXAGON mission in 1971, the parachute broke off causing the bucket to crash into the ocean. This release includes photos of the capsule on the ocean floor, pictures of the Trieste II (DSV-1), and an article recounting the deepest undersea salvage then attempted. We also linked to the Naval Undersea Museum, where the Trieste II (DSV-1) is on permanent display.
View Underwater Ice Station Zebra Documents
View Naval Undersea Museum website [external link disclaimer]
Download photos from the CIA Flickr stream [external link disclaimer]
UNVEILED -Senior Executive of ArthroCare Guilty in $400 Million Securities Fraud Scheme
WASHINGTON—A former senior executive of Texas-based ArthroCare Corp., a publicly traded medical device company, pleaded guilty today for his role in a scheme to defraud the company’s shareholders and members of the investing public by falsely inflating ArthroCare’s earnings, announced Acting Assistant Attorney General Mythili Raman of the Justice Department’s Criminal Division and U.S. Attorney Robert Pitman for the Western District of Texas.
David Applegate, 54, pleaded guilty before U.S. Magistrate Judge Mark Lane in Austin, Texas, to two counts of a superseding information which charges him with conspiracy to commit securities, mail and wire fraud, and with a false statements violation. Applegate was the senior vice president in charge of ArthroCare’s Spine Division. Applegate admitted that he and other co-conspirators inflated falsely ArthroCare’s sales and revenue through a series of end-of-quarter transactions involving ArthroCare’s distributors and that he and other co-conspirators caused ArthroCare to file a Form 10-K for 2007 with the U.S. Securities and Exchange Commission that materially misrepresented ArthroCare’s quarterly and annual sales, revenues, expenses and earnings.
According to court documents, Applegate and others determined the type and amount of product to be shipped to distributors, notably ArthroCare’s largest distributor, DiscoCare Inc., based on ArthroCare’s need to meet sales forecasts, rather than the distributors’ actual orders. Applegate and others then caused ArthroCare to “park” millions of dollars’ worth of ArthroCare’s medical devices at its distributors at the end of each relevant quarter. ArthroCare would then report these shipments as sales in its quarterly and annual filings at the time of the shipment, enabling the company to meet or exceed internal and external earnings forecasts.
According to the superseding information, DiscoCare agreed to accept shipment of approximately $37 million of product in exchange for substantial, upfront cash commissions, extended payment terms and the ability to return product, as well as other special conditions, allowing ArthroCare to inflate falsely its revenue by tens of millions of dollars. To conceal the fact that DiscoCare owed ArthroCare a substantial amount of money on the unused inventory, ArthroCare, with Applegate’s knowledge, caused ArthroCare to acquire DiscoCare on December 31, 2007.
According to court documents, between December 2005 and December 2008, ArthroCare’s shareholders held more than 25 million shares of ArthroCare stock. On July 21, 2008, after ArthroCare announced publicly that it would be restating its previously reported financial results from the third quarter 2006 through the first quarter 2008 to reflect the results of an internal investigation, the price of ArthroCare shares dropped from $40.03 to $23.21 per share. The drop in ArthroCare’s share price caused an immediate loss in shareholder value of more than $400 million.
Applegate faces a maximum prison sentence of five years in prison for each charge. A sentencing date has yet to be scheduled.
David Applegate’s co-defendant John Raffle is scheduled for trial on July 15, 2013. Defendants are presumed innocent unless and until proven guilty at trial.
This case was investigated by the FBI’s Austin Resident Agency. The case is being prosecuted by Deputy Chief Benjamin D. Singer and Trial Attorney Henry P. Van Dyck of the Criminal Division’s Fraud Section. The Department recognizes the substantial assistance of the U.S. Securities and Exchange Commission.
