Saturday, December 31, 2011

Doc's teams score the mother load

Rangers scored the mother load yesterday when an AKAMAI executive unloaded 2,202 documents that could implicate AKAMAI in thousands of online attacks a week hidden under the right to administrate their network. But that many attacks including the unsanctioned rogues may also be apart of the plan including several unheard of sites in North America may indicate a large scale vulnerability may exist in the United States purported by AKAMAI. There may exist a large scale racketeering case that by the use of these attacks, it would force cable customers to rely more on Cable Customer Services, a kick back that keeps both AKAMAI and the cable operators wealthy. Some Cable Operators charge exuberant fees for service calls.

The attorney's over the case took possession of the documents on Friday under an undisclosed agreement. It is believed that the documents were bought for several millions of dollars. Doc's actors or actresses were used to convince the Executive to hand over the documents. During the collection, the Attorney insisted on video taping and interview with the Executive. The Executive has been granted anonymity to protect his family.

Thursday, December 29, 2011

Actors and Actresses begin walkthroughs.


Pigeon groups begin walk through over sought by over watch teams to prepare for any event. The day starts out with briefing and tactics sessions. Depending on mission complexity, these meetings could last one hour to four hours.

For the next six or eight weeks they will be assigned to get close to the quarry. They are professionally trained to “live” their cover.

The team was created to infiltrate dirty businesses suspected of promoting hate crimes in Los Angeles and Sacramento, and infiltrating homeless groups to I.T.T.-Identify, Target and Track predators and hate groups. The first group that was created by Doc referred to as ‘alpha one’.  Doc’s team successfully penetrated the Juggalos, homeless teen peer group, identifying sexual predators-both documented and undocumented only referred to as “closets”. They also identified dangerous drug dealers and their sources. Not every drug dealer is dangerous, but those peddling pills, heroine, meth and certain genre of ecstasy are.

The team will split up in teams of five per peer groups. Contact groups will work in pairs on the buddy system. Each buddy group will have three group supervisors-around the clock, close by.
Teams will be assigned by their experience, acting skills and their abilities and come under periodic  threat assessment.

If one is burned (exposed) they become support for the same group. In the last eight years, only one person was ever exposed.

For now they live in an RV city located in an abandoned warehouses owned by the Board of Directors. The Board of Directors owns warehouses in 61 cities.

Wednesday, December 28, 2011

DOC loses his sixth Class C firewall

AKAMAI claimed Doc's sixth firewall this morning, And the North American Underground will now begin disrupting services at all levels using a doppler pulse bandwidth disrupter from an overseas website.

At 5:45 AM CST this morning, Akamai owned DHCP contoller at 10.98.128.1 smurfed (Blinded) the Cisco 5505 making it vulnerable for "ice attacks" at 6:11 CST, the firewall went down. This the second major attack this week.

Emails were sent by Kansas City to 4,000 to Insight Customers to drop all services, and an agreement to pick up other services has been made.

The disrupter came online at 9:23 am from a non-extradition country will be disrupting AKAMAI boston and AKAMAI Colorado with mixed 160hz, 325 hz, 400hz and 800hz signals, all pulsed, attacking all 65000 ports randomly.






Tuesday, December 27, 2011

Surveillance photos start arriving

Surveillance photos began arriving on NADINE, and internal server operated by the North American Underground this morning. More than 6,000 photos began arriving since midnight CDT-blue and CDT-red at 6 am CST. These photos will be used to identify key personnel and so that background checks can be conducted. More photos are expected throughout the day.

"DARK MATTER" CYBER TEAM

Call sign "Dark Matter", a cyber team set up Cisco Telepresence, a teleconferencing system today to watch unmanned surveillance posts set up in strategic areas. They will watch tails and actors and actresses carrying "body cameras" as they pump information from quarries in a high tech performance-"better than soap operas" which will be transmitted and recorded to a Command Center located in the surveillance areas. This will give attorneys an edge for any trial-criminal or civil, or it can be played for News Media-at the whim of the attorney's. The system is privately owned. The actors and actresses act as lures.

