D ID MEN IN BLACK HIJACK
The Original proparanoid.com?

Back to Home Page

 
Beware The Web Pirates!

This article will explain:

What happened to the original proparanoid.com Web site
How domain name hijacking (cybersquatting) works
How activists Web sites are suppressed by hijacking
How to see it coming if a deliberate attack strategy
What proxy domain name registry is and why it is a bad thing
Who is involved in Web piracy 
Multiple indicators that military-intelligence community is involved
Why proparanoid.com was targeted by hijackers
How everyone is a victim
What to do about it 
Note: Colored words are 'first use' key words or concepts

Did Men in Black Hijack proparanoid.com?  Someone did!

You, the reader, can decide if they are covertly funded by MIIM, the Military-Industrial-Intelligence-Media complex. My suspicion is, when it can't suppress the truth adequately, government operatives steal it. I can't quite prove it in court, YET, but the means is at hand for we activists and investigative writers who might be targeted now or in the near future. Everyone needs to be warned, not just those who have such sites, but THEIR VISITORS, who may find themselves instead visiting an intelligence community site where visits could be covertly logged. This is true even though the new resulting 'generic' site merely states '(Web site) is under construction.' 
 
 

If your Web pages point to proparanoid.com - consider this graphic a simplified link-repair solution, just link it to proparanoid.NET





The bad guys want $157,800 to get proparanoid.com back. DO NOT VISIT proparanoid.com: there is nothing there but unfriendlies that might track your visit and a bogus search engine.  Instead, visit the new proparanoid.NET, the replacement pending return of the hijacked site. The ridiculous nature of this absurd ransom sum, when it is rare to charge even $1,000 in 'normal' cybersquatting domain name sales, is an indication of just how badly they want to keep me 'off the air.' I told them "I don't pay blackmail/ransom to government operatives, I expose them." This article seeks to do just that, though as more is learned, this page may be updated. FULL PERMISSIONS to reproduce this page in full or in part with credits and link to proparanoid.NET are hereby granted -- please so advise. Spread the word, because anyone can become a victim, including those seeking to go to a targeted site and find themselves being misdirected or turned away empty handed by men in black with ulterior motives.
 
 

If you would like to nominate a site as worthy of the Good Light Award, let me know.

If your Web site has been awarded the Good Light Awared, please substitute this graphic and an appropriate link.




Why was the site hijacked?  We may never know for sure, but it took place just weeks after prerecording a Sphinx Radio show with host William Kennedy, providing promotional Web material to Michael Corbin's A Closer Look radio show, and contacting Coast to Coast AM's George Noory -- all regarding the planned release of my new book, Fatal Rebirth. Also immediately thereafter, Michael Corbin suffered numerous mysteries involving vandalism of his station's security system, a fire in his apartment, and a hit-and-run on his car. Hmm… come to think of it both of my cars engines blew up in the same week! Regardless of any relationships, de facto censorship was achieved, even if just a delaying tactic (proparanoid.NET and fatalrebirth.com were established, though a total loss of hit volume and site income nearly bankrupted me -- making $157,800 all that more impossible).
 
 

IF YOU ARE ALSO AN ACTIVIST VICTIM OR CAN ADD ANYTHING TO MY UNDERSTANDING OF THE MATTERS ON THIS PAGE, CONTACT ME!

George Tenet and Donald Rumsfeld: Web Pirates?
Tenet was head of CIA at time of hijack
Donald was about six miles away




Navigational headings in this article:

  1. Introduction

  2. How as site is hijacked (background)

  3. The principle players (background)

  4. How activist site hijacking works

  5. Politically motivated or legitimate business?
        Victims would rather fight than pay
       Arbitration example #1: inept defense
       Arbitration example #2: charges 

  6. Is there evidence suggesting targeting?

  7. Is there evidence of conspiracy?

  8. Is there evidence of SPAM attacks?
       The SPAM Russians is coming
       Federal SPAM investigation

  9. Is there evidence of military-intelligence?
       Front trait: Multiple firms same address
       Front trait: Excessive security
       Hillary Clinton-CIA-Iraq connection?
       Military connections?
       Terrorist Web sites
       Flock of proprietaries: Vulture's nest
       Front trait: More bedfellows

10. Evidence of a pattern of deceit and fraud?
       CIA porn?
       Fraud in name only
       Specific fraud charges
       Fraud summary: Fight back
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Like the background image? 
It comes from a cool shirt (jersey) you can order it at <http://www.kucharik.com/jersey.htm>  The shirt does not come with red eyes, I added that. I also made the stunning silver-white bones and web very dark. Consider ordering one and having it modified with "Alternative Identity, Web Pirates!"


How a site is hijacked: Background for the lay Web user

There are many ways to achieve a hijacking, but all revolve around a central theme of lapsed domain name registry (renewal of the registry of the domain name). In my case, the hijacking methods used illustrate the calculated nature of the mechanism and reveal the intent was as a political weapon. But to understand any of this, the reader must have a good grasp of basic Web mechanics. So I must first offer a little background on Web domain names so no one will be confused or left behind in the dust of Internet jargon.

A Web site name is called a domain name, and it must be 'registered' in order for people to be able to access it on the Internet.  Registration makes it legally the property of the registrant, much like a trade name or business name, and the registration provides all necessary facilitation of the Web processes which allow a Web browser to 'find' the Web site by simply typing in its name, often called the URL (Uniform Resource Locator, which might make more sense if thought of as Unique Reference Location). In essence, the name is 'looked up' to find the true IP address, which is a numerical Internet Provider code which 'points' directly to the correct Web server where the files (the Web pages in question) are stored. You can see who owns a given Web site (normally) by typing in their name or IP address into any of the WHO IS search tools (type WHO IS into your favorite search engine). The system works, and works perfectly well… almost.

To hijack a Web site would only require the changing of these numbers to some other server, where an entirely different content or purpose might be encountered. However, since registration is also ownership, any such change would normally be a criminal act, and one easily detected and dealt with by the true owner and/or the registry service. The registry service is usually a victim, too, because if found culpable they could loose their business. So this form of hijacking is rare.  When it happens, it is usually for short-term gain and is the result of hacking or perhaps an angry employee, or similar dirty deeds which are easy to uncover.

Registration is sometimes undertaken to 'reserve' a name for possible future use, or perhaps for profit. This is often called 'parking' or 'cybersquatting.'  Such registrations are in hopes that someone else will want that name, in which case it can be 'sold' or transferred to the new owner for cash payment. In the early days when the Web was growing at a faster rate, parking could be quite profitable, especially if someone knew of a large firm that had not yet jumped onto the Web but which should. A person could register 'GeneralElectric.com' for instance, in hopes that when the deep-pockets firm wanted a Web presence, they would be willing to pay big bucks to get it. 

Sometimes that worked, if not asking too much money. More often than not, the big firm simply sued to get the name ("You can't register that name, it is our legal property as a registered trade name!") or chose an equally useful alternative such as 'GeneralElectric.net' or 'GE.com.' An example is that the same firm involved in my hijacking tried to park on usbank.us, and would have sold it for $30, but US BANK preferred to spend five digits to take it by legal action. It's not nice to fool around with Mutha' F*!

With new .us, .biz, .name, and other .such-and-such variations, the combinations are endless and thus squatting for profit is less profitable now than it has ever been. One would have to literally register dozens of variations to truly lock up a potential name for just one possible sale, and that means hundreds of dollars a year in renewable registration fees for each potential sale. The value of a name is usually a few hundred to perhaps a few thousand dollars, though there have been larger sums paid in the old days. All prices are almost always subject to negotiation — or heated exchanges which force legal recourse. It is a dangerous and risky game.

But registration is fleeting, needing to be 'renewed' each year, though one can prepay for multiple years, usually at a discount. When a registration expires, if it is not renewed, the name becomes available for use by someone else, though such reuse seldom makes a lot of sense: if the name had a lot of 'recognition' and traffic, it is likely there was some high degree of loyalty to the former owner of the name, and there would be danger of great resentment to finding a new owner. Unless the new owner was offering something better than the original, it would be risky. No one likes to feel like they've been sidetracked into a pretender's lair to do business by some form of electronic manipulation. Likewise, once a Web domain name has been around for a while, it assumes its own trademark identity in real legal terms, and subject to legal recourse.

More Background: The Principle Players                                                                                        Return to Top

As a last point of explanation, we need to talk about domain registrars in more specific detail. When the Department of Defense's DARPA (Defense Advanced Research Projects Agency) turned the Internet over to the public (and you though Al Gore invented it?), they created something called the InterNIC to manage access, which resulted a 'private' corporation staffed with 'ex' military and intelligence types. This was eventually to become known as Network Solutions. They were originally the ONLY game in town. Roughly a decade later, their monopoly was broken through legal action and competitors were allowed to play, including Alternative Identity, one of the firms playing a key role in all the hijackings in question. Even Network Solutions, in turn, spawned a new firm called Verisign. 

Network Solutions & company is bit of a spooky outfit that, in addition to providing domain name registry, seems to be the ONE central place that ALL Web site calls goes through regardless of where in the world the call originates from or where the destination Web site is located. So, if anyone WAS tracking Web surfing activities, THIS would be the way to do it, and these would be the people behind arranging it, the people with the needed resources (spooks, funding, experts), and a motive (government spying on citizens). Of course, the government does not want to spy on us (Cheshire grin), and therefore, there is no reason to worry about this possibility. Besides, that is not our focus, here, but it is useful to know the players as well as possible. 

Alternative Identity is different, however. The whole INTENT of domain registry is not only to prove who owns the name, but to make them RESPONSIBLE for it. If you have a real world storefront or "brick and mortar" business name, you have a responsibility to conduct fair business practices, or be held accountable. The MEANS for holding firms accountable is based on being able to IDENTIFY the owner through their registration with the State Corporation Commissioner (or similar, every state has some such agency). In fact, in a business name registration, it is required that there be a legal contact person and address used for serving legal papers and notices. This is all public record information to allow anyone seeking recourse for a wrong to obtain it. If it were not public, business crooks could get away with atrocious behavior because you could never know who to sue or file charges against.

Internet registry is SUPPOSED to be like that, too, and for the same exact reasons. What Alternative Identity does is to offer anonymous (often called 'proxy') domain name registration services, which is completely contrary to the original intent of registration. They become the sole contact point and refuse under any means short of law enforcement intervention (warrant) to reveal who owns a domain name. They might pass a complaint or inquiry along to the owner, but the owner is not obligated or expected to respond, able to 'hide' behind AI's protective interference. They sell and promote anonymity on the notion of 'personal security' against 'Web stalkers,' but this is a thinly veiled excuse. Thus whenever legal steps are taken in CIVIL matters, Alternative Identity is the sole representative, and they generally choose NOT to respond, leaving it up to the domain owner to choose to defend, or not. More on what that translates to in another section. But it is the relationship between Alternative Identity and Network Solutions which may need some examination.

There is a long list of gripes and complaints about Network Solutions within the industry and by customers which are important to know about, as it is Network Solutions who was my registrar. They are not squeaky clean and are, according to many other victims are, hijacking suspects, too. These complaints include matters relating to fraud and negligence, specifically having to do with expiration and renewal of domain names. Imagine this: you are a Network Solutions customer and you get a polite 'courtesy warning' from Verisign (as if they were your domain registry service) stating your domain name is about to expire (when it is more than a year away) and give you instructions for renewal which are, in fact, disguised orders to cancel with Network Solutions and move to (Network Solutions) Verisign at a HIGHER rate. They did this not only with their own customers, but hundreds of thousands of customers of other registrars. They were even sued for the offense.