Exposed – The I Files Preview – Investigate Your World
Revealed – First Seconds After Boston Bomb Blast 1
First Seconds After Boston Bomb Blast 1
Previous:
2013-0395.pdf Dzhokhar Tsarnaev Complaint via Boaz Guttman April 22, 2013 (2.0MB) 2013-0384.htm Boston Blasts: Bystanders Giving Aid April 20, 2013 2013-0380.pdf Tamerlan Tsarnaev April 19, 2013 2013-0379.htm Djohar Tsarnaev April 19, 2013 2013-0371.htm Boston Bomb Blasts 2 April 16, 2013 2013-0370.htm Boston Bomb Blasts April 16, 2013
|
1.![]() |
2. Man at left center, hand raised, with naked knees, is Jeff Bauman, who lost both lower legs. The bomb was at his feet. Woman at right in blue top with arm extended is Krystle Campbell, who died. Several others lost legs.![]() |
3.![]() |
4. Krystle is screaming at right.![]() |
5.![]() |
6.![]() |
7.![]() |
8.![]() |
9. Krystle Campbell, at left, has died. Jeff Bauman grasps his leg.![]() |
9. Krystle andJeff.![]() |
10. EMS checks for pulse of Krystle Campbell.![]() |
FEMEN TV – FEMEN IN PARIS
CONFIDENTIAL – New Jersey Fusion Center: Boston Marathon Bombing Used to Disseminate Malware and Conduct Fraud
New Jersey Regional Operations Intelligence Center (NJ ROIC) Intelligence & Analysis Threat Unit
- 2 pages
- For Official Use Only
- April 18, 2013
(U//FOUO) Websites and emails referencing the Boston Marathon bombing should be viewed with caution, as malicious actors are using the incident to disseminate malware and conduct fraud. While other agencies investigate the frauds, the NJ ROIC provides this information for situational awareness.
Tactics, Techniques & Procedures
(U//FOUO) Cyber security experts have identified multiple fake websites and charity efforts taking advantage of the Boston Marathon bombing. Based on previous incidents, more scams will follow.
- Within the hours of the bombings, actors with unknown intentions registered more than 125 domain names using a combination of “Boston,” “Marathon,” “2013,” “bomb,” “explosions,” “attack,” “victims,” and “donate” and should be viewed with caution. More domains are likely to follow.
- Malicious actors are using social networking sites to spread hoaxes, including information regarding the purported death of several child runners (children are not allowed to participate in the Boston Marathon), and injured runners purportedly running for a variety of charities and causes.
- Phishing emails may provide links to malicious websites purporting to contain information, pictures, and video, or may contain attachments with embedded malware. Clicking on the links or opening the attachments can infect the victim’s computer to further malicious activity.
- Multiple fake charities were created on social networking websites within minutes of the explosions, purporting to collect funds for victims. Traditionally, these websites are scams.
…
Recommendations
Internet users should conduct due diligence before clicking links, visiting sites, or making donations.
- Be cautious of emails/websites that claim to provide information because they may contain viruses.
- Do not open unsolicited emails, or click on the links/attachments contained in those messages.
- Never reveal personal or financial information in email.
- Do not go to unfamiliar websites to view the event or information regarding it.
- Never send sensitive information over the Internet before checking a site’s security and confirming its legitimacy. Malicious websites often look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g., .com vs. .net).
- Search email systems for the subject lines noted above and delete them from inboxes.
Video Skid – Monty Python’s Military Fairy
FEMEN TV – FEMEN Ukrayna
TOP-SECRET – Unveiled – Iran’s New Sea-based Missiles
رئیس سازمان هوافضای وزارت دفاع و پشتیبانی نیروهای مسلح از برنامهریزی برای تحویل موشکهای کروز پیشرفته با برد بیش از ۳۰۰ کیلومتر به نیروی دریایی سپاه خبر داد.

سردار سید مهدی فرحی رئیس سازمان هوافضای وزارت دفاع و پشتیبانی نیروهای مسلح در گفتگو با خبرنگار دفاعی خبرگزاری فارس، با اشاره به تجهیز نیروهای مسلح از سوی این وزارتخانه به انواع تسلیحات نظامی ازجمله موشک و راکت گفت: تاکتیکها و نحوه استفاده از این تجهیزات و تسلیحات به عهده فرماندهان نیروهای مسلح است.
وی ادامه داد: محصولات متعددی از جمله موشکهای 300 کیلومتری در اختیار نیروی دریایی سپاه است.
فرحی تاکید کرد: بزودی محصولات جدید دیگری با بردهای مختلف و قابلیتهای فوقالعاده پیشرفته و از نوع کروز در اختیار نیروی دریایی سپاه قرار میگیرد.
رئیس سازمان هوافضای وزارت دفاع و پشتیبانی نیروهای مسلح اظهار داشت: دقت و برد موشکهای جدید نسبت به موشکهای 300 کیلومتری که اکنون در اختیار نیروی دریایی سپاه است، افزایش یافته است.
فرحی همچنین تاکید کرد: این موشک میتواند توان دفاعی ما را در نبردهای دریایی افزایش دهد.
