MIXED THREATS:
Malfeasance and Malicious
Codes in the
(CONSPIRING by CREATING DIVERSIONS PERHAPS TO COVERUP
DECEPTIONS, DECEIT?))
Computer Industry
MIXED THREATS INTRODUCTION
IRONICALLY,
THE CONSENT DECREE PREVENTING American Telephone and
Telegraph (AT&T) FROM BEING IN THE COMPUTER INDUSTRY ULTIMATELY SEEMS TO
HAVE ALLOWED International Business Machine (IBM) TO PROFIT FROM ATT’S
OPERATING SYSTEM. THIS IS JUST ONE OF
THE STRANGELY TRENDS (OFTEN CYCLICAL) IN THE
Although
software is generally bad, licensing and other fees are rarely paid, and this
is partly due to hackers capturing the imagination, fortunes, protected status
of a generation. MANY OF THE INDUSTRY
INSIDERS WERE named after their fathers and grandfathers (or who have Junior,
II, or III after their name likely will continue the agenda of their
ancestors), archangels, evil kings, emperors, mythical entities, or were adoptees or considered outsiders, even entities of supreme
importance, and often advocated the counter-culture, drug-culture, or
rebellion, or worthy, near lost causes!
The
least problematic names may be named after their relatives, increasing to more
problematic in the following order: archangels, evil kings, emperors, mythical
entities (perhaps mentioned in the bible or a fable as having important
symbolism or power), evil emperors (William), archangels (Michael), and/or
being the children of Auto industry executives (where they tended to learn how
to cost-shift related expenses to the government and learn how to get special
status from the government), or were adoptees. Often adoptees have
some frightening statistics associated with them, including a tendency to
murder. Interestingly, some might
believe Steve Jobs, co-founder of Apple Computer, became more likeable, stable,
or confident when he found his biological parents and sister. Interestingly, his non-biological family may
have given him a type of support, especially early in his career, that his
college professor biological parents may later in life may have been willing to
give him. He in turn may have allowed
his biological female child into his life that he may have previously treated
as an outsider, and his biological sister I believe was an accomplished writer
who even stayed with him and his wife.
Both Larry Ellison, CEO of Oracle, and Steve Jobs co-founder of Apple
Computer and CEO of Pixar Animation Studios are
friends and adoptees, and it may be common for adoptees and/or foster children to share a social bond that
few may understand. Often children of
engineers or school teachers become important in the computer industry.
http://66.218.69.11/search/cache?p=murder+adoptees+statistics&ei=UTF-8&fr=ush1-mail&n=10&fl=0&x=wrt&u=www.amfor.net/statistics.html&w=murder+adoptees+statistics&d=ahFcn2P9NFLk&icp=1&.intl=us
Their
companies were named after themselves, objects, places, or concepts. Often certain companies were known for their
cultures, or even certain phrases; For instance, “think” as a motto was
associated with IBM.
Sometimes,
conflicts can be evaluated initially by comparing the cultures, region, names
of founders and the names of the organization against each other, and sometimes
names associated with concepts or places then to skew as very favorable or very
unfavorable in a dispute. Names of
places, such as Stanford, or Stanford University Network (Sun, as in Sun
Microsystems) may be over associated with academia, or a place, and Microsoft may be under associated with a
concept; also, Santa Cruz Operation may be over associated with Santa Cruz and
certain stigmas that Santa Cruz, California has been associated with. Often it
can be noticed in the Insurance industry or in a Court Index of lawsuit that
companies named after a location can have bad business practices, especially in
metropolitan regions.
We
can also compare Bill Gross’ name with the name Idea Lab in which he is CEO.
Idea Lab may weigh more importantly as a concept than a name and may have a
bright future. Whereas, the name Bill in
Bill Gross may be considered something of a liability, and Bill Gross has not
been free of controversy, but Idealab, and be
considered something of a charmed name, and to some extent possibly the most famous and prolific business incubator
of the dot-com era.
It has this author’s experience that businesses named after locations
are usually problematic, named after the founder a little less problematic,
named after a thing is even less problematic, and named after a very important
universal concept, especially if it has a great logo, symbol, or culture tend
to be the least problematic.
AT&T’s
name may not be the best, but its logo is often considered one of the best in
industry. International Business
Machines (IBM) may be one of the best business names in history. This author is
inclined to think that IBM, Linux, Idea Lab, and AT&T will continue to do
will and/or dominate this industry.
Another example of what may be one of the best possible industry names
is Macromedia, which is a large software company, that was taken over by Adobe,
which this author thinks is a horrible name for a software company, and it may
continue to do very well. (This author
did not enjoy Adobe’s educational software, especially the images in Adobe’s Photoshop classroom in a book, which contained an
insensitive photos of a melted
grill of a truck, and other strange images that some may wonder if they
contain subliminal messages.)
Note to editor:
it may have been 5.0
If we
look at the names of the co-founders and the names of the corporations and try
to look for a trend within the industry, it may suggest that this industry is
actually elitist, but not necessarily intellectual, which may suggest that
entertainment applications may be the most common applications for the consumer
use of computers. This may be one reason
Microsoft does so well. Most persons do
not use their computers for the more advanced applications, so them may be
willing to replace a cheap computer and/or software and may only buy cheap
video games, movies or music mostly on their computers and very minor business
applications on their computers. They may not think in terms of the cost of
losing data.
One
of the most interesting and rarely thought about comparisons is to the name
William, or Bill as a shorting of the name William, and the history of William II (born Frederick William Albert
Victor, grandson of William I of Germany and of Queen Victoria of England,
(this may be of great importance because many of those in other industries will
be likely in disbelief, shock, and near constantly perplexed about some of the unique
standards in this industry and the Silicon Valley; often the standards are near
nonexistent and even skewed towards annihilation or going to great lengths to
control certain customers or markets, and there may be a larger amount of
remote controlling and/or monitoring of certain computers or individuals).
A recent example was with Sony’s Rootkit which would call Sony via the internet each time a
song on a Sony CD was played on a computer.
Many
customers are also eligible for extra downloads or a small cash settlement
according to eff.org:
By including a flawed and
overreaching computer program in millions of music CDs sold to the public, Sony
BMG has created serious security, privacy and consumer protection problems that
have damaged music lovers everywhere.
At issue are two software
technologies - SunnComm's MediaMax
and First4Internet's Extended Copy Protection (also known as XCP) - which Sony
BMG claims to have placed on the music CDs to restrict consumer use of the
music on the CDs but which in truth do much more, including reporting customer
listening of the CDs and installing undisclosed and in some cases hidden files
on users' computers that can expose users to malicious attacks by third
parties, all without appropriate notice and consent from purchasers. The CDs
also condition use of the music on unconscionable licensing terms in the End
User Licensing Agreement (EULA).
Even the most respectable persons in
high places in the computer industry seem to violate privacy. For instance: about September 2006 even the
Chairperson of Hewlett-Packard Corporation (HP), Patricia Dunn, has been
accused of hiring third parties who are guilty of pretexting
(five other persons have been indicted by California Attorney General Bill Lockyer regarding HP incident), which is using identity theft or
impersonation to obtain information, usually phone records, or other business
type records. Patricia Dunn allegedly violated the privacy of her fellow HP
directors, several journalists and their families. Dunn didn’t seem to confront outside
investigators about how telephone logs were obtained, which usually can only be
obtained through government subpoena, or with the consent and/or, authorization
of release of information of the person who owns the telephone logs, usually
the person who made the calls.
Chairperson of Hewlett-Packard Corporation Patricia Dunn is the daughter
of showgirl and vaudeville actor, and studied journalism. Hewlett-Packard Corporation makes some of the
most sophisticated and admired computing products in the world. It is astonishing that Hewlett-Packard
Corporation could become embroiled in a privacy scandal.
http://216.109.125.130/search/cache?p=HP++indicted&ei=UTF-8&fr=ush1-mail&x=wrt&u=www.denverpost.com/technology/ci_4443697&w=hp+indicted&d=LPnZ_iQ8NlkR&icp=1&.intl=us
http://search.yahoo.com/search?p=pretexting+hp+chair&fr=ush1-mail
http://news.yahoo.com/s/ap/20060909/ap_on_bi_ge/hewlett_packard_directors
Again, privacy violationa
are alledged in the telcom
or computer industry. Information about
Electronic Frontier Foundation's (EFF)
EFF filed the class-action suit
against AT&T in January, alleging that the telecommunications company has
given the National Security Agency (NSA) secret, direct access to the phone
calls and emails going over its network and has been handing over
communications logs detailing the activities of millions of ordinary Americans.