It is the registration renewal issue which can become the central tool for hijacking, especially when Network Solutions and Alternative Identity are involved, as they both apparently stand to benefit from a hijacking, and it is even possible there is collusion between them at some level according to some victims. More on that in another section, too. The question is, how do you cause someone to fail to register so you can hijack? There are apparently lots of ways, as mentioned earlier, ways made much easier if you are a registrar like Network Solutions and Alternative Identity, and willing to play games with user accounts. This is especially true, perhaps, when one wants to move to a different registrar to save money (Network Solutions and Verisign charge up to 3 times as much as some others). And, when it comes to activists, there just might be a surefire way to implement set the stage for (enable) such tricks…

How Activist Site Hijacking Works:                                                                                                   Return to Top

Activists tend to be under funded and overworked. I don't know very many of them who are terribly good at management duties with respect to their Web presence, especially the business and technical sides. That includes me. I can run a retail chain or an international marketing operation flawlessly, but ask me to manage my checkbook against bills, and I screw it up. It may also be true that activists tend to procrastinate, perhaps because we are too busy working on the latest 'battle' to be bothered with mere business details. I know that is true of me. These traits are likely found in the psychological profile of any given activist.

Activists have special problems, as a rule, and any well organized enemy would likely know of this and take advantage. One way government (via the intelligence community) routinely takes advantage is to create psychological profiles for anyone who stands visibly opposed to abuse of power in government. They will go to great lengths to create a profile on an activist or protester who gets in their cross hairs. This will include everything from the mundane matters just described to sexual habits and how they react when cut off on the freeway. Detailed personal observation and surveillance can be involved, even to include cameras in the bedroom. With a profile in hand, it can be accurately predicted as to just how the subject will react in a given situation. This is scientific fact, and CIA has a special computer program and a lot of psychologists on staff just to facilitate such determinations. Learn more in my books, The Professional Paranoid, 2nd edition, or its sequel on political control technology, MC Realities.

As a result, they know our activist weaknesses and move to take advantage of them in calculated ways. As we tend to fit a generic 'mold' there are surely enough things in common that certain procedures can be calculated to have good effect against the majority of us.  If that were true, it would be a simple matter to create businesses (front operations) designed to take advantage in specific ways, or simply modify an existing firm in some way suitable for the same capabilities. That may be what has happened here. More on the firms involved, later, that you may decide for yourself. 

But first, the steps undertaken by these firms with respect to hijacking must be reviewed. The hijacking would seem to involve a plan based on a methodical process roughly two years long.  That figure is based on consistencies in multiple examples, and is well within the norms of intelligence community strategy and use of profiles. Of course, any given activist might have unique circumstances that might allow variations on a theme, or even skipping some of the steps. For my hijacking and, according to Web postings by other victims, it apparently works like this:

Step one: Massive spam/virus attacks. A normal day for me in the early days would see between 30-100 legitimate e-mail contacts from Web site visitors and clients. There might be 5-20 assorted spam messages on a bad spam day. There would be typically 10 Nigerian scam spams for a given week (I'm exceptionally targeted because I offer more information on them than does the Secret Service, and I reveal possible ties of the scam directly to the intelligence community), and unless there was a current Web-wide virus infection underway, I would get 3-10 virus e-mails a week. This was all very manageable. 

Slowly, so as not to arouse too much attention, the spam levels began rising until out of control. Toward the end, I got as many as 200 spams a day, as many as 10 Nigerian scams a day, and perhaps 50 virus e-mails. The same exact message (in any of the spam, virus, nigerian categories) could originate from as many as 15 or 20 different (seemingly bogus) points of origin/senders on a given day.  The net effect was to make it harder and harder to find the legitimate e-mail, and harder and harder for spam filters to avoid accidental identification of true mail as spam.

Step Two: CARNIVORE. Carnivore is the Federal Bureau of Investigation's covertly installed (supposedly requires a warrant) e-mail surveillance tool created in the early days of antiterrorism legislation (pre 911). Allegedly aimed at terrorism, it is believed by many fellow paranoids (activists) that virtually every e-mail server in the US has a Carnivore attached to it by now. Carnivore has become the focus of an international furor which has been completely ignored by FBI and government in general, and allowed to die down to a dull whimpering roar. After all, there are newer and fresher wrongs to start yelling about almost every month.

I and others have long held that the reason FBI has refused to make public its code for their Carnivore software is that it did something MORE than merely filter e-mail of 'warrant' targets for possible 'evidence.' We believe it is intended, as the name implies, to selectively allow the 'eating' of e-mail to prevent it from reaching destination, and we also believe it will filter all the e-mail on the entire hosting mail server, which is well outside of the mandate of any legal warrant. This is not, IMO, a tool intended to result in prosecution of criminals, but primarily aimed at activists and other government critics, or anyone they wish to limit in terms of access to information (such as the truth). So you sent an e-mail to a web site and never got an answer or an error message?  Do you think an activist would ignore your interest?  Think again. 

In my case, synchronous with the growth in spam attacks, it seemed my regular Web visitors and clients began failing to 'write me.'  Slowly but surely the number legitimate e-mails a day dropped further and further. Over the space of two years the numbers have continually dropped despite the fact that Web hits have increased. There is also some evidence that mail sent me and mail I've sent was altered prior to a late delivery. Additionally, some e-mail, once read, simply vanishes from the mail folders after some period of time. Again, this is for mail I've sent as well as received. Many activists complain of vanishing and altered e-mail. Life is fun, when you make waves. Splash, splash…

Statistically, My Web site is more popular than ever, with tens of thousands of visitors each month, and more when I do a radio show. Try a thousand in an hour! The average visitor of a typical Web site, according to Web site promotion services, visits for only a few seconds ("Nope! Not what I wanted…") and visits something just over one times (i.e., 1.3 visits), seldom bothering to go on to more than one additional page ("Might be what I want"). My visitors AVERAGE 1.3 hours per visit and 5 plus visits, each visit looking at page after page. Just one file alone has had over 12 million downloads (The 25 Rules of Disinformation)! So why, in the last days, have my legitimate e-mails numbered less than 5 a week? Today, I get none. NOT ONE LEGITIMATE E-MAIL, except for test messages to myself. Not even from people who include me on their DAILY group mailings. This was remedied when I obtained a new ISP for my mail, forcing the 'other side' to start all over. 

SOMETHING was eating them. In fact, over the last few years, at least a half dozen clients have gone out of their way to reach me by postal mail or alternate e-mail means specifically to say they are sending e-mail and I'm not responding -- because I never got the mail.  This, too, makes it harder and harder to find legitimate mail amid the spam -- to the point where eventually, there was no legitimate mail to find, at all. In point of fact, it has completely stopped 100% of my Web-based income, and is an actionable matter, if deliberate meddling can be proven. Actually, the mechanics of the theft of the Web site may well provide the needed means for such a proof, so let us continue. If this turns out to be the case, everyone effected (clients and others who tried to reach me) could join in such a suite: a class action suit, which could be for multimillions of dollars, and are generally easier to win, and much easier to staff with lawyers willing to jump in for a cut as opposed to regular billing. Stay tuned to this station…

Step Three: Enable the theft via domain registry expiration. When my domain registry neared expiration, I was sent e-mail notices that renewal payments were due . There were also a few mailed pieces through the post office (in the past, I even had some from Verisign), but these were sent so early as to be ignored. I don't need and can't use a three-month advance notice, since I, like every activist I know, tend to procrastinate. The e-mail versions were mostly treated as spam by the heavy-handed spam filters (they fit the profile of spam -- full of marketing information and links). The few that did get through were visually missed since they also LOOKED like spam at a glance. Thus, my domain registry expired, and I didn't even know it. Hundreds of people (or more) were apparently e-mailing me to say my Site was missing or down, but I didn't get any of those messages, because CARNIVORE (or something) was eating them. Burp!
 

Note: The first three steps could be replaced by other opportunities. As it happens, there are about a half-dozen ways a Web master can either screw up or be tricked into doing or failing to do something which will end up in failure to renew or which invalidates the renewal or even the current registration. There are things the registrar can do to aid in that, especially if wanting to prematurely invalidate a registration (such as simply changing the contact information of the owner and then claiming it is inaccurate and in violation of the agreement). It appears that there are mechanisms deliberately in place at The NIC and at Alternative Identity which can INSTANTLY take advantage and proceed directly to step four once a registry is no longer valid. There have been levied charges against both firms for various combinations of all of the above over the years, but proof is hard to come by -- they hold all the records that would be useful as proof. Na-na na-na-na!


However, it is interesting that other victims who have shared the full details of their story tell of the same spam attack methodology. This is especially interesting when Alternative Identity and its sister firm, Direct NIC, specifically cater to and host spammers, often using the very same stolen domain names for the purpose (deliberately damaging the reputation of the original owners). How hard would it be for a registrar to arrange for a spam attack? There are enough ways, especially if also hosting the Web domains of the spammers, that the answer which serves best, here, is "not too difficult." More on this, later.

Step Four: Domain name put up for sale as 'available' by the domain registrar. So, THEY put my domain up for sale, and I didn't even know it. It must be a 'hot' property, as it apparently sold within minutes, which is the common way of these things. That can only be the case if the system is specifically designed to facilitate it, a kind of collusion. The registrars want it that way. They enable and seek hijacking for fun and (extra) profit. So I ask, how much further would they go to enable it? Premeditated spamming is just one additional step to someone who thinks that way, a kind of 'insurance policy' to help insure hijacking will be possible.

Step Five: Domain name purchased. Within minutes of expiration, the spooky outfit 'Alternative Identity' had 'facilitated' the purchase of my domain name AND instantly mounted a Web site 'under construction' at their sister Web hosting company, Direct Nic. These are just two of several business names used by CEO Sigmund Solares, all of which are under the umbrella Corporate name of New Orleans Leftover Data Centers (NOLD C),  also known as simply, NOLD. Due to the speed of the transaction, it appears that there must be some close working relationship between these firms and The NIC, or how else would they even know to act?  Again, both firms need to work together in some way to facilitate. I'm thinking that sounds a lot like conspiracy, or at least some form of FTC violation, but it is apparently legal, especially if victims can't access internal documents. Then, two more odd things happened.

Step Six: Ransom (blackmail) Note:  Alternative Identity kindly informed me that they would sell me back my own domain name for $157,800. This is all perfectly legal, mind you, though there are some interesting legal ramifications discussed later. This contact was kind of unusual because it was delivered to my personal e-mail address, and what makes that unusual is that I did not contact them to give them that address, and it is not generally public information. Funny how this came to be, unless perhaps Carnivore assisted. Almost synchronous with this was an offer to pay me a COMMISSION of $6.57 for the sale of my domain name by Network Solutions to Alternative Identity.  Hey! How about I sell proparanoid.NET for $150K leaving a quick $7K profit to the buyers? I'll gladly pay you $6.57 commission if you can find a buyer for me!

Further more, both of these messages then mysteriously vanished from my mail folders, and are not found in my deleted mail folder, which has yet to be 'emptied' into the trash. More suspected Carnivore symptoms. Fortunately, I had already copied the blackmail message to my word processor, shown in the next section.

Is it Politically Motivated, or a Legitimate Business Tactic?                                                                      Return to Top

Domain names do expire, accidentally and otherwise. There are people who do reregister (cybersquat) expired domains for profit. There are activists who find their domain names hijacked in this way. It is infuriating, to be sure. But non of this proves ill intent by some unknown third party for other than profit motive. It does not prove a conspiracy, or criminal intent. It does not prove government involvement. It does not prove anything except that an unfortunate situation exists -- unless…

There are some questions to ask that might determine a given specific case was some form of conspiracy, perhaps government fomented or backed at some level. There would have to be some unusual characteristics of such a situation, things which would NOT be true for 'legitimate' hijackings. So I have a couple of questions.

 
1)  Was the hijacking for profit, or to kill the site altogether?


About the $157,800. This is an unusual number in two respects. One, it is an odd figure to ask, and two, it is way (to the nth power) too high. Most domain names which successfully sell go for a few hundred to perhaps a few thousand, depending on their marketing value -- IF THEY SELL AT ALL. Information available on 'cybersquatting' suggests that sales are rare now days altogether. Anyone able to afford an exorbitantly large sum can afford to sue or come up with a similar or alternative name from somewhere else, as already mentioned. This implies that they HAD to make it for sale (or ulterior motives would be even more clear) so they deliberately chose an impossible figure.

