#OpISIS: The Gang’s All Here

When I think of Social Media, I think predominately of Signals Intelligence (SIGINT). SIGINT, in an Open Source Intelligence (OSINT) setting, is closely related to Communications Intelligence (COMINT). Rarely, if ever though, does a tremendous amount of Human Intelligence (HUMINT) come into play. All of these terms I use daily in the Mortgage Field Services Industry as a Consultant. All of them have their genesis with the US Military  and Intelligence Services. It is to say that when we collectively call everything in Social Media chatter; when we sift and refine through information using algorithms searching for patterns, the reality is that we begin to create a working model upon which threat assessments may both be built and measured against.

I am not going to speak for Ghost Security (GhostSec) with specificity to how they should do something nor am I going to tell the Western Governments and Intelligence Agencies how they should proceed. What I am here to do is point out that which is self evident. Unfortunately, in the same way which the National Association of Mortgage Field Services (NAMFS) never takes heed nor advice on the fronts where I wage my campaigns, so to the US Government is found lacking in the capacity of onboarding those whom would assist in a war which they are ill equipped to fight.

Whether we are talking about the military or civilian sector; whether we are talking nation states or corporations, the fundamentals are all the same at the end of the day. Information is a commodity and the packaging of information into convenient sound bites and Talking Points determines whom wins and whom looses. While gathering raw intelligence is a relatively simple task, quality analysis is a difficult endeavor. The problem which presents is that those gathering it really understand what is going on, but by the time that the Talking Points are summarized for officials, the true value has been diluted to a point which it is really only yet another political position statement.

GhostSec, a melange of Anonymous participants, have been actively hunting down Islamic State (IS) Twitter accounts and websites both in what we refer to as the Internet — this is the front facing world wide web which accounts for maybe ten percent of the internet — and the Dark Net which is generally only accessible by applications such as the TOR Onion Router which was developed in the mid-1990s by United States Naval Research Laboratory.

Dr. Janine Davidson is senior fellow for defense policy at the Council on Foreign Relations. She has been fairly prolific in covering all things IS lately. She had an interesting piece over on Defense One back in September, 2014. In essence, the potential cost of a limited, in theater conflict air strike against IS had a price tag of about $1.5 Billion per month.

Preliminary estimates place the number of ISIS fighter casualties at a minimum of 70 — and likely more. 95 percent of expended munitions were precision-guided, suggesting a clear awareness of the strategic peril of unconstrained bombardment and collateral damage.

You know, I could drone on and on — no pun intended — about how this piece of hardware is guaranteeing battlefield supremacy and I could elaborate upon the toll which Ghost Security is taking upon the IS cyberspace campaigns — which I will in a minute — but the reality is that what we are experiencing, overall, is the coming of age in a religion which Christianity and Judaism had about 600 years ago. See, that is the problem which America experiences today. Cyber warfare is a more difficult sell to the Voting Constituency than an active ground campaign. And here’s the reason why,

For as young a Nation as we are, the United States has well demonstrated that we are a war like people. In our 200+ year existence we have had a major war about every 20 years. Now, in fairness, the last official Declaration of War by the US Congress was WWII. And being honest, that was the last time we blew the fuck out of white people — namely Adolf Hitler whom was attempting to engage in global hegemony which, at the end of the day, is our Game. The definition of war; the definition which our Forefathers coined, is antiquated. Take, for example, the definition of Linda J. Bilmes and Michael D. Intriligator in their recent paper entitled, How Many Wars Is the US Fighting Today? Look, Bilmes is a Harvard lady so I figure she probably knows what the fuck she is talking about — perhaps uptight and panties in a bunch, but smart nonetheless.

Total Number of Current Wars: 134. I am not shitting you! The above referenced paper was  presented at the 6th Defense and Security Economics Workshop, Monday, 14 November 2011 at the Royal Military College of Canada and Defence Management Studies, School of Policy Studies, Queen’s University.

Americans are good at blowing shit up. We are damn good at it. We like to watch it in real time and as the Drive By Media are more unpaid spokespersons for the Department of Defense (DoD) these days, it is a win – win relationship for Prime Time. And if what we are blowing up doesn’t have white people there, we are all the better at causing senseless mayhem on a scale which even Hollywood blushes at. I mean it’s not a personal thing; I don’t believe the DoD wakes up at 0308EDT and says, “Let’s find us some non whites to drop napalm from above upon,” I simply believe it is our current military in theater doctrine.