The government intervened in the case and asked that it be dismissed because
the suit could expose "state secrets." But Thursday,
http://www.eff.org/news/archives/2006_07.php#004843
The various browsers,
especially Internet Explorer a Microsoft product that its founder Bill Gates
has some control over, may be used to monitor communications as may be
suggested by the June 22, 2006 issue of outsidethebeltway.com
that states that “Bill Gates Has Top Secret Clearance”. Here is their analysis of the reason for Top
Secret clearances:
An interesting tidbit in
an otherwise mundane AP story: Microsoft executives Bill Gates and Steve
Ballmer have Top Secret clearances from the Defense Department.
OTB roving correspondent
Richard Gardner passed on the tip and noted that this isn’t surprising, on
reflection, since Microsoft does a lot of encryption and other IT work for the
government and “SEC rules require executives to know what their underlings are
up to.”…
On a personal level, I
find it rather amusing that Gates and Ballmer, who are billionaires several
times over, have what amounts to a free ticket to a high paying government job.
As noted here numerous times, the longstanding backlog on security background
checks makes those with an existence clearance, especially a Top Secret, a hot
commodity in the defense and homeland security sectors.
For example, within the Dotcom,
computer, telecommunications, and/or entertainment industries, resourcefulness
rather than privacy may be prized. For
instance, Jeff Bezos, Amazon.com's founder, according to Wired sought out a female for permanent relationship who
could get him out of prison. Quoting the
article:
"The number-one criterion was
that I wanted a woman who could get me out of a Third World prison," he
says.
"What I really wanted was
someone resourceful. But nobody knows what you mean when you say, 'I'm looking
for a resourceful woman.' If I tell somebody I'm looking for a woman who can
get me out of a Third World prison, they start thinking Ross Perot -
Ah-ha-ha-ha-ha-ha! - they have something they can hang
their hat on! Life's too short to hang out with people who aren't
resourceful."
Interestingly, Amazon.com's
success meant that likely the real estate market in the Bay Area would pick up,
and Bill Joy may be one of Amazon.com's biggest
customers. The first purchasers of books
at Amazon.com’s website were intellectual, perhaps
elitist. Therefore, maybe the purchases
of Amazon.com's buyers may be of great importance,
and even book clubs of various buyers of books could be created somehow without
violating privacy. Bezos
may understand the records about the purchases of his customers could put him
at risk for criminal activity, such as home invasions; then he could be put in
some strange prison in a foreign country.
John Draper, also known
as Cap't Crunch, ended up in prison for using
something known as a blue box to defraud the phone company to make free calls,
and allegedly the founders of Apple computer were also allegedly illegally
either making, selling, and/or using blue boxes to defraud the phone company. There is a suggestion that John was
compromised when skepticfiles.org alleges:
John Draper, author of
one of the earliest word processing programs, EasyWriter,
and, under his nomme de plume, "Cap't Crunch", one of the first known
"hackers", told Newsbytes that while he
"really enjoyed Sneakers, people should realize that there is an important
message contained within."
(Sneakers was a movie.)
Draper, who served time
in prison for his "phone phreaking", was
considered the model on which the role of "Cosmo", played by Ben
Kingsley, was based. Cosmo, like Draper, served a prison sentence for his
activities and, while in prison, became a collaborator with a nationwide
criminal organization, becoming their technical wizard.
http://216.109.125.130/search/cache?_adv_prop=web&x=op&ei=UTF-8&fr=ush1-mail&va=mafia&va_vt=any&vp=John+Draper&vp_vt=any&vo=prison&vo_vt=any&ve_vt=any&vst=0&vf=all&vm=i&fl=0&n=10&u=www.skepticfiles.org/hacker/cud446.htm&w=mafia+prison+%22john+draper%22&d=cngJMSQ8NSSz&icp=1&.intl=us
Skype is a little program for
making free calls over the internet to anyone else who also has Skype. Skype was acquired by eBay; this may seem to make dotcom
and communications legally promoting free communication services and meshes
with what seems to be the early agenda of those in
http://about.skype.com/skypeebay.html
The Anthrax Letters may
have been motivated to get the Patriot Act passed according to various
analysts. Both the Patriot Act and
Homeland security may fund a massive amount of intelligence gathering by the
private sector.
The California Financial
Information Privacy Act was Signed into law by Gov. Gray Davis August 27, 2003
and proposed by Senators Speier & Burton and gave
consumers more protection about information being sold about their financial
transactions, which banks and insurance companies might be interested in to
find customers for their products.
Persons in more data centered
industries, especially the insurance industry or banking industry, may not
understand the culture often rooted in criminal activity of many in the
associated applications of both the computer and entertainment industries. Even law firms tend to have great difficulty
keeping information private, and may need to threaten to terminate young
attorneys if they talk about a case or client in an elevator. Even the best law firms may need to bring in
private detective to protect privacy and resources, and it can be common for
wrongdoing to happen in any high stress environment.
It may be much more
common for illegal gathering of financial and communications and even
government information than the average person might guess. This is because so many people can have
access to personal information, including medical records, and that is why
movie stars medical reports may be seen by the public in tabloids or elsewhere
(they tend to pay well for this type of information). This information is often illegally
obtained. It is difficult to stop
because it is difficult to catch.
http://search.yahoo.com/search?p=senator+california+privacy+bill+&ei=UTF-8&fr=ush1-mail&x=wrt
http://66.218.69.11/search/cache?p=senator+california+privacy+bill+&ei=UTF-8&fr=ush1-mail&x=wrt&u=www.privacyrights.org/ar/SB1Info.htm&w=senator+california+privacy+bill&d=Nr0LESQ8NdhO&icp=1&.intl=us
Many computer games are about
annihilation of an enemy, and many of the instructors at some colleges do not
even need a four year degree in computer science to teach computer classes, and
are self-taught partly from gaming. In
fact, one of the first applications of computers was by Richard Bellman at Rand
Corporation using computers to model Warfare for the
For instance the author wondered if
the anti-virus industry really understands that complete destruction of a
computer may intentionally, or accidentally, be intended by the virus author as
seen in the Blah.3385
virus according to avp.ch:
“Blah.3385" has a bug - the boot/MBR sector stamp 55AAh is placed at the wrong offset in the virus body (01FFh instead of 01FEh), it causes system error message on loading from such MBR, and the hard drive stays as not available.
http://www.avp.ch/AVPVE/bootmult/blah.stm
Some facts and/or allegations about
William II that may be repeated by others named Bill or William (see underlined
and emphasized) in the computer industry and/or
He was the last German Emperor (Kaiser) and King of Prussia;
A traumatic breech birth left him with a withered left arm
due to Erb's Palsy;
It has been argued that he had an aggressive, tactless,
headstrong, and occasionally bullying nature;
He wrote his love interest poems;
Following the fall of
The Emperor loved all things Norwegian,
where he often spent cruised
He
claimed that he was not guilty of initiating the
Great War, World War I, but Treaty of Versailles provided that William should be
tried for promoting World War I.
There is not a positive and exact correlation in behavior with the name
William (also known as Bill) in the computer industry with Emperor William II
(Bill Gross has been accused of by shareholders of everything from using Idealab as a personal piggybank to using the company jet to
take vacations; Bill Joy co-founder of Sun Microsystems has many expensive residences;
Bill Gates co-founder of Microsoft has great personal wealth), but it might be
worth thinking about; this is because
there is the ability to remotely control an adversary’s or competitor’s
computer, which is usually done by clicking on links often that start executable (.exe)
files or even by opening an email which then may cause denial of service
attacks on websites due to sending too much traffic to the website and tying up
the phone lines. These distributed
denial of service (DDOS) attacks can be known as Trojans, worms, viruses and
when used in combination, as blended threats.
I would define a mixed threat and combining a blended threat or reacting
to a blended threat with another threat, often non-virtual or physical in
nature.
For instance: “According to Bill Joy of Sun Microsystems: ‘You know what Machiavelli said about foreign lands: you
either take it over, or you destroy it. That's Microsoft.’” as he stated in corporatewatch.org’s Newsletter Issue 13 dated March-April 2003.