Where a domain name IS purchased, price is dependent on VALUE.  A name like "warts.com" would be quite marketable to anyone in  the medical trade treating warts and would sell better than a name based on a nonsense word such as "prowarts." And, there are more medical firms seeking to reach more 'warted' customers than there are people in my line of work, for which there are again far fewer (hopefully) afflicted victims. Too, the word wart (and paranoid) has meaning and intuitively tells you what the site is about, and will be a direct hit on a search engine (very marketable concept). A nonsense word like prowart or proparanoid will, at best, be an indirect match at the bottom of the list (unless someone already knows the word and what it means, and is using for that very reason to obtain a precise match without a lot of search engine clutter 'misses'). I have spent more than a decade making proparanoid known to those in need, but the average Joe still has no clue. It is not a high demand term, and it is ONLY valuable to ME. 

Thus we might ask why so much?  Because, perhaps, it is impossible to pay. That is to say, they want to shut down proparanoid and make it inaccessible to the public. They don't want the truth offered there exposed. They don't want people who need my help to be able to even know the help is available, much less actually get it. The odd sum almost makes it seem, in my mind, as if completely off the wall -- a figure made up out of the blue by someone thinking it amusing, perhaps. But they did have to cite a figure to make it least look like a legitimate business offer.

As stated, this is all perfectly legal, of course, except perhaps for one thing. The WORD proparanoid is copyright protected, and a de facto trade mark. I invented and defined the word in my writings and on my very home page. Thus there may be some legal recourse, and this is being researched. I'm considering asking punitive damages for copyright infringement of $10,000 a day. Then of course, there is the loss of income aspect, and punitive damages.  We will see what the lawyer's suggest is doable. The blackmail note follows:
 

From support@noldc.com Fri May  6 14:34:37 2005
Received: from webmail. directnic.com ([204.251.10.136])
          by rwcrmxc14.comcast.net (rwcrmxc14) with SMTP
          id <20050505122235r1400is92de>; Thu, 5 May 2005 12:22:35 +0000
X-Originating-IP: [204.251.10.136]
Received: (qmail 3096 invoked by uid 99); 5 May 2005 12:29:25 -0000
Date: 5 May 2005 12:29:25 -0000
Message-ID: <20050505122925.3095.qmail@webmail.directnic.com>
To: [REDACTED]
Subject: proparanoid.com
Received: from (204.251.2.220)
From: "support@noldc.com" <support@noldc.com>
MIME-Version: 1.0
X-Sender: <support@noldc.com>
X-Mailer: directNIC Webmail
X-Priority: 3
Reply-To: "support@noldc.com" <support@noldc.com>
Content-Type: text/plain; charset=us-ascii

Hello,

The domain proparanoid.com is using our Domain Name Contact Services at Alternative Identity. We have contacted the owners and apprised them of your interest. They have agreed to sell you the domain name proparanoid.net for US $157,300. There will be an escrow service fee of US $500 that must be applied to the final price of the domain name. Total price of the domain name will be US $157,800. If this is an acceptable price, please send wire, money order or certified or cashiers check (international checks please add an additional US $50 processing fee), which must be made payable to Alternative Identity, to:

Alternative Identity
838 Camp St., 4th Floor
New Orleans, Louisiana 70130

(Note: The domain is currently with Network Solutions and you will need to request a transfer from the registrar of your choice. We will confirm this transfer request upon receipt and clearance of payment.)

Thank-you for your interest.

Sincerely-
Alternative Identity
 

Now, compare how much they are asking from me to other sites they have hijacked. Here is the pertinent sections of the messages sent to two who DID inquire about getting their names back:
 
The domain tc-alumni.com is using our Domain Name Contact Services at NOLDC, Inc. We have contacted the owners and apprised them of your interest.  They have agreed to sell you the domain name tc-alumni.com for US $350. There will be an escrow service fee of US $30 that must be applied to the final price of the domain name.  Total price of the domain name will be US $380…

The domain sauceage.org is using our Domain Name Contact Services at NOLDC, Inc. We have contacted the owners and apprised them of your interest. They have agreed to  sell you the domain name sauceage.org for US $350. There will be an escrow service  fee of US $30 that must be applied to the final price of the domain name. Total price  of the domain name will be US $380…


I've found several other examples, some of which were for even less money. Only one of these many victims deemed to pay the blackmail, which was $230. That one sale could in no way could cover the costs of any legitimate parking fees on the remaining Web sites reported hijacked and not repurchased (but then, there are charges that they don't actually PAY for the parking in the first place -- see the section on Fraud and Conspiracy). 
 

Victims prefer to fight rather than pay                                                                                             Return to Top

Additionally, 'parking' tends to fail on legal grounds, where the victim can afford to pursue the matter that way. Here are sample charges against NOLDC by complainants electing arbitration through any of several available resources. Other, virtually identical samples were also found, almost all of them finding against NOLDC. In fact, the CEO of Alternative Identity himself states that 'virtually all arbitration findings are in favor of the complainant.'  He should know, as is apparently a fool under an old adage about lawyers, for he is also his own firm's lawyer: "A lawyer who represents himself has a fool for a client." Here is an example of Sigmund Solares' foolishness in the first of two excerpts from two example rulings. The second example is chosen to specifically highlight the findings on Bad Faith.
 

First Arbitration Example: Inept Defense
 

3. Procedural History

On April 26, 2002, the Complaint was received by the WIPO Arbitration and Mediation Center ("the Center") by e-mail and in hard copy on April 30, 2002.

In accordance with Paragraph 4(a) of the Rules for Startup Trademark Opposition Policy for .BIZ ("the STOP Rules") the Center verified that the Complaint satisfied the formal requirements of the Startup Trademark Opposition Policy for .BIZ ("the STOP Policy"), the STOP Rules and the WIPO Supplemental STOP Rules and that payment in the required amount had been paid by the Complainant.

 On May 7, 2002, the Center sent a Notification of STOP Complaint and Commencement of Administrative Proceeding to the Respondent by post/courier (with enclosures) and by e-mail (Complaint without attachments). A copy of said Notification was sent to the authorized representative of the Complainant by e-mail. Further copies of said Notification were sent to the Internet Corporation for Assigned Names and Numbers (ICANN) and to the Registrar by e-mail.

Said Notification of Complaint and Commencement of Administrative Proceeding inter alia advised the Respondent that this Administrative Proceeding had commenced on May 7, 2002, and that the Respondent was required to submit a Response to the Center on or before May 27, 2002.

No Response was received by the Center and on May 29, 2002, the Center sent a Notification of Respondent Default to the Respondent by post/courier and by e-mail. A copy of said Notification of Respondent Default was on the same date sent to the authorized representative of the Complainant by e-mail.

On May 29, 2002, there followed an exchange of e-mail correspondence between a Mr. Sigmund Solares and the Center. Mr. Solares complained that the documentation sent by the Center to the Respondent was incorrect and that there was an incorrect deadline set for the Response. The Center checked the documentation sent and confirmed that both the documentation and the deadline for filing the Response were in fact correct and complied with the STOP Policy, the Stop Rules and WIPO Supplemental STOP Rules.

On June 6, 2002, after having received a Statement of Acceptance and Declaration of Impartiality from him in accordance with paragraph 7 of the Rules, the Center proceeded to appoint James Bridgeman as the Administrative Panel. On the same day the case file was transmitted to the Administrative Panel.

In the view of the Administrative Panel, proper procedures were followed and this Administrative Panel was properly constituted.

4. Factual Background:  The Complainant claims to be the owner of Benelux Trademark Registration number 463888 for CONSTRUCTOR in international classes 6,7 and 20.

There is no information about the Respondent except the address and contact details as found on the Registrar's records set out in the Complaint.
 

Second Arbitration Example: Bad Faith
 
Bad Faith (in this arbitration, the original owner of the domain suffered loss of respect and business, as the hijacked domain, under Alternative Identity's protection, was converted into a porn site! This was deemed bad faith acquisition of the domain name, but it also illustrated as it shows the duplicity between the public image Sigmund Solares' firms portray vs. what they really do. Here they defended a pornographer, but publicly they claim to defend victims of this kind of domain abuse - more later.
  
Paragraph 4(b) of the STOP Policy sets out the following examples of circumstances that will be considered by an Administrative Panel to be evidence of the bad faith registration and use of a domain name  viz. circumstances indicating : 

(i) that the domain name was registered or acquired primarily for the purpose of selling, renting, or otherwise transferring the domain name registration to the Complainant or to a competitor of the Complainant, for valuable consideration in excess of the Respondent's out-of-pocket costs directly related to the domain name; or 

(ii) that the Respondent registered the domain name in order to prevent the Complainant from reflecting the mark in a corresponding domain name; or  

(iii) the Respondent registered the domain name primarily for the purpose of disrupting the business (of complaintant)…  

2) Is there evidence suggesting a targeting pattern?                                                                     Return to Top


I refer you to the five-step process earlier described. The question is, are there other examples?  If there are, then there may be something to the notion, especially if it can be shown that there is something unusual about the methodology which ties directly to the SAME participants in some way.  We have all of that, here.

I am not the only activist victim. The firms involved have also participated in hijacking of at least four activist sites known to me, including talkingaboutreligion.com,  a discussion site which waxed political in nature. They have even targeted and hijacked foreign sites such as humandrightswatchgermany.org. Altogether, I have uncovered by GOOGLE search about five pages worth of sites taken over by these same people (some of which are possiblly activist sites unknown to me). Changing search criteria slightly finds even more. It is an iceberg for which I do not have the time and resources to fully guage its true size.

So some number greater than four of these are undoubtedly activist or critical of government in nature. Hower, to date, I've only encountered one of these where the owner of the Web site realized it may have been a deliberate takeover and who understood and talked openly any about the specific means, which was exactly the way my site was taken over. The rest simply wandered away into oblivion not suspecting they might have been deliberately targeted. Thus, any others who have been thus targeted and come to realize it as a result of this document, please contact me at once, and we can compare notes and plan a war council. I have not released everything I know, here -- I like to have ammunition in reserve, and to bait my enemy into making false assumptions. And, I want to know more. MUCH MORE!

A clue that the above process is an actual tactic is found in this quote from the Web master of nimud.org, who lost his Web site in an identical fashion: "For longtime fans, you might be wondering 'what happened to nimud.org'? The answer: capitalism. Nimud.org was purchased when I tried to transfer it from Network Solutions to Godaddy. I was a little spammed to death and a bit broke at the time the domains came up for renewal…"

3) Is there evidence to suggest a conspiracy?


The notion of complicity on the part of Alternative Identity cannot be overlooked. Indeed, it begs to be examined. I find several levels or layers of culpability, and propose several sub questions to get closer to the truth in the matter, the answers to which address the larger question just posed. If they are merely someone else's agent for registry, that is one thing. But if they actively participated in any of the earlier steps, that is another, and implies conspiracy. Likewise, if they cooperatively conspired with Network Solutions in some way. Of course, only a confession access to internal documents could afford concrete proof. Short of that, we must look for smoke to see if the building exhibits signs of fire. So, what does smoke look like?

a) Is there any evidence of involvement with spam attacks?                                                   Return to Top


Someone caused a dramatic increase in spam attacks. While it is possible for the military or the intelligence community to 'custom' create a mechanism for generating large sums of spam, it would be simplest if they could somehow control or access (redirect the focus) of existing spammer systems. This would require some interaction with (cooperation) with some centralized concentration of spammers. As it happens, Alternative Identity exactly caters to spammers with their policy  of offering domain owner covert identity. Spammers NEED to hide their identity as much as they possibly can.