به گزارش فارس، موشکهای کروز ساحل به دریا و سطح به سطح با قابلیتهای خاص خود، میتوانند در مقابله با انواع تهدیدات، تاکتیک های خود را تغییر داده و این تغییر تاکتیکها نیز در اختیار فرمانده نیرو قرار دارد.
موشک های کروز که امکان شلیک آنها از روی شناور نیز وجود دارد، میتوانند از روی شناورهای با سرعت بالای 30 نات (حدود 60 کیلومتر) نیز شلیک شوند که از نمونه های قبلی در این حوزه می توان به موشک های کروز ظفر، نصر، نور، قادر و غدیر اشاره کرد.
انتهای پیام/
Iran’s New Sea-based Missiles
A sends:
Source : http://www.farsnews.com/newstext.php?nn=13920216000464
Today 5-12-2013, General Farahi, the chief of the Iranian Ministry of Defense’s Aerospace Organization, has announced a new series of fast-acting sea-based rockets and missiles have been produced and turned over to IRGC’s Navy force. This force is responsible for “the security” of the Persian Gulf and the infamous Hormoz Strait.
According to publications by FarsNews, a semi-state-run media, IRGC’s Navy has been operating a series of fast-acting rockets and missiles fit to be fired from small-scale fast boats named “Zafar”, “Nasr”, “Nour”, Ghader” and “Ghadir”, but the newly produced “Cruise Type” missile which is unnamed in the report, has a firing speed of 300 Km/h and can be fired from a moving boat at a speed of 30 knots.
Netizens.
TOP-SECRET-U.S. Air Force Notice on Use of Social Networking Sites for Computer Network Exploitation
The following notice was published in the May issue of the Illinois Air National Guard 183rd Fighter Wing monthly newsletter Falcon View. Despite the spelling mistake in the first paragraph, the notice is apparently authentic.
Notice to Airman 2013-080-001:
(U//FOUO) EXECUTIVE SUMMERY: Nation-state adversaries regularly use accounts on popular social networking sites to facilitate social engineering against DoD members. Information disclosed or discovered on social networking sites creates a significant operations security (OPSEC) concern and in the context of a wide spread collection effort could be by adversaries to form a classified picture.
(U//FOUO) MISSION IMPACT: Poor OPSEC practices or general disclosures of sensitive information can lead to kinetic adversary responses to U.S. forces’ actions, potentially leading to mission degradation or even loss of life. Additionally, malware introduced into AF networks via social network sites can degrade or disrupt operations.
(U//FOUO) DETAILS: The nature of social networking sites (SNS) which promote socialization and the sharing of information makes personnel more susceptible to exploitation. SNS applications give the common user an increased opportunity to release official information. In the past two years, there are several examples of adversaries using or attempting to use SNS for likely cyber espionage.
(U//FOUO) ACTIONS: All Air Force members must be aware that they are a potential target of cyber exploitation/espionage and take appropriate caution when using social networking sites. Do not accept contact requests from individuals who you do not personally know and trust. Additionally, hackers are known to spoof requests so that any request may appear to be from someone you know, so treat all requests with suspicion and vigilance. Only accept a request if there is a high level of certainty regarding the identity and authenticity of the requestor. Finally, be aware of the security settings on these websites and do not inadvertently release sensitive information to the public because of careless use.
Film – Monty Python’s Flying Circus 1×08 Full Frontal Nudity
Unveiled by Crpytome – $45M ATM Hack Complaint
FEMEN TV – Femen vs Berlusconi
TOP-SECRET-DHS-Connecticut Intelligence Center (CTIC) Active Shooter Individual Response Guidelines
Active Shooter Individual Response Measures
- 5 pages
- December 18, 2012
The Connecticut Intelligence Center (CTIC) along with the U.S. Department of Homeland Security (DHS) is providing this information for awareness of Active Shooter Incidents and your individual response, should you become involved in an Active Shooter situation.
Please note: These are individual measures and should not be used in conflict with established protocols trained to personnel in schools or at their workplace.
PROFILE OF AN ACTIVE SHOOTER
An “Active Shooter” is an individual actively engaging in killing or attempting to kill people in a confined and populated area; in most cases, active shooters use firearm(s) and there is no pattern or method to their selection of victims.
Active Shooter situations are unpredictable and evolve quickly. Typically, the immediate deployment of Law Enforcement is required to stop the shooting and mitigate harm to victims.
Because Active Shooter incidents are often over within 5-15 minutes, before Law Enforcement arrives on the scene, individuals must be prepared both mentally and physically to deal with an active shooter situation.