In The Plot to
get Bill Gates by Gary Rivlin, Joy seems
extremely emotional:
[T]he speakerphone would suddenly crackle with
expletives. It would be Joy, saying
something like “Fuck Microsoft. I don’t
even know why we’re fucking talking to you.
And fuck Bill Gates. No one here can
stand him. Why are we doing anything to
help this fucking guy grab even more business?”…Alone, the people from Microsoft
joked that Joy was so worked up, they could hear pellet of spittle bouncing off
his phone.
Bill Joy’s usual stance of wanting a single standard, or in
this case that security should be standard, is often argued in the computer
industry is seen again in the article
"Software Isn't Complete Unless It's Secure; Developers need to make
security a priority from the earliest stages of planning -- and buyers should
demand nothing less. (VIEWPOINT)."
in Business Week
Online dated
Applications that were never designed for the Internet
now interface with servers and users worldwide.
This situation has attracted, motivated, and enabled
hackers who attack and misuse software systems for malice and profit, putting
millions of users at risk. Organized crime, identity-theft "bots,"
and zombie
networks, directed behind the scenes by increasingly
sophisticated individuals, pose even larger threats.
SECURITY MUST BE STANDARD…
Rather
than simply building big walls around their networks, developers must become
proactive about security and include it from the beginning of an application's
development…[W]e should insist that software is not complete unless it is
secure…
http://66.218.69.11/search/cache?ei=UTF-8&p=Software+Isn%27t+Complete+Unless+It%27s+Secure&fr=ush1-mail&u=www.businessweek.com/technology/content/sep2006/tc20060926_175459.htm%3Fchan%3Dtop+news_top+news+index&w=software+isn%27t+complete+unless+it%27s+secure&d=eOZyMCQ8NlUS&icp=1&.intl=us
Some feel the Anthrax letters were sent to those to get
the Patriot Act passed, and were addressed to entities associated with the "Empire of
Energy" (term used by Marshall Smith editor of brojon.org), and others are
suggesting a political possibly pro-Jewish conspiracy perhaps involving Jewish
microbiologist Dr. Philip M. Zack (Was Zack behind a vile conspiracy to frame
an Arab colleague who worked with Dr. Zack, at the U.S. Army's Medical Research
Institute for Infectious Diseases in Fort Detrick,
Md.?); Furthermore, as more support for their theories they note that a
Republican did not receive the Anthrax
letters. It is reasonable to
suspect that large computer contracts would be given out to monitor
communications by using computers, so insiders in the computer industry would
likely feel more secure if the Patriot Act passed, and Bill Joy was close to
the 911 attacks in New York when they happened.
Two different entities Marshall Smith editor of brojon.org and Ed
There seems to be a suppressed Anthrax letter
that may have attempted to frame Russians which can be implied from the report
by ucla.edu:
"THE UNTHINKABEL" (the Ns are
reversed as Cyrillic characters in the published Vanity Fair article)
SAMPLE OF HOW IT WILL LOOK Brief
but ominous, the handwritten note threatened bioterror
attacks on New York, Chicago, Los Angeles, and Washington, D.C. I found the text curious for a number of
reasons. First, the quotation marks were done Russian-style, with the opening
quotes below the line, and the document's backward N's resembled the letter I
in
However, there may be other suspects with
other interesting motives, which could lead some to believe a complex frameup could exist, or a single person could be guilty of
various crimes. The most recognized
suspect may have a motive for wanting antibiotics instead of a vaccine for
Anthrax. The are allegations that the anthrax vaccines caused Gulf War Syndrome, and is
ineffective against inhalation Anthrax. “Take Penacilin
[sic] now” was written in one of the letters suggested that the author NEVER
intended that anyone die and may have hoped to prevent deaths in the long term
by influencing policy. The FBI may have
conflict of interest because the hired ex-colleague of anthrax probe figure,
Glenn Cross in a news story by Marilyn W. Thompson of
Sources familiar with the case said that FBI
anthrax investigators have interviewed Cross extensively about his relationship
with Hatfill and his concerns in the fall of 2001
about possible security risks posed by Hatfill's work
with classified government projects.
Hatfill's supporters said that Cross and Hatfill were rivals at work and that Cross reported
information to his bosses and later to the FBI that heightened interest in Hatfill early in the anthrax investigation. Hatfill was first interviewed by the FBI in fall 2001 at
his SAIC office. The company is a large government consulting firm whose work
includes classified projects for the CIA and the Pentagon.
"Steve amused himself by telling him
some whoppers,"
Anyone could have cultured Anthrax alleges
fredoneverything.net:
How hard, really, would it be to carry out a
bio-attack? Not very, says Hatfill. Culturing
bacteria is easy and almost universally understood. Getting the culture past
Customs would be no problem. You could almost certainly just carry it in a
small bottle in your pocket. Hatfill, who is familiar
with such things, showed me how to culture bacteria with supplies that can be
bought at Safeway. A bright high-school student could manage it.
http://www.fredoneverything.net/Cop_Bioterrorism.shtml
Prins and Van Der
Jeugd artlcle. "Herbivore population crashes and woodland
structure in East Africa.Africa" from The Journal of Ecology
dated June 1993 seems to suggest that
Anthrax in
However, shrub establishment, as determined
from counting tree-rings, preceded poaching. 3. Shrub establishment in two areas of the Park coincided
with anthrax epidemics that drastically reduced the impala population.
Luise White article "Poisoned food, poisoned
uniforms, and anthrax: or, how guerillas die in war. (Exposure And Invisibility) anthrax." In Osiris
19 states:
The largest recorded outbreak of anthrax in
humans occurred between November 1978 and October 1980 in
How did anthrax spread to previously uninvolved
areas? The data on the spread of anthrax, most of it from research in the
United States, was crystal clear: the disease might take on epizootic
proportions in areas with a history of anthrax outbreaks, but areas with no
history of anthrax tended to have only sporadic and mild epidemics of the
disease…
Fourth: Did the breakdown in veterinary
services in rural
The
Many Africans recalled seeing airplanes drop
"white powder" on pastures and cleared land; they believed this
caused anthrax and other diseases. A few people said they saw Rhodesian
soldiers sprinkle "small pills" into dams; these "killed the
fish and poisoned cattle, which then became bearers of anthrax." Others thought
the disease was spread by ticks, now out of control because African cattle were
not dipped or resulted from the pollution caused by gunfire and smoke…
The spirit mediums I spoke to in 1997 did not
have any doubts about what, and who, caused anthrax during the war: they did.
They insisted that this disease was brought by mediums after guerillas failed
to perform roper rituals--or any rituals at all--or do what mediums asked of
them; the mediums brought anthrax to punish certain areas….
When North American physicians and Zimbabwean
spirit mediums disagree about what brought anthrax to Zimbabwe in 1979, they
disagree not only about the epidemiology of the disease but also about the
history of the war.
Scott Shane of Sun Staff on
When recent reports in The Sun and
other publications revealed that former Army bioweapons
scientist Dr. Steven J. Hatfill
had claimed a Ph.D. he had not received, he offered an explanation.
He had completed the work for the degree at
But when applying for a research job in 1995,
Hatfill provided to the National Institutes of Health
a handsome
The Ph.D. certificate, a copy of which was
obtained by The Sun from the NIH under the Freedom of Information Act,
is a forgery,
"Our parchment doesn't even look like
that," says Angela Stuurman, assistant to the
registrar at
There are some allegations at angelfire.com
in “projecthatfill” that may, or may not, be
relevant, incriminating and/or accurate:
Here is what a complete investigation
uncovers: Hatfill never served with the
When the Washington Report asked Barbara Hatch Rosenberg, Ph.D., a biological
arms control expert at the State University of New York, if the allegations
regarding Dr. David Hatfill now took the heat off Lt.