Monday, December 26, 2011

Why DOC hates AKAMAI Content Delivery



It simply doesn't work. DOC has solution referred to as "Retribution". And it is a good one too.

Serbian Rat and Extract Crew-Haunts Insight

The Serbian RAT and EXTRACT Crew shown here has hit Insight Communications 163 times in the last 2 years.

79.101.237.196 designated "SCAR-3277" recently added to his long list of accolades with includes spamming, bot seeding, rat and extraction-complete drives (all files, passwords, media, credit card information, etc.) and can extract 500 gb's in approximately 40 minutes leaving nothing behind but the Windows Operating System. Interestingly enough recently cracked a media server containing home movies, decypted movies, company files for a Louisville Merchant and tax records all from behind a Netgear firewall. Insight denies this activity in a recorded conversation by the caller. Recording TA-70264 in the stack for the press to be released in January. Compare this call with 22 calls made to TWC, which also denies these attacks occur, make it conceivable that your personal information is not safe without spending several thousand dollars more than you should for Internet service.

79.101.237.196 has been placed offline by NAIDI six times this year. Yet he keeps coming back for more. Anonymous?

Sunday, December 25, 2011

KDDI

The site that attacked Doc last night was associated with a anti-peer to peer who owns a cloud at KDDI. The unsuspecting product that brought on the attack was the KM Player, a Korean Multimedia player.

Victim IP information removed-Actual data 12/25/2011 Time is GMT-7

On the start of the Multimedia player, a website in the 61.111.0.0/8 range pops up and begins a low level stream to a Korean site known as Pandora T.V. It is believed that Pandora streams the data to its site and either copy's its stream to a drive for later use or streams it across the web to homes for a fee.

Next come 209.137.130.253 with powerful chats trying to block the out going signal. When that fails, the KDDI cloud smothers the victim by over powering him with a TCP DDoS what doc calls a "superfly" attack, similar to a Brute Force attack.

This attack damaged a network switch and recording software known as a "real time log viewer" associated with the firewall, used to video capture the event. Attorneys picked up the Capture today to be used in the up coming trial.

Doc, smarter than the average bear, lured the attacker again today so NAIDI (North American Internet Defense Initiative) back trace the IP address for the NAIDI's attorney.

The back trace was successful.

This will be known as the Christmas Eve attack.







Clouded controversy

KDDI Cloud began attacking Insight customers "in protection of a contract that shouldn't have taken place" writes Doc on his internal server. But we now document a similar circumstance occurred with Activist Donna Chandler in which she reported being placed on an "illegal network".

This KDDI Cloud located at 209.137.130.253 is a integral player in Level 3 Communications and may just be China's latest acquisition or connected AKAMAI. We just don't know, yet.

A surveillance team of one hundred-thirty nine consisting of surveillance specialists including three anti cyber teams featuring former hackers
are now hunkered down in three cities preparing to expose AKAMAI top executives private lives. Doc wrote "they are damn sure controlling mine".

Massachusetts, Colorado and Florida will now become the biggest stage for 80 out of work actors and actresses now employed by rich Chicago Attorney's whom worked many corporate crime cases.

For Doc, this is a continuing saga of denied oportunities, but, for the Attorney's this is just another saga of rogue, dirty and out of control company's sticking it to the public.


Saturday, December 24, 2011

4,233 Insight Customers-Drop Accounts

4,233 will drop Insight Cable In Kentucky, 3,026 will drop Road Runner, Wordpress-2,741, LEVEL 3 will lose 7,203 due to online harassment says a press release that targets Level Three, Time-Warner and AKAMAI. A meeting broke up an hour ago in Louisville, Kentucky after demands for accountability were made by 755 customers in preparation for the numerous lawsuits over Attacks made by AKAMAI and Level Three during the Christmas Holidays.