When we talk about Ghost Security (GhostSec) and the cyber war ongoing with ISIS/ISIL/IS — I stick with IS which is the Islamic State — the biggest problem is that the Drive By Media hasn’t yet figured out a slick media presentation strategy to roll out which captivates the lust for blood and gore which the American Public needs to be satiated upon. In essence, until we get the modern version of War Games, GhostSec is going to be not only battling the cyber terrorists, they are also going to be battling an uphill campaign to win media slots wherein CNNs Wolf Blitzer and the rest of the pundits will be able to graphically present something resembling a body count.

Standing as a testament to the fact that #OpISIS is gaining widespread traction, Lara Abdallat, whom was Miss Jordan 2010 and first runner-up to Miss Arab 2011, has recently signed up in the #OpISIS Campaign and appears to be working, in conjunction with, GhostSec. She is the Cover Photo for this Article. As such, we presented some questions for GhostSec and brought in Candice Lanier, whom documented the aforementioned. Lanier is a prolific journalist covering beats at The Christian Post, Red State, The Blacksphere & Patriot Update; The Minority Report Blog, Human Events, World Threats, WIIS, Under Construction, and Front Lines Blog.

1. Is there any type of statistics on the makeup of GhostSec? Male, female; religion; age; geographic region?

Not that I’m aware of, but GhostSec may have some internal data they could share with you. All I know is that GhostSec is made up primarily of ex-military members and computer security experts.

2. In the war against ISIS is there a Sunni v Shiite theme? In this I mean is there any melding of the two? If not, does there appear to be any attempt by Sunnis to infiltrate or assist?

That question would also need to be directed to GhostSec. I don’t have any info on that.

3. Is there a general area from which the Cyber Caliphate originate from? I mean are we dealing with the typical Middle East skiddies or are we looking at Oxford types.

The Cyber Caliphate is apparently based in Russia. They are no longer believed to be affiliated with ISIS, according to new intel. You can read about it here: http://www.cnbc.com/2015/07/14/these-cyberhackers-not-backed-by-isis.html

4. Is there a general area from which the Cyber Caliphate operate from?

As for ISIS’ own hackers, most of them appear to operate out of Raqqa, Syria. In Raqqa, ISIS provides the Internet and there are many cyber cafes in Raqqa at which ISIS performs its Internet activities.

5. Is there a way to determine the types of access the Cyber Caliphate is dependent upon? E.g.; satellite, landline, hotspot, etc.

That would be another question for GhostSec. I haven’t researched that yet, but that’s something GhostSec works with daily.

6. What is the predominate language used by the crème de la crème of the Cyber Caliphate?

Most of the ISIS top brass I’ve come across speak Arabic. You might want to double check that with the ghosts, though, since they come into contact with more sites than I do.

7. Is it problematic switching between English which is the predominate language in coding in order to fight #OpISIS?

Not sure about that one either, but it’s a very good question.

8. Does there appear to be an underlying theme in the cyber war on the part of IS? What I mean is has anyone been able to determine if this is what we refer to as random noise in that you simply throw as many as you can into the breach and pray for chaos theory to take hold or does this appear to be an orchestrated ratcheting up as the Cyber Caliphate learns from mistakes and then capitalizes to further a yet unknown agenda?

ISIS has shown itself to be very adaptable. When Ghost Security first began to counter ISIS online, ISIS lacked the skills to effectively combat them. They also didn’t know how to navigate the Darknet. That has changed as they have been able to recruit more computer geeks and learn how to take advantage of various new tools. So, now they are successfully recruiting, fundraising and battlefield planning on the Darknet. ISIS doesn’t let lack of knowledge slow them down. They learn whatever they need to learn in order to continue operating successfully online.

9. I understand that there has been assistance in identifying both chatter (a term I use for commo) and the identification of High Value Targets (HVT). Is this correct?

GhostSec does work with a government contracted intel company for verification of some of their findings. And, that same intel is sent to the authorities.

10. I am really curious as to how receptive Western Governments have been to GhostSec relaying this information. What I mean is does it appear that these agencies are considering the COMINT (Communications Intelligence) to be of high quality and if so does it appear that they are actively acting upon such in a timely manner?

In one instance, which I recently wrote about – Hunting ISIS On The Darknet: The FBI’s De facto Collaboration With Anonymous – the FBI did admit that leads helped them to foil terror attacks over the 4th of July weekend. But, they did not specifically name Anonymous or GhostSec. There are other examples, in that article, of Anonymous assisting authorities and it also mentions the fact that France is now using hackers to combat ISIS online. GhostSec also helped authorities arrest 17 people in Tunisia. That intel was also verified by a government contracted intl company.

11. Are you able to give some redacted examples of intercepts which have been passed on and resulted in the prevention of operational evolutions (attacks).

That’s one for GhostSec, as well.

12. Is GhostSec able to discuss the Western Agencies, if any, that they have been passing on intel to?

Along with the FBI and CIA, they communicate with other US government agencies, depending on the threat being reported. For information on reporting to foreign agencies, you’d need to ask them. They also work with a government contracted intel agency.