HOW TO RESPOND WHEN AN ACTIVE SHOOTER IS IN YOUR VICINITY
Good Practices for Coping with an Active Shooter Situation
1. Be aware of your environment and any possible dangers
a. Situational Awareness / Perceived Threat
2. Take note of nearest Exits in any facility you visit
3. If in an Office or Enclosed Area
a. Shelter in Place
b. Close and Secure doors
4. If in a Hallway
a. Find a Room / Secure doors
5. Last Resort Measures / Enhanced Survival
a. Attempt to engage the shooter / take down
b. Use any measures, at hand weapons, continue to engage until no longer a threat or shooter is incapacitated
c. Be aware of potential for multiple shooters
6. CALL 911 AT SAFEST AVAILABLE TIMEQuickly determine the most reasonable way to protect your own life. Remember that customers, clients, students, etc. will follow the lead of employees, staff, or management during an Active Shooter situation.
1. EVACUATE
If an escape route is accessible, attempt to evacuate the premises. Be sure to:
a. Have an escape route and plan in mind
b. Evacuate regardless of others decisions to stay or follow
c. Leave belongings behind
d. Assist others escaping, if possible
e. Prevent individuals from entering the area where the active shooter may be, WARN people
f. Keeps hands visible to Security or Law Enforcement
g. Follow First Responders Instructions, Security, Police, etc.
h. DO NOT attempt to move wounded individuals
i. Call 911 when safe to do so2. HIDE OUT
If evacuation / escape not possible, find a place to hide where an active shooter is less likely to find you.
You hiding place should:
a. Be out of the shooter’s line of sight or view
b. Provide protection if shots are fired in your direction (i.e. closed and locked door of office or closet)
c. Not trap you or restrict options for movementTo help prevent an Active Shooter from entering your hiding place:
a. Lock all doors
b. Barricade the door if possible with available items (i.e. heavy furniture, etc.)If the Active Shooter is within your vicinity
a. Lock the door
b. Silence all cell phones, pagers, radios, or other devices, etc.
c. Turn off sources of noise such as TVs, radios, etc.
d. Conceal yourself behind large objects such as book cases, desks, etc.
e. Remain silent, limit movement which creates noise3. TAKE ACTION AGAINST THE ACTIVE SHOOTER
Take Last Resort Measures for Survival when facing Imminent Injury or Death. Attempt to Disrupt and/or Incapacitate the Active Shooter by:
a. Acting aggressively towards the shooter / engaging in physical attack
b. Throwing items or using improvised weapons
c. Yelling
d. Staying committed to your actions. Do not let up until shooter is incapacitated or disruptedHOW TO RESPOND WHEN LAW ENFORCEMENT ARRIVES
Arriving Law Enforcement’s first priority is to engage and stop the Active Shooter as soon as possible. Officers will form up and immediately proceed to engage the Active Shooter, moving towards the sound of gunfire.
a. Officers will group into teams of four (4) to engage if possible
b. Arriving officers may be from various agencies and have different uniforms, equipment, and other types of vehicles, some not marked
c. Officers may have various types of weapons, i.e. handguns, shotguns, and assault rifles
d. Officers may deploy tear gas or pepper spray to control the situation
e. Officers may shout commands and push people down on the ground for their safety1. HOW TO REACT WHEN LAW ENFORCEMENT ARRIVES
Your attention to Law Enforcement officers is vital for survival
a. Remain calm, and follow officers’ instructions
b. Put down any handheld items, i.e. bags, backpacks, jackets, etc.
c. Immediately Raise Hands / Spread Fingers
d. Keep hands visible at all times
e. Avoid making quick movements towards officers or grabbing onto them
f. Avoid pointing, screaming, or yelling at officers
g. DO NOT stop and ask officers for directions or help when evacuating, just proceed in the direction where officers are entering2. INFORMATION TO PROVIDE LAW ENFORCEMENT OR 911 CALL TAKER
Accurate and relevant information to Law Enforcement is vital for Active Shooter mitigation and can be provided to on scene Police or 911 Call Takers.
a. Location of the Active Shooter
b. Number of Active Shooters
c. Physical Description of Active Shooter(s)1. Clothing, Height, Weight, Hair Color, Type of Weapon, Distinguishing
2. Characteristics i.e. mask worn, wearing tactical equipment, etc.d. Number of weapons and types / explosive type devices in area
e. Number of potential victims at the locationNOTE:
Arriving officers will not stop to help injured persons, their initial response is to stop the Active Shooter, so be cognizant of this. Expect Rescue Teams comprised of additional officers and other Emergency Medical Personnel to follow the initial response officers. The Rescue Teams will treat and remove any injured persons. They may call upon able-bodied individuals to assist them in removing the wounded from the premises.