Col. Philip Zack, she replied, “Zack has NEVER been under suspicion as
perpetrator of the anthrax attack.”
http://sf.indymedia.org/news/2002/11/1542931.php
“
One theory on the "
A dissenting comment from another poster at
freerepublic.com states:
A sage observer recently noted, "If
there is a
What the observer meant, was that the
existence of a
The notion that the existence of a Greendale
School during the time of Steven Hatfill's stay in Rhodesia/Zimbabwe,
would "prove" that he was the anthrax terrorist, would only impress
someone who either had convinced himself that Hatfill
was guilty, or who wanted him to be guilty so badly, that he was indifferent or
hostile to the truth. The
A Greendale, Franklin combination,
intersection or linkage exists at about the location that silicon medical
products likely used for the weaponization of Anthrax
was purchased as gathered from the article "Vesta will move to Franklin site." by Rich Kirchen in The
Business Journal-Milwaukee dated December 3, 1990 suggests the wrongdoer(s)
enjoys leaving clues that might waste investigators resources:
Vesta Inc., a manufacturer of silicone products
for the medical equipment industry now located in the Greendale Industrial
Park, will build a new plant in the
Vesta's offer to pay $163,000 for 5.2 acres of
city-owned land on
The zip code was also a possible frameup,
diversion and/or attempt to waste government because the zip code matched an
area where Arabs were know to reside in
News reports have pointed out that there is a
town named “Franklin Park” in central
There isn’t a
What is interesting is that these three
Why the sender included clues about these
three neighboring towns in the return address is not clear, but it does make
for an interesting puzzle.
Some news reports claim that the Zip code for
Because the anthrax attacker needed to write the return addresses on the
Leahy and Daschle letters before he filled them with anthrax, I think he
created the fictitious return address using the Internet as I have outlined
above.
http://www.masonryinstituteofiowa.org/
http://maps.yahoo.com/maps_result?addr=&csz=ames%2C+Iowa&country=us&new=1&name=&qty=
Hatfill’s lawsuit alleges:
In addition to identifying Dr. Hatfill wrongfully and baselessly with the anthrax
mailings, defendant Kristof published numerous
discrete false statements about him, defamatory on their face or in the context
in which they appeared, in reckless disregard of whether what he wrote was
true. Such statements include the following, among others:
a) the
assertion that Dr. Hatfill "unquestionably had
the ability to make first-rate anthrax."
b) the
assertion that Dr. Hatfill had the "ability"
to send the anthrax.
c) the
assertion that Dr. Hatfill had the "access"
required to send the anthrax.
d) the
assertion that Dr. Hatfill had a "motive"
to send the anthrax.
e) the
assertion that Dr. Hatfill was one of a
"handful" of individuals who had the "ability, access and motive
to send the anthrax."
f) the
assertion that Dr. Hatfill "had access" to
an "isolated residence" in the fall of 2001, when the anthrax letters
were sent.
g) the
assertion that Dr. Hatfill "gave Cipro [an antibiotic famously used in the treatment of
anthrax infection] to people who visited [the 'isolated residence']."
h) the
assertion that Dr. Hatfill's anthrax vaccinations
were "up to date" as of
i) the assertion that Dr. Hatfill
"failed 3 successive polygraph examinations" between January 2002 and
j) the
assertion that Dr. Hatfill "was upset at the
k) the assertion that Dr. Hatfill "was once caught with a girlfriend in a
biohazard 'hot suite' at Fort Detrick [where Dr. Hatfill had concededly worked] surrounded only by blushing
germs."
The weeklystandard.com article “The Hunting of Steven J. Hatfill”
by David Tell dated September 2002 reports also seems to suggest Hatfill’s
innocence:
Steven Hatfill
was a virology researcher when he worked at
Finally, as the New York Times
reported on June 23, FBI technicians, through some form of radiocarbon dating,
seem to have satisfied themselves that last fall's anthrax letters contained
powders prepared from a freshly grown batch of bacteria, no more than two years
old. If so, that would suggest that the perpetrator cannot
have acquired the anthrax spores from which he cultured his weaponry any
earlier than September 1999. Hatfill's
National Research Council Grant at Fort Detrick, by
its formal terms, ended that same month. But according to numerous published
reports, Hatfill was no longer working at USAMRIID by
then. He had been full-time at SAIC since the previous February.
http://www.weeklystandard.com/Content/Public/Articles/000/000/001/624vjogb.asp
However important physical evidence was linked to
The anthrax-laden letters may have been sent
on September 18 &
http://216.109.125.130/search/cache?ei=UTF-8&p=September+18+nimda&fr=ush1-mail&u=www.symantec.com/avcenter/venc/data/w32.nimda.a@mm.html&w=september+18+nimda&d=d-vgzSQ8NpQG&icp=1&.intl=us
http://www.symantec.com/security_response/writeup.jsp?docid=2001-091816-3508-99
http://search.yahoo.com/search?p=October+9%2C+2001++nimda&fr=ush1-mail
http://216.109.125.130/search/cache?ei=UTF-8&p=October+9%2C+2001++nimda&fr=ush1-mail&u=securityresponse.symantec.com/avcenter/venc/data/w32.nimda.b@mm.html&w=october+9+2001+nimda&d=PbK9CCQ8NkKz&icp=1&.intl=us
http://www.symantec.com/security_response/writeup.jsp?docid=2001-100900-1647-99
http://216.109.125.130/search/cache?p=october+9+anthrax+letters&prssweb=Search&ei=UTF-8&fr=ush1-mail&x=wrt&u=www.ph.ucla.edu/epi/bioter/detect/antdetect_letters_a.htm&w=october+9+anthrax+letters&d=Fyk_SiQ8NoOM&icp=1&.intl=us
The avoid list of the 2001 mydoom worm unusually listed Stanford and utgers.ed (likely Rutgers.edu in
http://search.yahoo.com/search?_adv_prop=web&x=op&ei=UTF-8&fr=ush1-mail&fr2=op&va=+stanford+2001&va_vt=any&vp=sun+server&vp_vt=any&vo_vt=any&ve_vt=any&vd=all&vst=.edu&vs=.edu&vf=all&vm=i&fl=0&n=10
MIT is known for opensource
in 2001 but not for using Sun servers, and was also on the avoid list of the Mydoom worm.
http://66.218.69.11/search/cache?p=mit+2001+server&ei=UTF-8&fr=ush1-mail&n=10&fl=0&x=wrt&u=web.mit.edu/is/topics/windows/server/winmitedu/join.html&w=mit+2001+server&d=QJ7uiiQ8NRN9&icp=1&.intl=us
Files
seems to be dated 2001 at rutgers.edu regarding the installation of Sun
Servers:
12/ 23/ =2001/ store.sub
13/ =+Drafts/ =2002-01/ store.usr …
· These services will be based on Sun ONE
technology, including an LDAP directory and (when it's ready) the Sun ONE
Identity server. Calendaring will use the Sun ONE calendar product. Mail is
likely to use the Sun ONE mail product. Web and file access may be done with
new software, but it may also use existing web servers with improved LDAP
integration. .
http://search.yahoo.com/search?p=sun+servers+rutgers+2001&ei=UTF-8&fr=ush1-mail&x=wrt
According to a Sun Microsystems 2001
press release Rugers helps operate the Protein Data Bank which uses Sun
servers:
“The Protein Data Bank, operated by
The FBI investigated according to
The Associated Press
FBI agents examined Rutgers
University photocopying machines last week, looking for links to four
anthrax-tainted letters mailed from central
Two agents arrived
Friday at the Waksman Institute of Microbiology, a
''I asked whether it was related to
the (anthrax) investigation,'' he said in a phone interview Tuesday.
''The male investigator said, 'We can't leave
any stones unturned so we're turning over stones,' or something to that
effect.''
The agents spent about 10 minutes at
each Waksman Institute photocopier, making copies and
slipping them into a portfolio or large envelope, Ebright
said.
He said agents tested photocopiers
in other buildings, but he did not know which ones or how many machines.
''It's
obviously the geographic link,'' Ebright said. ''The letters were
mailed from this state, not more than 30 miles from this location.''