A casual search of the Web will show that NOLD C, and under other of its names, is indeed responsible for significant spam on the Web. Rhyolite.com, which operates extensive mailbox server systems, has set server level filters to block dozens of NOLD registered .coms including both NOLDC.com and yet another of NOLD's  firms, Intercosmos Media Group and its .com,  Intercosmos.com. In fact, NOLD was responsible for so many that it was assigned two 'group identifier' groups,  #50 and #259 among 400 other such spam 'collectives.' One might ask if a domain name registrar should be in the business of spam under ANY circumstances? Well, yes, if perhaps a primary covert function is use of spam to hijack Web sites.  From Rhyolite:

Group #50 and #259 of related unwelcome domains and IP address: The following domain names and IP addresses have appeared at one time or another to be related by owner, URLs advertised in unsolicited bulk mail (spam), service providers, or other characteristics…
 
 

  20w.com  
carmen1208@hotmail.com Intercosmos 
  aa18.com  
carmen1208@hotmail.com Intercosmos 
  aerowebb.com  
Perrenial Corp Curagao
  aspenhosting.com  
Intercosmos Media Group 
  bannerless-host.com  
Johny Derwin Optin Magick
  belize-hosting.com  
Johny Derwin Bulldozer Networks
  dns2you.com  
Intercosmos Media Group 
 erotica-mail.net  
Perrenial Corp Curagao
  ezisphosting.net  
Perrenial Corp Curagao
  freehostnetwork.com  
Intercosmos Media Group 
  freemember.us  
Peter Turner Email Offers NY
  freepornconnect.com  
Saint Thomas Virgin Islands
  freepornmall.com  
Saint Thomas Virgin Islands
 GetDrugs.com  
Perrenial Corp Curagao
  globalremoves.net  
Perrenial Corp Curagao
  intercosmos.com  
Intercosmos Media Group New Orleans
  nationalleadbroker.net  
Tropicana Ave Las Vega
  nationwidefinancial.org  
Tropicana Ave Las Vega
  nettaxfree.com  
Jeff Jenks Intercosmos Media Group 
  PalaceX.com  
Samuel LeHardy Waynesboro PA
   suphosting.com  
Susan Hayes Los Angeles
   tvdiscounts-online.com  
Intercosmos Media Group 
  wetpalace.com  
Samuel LeHardy Waynesboro PA
  04desember.com  
NOLDC New Orleans noldc@04desember.com
  2platinumandbeyond.com 
NOLDC New Orleans
  bmypc.com  
NOLDC New Orleans
  eastofatlanta.com  
NOLDC New Orleans
  epromotionad.com  
NOLDC New Orleans
  hkwire.com  
NOLDC New Orleans
  hollowaysoftware.com  
NOLDC New Orleans
  kbjrmail.com  
NOLDC New Orleans
  ksee24mail.com  
NOLDC New Orleans noldc@04desember.com
  libanismail.com  
NOLDC New Orleans noldc@04desember.com
  michelle-yu.com  
NOLDC alternativeidentity.com New Orleans
  noldc.com  
NOLDC New Orleans
  surftimemag.com  
NOLDC New Orleans noldc@04desember.com

That was just one diligent Web host doing an excellent job of protecting clients. Another, Ackadia.com, lists Intercosmos (NOLD under another name) as the second biggest spammer in their 2003 comparisons, with 'scores' of domain names involved -- so many, they don't list them by name, but by I.P. block addresses (IP Range 64.119.192.0 ~ 64.119.223.255). The capacity of that block is (223-192 = 31 * 256) nearly 8,000 potential spammer domains established at Intercosmos.  Now, assigning a block of IP addresses to any given function, reveals deliberate, organized, methodical dedication to the function -- and tons of money for the purpose.
 
 

The (Spam) Russians Are Coming!
Then there is <http://www.webservertalk.com/message1038765.html> where we find that there is a Russian Spam Gang tied to Intercosmos. This could be the Russian Mafia, a collective of ex KGB, or a bunch of independent Soviets not yet intimidated into submitting control of their operation over to the MAFIA or KGB types. From what I know of ex KGB, most of them have been recruited into CIA partnerships.  Thus, between theirs and ours, the Mafia leaves them alone, or itself partners with them in the way the US Mafia partners with CIA. 

This is all made more interesting by where the word "Intercosmos" originates. It is Russian, having both to do with the Soviet space program, and according to one source, a KGB project tied to satellites. I'm sure this is just another  coincidence, but it makes for interesting reading. Really. Coincidence.

Federal Spam 'Investigation'                                                                                                       Return to Top


Another telling example is part of an official investigation by the government, as charges were levied against NOLDC regarding spam to sell drugs. We can expect there will be no resulting actions against NOLD as it is likely a government friendly operation (IMO).  You will, in fact, note that NOLD's part is essentially censored from the complaint, in that instead of listing the firm, it lists the Web site and its registered address (NOLDC's address, 838 Camp Street), the very last on the list, again. Do you believe the Federal Government actually couldn't identify NOLD as owner of the address in their entire investigation, but I could in 60 seconds on the Web? Or is it a matter of someone being anointed, that they may more easily walk between the rain drops? More coincidence, no doubt.

The complaints seem to be tied to the promotion and sale of drugs of the type marketed by lots of spammers. The document comes from <http://makunu.com/browse/show/110318>.
 

FOR FURTHER INFORMATION CONTACT: Jay H. Reiziss, Esq., Office of Unfair Import Investigations, U.S. International Trade Commission, telephone 202-205-2579. 
    Authority: The authority for institution of this investigation is contained in section 337 of the Tariff Act of 1930, as amended, and in section 210.10 of the Commission''s Rules of Practice and Procedure, 19 CFR 210.10 (2004).
    Scope of Investigation: Having considered the complaint, the U.S. International Trade Commission, on May 9, 2005, Ordered that--
    (1) Pursuant to subsection (b) of section 337 of the Tariff Act of 1930, as amended, an investigation be instituted to determine whether there is a violation of subsection (a)(1)(B) of section 337 in the importation into the United States, the sale for importation, or the sale within the United States after importation of certain tadalafil or any salt or solvate thereof, or products containing same, by reason of infringement of one or more of claims 1-4, 6-8, and 12-13 of U.S. 
Patent No. 5,859,006, and whether an industry in the United States exists as required by subsection (a)(2) of section 337.
    (2) For the purpose of the investigation so instituted, the following are hereby named as parties upon which this notice of investigation shall be served:
    (a) The complainant is--
    Lilly ICOS LLC, 1209 Orange Street, Wilmington, DE 19801.
    (b) The respondents are the following companies alleged to be in violation of section 337 and upon which the complaint is to be served:
    Pharmacy4u.us, Attn: Dave Fox, 166 W. 44th Street, New York, NY 10282, Santovittorio Holdings Ltd, d/b/a Inhousepharmacy.co.uk.
    Apartado 6-6305 El Dorado, El Dorado, Panama, Expressgeneric, 722 8th Cross, 11th Main H.A.L. 2nd Stage, Bangalore, Karnataka 560008 IN.
    India, Stop4rx, Box 1246 Port-au-Prince, Port-au-Prince, FE 123182, Haiti.
    Cutprice Pills, c/o Domains By Proxy, Inc., 15111 N. Hayden Road, Suite 160, PMB353, Scottsdale, AZ 85260.
    Allpills.us, Attn: Gerard Gibson, Madisson 12, Beverly Hills, CA 90210.
    Generic Cialis Pharmacy, Del Parque Central 200 N, Managua, Nicaragua, Rx Mex-Com, S.A. de C.V., Avenida Lazaro Cardenas 4207, Colonia Las Brisas, Monterrey 64780, Mexico.
    Budget Medicines Pty Ltd., 2 Brierwood Place, French''s Forest, Sydney, 2068, Australia.
  http://www.nudewfds.info, 838 Camp Street, Apartment C, New Orleans, LA 70130.


The domains cited thus far in answer to this question are but a tiny fraction of the literal thousands of spam operators who have elected to register through Alternative Identity. After all, no one better protects their interests from prying eyes and investigations, civil suits, etc. In speculation: who better than a domain registrar then, who also happens to HOST the bulk of its clients on its own ISP server (DirectNIC, the Web host for virtually ALL the hijacked Web sites, is an Alternative Identity dba), to orchestrate focused spam attacks on a given target? 

It would be even easier if, (as Alternative Identity's Direct NIC does) the registrar/ISP ALSO offered its hosted-in-house Web clients a broad range of off-the-shelf and CUSTOM marketing software solutions, able to 'automate' such attacks, a task which could be easier through simple to achieve back door access. Thus, the actual spammers might not even be responsible, directly, were they using modified software designed to unleash them like robotic attack dogs. A search of the Web will produce a long list of press releases on software tools for Direct NIC customers, though non of them would dare mention spamming support as a feature. Thus, this is mere hypothetical conjecture as to how such a thing might be done by someone seeking to target Web sites with spam.

b) Is there evidence of involvement with the military-intelligence community?                      Return to Top


As with CIA fronts, there is never any direct evidence, but there are an uncomfortable number of indicators to suggest such ties may exist.  A little background is again in order to frame the question. Alternative Identity is an interesting firm. It was set up shortly after CIA formed a capital investment outfit called In-Q-Tel, which was specifically formed to fund establishment of businesses friendly to the needs of the intelligence community. Some would say 'fronts' or 'proprietaries,' but that was not the intended focus of such investments. It was simply to help establish firms which would conduct business useful to CIA -- just like a proprietary, but not… sort of.

CIA's fund was originally intended to be named In-Q-It. You can see the importance of the word "It" at CIA's own Web site <http://www.cia.gov/cia/publications/inqtel/#space>, which shows the rollout date was in 1999, well before the founding of NOLD's myriad of dba names. At the bottom of the page, NOTE #1 even shows the original In-Q-It name. Why didn't they use that name?

Ironically, SOMEONE had apparently parked on ALL variations of the original In-Q-It name (.com, .net, .org) shortly after the CIA announced formation of the firm. Yours truly never was contacted about releasing the domains. They instead elected to ignore me, and rename the firm -- which goes to show just how unprofitable cybersquatting really can be. OK, I lost $60 bucks.  The chuckles it bought me were worth much more than that! Yet no one contacted me to renew, the site apparently 'magically' hijacked back into CIA ownership, a feat which would require cooperation of the registrar. Gee, I seem to remember the search engine sending me to DirectNic's Web page for 'under construction' sites.

At this time I have no knowledge of how Alternative Identity was funded, or by whom. I do know it was started by NOLDC in 2002, shortly after CIA actually started handing out money. And, I seem to remember that when I first tried to find the new CIA Web site for In-Q-Tel, it was at the time hosed by Direct Nic using the same 'under construction' Web page as used by hijacked sites. At best, it would be highly speculative to presume CIA funding a possibility with nothing more to go on. What is needed, is something more concrete, something additional to suggest intelligence ties. In my book, Fatal Rebirth, I discuss the traits of a CIA proprietary, having uncovered nearly a dozen of them locally in my investigations of crimes of the intelligence community. Understand. There are no 'legitimate' CIA proprietaries. CIA was ordered out of the proprietary world by Congress, selling their companies to 'civilians' (who just happened to be retired CIA). For new proprietaries, they simply invest (fund) new firms and put their key people in place on the Boards of Directors, and elsewhere. Of course, an 'ex' operative has a better chance at funding, than one who is not.
 

Proprietary Trait: Multiple Firms Same Address


One trait of a front is multiple firm names for the same business, and/or multiple (otherwise unrelated) firms at the same address. At 838 Camp Street, we find this trait illustrated. Granted that any legitimate firm might have holding companies, dba's, and different corporate names for divisions, but that is not quite what we have going on, here — where there are additionally duplications. We find NOLDC, the financial parent (likes to buy closed data centers) which also operates as Intercosmos Media Group (a domain registrar), which also operates as Alternative Identity (yet another domain registrar), which also operates as Direct NIC (an ISP host), which also operates as Zipa (yet another ISP host). So they certainly have multiple names at the same address -- though Zipa quickly relocated to Enron's Broadband facilities, and we find Direct NIC is there, too. 