Once you have reached a safe location or an assembly point, you will likely be held in that area by Law Enforcement until the situation is under control and secure and all witnesses have been identified and questioned. DO NOT leave until released by Law Enforcement Authorities.
Monty Python Holy Grail – Killer Rabbit – Video Skid
Cryptome unveils – Francis “Frank” Archibald, Jr. CIA Covert Head
Francis “Frank” Archibald, Jr.
A sends: Archibald is reported to be the new head of CIA Clandestine Service.
http://archibaldinsc.blogspot.com/2010_12_01_archive.html (Blog of Francis X. Archibald, Sr.)
Francis “Frank” X. Archibald, Jr. and his wife, Lisa, of McLean, VA.
|
Intelius.com![]() |
Google Maps![]() |
Google Street View![]() |
![]() |
FEMEN TV- Les Femen s’invitent au salon de l’érotisme !
Public Intellligence – DHS Infrastructure Protection Report: Elementary and Secondary Schools
DHS Infrastructure Protection Report Series
- 2 pages
- For Official Use Only
- September 15, 2011
Approximately fifty million students attend nearly 100,000 public elementary and secondary schools throughout the Nation. Elementary and secondary schools are relatively open-access, limited egress congregation points for children, and have been successfully targeted by terrorists in the past.
Potential Indicators of Terrorist Activity
Terrorists have a wide variety of weapons and tactics available to achieve their objectives. Specific threats of most concern to schools include:
- Small arms attack
- Improvised explosive devices (IEDs)
- Vehicle-borne improvised explosive devices (VBIEDs)
- Arson or incendiary attack
- Chemical or biological attack
Terrorist activity indicators are observable anomalies or incidents that may precede a terrorist attack. Indicators of an imminent attack requiring immediate action may include the following:
- Persons in crowded areas (e.g., school auditorium, cafeteria, athletic facilities) wearing unusually bulky clothing that might conceal suicide explosives or weapons
- Vehicles approaching the school at an unusually high speed or steering around barriers and traffic controls
- Suspicious or illegally parked vehicles on or near school grounds
- Unattended packages (e.g., backpack, briefcase, box) that may contain explosives. Packages may be left in open areas or may be hidden in trash receptacles, lockers, or similar containers.
- Evidence of unauthorized access to heating, ventilation, and air-conditioning (HVAC) areas of a school; indications of unusual substances near air intakes
- Suspicious packages and/or letters received by mail that might contain explosives or chemical/biological/ radiological agents.
Indicators of potential surveillance by terrorists include:
- Persons using or carrying video/camera/observation equipment in or near the school over an extended period
- Persons parking, standing, or loitering in the same area over a multiple-day period with no reasonable explanation
- Persons questioning school employees off-site about practices pertaining to the school and its operations
- Persons discovered with school maps, photos, or diagrams with key components or sensitive areas highlighted
- Suspicious personal e-mail, telephone, fax, or postal mail requests for information about the school or its operations
- A noted pattern of false alarms requiring a response by law enforcement or emergency services
- Threats by telephone, mail, or e-mail and/or increase in reports of threats from known reliable sources
Common Vulnerabilities
The following are key common vulnerabilities of elementary and secondary schools:
- Relatively open access to school grounds and buildings
- Limited or no vehicle access controls
- Large concentrations of students gathering in open areas outside school buildings on a regular and readily observable schedule
- Proximity of schools and neighboring facilities, especially in urban areas
- Limited or no inspection of students’ personal articles, particularly in lower-crime areas
- Limited security on school buses
Protective Measures
Protective measures include equipment, personnel, and procedures designed to protect a facility against threats and to mitigate the effects of an attack. Protective measures for elementary and secondary schools include:
Planning and Preparedness
- Designate an employee as security director to develop, implement, and coordinate all security-related activities
- Conduct security audits on a regular and continuing basis. Develop a comprehensive security plan and emergency response plan for the school
- Conduct regular exercises of emergency plans
- Establish liaison and regular communication with local law enforcement and emergency responders
Personnel
- Conduct background checks on all school employees
- Incorporate security into employee training programs
- Provide security information and training to all students
Access Control
- Define the facility perimeter and areas within the facility that require access control. Maintain building access points to the minimum needed
- Issue photo identification badges to all school employees and students
- Require visitors check in with the front office upon arrival and departure
- Provide visitors with school issued identification badges when on school grounds.