No anthrax research is conducted at
(was rutgers listed partly as a frame re: anthrax letters? Not a
usual pro-opensource, big computer si school? utgers.ed on mydoom worm avoid list)
http://paul.rutgers.edu/ (big
sun micro contract at
http://search.yahoo.com/search?p=utgers.ed+mydoom+2001&prssweb=Search&ei=UTF-8&n=10&fl=0&x=wrt
http://waksman.rutgers.edu/mbcl.html
http://216.109.125.130/search/cache?p=rutgers.edu+mozilla&ei=UTF-8&n=10&fl=0&x=wrt&u=www.math.rutgers.edu/help/secure/mozilla.ssl.php&w=rutgers+.edu+mozilla&d=bxEGziQ8NSjp&icp=1&.intl=us
http://en.wikipedia.org/wiki/Franklin,_Michigan
http://maps.yahoo.com/maps_result?addr=&csz=Franklin%2C+Michigan&country=us&new=1&name=&qty=
http://en.wikipedia.org/wiki/Farmington,_Michigan
http://maps.yahoo.com/maps_result?addr=&csz=Farmington%2C+Michigan&country=us&new=1&name=&qty=
http://www.franklinparklibrary.org/localhistory/fpnative.htm
http://maps.yahoo.com/maps_result?addr=Greendale+Township&csz=michigan&country=us&new=1&name=&qty=
http://216.109.125.130/search/cache?p=greendale+school+farmington+michigan&ei=UTF-8&fr=ush1-mail&x=wrt&u=www.michigan.gov/documents/Utica_Community_Schools_040105_120809_7.pdf&w=greendale+school+farmington+michigan&d=em0QziQ8NSA3&icp=1&.intl=us
Reports
nationalreview.com about Hatill that may suggest his
innocence:
Hatfill will soon undergo blood tests, which he
claims he requested months ago, that will test antigens in his blood to see if
he has had recent exposure to either anthrax or an anthrax vaccination. Hatfill will also submit a handwriting sample to the FBI,
which will be compared to the handwriting in the four anthrax letters. Hatfill has waived his privacy rights with respect to the
blood and handwriting tests, and he wants the results
made public as soon as possible.
These are not the sort of tests that a guilty
man volunteers for. Hatfill actually did not even
hire a criminal-defense attorney until after the second time his apartment was
searched. In addition to the tests he's volunteered for, Hatfill
has also made public his timesheet for the four days during which the anthrax
letters could have been mailed.
The prospect.org insightfully reported:
For instance, Hatfill allegedly said that
anyone who knew "how to grow anthrax spores of one to three microns had to
know that the hole in an envelope is 10 microns and that the spores would
escape."
http://www.prospect.org/webfeatures/2002/06/rozen-l-06-27.html
Steven J. Hatfill is
quoted at hatfill.blogspot.com
about the prejudicial label given to him of “person of interest”:
A “person of interest” is someone who comes into being when
the government is under intense political pressure to solve a crime but can't
do so, either because the crime is too difficult to solve or because the
authorities are proceeding in what can mildly be called a wrong-headed
manner... This should preferably be a person about whom mysterious questions
can be raised, someone with an interesting or colorful background. Then they
give him a prejudicial label, “person of interest.” And they leak appropriate
rumor and innuendo to the press...
Some outlandish, and perhaps diversionary,
postings about the Anthrax investigation have been posted on the Internet by
persons, such as:
A microbiologist using the screen name "The Great Satan"
has been posting on the ultra-conservative news forum: http://www.freerepublic.com.
Prior to adopting the Satan persona he posted as "
The thrust of his repetitive argument is that Saddam Hussein (and
his "sleepers") is behind the anthrax mailings and is
"blackmailing" George Bush by covertly threatening a major anthrax
attack.
The anthrax mailings in the fall of 2001 were just "warnings".
The Amerithrax investigation is a cover
and a farce and Steven Hatfill - the person of
interest - is in on it.
A lone, renegade American scientist (such as he?) did not
mail the anthrax.
Move along - there's nothing to see here...........
The poster admits he works in a laboratory creating antibotic resistant bacteria…
"Adding antibiotic resistance to bacteria
is a trivial exercise.
I do it routinely in the lab.
You can do it with it a kit that costs about $500."
The Great Satan…
"Make the towel-headed,
sheet-wearing,
tent-sleeping, bloodthirsty,
misogynistic,
Jew hating medievals
drink their f***ing oil."
"Do you believe in fate?
"No,
but I want the ragheads
to start believing
they are fated
to either die or
live on rocks
for all eternity." …
"Indeed! Islam
and Nazism: two peas in a pod."…
Everyone should have a pardigm shift and try to
solve the problem rather then perpetuate it.
Hate breeds Hate
And eliminating the Islamazis breeds a
better future for the whole world.
They started the fight, WE will finish it.
Cry me a river for their deaths...they were preventable if these
ANIMALS evolved past thinking that an opposable thumb is a useless thing...
Their entire CULTURE is built around the ravings of a self-grandeurized pedophilic mass murderer, and the enslavement
of the world to said philosophy.
War is wearing a strapped on bomb into civilian populations as
to do the MAXIMUM damage to children and non-combatants...so war BACK AT them
will be the systematic ELIMINATION of them all as a threat...since they ALL ARE
a threat to all frere life on Earth.
Show me how they are deserving of sympathy or survival, and I
will show you chapter and verse on how they have brought pain and sorrow to ALL
they contact...including their own self-inflicted pain!...
37
posted on
To: Amerithrax
Amerithrax said: "Submit a Tip if you have information regarding the Amerithrax investigation."
"Here's the tip:
Amerithrax is a hoax, a fraud, a diversion, a feint, a Potemkin
Village, a sham, a scam, a PR exercise, cheap theatrics, wartime propaganda, disinformazia, a painted storefront on a Hollywood backlot, a joke, a goof, a delaying tactic, a stall, a
charade, a fake, and a travesty.
The purpose of Amerithrax
is to temporarily distract the American people's attention from the fact that
the
Hatfill
has not the slightest concern that he will ever be arrested in the anthrax
deaths.
Hatfill's mythical traumatized girlfriend will not be doing Larry King or
Barbara Walters, Hatfill will not run out of money
for legal expenses and be reduced to panhandling in the streets, because Uncle
Sam is making sure he's taken care of, and the "growing sense of
excitement" that John Ashcroft cited in the Amerithrax
investigation four months ago will come to nothing, just as it has come to
nothing in the four months since he cited it."
"Why are there no Arabs on
Star Trek?
Because it takes place
in the future."
NativeNewYorker AKA - The Great
Satan…
http://anthrax_hoaxes.tripod.com/
Who posted Korova Milk Bar, The Great
Satan, Allan Quatermain, and FBI Special Agent Dale
Cooper, and
So far on this thread, we have had you here as Korova Milk Bar, The Great Satan, Allan Quatermain,
and FBI Special Agent Dale Cooper. And we also have
Allan Quatermain
Account # 60935
Signup 2001-06-03
Messages 3 replies
The other post was before
Account # 19264
Signup 1999-02-26
And
The Great Satan
Account # 75639
Signup 2001-12-28
And
FBI Special Agent Dale Cooper
Account # 64128
Signup 2001-07-22
And
Korova Milk Bar
Account # 112679
Signup 2003-06-07
Here are some of the
more interesting and complex posts of The Great Satan found on Truthsayer.com:
To: Badabing Badaboom; Mitchell; Fred
Mertz; cgk; aristeides; FairOpinion; Shermy; jpl; pttttt
Interesting. I'd seen the header for that mail when Googling for Michie, but was
never able to call up the whole thing. The "Scorpions" he refers to
are an elite detective squad inaugurated by the South African goverment a few years ago: Scorpions
target South African crime.
It
certainly looks like Dr. John Michie of the
All of
which raises a host of questions. If Michie is a
really an enemy of Hatfill and a genuine
whistle-blower, then Hatfill, Kirby, Bohm are all charlatans. Michie
himself is likely, on that scenario, also a somewhat disturbed individual,
inasmuch as he has been a colleague of Hatfill's
thesis advisor, Bohm, since at least 1989, and
authored a paper with him as recently as 2000. Odd that he would choose to
collaborate scientifically with a man he knew to be a scoundrel and a
charlatan. Odd that he would expose a friend like that, anonymously. Odd that
he would choose to make his case through the medium of Andrew J. Weberman, the eccentric Bob Dylan "garbologist"
whose
There is
another explanation for all this bizarreness, and it is the one I favor. The
e-mail supplied by Michie is, IMHO, a sophisticated
fraud. I say sophisticated, because the author clearly has a good understanding
of molecular biology, and the "inside baseball" talk in the e-mail is
quite impressive, and suggests at the very minimum considerable insight into Hatfill's MSc thesis work. This
stuff is right up my alley, professionally, but I had to dig around a bit to
understand what the "DIAGEN" reference and the "GC clamp"
talk were about -- these details refer to the very specialized Thermal Gradient
Gel Electrophoresis technique Hatfill used for the
Lancet paper and are not, incidentally, discussed in that publication. Aside
from noting the sophistication, one would have to assume that, if the e-mail is
a fraud, the perp is either very confident that he
will not be sued by the three men implicated in gross scientific conduct, and
quite happy to completely trash their reputations -- or, the perp knows perfectly well that none of those individuals
will raise a ruckus about the e-mail, and, even in the unlikely event someone
other than the smeared parties tried to make an issue of it, the whole matter
would soon be exposed as a Internet hoax and melt away in the light of day --
perhaps because the e-mail address in the To: line of the header puts Ralph
Kirby in Taiwan in 1993, when he didn't move to Yang Ming university until ten
years later.