Enron, it turns out, started out in life as Hughes Tools, an oil-industry giant which was taken over (infiltrated and operated, eventually owned) by CIA in my history book (Fatal Rebirth). That puts a whole new light on the Enron swindles, doesn't it. Funny no one in Congress or media has dared mention these little facts, though the history is documented in books (earlier) written by CIA experts such as Jim Hougan, John Marks, and Victor Marchetti. How else do you suppose CIA front Evergreen Air wound up with Hughes' most prized possession, the Spruce Goose? In the Enron facilities, Zipa inherited a ton of special Internet access provisioning hardware/wiring, a matter which interests me greatly — and will make a good deal of sense, shortly. In fact, the Enron relationship with Zipa and Direct NIC is very worthwhile reading, as it provides a great deal of illumination on the inner workings of these firms. But I digress from multiple names…

It is odd enough to conduct business under a blizzard of names from the same location(s). But what about multiple unrelated firms at the same address? Well, it is a large building, but they list their address as 838 Camp Street as well as 838 C Camp Street. So if they can be reached with just the primary address, that leads me to presume that whatever other addresses (i.e., B, D, E, etc., are ALSO somehow theirs. How else could a poor postman cope?  Especially if the other firms ALSO list the same primary address — or is this standard fair for addressing multiple unrelated businesses in the same building? There are several who do share NOLD's address, and some that interest me more than the others.

One such firm is called Daisy Dukes, which is a Junior Apparel Importer according to Trade-India.com. But that is the only mention of the firm anywhere on the Web. All GOOGLE will find is reference to the Dukes of Hazard TV show character, Daisy Dukes. What kind of firm fails to advertise itself with a Web presence when it literally resides in 'Web Central?" There is a trait of CIA proprietaries which could prove the answer:  They don't advertise because they have no need -- they don't have legitimate customers, don't even want them. They only need the veneer of a business (also called a business shell, or shell company). 

But perhaps this is merely a 'vanity business' for Vivian Solares, who as Sigmund's wife, is also listed publicly as working for his firms (presumed partner, as press released describe Solares ventures as 'family owned'). Keeping the little woman busy doing whatever hobby she wants (even a business) is often a ploy used by the rich to free up time for other activities, typically extramarital. Or perhaps, as is often true, there is a Husband and wife team working together for Agency in New Orleans on Company business. I've seen this trait before, as CIA likes to keep agents where they can watch each other very closely. Again, this is documented by other experts on CIA, such as Jim Hougan in his book, Spooks. Either possibility might leave us with a firm not in need of advertising or other traditional business trappings. On that note, I ask about Daisy Dukes promoting its business to India:

What kind of firm gives as its address as the address of a bigger firm when doing 'business' in another country?  Again, another trait of CIA proprietaries. When Agency wants to infiltrate a foreign country with agents, it sometimes gives them a cover as a salesman for a bogus firm (ask James Bond). For this to work, there must be some 'evidence' the firm exists, such as a mention in the trades (tradeindia, for instance) and some kind of real-world address and phone number in case anyone checks up. What is NOT needed is a real-world office or a warehouse, employees, or customers. All you need is a phone and a desk, and that can be anywhere, but likely, will be placed in some other CIA front for convenience sake. This is fully demonstrable in the large number of CIA proprietaries which operated out of the same location as the National Intelligence Academy in Florida in the days prior to its total destruction by Hurricane Andrew. There was this hotel that was also a manufacturer of electronics and an news distribution outlet and a… well, you get the idea.
 

Proprietary Trait: Excessive Security

Return to Top


There is another trait indicator to be found in excessive security. For instance, one firm researched locally had an elevator that only worked with a key, doors leading from the public access office area had no door knobs and required a push of a hidden button to open, and a cyclone fence around its property with razor wire at the top -- angled in BOTH directions. Now it is true that a Web server location is a secure location. Generally, you can't get past locked doors to actually access the servers themselves. But in EVERY instance where I've ever dealt with a server company, including Broadband, they've always had an office area open to the public. 

But according to Joseph E. Kean, who tried to visit NOLDC to file complaints in person, YOU CAN'T GET INTO THE BUILDING AT ALL. It is manned AND locked 24-7, but no matter what you do at the front door, the people inside ignore you and won't let you in.  While non of the server locations I've been to were like that, there was ONE PLACE where I experienced a similar situation. It WAS a CIA proprietary. Unless you have prearranged permission to get in, as I did (to discuss suspicion of another firm they were associated with being a proprietary, an adventure described in my latest book set, Fatal Rebirth), you can't get past the front door. Does Kean's description as follows, dated 04/02, sound like a legitimate business, to you?
 

"I was directed to DirectNic by an unscrupulous Web hosting company that has now turned my site into a porn site. I have been trying to get Directnic to block access to the site since early January. It is now March 5th. They will not respond by e-mail or telephone. It looks like I will now have to go to my wallet to hire lawyers to fix this. In the meantime, my reputation built over 32 years is being trashed. Directnic Tel: 504-679-5170 Vivian Solares ext. 551. Owner/CEO Sigmund Solares. I sent a representative to the office (650 Poydras St., Ste. 2311, New Orleans, LA) and the door was locked and no one would answer although it was obvious that people were there. The security guard in the lobby said it is staffed 24/7. These people have registered such domains as TimothyMcVeigh.com & bombWTC.com. Draw your own conclusions."


Now, here is the spooky part of that statement.  The address is NOT 838 Camp Street. What address is it? It is 650 Poydras St. That address AT THAT TIME belonged to ENRON, the very address it was claimed that Zipa (and at times when Sigmund couldn't get his details straight in public statements, Intercosmos) bought from ENRON in October of the NEXT year. Thus NOLDC was working closely with, within, or for, or under ENRON Broadband all along. Zipa didn't 'buy' the facilities, it WAS the facilities. This is solid evidence of a tie with another CIA front, if you accept my premise regarding Hughes Tools. 

Why would Alternative Identity/Direct NIC CEO Sigmund Solares go out of his way to create endless press releases about creating Zipa and then making it sound like they bought and moved into, and renovated these premises AFTER DirectNIC was already there. This would only make sense if covering something up, such as a covert operation. In fact, Solares specifically stated publicly that Direct NIC was running out of space and looking for something new just prior to the announcements. If you run out of space, does moving out of and back into the same space with yet another firm somehow give you more room? There is deliberate deceit, here, also an Agency trait (more examples to come). 
 

Hillary Clinton-CIA-Iraq Connection?
And, if his wife, who is likely in fact to be Sigmund's business partner, was actually over at Poydras, I guess we can rule out the vanity business angle for Daisy Dukes. But wait… there is yet another mystery and one more firm name associated with Vivian Solares. It seems that she is listed as a credit/trade reference for a construction firm called Donnahue Favret. The only problem is, the reference indicates Vivian works not in the Poydras facility for her husband, but for the world's largest concrete company, Lafarge Concrete, which operates in 75 countries. A phone number is given for her where she apparently (at least at the time) had a desk in the New Orleans offices of LaFarge some ten miles from Poydras/Camp streets. Of course, we don't really know where that phone is located, or why. Could this be an additional clue that there are fronts involved? YES!

From J. Orlin Grabbe, author-publisher and former U. of Pennsylvania professor turned intelligence guru/insider with expertise in cryptology and security we lean something about Lafarge.  His pointed article Hillary Clinton, Lafarge, and Kennametal, reveals that Hillary was, while at Rose Law and wife to Governor Clinton, a director at Lafarge. He (and as confirmed from two other resources of mine retired from NSA) points  out Lafarge subsidiaries and Hillary were involved in illegal weapon sales to Iraq involving CIA proprietaries (i.e., Kennametal). My sources indicated Hillary had just before invested a modest low five-didget sum in the proprietary just in time to reap a high six-didget return after the deal. This all dovetails neatly, according to Grabbe, with the Vince Foster murder, the NSA, questionable political support and business dealings with the Red Chinesse, and Banking Transactions Spying during the Clinton White House. 

And who else is Lafarge involved with? Non other than the nefarious and CIA enmeshed Carlyle Group, which now outright owns former Lafarge subsidiaries. In fact, at least one director at Lafarge, Oscar Fanjul, is also on the Board at Carlyle. Cozy, eh? Kennametal, of course, went on to infiltrate China as business partner with the Red government, much the at least three CIA proprietaries have done before them. Full circle, et. al, we find Carlyle Group and Enron (Solares?) were business buddies, too. Is there anyone in the CIA Solares has no ties with?
 

Military Intelligence Connections?                                                                                       Return to Top
There is a more interesting potential tie to the intelligence community. At least one other company uses the 838 Camp Street address, as listed for one of their registered agents. The fellow is a management type for a company which is a military contractor in the area of software. His firm, Plexos International, is affiliated with and works for Quantico,which is FBI's training facility now under US Marine occupation (co-headquartered, as if there was no such thing as a Police State coming). They have similar ties with other military contractors and law enforcement.  Their specialty is database software, and in addition to the military/law enforcement industries, they cater to the large oil firms, who provide their bread and butter.  Hmm…  that's the second oil firm associated with Solares family interests. Wonder if these all these bedfellows know the Bush family?

Now, if there is any CIA connection, the words database and CIA put together spell PROMIS, a database software developed by CIA for extremely broad sales under an ENDLESS stream of evolving products and company names to unsuspecting clients… clients who, by installing the software, were providing backdoor access to CIA and anyone else hip to the deed (i.e., military intelligence). Now in fairness, Plexos does not seem to fit the profile of the normal PROMIS purveyor, since their client focus seems rather narrow and includes other intelligence resources (though it is also common for a proprietary to cite bogus clients of such 'prestige' to better 'legitimize' their existence, or even to have actual 'contracts' with such governmental resources which funnel funds into the proprietary as a means of avoiding Congressional oversight). Regardless, whenever I see military or intelligence community ties to a database firm, I get nervous about the darker possibilities. My hunch about Plexos, thus far invalidated by a lack of proof, is that they are ramping up for Homeland Security applications, where PROMIS would have, well… great PROMISE. Here is a registered agent listing for PLEXOS featuring a Mr., Hook, who as 'Member' is a full partner in Plexos, but working out of offices at 838 Camp Street: 
 

35832642K  12/10/2004  PLEXOS INTERNATIONAL, L.L.C.  12437 CARDEZA AVE.  BATON ROUGE, LA  70816
               Agent:   DAVID F. ODOM  12437 CARDEZA AVE.  BATON ROUGE, LA  70816
               Member/Manager   DAVID F. ODOM, Manager  12437 CARDEZA AVE.  BATON ROUGE, LA  70816
               Member/Manager   ARNE N. HOOK, Member  838 CAMP STREET  NEW ORLEANS, LA  7030
               Member/Manager   BRUCE R. RAY, Member  17321 S. HARRELL'S FERRY ROAD  BATON ROUGE, LA  70817
These are not just some 'agents' or 'managers' in this list, they are top executives -- the top three listed at Plexosinternational.com. David F. Odem is President and CEO of Plexos, for instance. Arne is listed as VP of Sales. So I ask, what kind of top-level employee gives as his contact information an address with another firm? The answer is simple and goes directly to the heart of all suspicions: someone who works there A LOT. Yet there is NO PUBLIC MENTION of it. I wonder why that is? Plexos lists its biggest clients at its Web site but apparently, having the number two man at a client's location full time is not indicative of a major client... or is it that they don't want anyone to know about the relationship for some other reason? 

And how does a major corporation sacrifice its V.P. of Sales to the dedicated service of a single client without risking damage to the greater sales effort? I know one possible answer. If the firm was a proprietary, it really cares nothing for general sales, but only what it needs to do to serve black projects. In fact, such proprietaries are usually quite small in their actual manpower size, so it might be absolutely necessary for someone listed in top management to actually be doing the field work for a black 'client' project. Perhaps this is why they do not list Solares firms as clients?