13. Overall, have the Western Agencies been receptive to the intel, if any, passed to them?

They are receptive, but they do not generally mention who they received the intel from. So, Ghost Security isn’t getting the credit for it, publicly.

14. Does it appear that any of the Western Agencies will contribute at any meaningful level to #OpISIS. E.g.; equipment — this would be dangerous I suppose, money, etc.

That is what GhostSec is hoping, because tracking ISIS on the Darknet does cost money – for the appropriate equipment. It has been suggested by a writer for Foreign Policy Magazine that the government pay them in Bitcoin.

15. Finally, any chance you might be willing to do a Podcast?

Yes, I would like that very much 😉

Not to oversimplify things, but what Islam is facing today is precisely the problems which Christianity and Judaism faced about 600 years ago. This is not surprising as Islam is about 600 years younger than Judeo – Christianity. Here is what I mean,

The Holy Bible is rife with a plethora of offenses for which the penalty is death. 600 years ago we experienced this madness all across the European Continent — The Crusades, The Inquisition, The Dark Ages and finally, the Reformation Period. It should come as no surprise that had Judeo – Christianity not broken out their felt tipped Sharpie and began drawing serious lines through a vast majority of shit in the Bible, there probably wouldn’t be a whole lot of us left to even have this conversation today.

The best example I might give is this: For those of us whom wake up on a Saturday or Sunday morning and hear someone cutting the grass next door, we do not feel religiously compelled to stone that person to death. Granted, those of us whom are sane are generally just getting home from a kegger and have one hell of a splitting headache, we are not relying upon the Torah or Holy Bible which commands that you put someone to death for working upon the Sabbath.

When those of us whom live in urban environments see Jimmy and Joe holding hands on the porch swing, enjoying a cool autumn breeze, we are not compelled to stone to death Jimmy and Joe simply because both the Holy Bible and Torah command such for violation of the Commandment against homosexuality. Generally speaking, many of us notice that the house they moved into that old Mrs. Snodgrass owned, has really came back to life due to the attention Jimmy and Joe gave it.

Fundamentalism is a dangerous thing. Look, earlier this year Matt McLaughlin, an ambulance chasing lawyer and the Foreclosurepedia Nation knows precisely where I hold lawyers in my opinions, proposed the Sodomite Suppression Act in California, it really reinforced the dangers of fundamentalism in the religious world even in America, today. Look, no one in our modern society was going to allow the moral turpitude which advocated the illegal, heinous, horrible, and reprehensible conduct which McLaughlin advocated for.

Better that offenders should die than that all of us should be killed by God’s just wrath. — Matt McLaughlin commenting on the rationale for his Sodomite Suppression Act.

His Bill called for the murder of all gays in California, by the way. The problem, though, is that this fundamentalist belief is not without a substantial amount of followers domestically in the United States. Many of these fundamentalists are positioned within the highest levels of power in the Beltway.

Jerry Falwell used to preach the Fundamentalist flavor and said,

AIDS is the punishment for a society that condones homosexuality. Gays and lesbians helped 9/11 happen.

Pastor John Hagee said,

God caused Hurricane Katrina happened to punish New Orleans because it had a Gay Pride parade the week before.

Pastor Pat Robertson said if [Orlando] Disney World went ahead with a gay themed promotion,

[I]t will bring about terrorist bombs … earthquakes, tornadoes and possibly a meteor.

While in the United States, Judeo – Christian Fundamentalists are predominately headline catchers, the fact of the matter is that Fundamentalist Muslims are not. In the case of the Westboro Baptist Church (WBC) is an example which Anonymous took on directly In 2011, Anonymous made good on their threats. They are coming again and interestingly enough, Louisiana Governor Bobby Jindal is backing the overall concept by threatening to imprison any WBC protesters whom protest at the Layafette Funerals several hours ago. This is what Anonymous had to say to WBC,

We are coming for you. We will defeat you just as we always have. Your best bet is to stop this foolishness at once. We know you will not, so you can fucking …. EXPECT US.

Anonymous has proven successful in its disruption of unsavory entities in cyberspace going back nearly a decade now. There is mountains of empirical evidence attesting to the fact that most Western Governments never achieved victory from a technological point-of-view, but rather only by infiltration — we know this is not going to happen with IS. In the United States and when discussing Judeo – Christian Fundamentalists, with a few Lone Wolf exceptions, the reality is that everyone knows that these are blow hard assholes preaching the Gospel of Fuckstick Hate. For Fundamentalist Islamo Facists like IS, though, this is not the case.