On that
second scenario, the author of the e-mail is likely Steven Jay Hatfill himself. Michie, who is
probably a friend and confidante rather than an arch-foe of Hatfill,
is acting as Hatfill's "cut-out" to feed
superficially incriminating but ultimately toothless "evidence" into
the Communication Stream of Conspiracy Commerce. Hatfill's
Msc thesis advisor, Bohm,
and his PhD thesis advisor, Kirby, are also old friends -- they've authored
many papers together and Kirby was introduced to his wife by Hatfill -- and they are in the know, or at least have been
given a heads up by Hatfill. They know
"everything is under control" and "it's a national security
issue" and Hatfill isn't a
a (sic) cold-blooded murderer, nor is he in any
danger of being railroaded and sent to the
And that
is what my best guess as to what's really going on here. Care to hazard your
own theories?
"In
wartime, truth is so precious that she should always be attended by a bodyguard
of lies." Winston Churchill
182 posted on
To: Shermy; Badabing
Badaboom; Mitchell; Fred Mertz; cgk;
pttttt; jpl; aristeides
"In
wartime, truth is so precious that she should always be attended by a bodyguard
of lies." Winston Churchill
"No
one ever went broke underestimating the intelligence of the American
public." P. T. Barnum
186 posted on
To: Shermy; Fred Mertz; cgk;
Badabing Badaboom
The
timing of the Project Hatfill fits the Daschle
meeting scenario, and, IMO, fits an explanation that
is plausible within established scenarios of bureaucratic politics.
As best
can be determined from public domain sources, the genesis of Project Hatfill was the National Security Council meeting of
October 17, 2001 -- the meeting described on p. 248 of Bob Woodward's
authorized history of the Afghanistan campaign, Bush at War. It was at that meeting that, in
response to an intelligence assessment that the anthrax threats emanated from a
state sponsor of the 9/11 attacks, Vice President Dick Cheney made a decision
that the truth be kept from the American people. Ten days after that meeting
took place, the "domestic terrorism" story
was pump-primed by none other than our old friend, Bob Woodward, writing in the
The rest
is history -- 1984-style history, anyway.
188 posted on
Oddly,
this possible confidential internal communication of freerepublic.com was also
found on Truthsayer.com:
Mr.
Robinson,
As you
know, there has been some give and take on Freerepublic
forums between the person who uses various screen names such as "The Great
Satan", "Clinton's a rapist", etc, and individuals
who challenged his posting under multiple aliases and the meaning of his
"message".
It would
appear that, since an interaction with "TGS" that is challenging and
not of his liking is immediately censored and the poster is banned, Freerepublic has been drawn in to his rant.
We
realize that he is shrewd, intelligent, well read, highly manipulative, a
master of persuasion and probably a big drawing card for Freerepublic.
Nevertheless,
there is clearly a hidden agenda cloaked within his skillfully constructed,
repeated attempts to discredit the Amerithrax
investigation and the FBI Behavioral Profile of the anthrax mailer.
To some
of us his rant is so transparent that we wonder how others cannot see through
it.
Nevertheless,
he continues to make "converts" he now calls his "fans".
We have
no bone to pick with you, Freerepublic nor any Freeper, short of TGS.
He is
apparently able to pull strings at Freerepublic by
addressing his replies to both the challenger AND to Jim Robinson
simultaneously.
The
challenger then gets "flushed" along with any statements he or she
has made.
The
challenger is also banned, insuring no rebuttals.
The
Great Satan is free to distort the challengers
statements in any way he chooses. Nothing is left on the forum for others to
read for themselves and make up their own minds.
This he
has done recently with a posting of
He has
twisted and distorted that tale into what he calls a "death threat",
referencing a Boris Karloff film and a sniper.
Ridiculous!
Of
course, Freepers cannot read the challenger's post
that he so deftly twisted, creating "enemies" and "death
threats" that do not exist.
You
censored it.
Yet you
let him rant on, naming names he contrives and slandering others, as he leaves
his well-planned trail for innocents to follow - right up his coat tails.
If you
object to the challenge, which is your prerogative, why do you permit his
twisted "explanations" to stand?
Yours is
not the only venue in which he is selling his wares.
Who he is and the truth of his game will come out.
It is our
sincere wish that you, Jim Robinson, and Freerepublic
do not suffer loss of credibility, prestige and all that you strive for,
through the selective use of censorship and an apparent alliance with a devious
person whose motives are plainly seen by some and unquestioned by countless
others.
We only
seek the truth. It's just that simple…
This,
too, was on Truthsayer.com and could be from the webmaster of Truthsayer.com:
FAKE
TERROR : "Is terrorism inside the United States really from
outside.....It's the oldest trick in the book, dating back to Roman times;
creating the enemies you need."
These
communications also found on Freerepublic.com and Truthsayer.com
may suggest the ANTHRAX LETTER WRITER IS ALSO A HACKER. The Nimda and Swen worm dates may also suggest that ANTHRAX LETTER WRITER
IS ALSO A HACKER as seen below.
The
multiple posts likely from the same person should especially be noted because
both Nimda & Swen worm
dates may match both Anthrax letter Month and Day postmarked dates with perhaps
bacillus
(anthrax?) in a swen worm from the http://webcrime.tripod.com
link as evidenced below:
WORM:
W32.Swen.A@mm
Discovered
on:
WORM:
discovered on
and is a minor variant of
Swen.A, the mass-mailing worm that started spreading
last month through e-mails falsely claiming to be from Microsoft.
Swen.B is a compressed
version of the original worm and is an attempt to make the worm undetectable to
some anti-virus programs. In addition to this, the majority of
references within the e-mail have been changed from Microsoft to the Italian
ISP Tiscali. Otherwise the original worm and this
variant are very similar.
The worm counts the number of computers
it has infected.
It used its own hit counter at:
http://ww2.fce.vutbr.cz/bin/counter.gif/link=bacillus
NIMDA CODE RED CONNECTION
In September 2001, Nimda raised new alarms by using five different
ways to spread to 450,000 hosts within the first 12 hours.
Nimda seemed to signal a new level of worm sophistication.
It found e-mail addresses from the
computer Web cache and default
Messaging Application Programming
Interface (MAPI) mailbox.
Itsent itself by e-mail with random subjects and an
attachment named
readme.exe. If the target system
supported the automatic execution
of embedded MIME types, the attached
worm would be automatically
executed and infect the target.
It infected Microsoft IIS Web servers,
selected at random, through a
buffer overflow attack called a unicode Web traversal exploit.
It copied itself across open network
shares. On an infected server, the
worm wrote Multipurpose Internet Mail
Extensions (MIME)-encoded
copies of itself to every directory,
including network shares.
It added _JavaScript to Web pages to
infect any Web browsers going
to that Website.
It looked for backdoors left by
previous Code Red II and Sadmind worms
http://search.yahoo.com/search?p=swen.b+discovered+9+October+2003&ei=UTF-8&fr=ush1-mail&x=wrt
http://search.yahoo.com/search?p=swen+discovered&fr=ush1-mail
The conclusion from following link http://webcrime.tripod.com suggests that the Anthrax letter
writer is also a Virus writer and likely an older engineer:
“Premise:
The Anthrax Mailer is a
major
Virus-Trojan-Worm writer.
Premise:
The FBI Behavioral Profile
of the Anthrax Mailer
is accurate.
Then it
would follow that the profile
fits the Virus Writer.”
"Usually, older virus writers work as engineers….”