Likewise, Sigmund is quite fond of issuing press releases on all his partnerships, especially with software firms, announcing almost constantly the availability of some new utility for his customers to use to create their Web sites and manage their operations. Yet there is Plexos-like silence about the relationship at his end, too. Is it because one thing Plexos does, apparently, is what they call InfoCenter, which is a distributed Web (over many Internet connected computers) 'application framework?' It is an innocent sounding thing by their description <http://plexosinternational.com/without_fl/html/infocenter.html>), but perhaps it is how you use it that is more important. But there are yet two other observations which tend to amplify my concerns over this possible cause of silence.

One is that a search of the Web will produce something called Plexos Java scripts, and Plexel, which appears to be a library of such scripts. Seems to be an entirely unrelated product, offered free through plexos.com (which appears unrelated to plexosinternational.com).  Java scripting? You know Java scripts -- those little Web-based execution files that get computers to do all kinds of things with simple 'calls' to the routine, often the basis for hacks, snoops, and back doors. You wouldn't find Java used in Promis, but you could use Java hooks to interface with it directly from a Web page. Of course, there are clearly no visible ties between Plexos Java and Plexos International other than the name. We will call that (another) coincidence, for now. But the second thing of interest is what else Plexos International does do, and it bothers me a lot:

RFID technology is perhaps the greatest threat to the average citizen's right to privacy that anyone in the military-intelligence community has ever thought up. Radio-Frequency Identification Devices are super tiny microchips which are intended to be implanted or embedded into all products sold in the US. One version, Digital Angel, is even being bioimplanted into people, rightly earning the nickname of 'Mark of The Beast.' Each chip broadcasts on command a simple identification number that is serial number unique and which, when correlated to buyer database information, identifies whomever the chip is associated with. Scary enough thought for an implanted chip, since it means the end of privacy with respect to where you go and what you do.  But even if NOT implanted, these chips hold that potential when installed on commercial products.

Purchaser information can be obtained AUTOMATICALLY by RFID credit cards (over 6,000,000 cards already issued -- does your card say 'Smart Card' or have a lot of zeros in it?) and money (the new currency with the strips between paper layers) implanted with the chips, enabled by automated but covert data capture at the point of sale. This creates a database which can be used to tell who the owner is or was, as well as when and where it was acquired, and how paid for. The Department of Defense's Office of Total Information Awareness (since renamed to Terrorism Information Awareness after a public outcry to fool us into thinking it was not about spying on citizens, when clearly, their model called for interfacing data capture at points of sale) NEEDS RFID to function. RFID offers the capability to track every movement and transaction of EVERY CITIZEN from birth to grave. It ends privacy as we no it. Learn more at <http://www.proparanoid.net/rfid.htm>.

Plexos is knee deep into giving this capability to them, busy developing data software for the purpose. Plexos calls it 'Wheels of Zeus,' and while they mention it on their main home page (bottom right), they don't talk about it like they do their other products. Well, guess what. There may just be a reason: The Internet is one giant point of sale, and if RFID is going to work the way Big Brother wants it to, they will need to close off any avenue of sale that does not collect purchaser information. For this to work, there would need to be some form of experimental but operational test bed -- a real world Internet Web host with real world Web sites and real world Web customers. And if this is indeed a government-fomented (military-intelligence) project, you can bet the test bed is IN BED with the military-intelligence community, too. Just thinking out loud here, mind you. All it is, is an 'out of place' address.  I just want to know why.

I'm also curious about a Web site called WheelsofZeus.com. Google shows there was at one time content on the home page, but the link goes to… DirectNic's page used to display hijacked Web sites 'under construction.' Curiously, even the cached page for the original is missing, going instead to the same dead end page. Now I wonder who would have enough juice to replace a cached Web page at a search engine? The only other times I've ever seen this happen is when the intelligence community felt the page in question was too critical of government or somehow damaged THEIR opinion of what was 'National Security,' which is to say it referenced a crime by government. All that was at WheelsofZeus.com was an explanation of the Greek mythology of the term, Wheels of Zeus: "Greek Gods · Master Of Olympus · Algorithm Animation · Timing Gears ... Wheels Of Zeus · Zeus Poseidon · Olympic Steel · Poseidon Zeus…"  Now, why do you suppose this site had to go away, and how do you suppose NOLD came to be involved in its demise? 

The military intelligence community likes to name things after Greek mythology, and usually, there IS relevance in the choice.  From Homer's Iliad, we find reference to the Wheels of Zeus which describe it as a kind of weapon, one used to quickly destroy a particular hero named Tantalus. One reviewer describes it this way: "Tantalus ends badly shortly thereafter (very shortly thereafter -- the wheels of Zeus grind quickly and they grind exceeding small)…" Sounds like RFID to me.  Methinks we are all Tantalus, who  was the Son of Zeus who, being also mortal, ate the food of the Gods. We consumers eat (consume) the food of the Gods (manufacturers of the Globalist kind), and are their sons (customers). We will be made small (powerless) very quickly by the tiny grinding wheels of RFID. Plexos will profit.
 

Terrorist Web sites?                                                                                                      Return to Top
In addition to the traits of a proprietary already pointed out, what kinds of things might a domain registry and Web hosting service be involved with if working for anyone in the military or intelligence world?  If I were to tell you that my book, Fatal Rebirth, shows direct connections between terrorist organizations and the military and CIA working TOGETHER to foment terrorism (I make a case that the goal is overthrow of the Constitution in favor of a military police state), what kind of things might an Agency front do to support such a notion?  If they actually DID support terrorism in some way, would it indeed be telling if FBI and CIA actually IGNORED those relationships and neither they nor the supporting firms did anything about it in the wake of Sept. 11? Would you find it interesting to discover NOLD/Solares firms had MULTIPLE ties to terrorist Web sites?

Visit <http://haganah.org.il/jihadi/pij.html>, which is an Israeli Web site devoted to confronting the Islamic Jihad. Scan down the page just over 1/3 the way and you find a Web site listed as the official Web sites of the Palestinian Islamic Jihad. It is sarayaalquds.org, a site registered with Intercosmos Media Group by Kamel abouid, from Beirut, Lebanon. This is not the only site Haganah says was registered through Intercosmos. Abrarway.com was not only registered through Intercosmos but also hosted at Direct NIC. At <http://haganah.org.il/harchives/003681.html>, haganah reveals that Sigmund Solares' Zipa hosted almahanna.com which terrorists used to upload files for sharing -- snuff films, communiqués, photos, etc.

US Law states that it is illegal to provide material support for terrorist organizations. I guess the law is unequally applied, and corporate policy unequally adhered to. Some of these sites have indeed been shut down, but some have been 'hijacked' to other, seemingly 'kinder' purposes, still Islamic in nature, and at least one (almahanna.com) is still listed as current with WHO IS, but for sale, presumably by cybersquatters. So for public relations use, they can claim that they have obeyed the law and/or enforced policy. For others, including some perhaps we perhaps don't know about, we wonder what the hell is going on in New Orleans. 
 
 

A flock of proprietaries: Vulture's Nest Syndrome
But what are the odds that the intelligence community would ever even consider mounting an intelligence operation in historic New Orleans?  What are the odds for little old Camp Street, which is merely one of thousands of streets in that city?  Perhaps the answers lie in the assassination of JFK in 1963. Former FBI agent Guy Bannister and the Bay of Pigs cubans, and Lee Harvey Oswald, all tied to the assassination in various ways, all operated from 544 Camp Street, two "full blocks" distance from Alternative Identity. 

What was it District Attorney Jim Garrison said in Oliver Stone's (Kevin Costner) portrayal? "This is the perfect place to launch an intelligence operation. On one corner, you have the FBI. Another is Justice. CIA is right over there, and across the street, you have the Office of Naval Intelligence." The notion was, 'one-stop shopping for intelligence resources.' Go figure: He was standing at the Courthouse at the other corner of Camp street on Bannister/Oswald's block, one and a half blocks from Alternative Identity. 650 Poydras, by the way, is a half block off of Camp street on the other side of Bannister's office. All those intelligence community offices in a neat little row… 
 
 
 
 
 
 
 

1963 Press photo of 544 Camp Street, the building with two addresses 

What else happens on Camp Street? There are a lot of hotels, and hotels mean conventions and other get togethers. Some of these might be of interest to the intelligence community, and especially, CIA. For instance, the Society of Neuroscience 2003 gathering (a must if you are into mind control); the Child Welfare League of America 2005 (a name right out of traditional CIA front naming conventions, a group which serves 900 agencies involved in helping abused children -- and one form of mind control involves ritual abuse of children to create manchurian candidate and other specialist 'tools'); Open Group 2004 (an organization devoted to developing global and national standards for information exchange, which would be a critical component/consideration for anyone involved in backdoor database software development); Sans Institute's Network Security 2003 & 2004 (also important if you have backdoor software); a federally sponsored Management Information Systems Conference 2005 (more back door); and something called the Democratic Underground Forum held at least one rally on Camp Street, and a group called Anarchist Librarians promoted a book fair, there. There was also CFO's Finance Transformation Forum 2003 (great for globalist interests, and the entire intelligence community is quite pro globalist); Society for Industrial and Applied Mathematics 1997 & 2005 (advanced scientific math programming as I've sold to the intelligence community when I worked for a supercomputer software provider); the Forward Together Conference (which has to do with governments and banks in the Caribbean, longtime playground of CIA banking and target of covert government manipulations); the Association of College and University Clubs 2005 (which would include Skull and Bones and other CIA recruiting grounds). There are more, but this paragraph is too long, and its all mere conjecture, anyway. But it is also very interesting.

What else is nearby? Well, within a short walk (i.e., half-dozen blocks) you will find no fewer than 25 consulates of foreign nations. Remember, what spies do, is to use consulates as a base of operations in other countries. So, what spies also do in their own country, is watch the consulates. That means having lots of CIA (and FBI) fronts nearby, even if that is NOT their prime mission. Fronts play together to watch each other's backs. Now, among these consulates are at least 8 which are from countries known as CIA playgrounds in the Caribbean and South America. Also present, are the US Immigration and Naturalization Office and the US Passport Agency,  which would be convenient if you were a nearby CIA front that needed to bring in special talent which might not otherwise get past US borders -- which is how virtually every World Trade Center terrorist entered the US thanks to CIA's manipulative intervention. In fact, many of the consulates are located right in the Poydras complex, some in the same building with (insert favorite Solares firm here, since we don't know which version of the 'official' story to believe). We also find CIA-Bush-Cheney dynamo, and Carlyle Groups' darling, Halliburton.

So we have two different addresses and each has multiple firms operating at the same address, both similar and dissimilar, both with examples of duplications of function. But wait! There is yet one more example. In the arbitration ruling sample quoted from above, notice there is an address given for legal response to NOLD, at al. What address? 2201 Fern Street, New Orleans, LA 70118. Who else uses that address?  According to <http://www.la-dir.com/new-orleans-beauty- salons.htmIngrid's Beauty Salon is also located there. I guess Sigmund likes to have his hair permed while he dictates his lawyer responses. Perhaps that's why his weak attempt at fighting the arbitration resulted in humiliation -- he couldn't see what he was doing because his head was deep into one of those hair machines. Just guessing. 

No, the truth of his ineptness is this. Sigmund is simply the wrong kind of lawyer. The clue lies in a paper he has written which reveals his true expertise: Preventing Medical Malpractice of Team Physicians in Professional Sports: A Call for the Players Unions to Hire the Team Physicians in Professional Sports. And, likely, Sigmund's offices are not actually shared by the Salon as implied, since his address additionally carries a '2C Apartment A' descriptor. But it was fun to image him that way in my mind, and in print. Nice perm, Siggy!
 