- Positively identify all vehicles and drivers that enter the school parking lots
- Institute a policy restricting other vehicles from accessing the bus-loading zone
- Secure ladders, awnings, and parapets that provide access to building roofs, HVAC systems, and other critical equipment
Barriers
- Install appropriate perimeter barriers and gates. Maintain clear area at perimeter barriers to enable continuous monitoring and to inhibit concealment of people or packages
- Establish a clear zone adjacent to buildings. Keep zone free of vegetation and other obstructions
- Install barriers to protect doors and windows from small arms fire and explosive blast effects
Communication and Notification
- Install system(s) that provide communication with all people at the school, including employees, students, emergency response teams, and visitors
- Develop a plan for communicating with parents during emergency situations
- Develop a notification protocol that outlines who should be contacted in emergencies.
- Develop a procedure for communicating with the public and the media regarding security issues
Monitoring, Surveillance, Inspection
- Evaluate needs and design a monitoring, surveillance, and inspection program
- Provide visual surveillance capability (e.g., designated surveillance points, cleared lines of sight)
- Install intrusion detection and alarm systems
- Deploy personnel assigned to security duty to regularly inspect sensitive or critical areas
- Continuously monitor all people entering and leaving the facility for suspicious behavior
- Continuously monitor all vehicles approaching the facility for signs of threatening behavior
Infrastructure Interdependencies
- Ensure that the school has adequate utility service capacity to meet normal and emergency needs
- Ensure that employees are familiar with how to shut off utility services
- Provide adequate physical security for utility services
Cyber Security
- Develop and implement a security plan for computer and information systems hardware and software
- Maintain a well-trained computer security staff
- Incident Response
- Ensure that an adequate number of emergency response personnel are on duty and/or on call
- Provide training and equipment to emergency response personnel to enable them to deal with terrorist-related incidents
- Check the status of all emergency response equipment and supplies on a regular basis
- Develop a plan for discharging students following incident resolution
SECRET-enior Executive of ArthroCare Corporation Pleads Guilty in $400 Million Securities Fraud Scheme
WASHINGTON—A former senior executive of Texas-based ArthroCare Corp., a publicly traded medical device company, pleaded guilty today for his role in a scheme to defraud the company’s shareholders and members of the investing public by falsely inflating ArthroCare’s earnings, announced Acting Assistant Attorney General Mythili Raman of the Justice Department’s Criminal Division and U.S. Attorney Robert Pitman for the Western District of Texas.
David Applegate, 54, pleaded guilty before U.S. Magistrate Judge Mark Lane in Austin, Texas, to two counts of a superseding information which charges him with conspiracy to commit securities, mail and wire fraud, and with a false statements violation. Applegate was the senior vice president in charge of ArthroCare’s Spine Division. Applegate admitted that he and other co-conspirators inflated falsely ArthroCare’s sales and revenue through a series of end-of-quarter transactions involving ArthroCare’s distributors and that he and other co-conspirators caused ArthroCare to file a Form 10-K for 2007 with the U.S. Securities and Exchange Commission that materially misrepresented ArthroCare’s quarterly and annual sales, revenues, expenses and earnings.
According to court documents, Applegate and others determined the type and amount of product to be shipped to distributors, notably ArthroCare’s largest distributor, DiscoCare Inc., based on ArthroCare’s need to meet sales forecasts, rather than the distributors’ actual orders. Applegate and others then caused ArthroCare to “park” millions of dollars’ worth of ArthroCare’s medical devices at its distributors at the end of each relevant quarter. ArthroCare would then report these shipments as sales in its quarterly and annual filings at the time of the shipment, enabling the company to meet or exceed internal and external earnings forecasts.
According to the superseding information, DiscoCare agreed to accept shipment of approximately $37 million of product in exchange for substantial, upfront cash commissions, extended payment terms and the ability to return product, as well as other special conditions, allowing ArthroCare to inflate falsely its revenue by tens of millions of dollars. To conceal the fact that DiscoCare owed ArthroCare a substantial amount of money on the unused inventory, ArthroCare, with Applegate’s knowledge, caused ArthroCare to acquire DiscoCare on December 31, 2007.