Some worm and virus writers leave clues
to their identities
in their coding or in some aspect of
their Modus Operandi
link=bacillus
http://webcrime.tripod.com/
(SEE INFO BELOW)
http://search.yahoo.com/search?p=swen+discovered&fr=ush1-mail
Rutgers.edu
as (utgers.edu) and Stanford.edu are on the avoid list of the Mydoom worm; both may use Sun Microsystem
servers, and/or have goverment contracts, but then
why then would Google be on the avoid list? The Mydoom
author may be protecting personal interests and not only opensource,
or free software that Sun may use and may NOT pay taxes on if they give
away software to perhaps induce overpriced hardware purchases (compare IBM's
speed and price to Sun servers and think about what happened to Ebay when it crashed using Sun products for which there may
be about 5 different explanations: patches, software or coding, hardware, lack
of fans and/or airconditioning and/or perhaps
even SECURITY ISSUES that where perhaps resolved after Security
professional was hired?), and much of the software may be BSD, which may be
free from the State of California.
Joy (we will assume that Joy and not a stylist
or his wife put the markings on his face below) tends to flattop and/or
correct his A's as seen below, and most noticeable to me is the A in PENACILIN seems to be flattopped
and corrected, and the Anthrax Letter writer seem to often correct his A's as
done the image of Joy below? Compare the bottom point in JAVA below with flattopped 2nd A in the word, and the flattopped
A's in SAGAN
& Ave oF THE
(5) Compare E in *CRATES with the E in TAKE PENACILIN NOW. (6) Notice the
near lack of white space in the E's in WE HAVE THIS ANTHRAX, and we may see
this again many, many times, perhaps as many as 3 times. (7) Compare
the messy E's in *IMER & FRATERNITEon Joy's face. (8) The T in FRATERNITE seems to match the top slant of the J
in NJ in the LEAHY letter.
(9) The slant of the V in JAVA seems to match the slant of the V's and the
W's in the Anthrax Letters most noticeably in TV;
The same can be true of the N's, L's, C's, F's, P's. (10) The G's in
BUILDING for both SENATOR['s] curve over to almost the
most right horizontal distance of the letters. We do not see the same
thing with Hatfill's G's. (11) However, we
tend to see this especially with the writing on Joy's face with the curved
letters, especially the S's and it is most obvious in the Anthrax Letter's S in
YOU CAN NOT STOP US, and SENAT* where the letters are somewhat squared
off, or could be more smoothed curved. The R's may be disguised in the
Anthrax Letters, but at least one very closely match's both the writing on
Joy's face and the Anthrax Letters and it is seen in SPARC and in PARK (LEAHY);
(12) but there is a tendency to bring the right leg of the R and A below the
base line, and this may perhaps be seen in FRATERNITE, *CRATES and many,
many times in the Anthrax Letters; (13) and in both the O's,
G's (*OCRATES, SAGAN) may tend to be put above the base
line. Whereas, Hatfill's Curved letters tend to
strongly follow the base line. (14) Generally, the curved letters in both
Anthrax Letters and on Joy's face tend to be top heavy, and the curved letters
in Hatfill's suspected handwriting sample tend to be
bottom heavy. Overall, the subtle things in the writing,
such as use of whitespace, slant, and bottom or top
heavy letters may be difficult to disguise because persons become habituated
about those.
Hatfill's 2 does
not match the 2's in the Anthrax Letters!
The so-called hoax letter to The St. Petersburg
Times E matches the E in Leahy’s letter and predated Leahy’s letter, so it may
not be a hoax. Do the E's seem to match
anthrax letters, and G's seem to match Joy's?
I will go
out on a limb and perhaps embarrass myself.
Notice the E in TROXLER below and
then compare it to the E in *KIMER in
the photo of Bill Joy with handwriting on his face below. http://www.forbeswolfe.com/archives/bill_pic.jpg.
They
appear almost identical. I
know that this letter below is not perhaps considered part of the Anthrax
LETTER series (I UNDERSTAND THERE MAY BE EVIDENCE TO SUGGEST THAT GIBE WORM
MATCHES
"The real anthrax killer
sends his condolences to Hatfill over his crushed
toe."
posted
on
(Revenge, Terror and Extortion: A Guide for the Perplexed)
Also
notice that the Ai n HOWARD in the letter below is flattopped. THE DATE
OF THIS LETTER I UNDERSTAND PRECEEDS THAT DATE OF THE LETTER TO LEAHY THAT HAS
A SIMILAR E's SEEN IN THE last E in GREENDALE first and in E in ST. PETERSBURG in the letter immediately below in
the link below. I assume this letter
below to be a nonforged document, which seems to
especially match Joy's suspected G's & R's.
http://www.anthraxinvestigation.com/tb-troxletter.jpg
lhttp://anthrax_hoaxes.tripod.com/ the above image I found at the prior link
and some suspect it is a
hoax, but I doubt that and I rather suspect that the letter to AMI was sent by
the same author as this and the other letters to media and politicians seen in
the link below.
http://www.fbi.gov/pressrel/pressrel01/102301.htm See the last paragraph with the following
quote:
"The fact that Stevens
got inhalation anthrax and that the anthrax was widely distributed (even if it
hopped a ride on a mail cart or copy paper ream) tell you it was weaponized,"
"It's not a great
leap from mailing bugs in snail-mail to mailing bugs in e-mail." -Protection Technologist
The Anthrax Virus Trojan
Worm seems to share the FBI Behavioral Profile of a Virus-Trojan-Worm writer.
Then it would follows that the profile fits older virus writers, which tend
work as engineers or system administrators. Worm and virus writers leave clues,
or leak information unconsciously to their identities in their coding, or in
some aspect of their Modus Operandi. The
link with “bacillus” in it similar to Anthrax “bacillus” was left in the
variants of the Swen worm, which stares month and
date with the variants of the Nimda worm, which uses
backdoors of the code red and Sadmind worms. The Sadmind uses a
vulnerability in the Sun Microsystems’ servers to attack Microsoft’s
servers. Both the Code Red and sadmind worms seem to share an agenda, especially political
and financial, with Bill Joy, and various other worms, and not with the agenda
of Luigi Andrea Warren.
http://theanthraxmuseum.tripod.com/index.html
http://theanthraxmuseum.tripod.com
W32.Sobig.A@mm
Discovered:
swen.C has a bit different set of
text strings mentioning both Tiscali and Microsoft
and also the name of Tiscali's CEO Renato Soru. A few Tiscali links that were present in the B variant were
slightly modified.
The text changes alter some
of the message parts that, in Swen.A, refer to
Microsoft and its activities, and replace them with references to the large
Italian ISP Tiscali.
Luigi cut his teeth writing microcode for an array processor built
by 3Dlabs, back in the days before they were 3Dlabs. He's done infrastructure
projects for Sony Pictures Imageworks and Industrial
Light and Magic, including the first practical hi-res preview system in the
film industry. The latter built on his work as head of software at Viewgraphics, the
My background is software development, a little bit of
it spent in the defense contracting field. I ran into a few of the Pentagon's
backroom boffins (sic) along the way, and got a pretty good
feel for how they think, and what their sense of humor is. I never had any
difficulty picturing how the Hatfill gambit could
have been ginned up to deal with the unprecedented blackmail mooted in the
Saddam scenario.
In recent
years my professional focus has switched from electronics to biology; I'm now
in the fourth year of a PhD in the subject. My antenna went up when I saw the
story about Hatfill's allegedly bogus research at
Needless to
say, what I'm proposing doesn't sit well with certain people, and various
attempts have been made to muddy the waters, intimidate me, cause problems for
me at work and in my career, etc. The pretext for all this, no doubt, would be
that poor Dr. Hatfill has had his life ruined by
nosey, do-gooding scientists, by John Ashcroft, and
by out-of-control federal agents. And I'm here to tell you, that's bunk, BS, crapola. Hatfill is a spook (read
Richard Preston's 1999 interview); when this is over,
he will go back to being a spook. And the rest of us will be none the wiser.
Luigi A.
Warren…The Hatfill Project…Leading Windows NT Programmer Luigi Warren…
http://theanthraxmuseum.tripod.com/id11.html
Luigi Warren Games Credited
Zork: Grand Inquisitor (1997), Activision,
Inc.