Wednesday, December 21, 2011

Doc's Plan

By the first of the year, Doc plan's to distribute Linux servers and ASA firewalls to key Insight customers hit hardest by AKAMAI. The plan is to end DDoS attacks, and identify bot seeders at least in Kentucky. By the end of next year, more than 1,000 will be installed. It's his last act of defiance to keeping homes and personal data safe. His trained staff will access and maintain both server and firewalls by phone.

Insight has made no preparation to stop online attacks and pathetically pushed an anti-virus is all you need-scheme, however, the first of the year "will stress many seams". Attorneys will start making their attacks around January.

A press conference will include inspection of the equipment lost in the latest war on the internet.

Monday, December 19, 2011

Attorney's make final preparations against Insight

Doc reported on his website that:

In January, 2012,  Attorneys will challenge a contract between Insight Cable and the City of Louisville. The challenge will prevent the forced contract based on reputation of Time Warner whom plans to acquire Insight and the reputation of Insight cable as not the best need for the residential customer. As far as Insight is concerned, the 2010 blackout hurt any chance of restored faith in the service. In addition to the blackout, plaintiff's will attack the AOL Time Warner's reputation of customer service as not a spotless record with the customers needs in mind. 10 former employees will testify to dirtiness of both companies. AKAMAI sponsored 16,103 online attacks between 1998-2002. One customer recorded 13,000 plus online attacks a year with Insight.


Online attacks from AKAMAI'S Edge Suite will also be cited. The contract is currently ongoing.


The "forrest fire"

A nine hour xchat attack from Akamai, Edge Suite, NTT, AOL-Time Warner, Insight ended abruptly when Doc defensively fired back by initiating a chat attack of his own in protection of a firewall that was knocked out numerous times by NTT America and Akamai (Boston). These port 80 attacks were consistent with a term referred to as a "Forrest Fire" used to deny access to the Internet.

Documentation is a key importance in attacks like these.


Here Akamai-Edge Suite, and Akamai's main office in Boston pulled this denial of service attack along with AOL and NTT (Akamai) brought 400 plus homes online ready to join the fight, siding with Doc, against the most corrupt member's of Level 3 Communications. Akamai Corporations Main Office is located in Japan.

As of this morning, Doc will make an announcement at the Annual Rangers Christmas Exodus at Thunder Valley for recruitment of more members of a group referred to as "Firefly", now four hundred strong.

Akamai and Level 3 try their very best to control activity on the Internet, but cannot, due to implied rights of paid access and civil liberties. This is example how foreign domination has taken control of the United States.

On a foot note, Level 3 Communications is a haven of criminal activity and currently houses the Chinese Mafia and Night Dragon (Chinese hackers).

Wednesday, December 14, 2011

If your an Insight Customer....

Insight allows: 222.168.102.78 to prey on you!



This IP is a part one of a bot seeder...using a browser insert to cause you flash player to crash. When it does, the seeder redirects your site to a phoney but realistic looking Adobe page prompting you to download a replacement player. 

The attack:
The attack pulls a snmp attack through port 443 of your browser.


Photos courtescy of Doc.

Saturday, December 3, 2011

Insight claims turns proven lies...

Doc recently disclosed to me an recent email from Michael Willner proclaiming that Insight Cable is vigilant against Botnets. The picture above came from one of Doc's computers. Doc keeps immaculate records about attacks on his system. Here's how this attack played out.

INAP, a backbone hosting Chinese websites, had flooded Doc's computer with a worm that targets flash player-when infected, causes the flash player to crash. The flash player plugin is affected and rendered useless. Next, the "seeder" a website that obliviously hijacks the browser to a fake, but realistically Adobe webpage prompting you to download the Adobe flash player. The seeding came from 79.0.0.0/8-EC2-Amazon.com.

At given time the hacker can activate the seed, and drop any-any website with malicious bots or Mal-bots.

At this time, NAIDI recorded 1,163 botnets attacking numerous websites including wordpress. Those using AVG and McAfee were seeded. The botnet controller was Beijing in the 218.0.0.0/8 range recorded by the Adaptive Service Appliance added after the seeding.


Willner lied and now it will be the subject of many court sessions. Insight is once again asleep at the switch.