6101
Living Room / Re: According To FBI, Internet Privacy Now Considered Suspicious
« Last post by Renegade on February 04, 2012, 09:19 AM »For those interested in laughing a hell of a lot more, the basic indicators of terrorist activities above have been pushed out to pretty much everyone you can imagine.
e.g. Hotels. Martial arts academies. Internet cafes. <insert any industry here />
More on Internet cafes:
http://www.osceola.o...rning_indicators.cfm
Martial arts & paintball:
http://info.publicin...ts_and_Paintball.pdf
Surplus stores:
http://oathkeepers.o...oFBISurplusStore.pdf
WARNING - YOU MAY JUST SHIT YOURSELF LAUGHING - PREPARE YOURSELF - YOU HAVE BEEN WARNED!
Farm Supply Stores:
http://agr.wa.gov/Fo...FarmSupplyStores.pdf
For more eye-popping fun and insanity, have a little search for "communities against terrorism potential indicators of terrorist activities":
http://www.google.co...terrorist+activities
BTW - I bought a copy of the Anarchist Cookbook when I was a kid. I haven't blown up any government buildings lately, so it might just be that I'm not a terrorist... Though I do use VPNs and encryption and... OH MY GOD! I AM A TERRORIST! AND I DIDN'T EVEN KNOW IT!!! Where can I turn myself in?
e.g. Hotels. Martial arts academies. Internet cafes. <insert any industry here />
More on Internet cafes:
http://www.osceola.o...rning_indicators.cfm
Insanity
Communities Against Terrorism
Potential Indicators of Terrorist Activities Related to Internet Café
What Should I Consider Suspicious?
People Who:
Are overly concerned about privacy, attempts to shield the screen from view of others
Always pay cash or use credit card(s) in different name(s)
Apparently use tradecraft: lookout, blocker or someone to distract employees
Act nervous or suspicious behavior inconsistent with activities
Are observed switching SIM cards in cell phone or use of multiple cell phones
Travel illogical distance to use Internet Café
Activities on Computer Indicate:
Evidence of a residential based internet provider (signs on to Comcast, AOL, etc.)
Use of anonymizers, portals, or other means to shield IP address
Suspicious or coded writings, use of code word sheets, cryptic ledgers, etc.
Encryption or use of software to hide encrypted data in digital photos, etc.
Suspicious communications using VOIP or communicating through a PC game
User Computers To:
Download content of extreme/radical nature with violent themes
Gather information about vulnerable infrastructure or obtain photos, maps or diagrams of transportation, sporting venues, or populated locations
Purchase chemicals, acids, hydrogen peroxide, acetone, fertilizer, etc.
Download or transfer files with "how-to" content such as:
Content of extreme/radical nature with violent themes
Anarchist Cookbook, explosives or weapons information
Military tactics, equipment manuals, chemical or biological information
Terrorist/revolutionary literature
Preoccupation with press coverage of terrorist attacks
Defensive tactics, police or government information
Information about timers, electronics, or remote transmitters / receivers
Note: It is important to remember that just because someone's speech, actions, beliefs, appearance, or way of life is different, it does not mean that he or she is suspicious.
What Should I Do?
Be Part of the Solution
Gather information about individuals without drawing attention to yourself
Identify license plates, vehicle description, names used, languages spoken, ethnicity, etc.
Do not collect metadata, content, or search electronic communications of individuals
Do not do additional logging of on-line activity or monitor communications
If something seems wrong, notify law enforcement authorities.
Do not jeopardize your safety or the safety of others.
Preventing terrorism is a community effort. By learning what to look for, you can make a positive contribution in the fight against terrorism. The partnership between the community and law enforcement is essential to the success of anti-terrorism efforts.
Some of the activities, taken individually, could be innocent and must be examined by law enforcement professionals in a larger context to determine whether there is a basis to investigate. The activities outlined on this handout are by no means all-inclusive but have been compiled from a review of terrorist events over several years.
Osceola County Sheriff's Office
Potential Indicators of Terrorist Activities Related to Internet Café
What Should I Consider Suspicious?
People Who:
Are overly concerned about privacy, attempts to shield the screen from view of others
Always pay cash or use credit card(s) in different name(s)
Apparently use tradecraft: lookout, blocker or someone to distract employees
Act nervous or suspicious behavior inconsistent with activities
Are observed switching SIM cards in cell phone or use of multiple cell phones
Travel illogical distance to use Internet Café
Activities on Computer Indicate:
Evidence of a residential based internet provider (signs on to Comcast, AOL, etc.)
Use of anonymizers, portals, or other means to shield IP address
Suspicious or coded writings, use of code word sheets, cryptic ledgers, etc.
Encryption or use of software to hide encrypted data in digital photos, etc.
Suspicious communications using VOIP or communicating through a PC game
User Computers To:
Download content of extreme/radical nature with violent themes
Gather information about vulnerable infrastructure or obtain photos, maps or diagrams of transportation, sporting venues, or populated locations
Purchase chemicals, acids, hydrogen peroxide, acetone, fertilizer, etc.
Download or transfer files with "how-to" content such as:
Content of extreme/radical nature with violent themes
Anarchist Cookbook, explosives or weapons information
Military tactics, equipment manuals, chemical or biological information
Terrorist/revolutionary literature
Preoccupation with press coverage of terrorist attacks
Defensive tactics, police or government information
Information about timers, electronics, or remote transmitters / receivers
Note: It is important to remember that just because someone's speech, actions, beliefs, appearance, or way of life is different, it does not mean that he or she is suspicious.
What Should I Do?
Be Part of the Solution
Gather information about individuals without drawing attention to yourself
Identify license plates, vehicle description, names used, languages spoken, ethnicity, etc.
Do not collect metadata, content, or search electronic communications of individuals
Do not do additional logging of on-line activity or monitor communications
If something seems wrong, notify law enforcement authorities.
Do not jeopardize your safety or the safety of others.
Preventing terrorism is a community effort. By learning what to look for, you can make a positive contribution in the fight against terrorism. The partnership between the community and law enforcement is essential to the success of anti-terrorism efforts.
Some of the activities, taken individually, could be innocent and must be examined by law enforcement professionals in a larger context to determine whether there is a basis to investigate. The activities outlined on this handout are by no means all-inclusive but have been compiled from a review of terrorist events over several years.
Osceola County Sheriff's Office
Martial arts & paintball:
http://info.publicin...ts_and_Paintball.pdf
Surplus stores:
http://oathkeepers.o...oFBISurplusStore.pdf
WARNING - YOU MAY JUST SHIT YOURSELF LAUGHING - PREPARE YOURSELF - YOU HAVE BEEN WARNED!
Farm Supply Stores:
http://agr.wa.gov/Fo...FarmSupplyStores.pdf
New customer...
For more eye-popping fun and insanity, have a little search for "communities against terrorism potential indicators of terrorist activities":
http://www.google.co...terrorist+activities
BTW - I bought a copy of the Anarchist Cookbook when I was a kid. I haven't blown up any government buildings lately, so it might just be that I'm not a terrorist... Though I do use VPNs and encryption and... OH MY GOD! I AM A TERRORIST! AND I DIDN'T EVEN KNOW IT!!! Where can I turn myself in?