Yemen, Iran, Iraq, Mauritania, Qatar, Saudi Arabia, Somalia, Sudan, United Arab Emirates, and Nigeria all punish homosexuality by death and generally rely upon Sharia Law to allow for the stoning or beheading.

Homosexuality is the least of the worries for those whom might challenge the Fundamentalists, though.

The Qur’an contains at least 109 verses that call Muslims to war with nonbelievers for the sake of Islamic rule.  Some are quite graphic, with commands to chop off heads and fingers and kill infidels wherever they may be hiding.  Muslims who do not join the fight are called ‘hypocrites’ and warned that Allah will send them to Hell if they do not join the slaughter.

The Qur’an certainly proclaims that when the time is appropriate, Muslims must use force to convert the unbelievers to Islam. For the non-Muslims, the alternative to this is to pay the humiliating protection money (Jizya tax) or be killed (by beheading, of course). A militarily dominant Islam, without doubt, precludes the peaceful co-existence with the unbelievers if the Muslims have to abide strictly by the unalterable stipulations of the Qur’an.

This does not mean that all Muslims are a clear and present danger; this does, though, reiterate the simple and salient fact that until there is an honest dialogue pertaining to Reformation of Islam, the end result will always be a tactical nightmare for co-existence.

The fact of the matter is that the cyber campaign which IS is engaged in should not be viewed as some trivial PR stunt. We are seeing the exact results of that which IS is dedicated to across Syria and Iraq right now. There is no negotiation with these type of people. And more on point, there will never be any type of peaceful co-existence between Islam and any other religion until Islam has its Reformation.

This is going to piss off a lot of people, but the fact of the matter is that it is uncontested. Moderate Muslims will point to the fact that they have not actively engaged in any overt assault upon the US Government, but I state this is not the case. A closer examination of Sharia Law as it is adopted in the UK, France, Germany and even in many quadrants of the United States shows a recalcitrant view towards adopting the Rule of Law which prevails within these social segments of government.

The Council on American – Islamic Relations (CAIR) is playing a good tune with respect to publicly condemning certain, cherry picked terrorist attacks like the recent one in my backyard. When Jeremy Ahmed opined upon Sharia Law established in Dearborn, MI, he was pretty clear in what was coming,

It is because of our need that Allah the Almighty, in all his generosity, has created laws for us, so that we can utilize them to obtain justice. We hope to see other cities taking this action in the face of the governments inaction of passing such legislation.

First and foremost, the United States needs to have a crystal clear understanding of IS and its doctrine. That requires, in particular, clarity without the tainting of Talking Points issued by nefarious entities pushing a legislative agenda formulated by appeasement. We currently do not have this. In fact, the corpus juris of Sharia Law, as applied by the Fundamentalists both within IS and overtly demonstrated by the House of Saud, stand as a testament for what is to come should Western Governments not pull their collective dicks out of the Lobbyist Funding Pots. We must obtain what I call informational dominance with respect to all aspects of that which IS and other similarly situated sects such as the Muslim Brotherhood, here in the United States, are involved in. Currently, the hands of our intelligence agencies are tied based, in part, upon domestic legislation. IS and others well understand this subtle insanity. National Security Decision Directive (NSDD) 75 somewhat addresses this endgame and is attributed with ending the Cold War. — The CIA Secret Document is listed in the link.

In understanding the enemy’s Threat Doctrine, the enemy being IS and any other organization similarly situated which poses a clear and present danger to the National Security of the United States, terms such as political correctness, multiculturalism, diversity, or tolerance have no place in the tactical vocabulary pertaining to our pursuit against the enemy. More on point, though, the fact of the matter is that the complete refusal to tap into the well developed and lubricated mechanisms of Ghost Security only occur at the detriment of Western Civilization.

The development of asymmetrical capabilities has always been the cornerstone and hallmark of how and why the United States has prevailed in many cases and at least muddled through strategic conflicts. Ghost Security presents, once again, with a purpose driven infrastructure which is currently being hindered by Beltway Pundits as opposed to harnessed. While Washington is readily accepting of arming camel fucking jihadists — this is how IS came into existence — the reality is that now, more than ever, we need to be thinking outside of the Beltway Box. We need to be legitimizing the non jihadists and crucifying the jihadists. The composition of Ghost Security easily displays that these components are achievable.

In closing, Foreclosurepedia will be rolling out a strategic assessment of both the in theater challenges as well as the asymmetrical contingencies which are shaping up to be the Civilized World’s greatest challenge, to date, of humanity’s ability to protect Life, Liberty and the Pursuit of Happiness.

Series Navigation<< #OpISIS: Infrastructure Attacks#OpISIS: Why The Camel Jockeys Are Defending A Multi Front Cyberwar >>

Search

Contract Opportunities

You must be logged in to post a comment Login