According to court documents, between December 2005 and December 2008, ArthroCare’s shareholders held more than 25 million shares of ArthroCare stock. On July 21, 2008, after ArthroCare announced publicly that it would be restating its previously reported financial results from the third quarter 2006 through the first quarter 2008 to reflect the results of an internal investigation, the price of ArthroCare shares dropped from $40.03 to $23.21 per share. The drop in ArthroCare’s share price caused an immediate loss in shareholder value of more than $400 million.
Applegate faces a maximum prison sentence of five years in prison for each charge. A sentencing date has yet to be scheduled.
David Applegate’s co-defendant John Raffle is scheduled for trial on July 15, 2013. Defendants are presumed innocent unless and until proven guilty at trial.
This case was investigated by the FBI’s Austin Resident Agency. The case is being prosecuted by Deputy Chief Benjamin D. Singer and Trial Attorney Henry P. Van Dyck of the Criminal Division’s Fraud Section. The Department recognizes the substantial assistance of the U.S. Securities and Exchange Commission.
Unveiled by Cryptome – Gina Cheri Haspel, ex-Acting CIA Covert Head
|
Video Skid – Monty Python’s Flying Circus – Merchant Banker
Neue Serverangriffe der vorbestraften Finanzbetrüger der “GoMoPa” und ihrer “Partner” mutmasslich “Peter Ehlers” und “Otmar Knoll”
Hier sehen Sie obenstehend den Beleg für die Internet-Attacken der er vorbestraften Finanzbetrüger der “GoMoPa” und ihrer “Partner” mutmasslich “Peter Ehlers” und “Otmar Knoll”
Das Urteil zu den vorbestraften Finanzbetrügern der “GoMoPa” wegen Betruges am eigenen Anleger finden Sie unter
These graphs below show the cyberattacks on our website initiated by the suspects we already mentioned and who even announced in an email that tehy would do this illegal internet crime. The email was by Otmar Knoll, Fairvesta, who announced the cybercrime. The suspected hackers are from “GoMoPa” and their thugs.
The graph shows the DDos attacks on our servers.
What is a DDos attack ?
Read here:
http://en.wikipedia.org/wiki/Denial-of-service_attack
These internet crimes are punished with longterm jail sentences and financial compensation..
Die obenstehende Graphik zeigen die Hackerangriffe auf unsere Webseiten, die seit Jahren durchgeführt werden im Ausschnitt. In einer Email an uns hat Otmar Knoll, Fairvesta, die Hackerangriffe, somit schwere Internetverbrechen angekündigt. Wir haben diese Emails bereits veröffentlicht. Mutmasslich arbeitet Otmar Knoll mit den üblichen Verdächtigen der “GoMoPa”, ihren Informanten und Hackern zusammen:
Die Graphiken zeigt die sogenannten DDos-Angriffe auf unsere Server.
Was ist eine DDos Attacke ?
http://de.wikipedia.org/wiki/Denial_of_Service
Lesen Sie hier:
Diese Vergehen werden mit langjährigen Freiheitsstrafen und Schadensersatz bestraft.
The NSA – The Perpetual Struggle to Fathom Pyongyang’s Motives and Goals
For decades, the erratic behavior of North Korea’s enigmatic leaders has often masked a mix of symbolic and pragmatic motives, according to declassified documents posted today by the National Security Archive. During earlier crises, Kim Jong Un’s father and grandfather postured and threatened the region in ways markedly similar to the behavior of the new leader, the records show.
While the current Kim is acting even more stridently in some cases, the documents reveal a past pattern characterized by bellicose conduct. In 1994, for instance, North Korean military officers threatened the U.S. with a possible preemptive strike if circumstances called for it: “This will not be a situation like the Iraq war,” U.S. officials were told. “We will not give you time to collect troops around Korea to attack us.” Yet American analysts believed during these earlier episodes that Pyongyang’s tone was aimed less at stoking hostilities than advancing a combination of practical objectives – from pushing the international community to accept North Korea’s position, to playing for time, to bolstering the leader’s political position at home.
Today’s posting provides a window into prior efforts to penetrate beneath North Korea’s shrill rhetoric to understand the logic, political dynamics and ultimate objectives underlying Pyongyang’s repeated threats against the U.S. and South Korea. Obtained through Freedom of Information Act requests, mostly from the State Department, these records describe events during the 1990s (the Clinton presidency) with notable echoes in the current crisis. Additional cables made public by WikiLeaks (Documents 12-14) take the story up to the Obama administration and provide assessments of Kim Jong Un himself.