Proprietary Trait: More Bedfellows


Another trait? CIA bedfellows. Here are two potential bedfellows (beyond Enron and some of the other possibilities already cited). Senator Bob Graham and Equifax (the credit bureau folks).  This basis for the connection of these folks to NOLD companies comes from hatless.com and is better explained there, than here. Here, I'll add my two cents and only summarize what you will find at <http://www.hatless.com/blog/archive/cat_is_bob_grahams_primary_campaign_ spamming.html>. The basis for Bob Graham's association with CIA is that he was once head of the Senate Select Committee on Intelligence, and thus worked closely with CIA at many levels. The basis for Equifax being so associated is, at best, mere conjecture: it is known that CIA operates at least ONE credit bureau, but which one is not (yet) known. THIS ONE has offices located in Florida near other proprietaries (and they like to be in neat little bundles, as seen in Camp Street). The bases for linking them all together at Hatless is found about half way down the page, reviewed by Steve Koppleman:

There were multiple Bob Graham political spam e-mails sent to him through multiple domain origins, and associated with multiple 'marketing' firms. In each case, Intercosmos was involved, and in each case, the marketing firms appear to have corporate ties with Fairfax. In both cases the marketing outreach was e-mailed to e-mail addresses which existed in only one place -- at domain registrars. Why would Equifax and friends push politics via Alternative Identity (among others) and using spam in this way? Not a very fiduciary responsible thing for a credit bureau, unless they were more interested in promoting (yet another) CIA-backed candidate into office than doing what was morally right with their database.
 

Proprietary Trait: Deceit and Fraud


It is absolutely true CIA fronts participate in deceit and, often, fraud. Fraud is typically used to help offset black ops expenses, given that as they are no longer 'legitimate' and funded by government.  I frame this notion with more of the sub questions, as their answers more directly speak to the larger question and negate the need for more detail in the intro. 

c) Is there any evidence to show a pattern of deceit, fraud, or criminal activity?                  Return to Top


Remember that Alternative Identity has literally invented the ultimate mechanism for site hijacking, which is guaranteed anonymity. The question is, are THEY DIRECTLY INVOLVED or just acting as mere agents for those wishing to be anonymous. Are THEY THEMSELVES hiding behind that notion to become villains in their own right? If so, there would be a pattern of deceit and implications of wrongdoing. We've already seen one example of deceit regarding the Enron site, but there are others I've not included as they are not yet fully researched. The best example of deceit may be how Alternative Identity presents itself publicly. 

Publicly, Sigmund Solares is very up front about hijacking -- sort of. He warns people about it, but then conveniently fails to tell people that HE enables, facilitates, and cosponsors it. Take the World Association of Domain Name Developers (WADND) meeting called Traffic West, in Las Vegas, for instance. Solares was a guest speaker at a Seminar on domain hijacking. The discussion points were very interesting, according to Traffic West's literature, since most of these evils (perhaps all) could describe Solares various hijacking participations. Now, do you suppose Solares would stand up and persecute himself in front of hundreds of professionals, or would he prostitute himself?
 

- lapses in security by registrars which facilitate hijackings
- blatant stealing of domain names by registrars
- taking domain names from customers who charge back on a domain name
- taking domain names from customers who are engaged in illegal activity (phishing, 
  auction fraud, illegal content) 
- registrars that sell domain names prior to releasing them
- a registrar enforcing an ICANN arbitration ruling
- blatant fraud by registrars
- questionable trade mark infringement actions  or "guilt by inactivity"
- domain names that are taken for WHOIS violations
- domain names that Registries seize from Registrars and thus from customers


Here is a quote from Solares: "Over the years, there have been numerous, high-profile cases of large companies losing their domain names because of fraud or because there was no one watching over them." Alternative Identity, of course, offers to watch over domains for those concerned they might be victims, while at the same time being the root cause of their concern. This is like a virus inventor selling virus detection and elimination software (something a lot of people fear takes place). Is all this not one, grand deceit?

Here is another example. At <http://www.antichildporn.org/intercosmos.htm> you will find a very nice (unsigned) statement from Intercosmos regarding their efforts to fight pornography, in this case, on behalf of someone (described only as "Lisa") not even a client of their firm who was being involved with porn unwillingly by a form of identity theft, a hijacked domain registry — in this case, by a competing registrar. The unstated author of this document a) fails to identify themselves by name or title; b) hints at ties to the intelligence community (FBI, in this case, but it is not unusual to find ex FBI types in a given CIA front operation, ask Guy Bannister and G. Gordon Liddy); and c) writes in a manner quite like a lawyer (like Sigmund Solares). Here is the opening of the statement:
 

"As an employee of Intercosmos Media Group, Inc., ("Intercosmos"), I am personally made aware on a daily basis that my company is on the forefront of legal accountability with the Internet community for unjust practices. Being a part of a corporation that is growing as quickly as ours, I find it personally necessary and rewarding to be responsible for many decisions our company makes regarding such practices as it shapes our future.

As an employee and responsible Internet citizen I owe the community access to my working knowledge and educational training in respect to the criminal accountability of child pornographers. I owe the Internet community my full attention to such socially devastating matters, most importantly child exploitation and abuse. I have found there often exists an unsettling lack of urgency and ignorance when teaching others in my field how to respond to these matters. Intercosmos has continually upheld a civilly responsible stand point on all of these reports"


The first sentence includes the parens/quoted "Intercosmos" in a manner often used in legal writing to indicate a version of 'herein after referred to as.' See the WIPO (1st) arbitration example which does the same thing in its first sentence. Thus I believe this document was written by Sigmund Solares, himself, the only lawyer known to be working at NOLD and who is quite used to arbitration document constructs. It also points out the firm is at the forefront of 'legal accountability with the Internet community for unjust practices.'  The context leads a casual reader to think the firm is literally doing daily battle with those guilty of unjust practices, when in point of fact, they are defendants continually being accused of those very unjust practices. If you reread it again with that in mind, you see it is still grammatically correct to that meaning, which is how lawyers conceal truth without lying: they weave words to have two meanings, which is also a spies tool, called 'doublespeak.'

The last sentence of the first paragraph indicates the author is high-level management. The next sentence indicates "working knowledge and educational training in respect to the criminal accountability of child pornographers." To my knowledge, the only 'working knowledge and educational training' anywhere out there on this topic is FBI. Thus I am left with the notion that Solares has some formal FBI training, a matter not uncommon to members of other intelligence agencies and the military intelligence community, as FBI courses are often required fare. But how do these grand statements and the rest of the document which features a blow-by-blow example of how they dealt with the bad guys in this instance, square with the rest of NOLDC's business practices?

Do pornographers want anonymous domain registry? Absolutely. Does Alternative Identity and their Web hosting services cater to their needs? Absolutely. This was revealed in the quote from Mr. Kaen, which was virtually identical in nature to the case of Lisa, in that a form of identity theft was involved (Web identity). While Intercosmos went to bat for a non customer (Lisa) against a competitor, they were apparently not willing to do so for someone who was victimized by one of THEIR clients. More deceit. In fact, there are perhaps hundreds to thousands of pornographers operating within Intercosmos protections. 

Just one of the hits on one of several Web pages resulting from a search for Intercosmos produced a single entry where there were over 110 different porn Web sites catering to ALL flavors of sexual preferences. Each link clicked on yielded even more porn sites. There could be thousands. I didn't have the time to see if they were all registered with Intercosmos, but others on the Web have already documented large numbers of such sites. That Solares does it in volume is not in debate. There will simply never be a good way to know the absolute size of this particular iceberg without a confession. Nice that such a firm helped Lisa out, eh? Good PR, Siggy. You are sooo sincere!
 

CIA Porn?

Return to Top


Interesting. There is a certain CIA operative in my investigative path who is known to have been associated with just such a network of hundreds and hundreds of CIA-sponsored porn sites, all of which were cleverly written to monitor visitor interests. By analyzing which buttons you clicked, the visitor's sexual preferences were catalogued and analyzed -- all part of a psychological profiling program which might be useful should any given individual visitor become visible in government's cross hairs. This is known technology in the Web world. Analysis of click-through patterns is called Predictive Marketing. It is interesting to note that these redirects continually offer increasingly more extreme porn choices slightly tilted towards the user's indicated interests, yet increasingly goading the visitor to select child porn, bestiality, homosexual, or sado-sex options along the way. 

Could there be a relationship between these sites, Intercosmos, and the Agency's porn programmer? Yes, anything is possible. But regardless of who the sinister CIA perpetrator actually works for, or what sites are involved, such things would also be difficult to prove short of a confession. Even then, a confession does not prove culpability for either the domain host or registrar, unless that was also part of the confession. I'm only reporting that all the pieces are in place to facilitate, and that this particular animal seems to walk like that duck. Sans confession, it could also be proven, however, by looking at the TRUE domain name registry information of those profiling sites (if not using fraudulent names, which is more likely) to see if it tracks to Mr. CIA. Alternative Identity, perhaps conveniently, shields all access to such records. 
 

When Fraud is not Fraud, but Fraud in Name, Only

Return to Top


Non disclaimer disclaimer and the world of plausible deniability: There are more provocative issues with respect to charges of fraud, the Web rife with charges against Sigmund's firms. Now in fair defense of Sigmund and his businesses, it should be pointed out that most charges against him and his firms stem ONLY from the fact that WHO IS regarding a domain associated with fraud reveals one or more of his companies are involved (registry, and/or hosting). Web charges are also low in substance (little useful evidence, since all such evidence is secure behind NOLD's locked doors) and high in anger. But there IS sufficient material fact offered in most cases to suggest the ring of truth, or at least point out that there is smoke billowing from a building with windows aglow. That is no clear indictment of a fire; no proof that these firms are RESPONSIBLE or even CULPABLE in the fraud. There is a reason such charges remain weak.

The principal reason this is CONSISTENTLY so is that Alternative Identity is SHIELDING THE GUILTY by PROXY registration in NOLD (etc.) names to conceal the true identity.  Well, excuse me, but while that does not prove NOLD guilty, it serves the same purpose. In legal matters, law suites and investigations, Sigmund's firms RIGHTLY take all the heat. Only NOLD operatives appear at hearings or prepare written responses, and judgments are against NOLD. Unless the crime is such that it goes beyond civil and into the world of felony (resulting in a warrant), they DO BEAR ALL RESPONSIBILITY unto themselves. That is the price they pay for 'selling' anonymity via the proxy domain registry. 

They pay this price GLADLY, I believe. Not necessarily because it is profitable thought I suspect it is. One REQUIREMENT in setting up a proprietary is finding a way to insure plausible deniability. In the spy trade, this is the ability to say you are not guilty or participatory (especially when you actually are) and have people believe the claim true without demanding proof. Proxy domain name registry gives absolute plausible deniability. Any manner of Web crime could be undertaken and gotten away with 'because it wasn't us, but one of our clients - but our agreement with them forbids us to say who…' Convenient.

Make no mistake. I do not accuse them of these frauds, but I do say they are EQUALLY CULPABLE in all practical and moral ways. More to the point, as we shall see in a quote from another critic (charging fraud), a registrar using proxy anonymity creates for ITSELF the perfect disguise for any wrongdoing it wishes to perpetrate. It can, after all, use fraudulent identity to create a bogus registry, and then protect it from all but a warrant. The warrant will reveal nothing useful as the names are bogus, and the registrar (who was most helpful to authorities) can walk away clean. This alone is smoke enough, for me. Put Siggy behind bars, I say. His crime against the entire Web community is proxy registry, and all which it beget in turn. 
 

Specific Fraud Charges Against NOLD:


Fraud Type #1 - Domain names purchased using non existent credit cards and bogus identity, or stolen card numbers: Of particular interest are indications of fraudulent business practices which implies that domain names are being purchased by Alternative Identity in fake transactions. If true, this would indicate collusion between the seller (i.e., Network Solutions in my example) and NOLD, et. al. Read about it here (cached file): <http://www.domainnametalk.com/show thread.php?t=86>. Notice the title of the thread is "Domain Name Hijacking FOUNDED @ directnic.com."

There is an interesting but hardly substantiated claim by "nobatteriesrequired," which is an anonymous party on an ezboard.com chat group. Anonymous and unsubstantiated is hardly worth noting, normally, except for some interesting details in his commentary, which if true, are telling, after all. He said, in response to reports from another chat room denizen about being taken for $1,500 by the domain in question: 
 

"You lost money on BETTERBUSINESSUPPORT.COM?  What have YOU done to shut the site down? I spoke to the company that registered the site on 6-23 and requested its removal. Their lawyer (scare tactic) called me yesterday. Intercosmos Media Group,  504-675-5170.  I also spoke to "customer service" at the hosting ISP:  powweb.com.  I was told, in a nasty manner, that the site would only be taken down with a court order.  Talk to a lawyer… those companies are charging the site to a stolen credit card. That's against the law. The site is still up AFTER they were informed of this."