Magic spells are hidden all
over the Underground. These spells are automatically added to the player's
spell book as they are discovered, and include rezrov,
throck, obidil
and snavig. See Zork Magic for details on these spells, many of which
originated in Infocom's original series of Zork and Enchanter games.
http://en.wikipedia.org/wiki/Zork_Grand_Inquisitor
Possible relevant Official
Spells are bittyjoo make lies undetectable (and
vaporize chocolate); zimbor = turn one really big
city into lots of tiny, little ashes…
An Unnamed Spells is turn[ing] embarrassing photo invisible…
An Unofficial Spells are ledak
= detect forgery; mortin = cause the immediate death
of the caster; shazok = call lightning from storm; urbzig = turn a dangerous object into a harmless one taclor = heal wounds; zikkle =
possibly make invisible things appear.
http://en.wikipedia.org/wiki/Zork_Magic
The Luigi Andrea
("Anthrax")
Mar. 4, 2002
Feb. 24, 2003
(There were also minor follow-up variants released on
Why draw attention to these earlier dates? I don't know, but that attention to
the earlier Gibe-worm release dates is a predictable consequence of the later Swen releases on the anthrax anniversary dates. In this
theory 3(b), it's as if someone is saying: "Look at the release
dates!"
My guess is that it's just a coincidence - Possibility 1.
As you can see, the
Before proceeding, a
bit on the Nimda worm: It is known that the
destructive Nimda worm was released on Sept. 18,
2001, exactly one week after the 9/11 attack (one week to the minute, as
closely as one can tell). The destructiveness of this worm on the heels of 9/11
was sufficient that John Ashcroft made a televised statement on Sept. 18 that
the worm was not known to be terrorist-related. Something no one knew on
that date was that
"To: Khan Noonian Singh; genefromjersey;
John Faust; Battle Axe; Allan; Shermy; TrebleRebel
So what observations have *you* noticed that you have not posted or that may
not be known widely?
Here's something I noticed.
Khan, in a posting of yours in July, 2004, you made the claim that there was an
"ineffective anthrax attack at end of February of 2003." You then
elaborated, as follows:
"Has been dubbed weaponised
or semiweaponised.
Was thought to have encompassed both
a letter campaign with threatening messages and an outdoor delivery trial.
Best estimate of date is
Links: http://www.freerepublic.com/focus/f-news/1165194/posts?page=112#112 and
http://www.freerepublic.com/focus/f-news/1165194/posts?page=145#145
What I noticed was that the same date (
http://theanthraxmuseum.tripod.com/id8.html
http://theanthraxmuseum.tripod.com/
http://anthraxmanifesto.tripod.com/
"The real anthrax killer
sends his condolences to Hatfill over his crushed
toe."
posted
on
(Revenge, Terror and Extortion: A Guide for the Perplexed)
"I don't know why
everybody is so obsessed with finding someone other
than
Saddam to pin this on. "
The
Great Satan
What
if the anthrax were engineered to be resistant to certain antibiotics.
Is there a chance "piggy backing"
antibiotics would offer a better chance.
I purchased
I understand the concept of
genetic polymorphism.
I suggest you read the article before you pontificate about this.
I refer you, in particular, to Figures 1 and 2, and the accompanying
legends."
30 posted on
I know from personal,
professional experience that adding antibiotic resistance to bacteria is a
trivial matter -- all it takes is a $500 kit. I don't know, and haven't been
able to find out, if it's as easy to engineer resistance to the new like Cipro and Doxy as it is to penicillin or ampicillan (sic).
70 posted on
"Oh
dear. Better hope he doesn't have anything
genetically-engineered to evade the vaccine.
I use
genetically-engineered viruses in my work, and it is rather frightening how
easy it is with current technology to play mix and match with these things.
For instance, it is quite routine to take an ecotrophic
virus (one that only infects a single species) and turn into an amphitrophic virus (one that infects a wide range of
species) simply by swapping out the genes that code for the coat proteins. If
Saddam is operating at that level of technology, I venture to say we could lose
about a third of the population in the coming showdown -- comparable to a
full-scale nuclear exchange.
If he has only conventional
smallpox, anthrax, botulism, etc., then we may be able to contain the threat to
something manageable (sic) by building up our civil defense infrastructure
(sic). Even then, I don't think we're near that point -- perhaps in a couple of
years. I expect Bush to keep up the rhetorical heat on Saddam and pursue every
avenue to put the squeeze on him, including military pressure, but I thing
those who are expecting a big assault in the next 12 months will be
disappointed.
"Indeed. Here's my executive
summary:
They looked at genetic markers in seven cultures of the
Four of the
Three of the
The 1997 goat substrain represents an outgroup vis--vis
the USDA anthrax.
(Actually, you don't need
to see the markers to figure this out, of course.) The Florida
anthrax did not come from the
And that's all you can say,
based on the genotyping evidence."
Blog@ZipLip.Com
http://luigiwarren.blogspot.com/2006_06_01_luigiwarren_archive.html
http://luigiwarren.blogspot.com/2006_05_01_luigiwarren_archive.html
http://anthraxmanifesto.tripod.com/anthrax-manifesto/id2.html
http://luigiwarren.blogspot.com/2006_04_01_luigiwarren_archive.html
Luigi Andrea Warren
Name: Luigi Andrea Warren
Stanford Mail Code: 5444
Organization: University
Relationship: Staff
Position: Casual - Non-Exempt
Department: Bioengineering
Profiles of the anthrax
terrorists:
The unidentified "anthrax terrorist" is most likely two people: the
"supplier" who obtained the
Profile of the anthrax
supplier:
Here's
some clues: http://www.ph.ucla.edu/epi/bioter/pursuithatfill.html
Profile of the anthrax
refiner/mailer:
http://theanthraxmuseum.tripod.com/
http://anthraxmanifesto.tripod.com/
Re:Luigi Warren is the
Great Satan? (Score:0)
This Luigi guy has a couple
of interesting MP3s up on his blog. There's this one,
by a fellow called Stuart Jacobsen, who apparently workd
for
http://www.angelfire.com/ex/projecthatfill/images/StuartJacobsen120903.mp3
This Jacobsen guy sounds
scared out of wits, like he told Luigi some deep dark secret which mustn't be
revealed, and Luigi revealed it. What was all that about? Any
idea?
[
Reply
| In Reply To ]
Re:Luigi Warren is the
Great Satan? (Score:0)
I found out what Stuart
Jacobsen was so up in arms about -- he sounds at death's door in that voicemail, doesn't he? Seems Jacobsen collaborated with
"I have heard from a
usually reliable source that one of Matsumoto's sources for the
"polymerized glass" story was none other than Dr David Kelly. You'll
recall that Kelly,
Jacobsen
told Luigi a number of other intersting things he
learned from Matsumoto and a few other people -- like Hatfill's
lawyer, Tom Connolly -- during several months of hour-long phone conversations
and innumerable e-mails stretching back to 2002.
Seems that somebody's been trying to harass Luigi, calling up his coworkers,
making threatening noises, etc., and Luigi has decided the safest thing is to
go public with everything he knows. Sounds reasonable to me.
Let the chips fall where they may, that's what I always say.
"THE GREAT SATAN" Re-Emerges
!!
Posted on
Those of you who may have
missed the mysterious postings,ravings,etc,
of THE GREAT SATAN will be delighted to hear he has re-emerged, now calls
himself LUIGI WARREN ,and claims to be a biology student at UCLA.
He also makes the
"modest" (by TGS standards) claim to have solved the Anthrax Letters
case when all others have failed.
I'll give you a small clue:
He apparently feels everybody who published anything on the topic was on the
CIA payroll.
I'm sure the folks on the
forum he posts to will believe him implicitly...
http://hatfill.blogspot.com/
http://the_ricin_solution.tripod.com/id6.html
Anthrax at AMI traveled via
copiers
Posted by The
Great Satan to cookcounty
On News/Activism
Didn't the press report
last fall that the
There have been
contradictory reports on that. The fact that Stevens got inhalation anthrax and
that the anthrax was widely distributed (even if it hopped a ride on a mail
cart or copy paper ream) tell you it was weaponized,
unlike the brown, granular anthrax sent to the NYC media outlets, which caused
only non-life-threatening cutaneous anthrax. That is,
in itself, rather remarkable, because it makes AMI even more of an odd-man out
in the media-directed letter campaign. Why send lethal anthrax to a
*@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.*