The documents from 1994-95, which saw the first nuclear crisis with North Korea and the death of Kim Il Sung, include excerpts from the morning intelligence summaries prepared for the secretary of state that seek to assess the factors and interests driving such developments as:
North Korea’s initial response to U.S. plans to station Patriot missiles in North Korea, deemed by Pyongyang to be an “unpardonable grave military challenge.” This step was viewed as typical: “to record its strong opposition without committing itself to any particular line of action while it sorts out its options.” (Document 1)
The deepening crisis in 1994 over the North’s nuclear weapons program, and confrontations over inspections of North Korea’s nuclear facilities. One document records a frank warning from North Korean military officials during a meeting at Panmunjon: “this will not be a situation like the Iraq war. We will not give you time to collect troops around Korea to attack us. We will not attack the South first, but if it is clear you are going to attack, then we will attack.” Another document provides a fascinating evaluation of how China might respond to the outbreak of war on the peninsula should the nuclear crisis escalate. (Documents 2, 3 and 11)
Pyongyang’s withdrawal nearly 20 years ago from the Military Armistice Commission (MAC). The North described the MAC as part of the “useless” armistice. U.S. diplomats saw the issue as possibly tied to the leadership succession in Pyongyang, as Kim Jong Il was North Korea’s “supreme commander” and needed to be seen as directing any military negotiations. (Documents 4, 5, 9 and 10); and
The implications for North Korean policies of the death of Kim Il Sung and the prolonged consolidation of Kim Jong Il in power, a delay caused in part by Kim’s health problems. This led INR to conclude that “Kim Jong Il will have to make some leadership changes soon, to root out pockets of opposition and to put his own stamp on his regime.” (Documents 6, 7 and 8)
Three additional documents from 2009-2010, originally made public by WikiLeaks, provide reports from the U.S. embassy in Seoul about:
The possible motivations and goals behind the “rapid deterioration” in inter-Korea relations since the election of conservative Lee Myung Bak as president. Lee had begun turning away from the policy of engagement with North Korea followed by his predecessors (Documents 12 and 13). As the cables report, Pyongyang was motivated to drive home its conviction that it, not Seoul, called the shots on the peninsula. The embassy stressed, however, “the apathy – even nonchalance – with which the ROK public has reacted to the DPRK’s blasts. They see the DPRK as an object of pity, and the heightened North Korea rhetoric as a sign of distress rather than a realistic threat;” and
A discussion between former Assistant Secretary of State Kurt Campbell and South Korean officials and scholars on the prospects for the post-Kim Jong Il leadership (Document 14). The latter provides interesting assessments of Kim Jong Un’s background and possible challenges to his claim to the leadership position, particularly from his brother-in-law, Jang Song Taek. The State Department viewed these in light of three alleged coup attempts against Kim Jong Il in the late 1990s.
Not since the first Clinton administration, when the U.S. seriously considered military options to counter Pyongyang’s nuclear weapons ambitions, have North Korea’s rhetoric and actions seemed to carry such potentially grave consequences, intended or not. North Korea has pronounced the 1953 armistice null and void, declared the Korean peninsula in a state of war, closed the Kaesong inter-Korean industrial complex, warned other governments to evacuate their embassies in Pyongyang due to the threat of war, announced it is restarting nuclear processing facilities to support production of nuclear weapons, and making preparations to test a medium-range missile from the east coast of North Korea, possibly on the anniversary of Kim Il Sung’s birth. South Korea – all in response to the imposition of new UN economic sanctions on North Korea in retaliation for its recent nuclear weapons test.
While many if not most observers believe these actions are driven at heart by North Korea’s persistent demand to be taken seriously by the U.S. and to engage in direct talks with Washington about such key topics as a final peace settlement for the peninsula, political recognition and economic assistance, (not to mention solidifying Kim Jong Un’s leadership position with the military), these analysts also stress the potential for miscalculation by the young, untested North Korean leader. Current efforts to assess Kim Jong Un’s personality and rationality can be viewed against the background of prior such efforts, discussed in these documents, which provide something of a baseline for seeing how far he may be departing from what has been taken as “normal” for North Korea.
Documents
Document 1: DPRK – Reaction to Patriots, The Secretary’s Morning Intelligence Summary, INR, January 29, 1994 (Top Secret/Codeword)
Source: FOIA
This assessment looks at how North Korea might react to reports that the U.S. planned to deploy Patriot missiles in South Korea. Pyongyang’s initial response is characterized as typical: “to record its strong opposition without committing itself to any particular line of action while it sorts out its options.” Looking at an unattributed commentary issued by North Korea, the analysis notes that while the Patriot plan is calle