Analysis: Intercosmos is the cited registrar. The official lawyer for Intercosmos is the CEO, himself, Sigmund Solares. Intercosmos is regularly criticized for not even returning phone calls or e-mails, yet the CEO calls this fellow?  Must surely have had something to say of interest to Solares, I suspect.  Could it be that Sigmund is sensitive enough about public discussion of stolen credit cards being used to register sites that he would apply intimidation tactics? If knowing the cards were stolen and still not taking the sites down (as stated), then that in turn implies collusion and conspiracy. Perhaps THAT is what got Solares to call. Well, with multiple accusations in this direction, Intercosmos did eventually part company with the domain in question, so perhaps the entire matter has some validity after all.

A supporting claim by another person indicts Network Solutions as similarly effecting bogus purchases. In such a scenario, depending on intent, they might prefer to transfer registration (or sell to a shell firm that transfers) to Alternative Identity in order to shield the fake transaction. In my mind, it would take a criminologist or lawyer to decide if that was collusion or conspiracy, but it is fraud on the part of at least the original registrar. There is evidence this may have happened in some variation in my case. If you read the tail of the ransom note from Alternative Identity, you will note it mentions that Network Solutions still holds the registration (only the 'purchaser' is shielded by Alternative Identity). Sigmund himself has spoke to this issue in his presentation to TRAFFIC West ("blatant stealing of domain names by registrars"). See <http://www.webmasterworld.com/forum25/1434.htm> which hints at the possibility with this text:
 

"Over the weekend, Network Solutions has made a drastic change in their policies; they're now snatching up all domains that appear on the Pending Delete list--even if it is registered through another registrar.  It appears that if a domain name is on the Pending Delete list, Network Solutions is somehow inheriting it, changing the status and expiration date to a year from now.  This may be their attempt to get ready for the WLS list, but forget about getting an expired domain anymore. You cannot backorder one because you just won't get it.  Over the weekend I was watching several hundred domain names that had a status of 'pending delete' and now ALL of them are now registered through Network Solutions, with an expiration date of next year.  Expired domains and the hopes of registering domain names with good PageRank, links, and traffic coming to it is over, folks. Network Solutions has now made it a reality." 

There is yet another supporting charge in the form of another kind of fraud:


Charges of being responsible for 'spoof' spam trying to steal credit card information from paypal: There is dialog between Direct NIC victims (their characterization) in a chat room which links Solares firms to just such a fake e-mail attack. While it offered no specific proof, the nature and wording of the accusation directly implies (literally required) a WHO IS search returned Direct NIC company as registered owner of the offending domain. The best part of the charges made in my mind was the closing sentence, which illustrates the problem inherent in a proxy registrar. "they would say 'well, we have no control who uses our domain', but I believe that there is no better way to hide computer crime than having your own hosting and domain org."

Fraud Type #2 - Employment Scams: This serious threat leaves job hungry victims bankrupt and with criminal record. At first it looks completely innocent, even when you read it knowing it is a scam. You have no clue as to what is wrong with the picture. Visit <http://www.scam.com/showthread.php?p=19677#post19677>, where you will find that the ad and the opportunity to be victimized originate from a NOLD registered Web site, higaservices.com, hosted at Direct NIC, and it reads like this:
 

   Employer Name: HiGA Agency
   Postal/Financial Services SpiderID: 1400510 
   Location: Richmond, Virginia Date Posted: 10/5/2004 
   Wage: 
   Category: Miscellaneous 
   Job Code: JQ83374SNL89T82GQ4 

Job Description:
POSITION OVERVIEW: Experienced shipping and receiving candidates needed to cover all aspects including inventory control, shipping-receiving and documentation. Operators will receive packages mostly with electronics, sport equipment from our US partners and then forward them to our further world wide clients via shipping companies: UPS and USPS. We provide all necessary account information for all shipments. Operator's daily duties require punctuality, good communication skills, proficiency with Microsoft office programs (Microsoft Word, Microsoft Excel), and stable internet connection. This position can be considered as Temporary or Full Time. 

Job Requirements:
APPLICANT'S REQUIREMENTS: Applicants should have at least one year experience in general warehousing and distribution, shipping & receiving, be able to learn fast and do fulfillment system, follow directions well. Should be able strong enough to lift 10-25 lbs boxes. Should have check e-mail and respond to e-mails several times a day. Be able to work overtime if needed and do reports correctly, fairly, consistently. All reports samples would be provided from the company. Computer skills a must. Important: Microsoft Office programs should be installed on Applicant's pc. Ideal candidate: From 25 to 50. Must have a minimum of 1 year experience in a warehouse setting, Must be in good physical shape, able to lift up to 50 lbs and understand the importance of company's procedures. COMPANY OVERVIEW: Our Company is a stable, growing international company. If you have experience working in the Warehouse or Distribution Center, Package handling, shipping/receiving, customer service, then this job is just for you. Only qualified candidates who send resume and salary requirements will be contacted. If you are interested and feel that this job is perfect for you, you can e-mail your resume to Nick Marks, applications@higaservices.com for further assistance. Please reference Apln-392H in the subject of your e-mail so we could respond in timely maner. Candidates responding to this posting must currently possess the eligibility to work in the United States. Nick Marks Staffing Group, Applications processor [e-mail applications@higaservices.com

IMPORTANT: You should format your resume in MS Word or TXT format and send it to applications@higaservices.com as an attachment. HiGA Agency - Postal/Financial Services
For any additional questions about the job, please contact Nick Marks. 


Here is what happens when applicants are 'hired.'
 
 

"I responded to a work at home job opportunity on Monster.Com. I filled out an employment app with all my info (ssn, date of birth, signature). 3 weeks later I was told what I have to do - it was very simple. Merchandise would arrive at my house - then I would repackage it and ship it overseas to eastern european addresses. I did this for an entire month until I found it it was a terrible scam. I was never even compensated for my work . Credit cards were opened up in my name with two separate addresses. Then the statements started to arrive. Also, cell phone service, loans, bank accounts and other **** was opened under my name.  Now the credit card companies cant do **** - because all merchandise was shipped to my address with my approval. Im in debt for over 50K and my credit is ruined. DON'T EVER TRUST WORK AT HOME SCAMS . I spoke with an attorney and he said to file for bankruptcy."


Here is another victim's report regarding a variation, a fraudulent check cashing scam that has even greater risks: 
 

"You know what, I think Im in the same situation, as a matter of fact I am. I live here in chicago and i found the ad on Careerbuilder.com. I sent my ID and everything like the others. but in stead of them shipping me boxes. They are sending me money orders, and i just cash them and send them outside of the US… I knew something was wrong after the 2nd transfer. so I just stop cashing them and they sent me one e-mail asking what happen… I not for sure how true it is but from what I heard on here these guys are rip offs.. Stay away from HIGA services… DAM only if it was more jobs in this country we wouldn't have to be worried about this mess… Now im just sitting hopping that im not in trouble."


A single victim can find himself owing $50-$100K, and under investigation for wire fraud by the Secret Service. No one seems to want to believe the victim is innocent, they just go for blood. For this scam to work, there has to be connections with a credit company of the Equifax kind. The scammers need personal information about the mark's credit, and perhaps, an ability to alter records to increase their credit line significantly. This brings us back to CIA's credit bureau, whomever they may really be, and the he address under which this scam is operated from, which is Richmond, Va, CIA's back yard. Ergo, Secret Service blindness to evidence of a scam, when reported.

Fraud Type # 3 - Pop ups windows that auto-download software and bill victim's phone acct: You visit a Web site and a pop up window appears. If you don't close it right away, it downloads software to your computer (which is covert and does you know not what). Later, your phone bill shows an innocuous little charge for unstated services from a phone company sounding name. You probably pay the bill thinking it legit. If you protest, the phone company has no sympathy, it seems legit to them, they get them all the time.  Learn more at <http://www.utahsearch.com/usbi.htm> including this scams ties (variants) to BOTH Direct Nic and Intercosmos, and some important instruction on how to successfully fight back if a victim. The fight won't be pretty, but should avoid the courts and legal expenses.

Fraud Type #4 - Renewal of services scams: Numerous scams involve renewal of some form of service, assuming that a certain percentage of recipients will think they forgot about or didn't know about something someone else in the firm undertook and click to renew. One such scam tied to both Direct NIC and Intercosmos is found at <http://www.chatmag.com/help/ scam2.html>. What makes this interesting is that the scam domain, top-sites.net, offers in its 'renewal statement' testimonials from two individuals whose e-mail is also located on the same servers. Thus, multiple domains were set up for this one scam, all on Solares enabled accounts.

Fraud Type # 5 - Property Escrow scams: There are several domains listed involved in a set of well documented scams found at the (multiple) pages at <http://www.sos4auctions.com/escrow/docs/Escrow-eCommerce.8m.com.txt>. Again, we find Intercosmos and Directnic cited as supporting (at least one) escrow scammer(s) as registrar and Web host.
 

Fraud Summary: Fight back

Return to Top


The thing about all these scams is not that they are sometimes hosted on NOLD servers, though that can be indicative of culpability to a degree. It is not even that they may be proxy registered through one of the NOLD services, but again culpability is justly rationed. What is more important is the CONSISTENT use of proxy registry by NOLD clients for SCAM purposes, even to include dedicated IP address blocks. As stated, this could indicate DIRECT culpability and criminality, but we can never know it short of confession. It could also merely be bad circumstantial luck. That's right, more coincidence. Surely, the same track record could be built for other registrars who offer proxy domain registration. The real issue is the appearance of impropriety, and even more to the point, the total lack of social responsibility which is otherwise publicly proclaimed to be in force. These are not Web servants, not even entreprenurial Web netizens, but Web pirates!

Proxy registration puts the entire Web community at constant risk, and gives us absolutely NO USEFUL RELIEF even when we identify a perp. Everyone needs to see the massive nature of this problem for what it is: NOLD's FAULT!  They bear full responsibility for each and every wrong they conceal thru proxy. We should all take them to task regardless of any true intentional criminality or not. But if we can ever prove them guilty of even just one crime, they should be leveled to the ground. That they are willing to do what they do in defiance of all public charges against them, scattered about the Web, is proof they do not care, and implies dark intent. This work hopes, by its size and detail, and links, to illustrate just how large a problem they really are. My hijacking aside, these and some of the others in this article are dangerous to everyone's Web, social, and financial health. And in the case of scammers selling drugs, perhaps actual physical health.

Of course, we activists, if targeted the way proparanoid.com was by SPAM, may just have a way to prove the criminality: All we need do is trace the spam attacks back to NOLD firms. If the percentage of spam generated by NOLD is more than merely random sprinkling (using Rhyolite's two groups of 400 would mean anything above, say, 5% was more than normal). If the volume was significantly above this level, it would HAVE to be deliberate targeting. Fortunately, I still have some of my old email files, including the trash files. Once I figure out how to access these, there may be some fireworks. Meanwhile, other victims should do the same. Sleep well, Siggy!

So goes the disclaimer, and so goes the chest beating. But what if the disclaimer was wrong? What if there was something more to the coincidental evidence. Could there be yet something else we've overlooked. Perhaps there is yet one more, perhaps better-than-the-rest indicator NOLD and friends are up to no good: Enter Donny Simonton, an employee of some standing with the Solares empire (for now - liabilities have a way of being liquidated), manager of programmers, and more. He has represented the NOLD firm(s) at ICANN, ironically on topic of fraudulent credit cards being used for registration (<http://www.dnso.org/clubpublic/registrars/Arc01/msg03346.html>). His opening statement is AGAINST dealing with stolen cards in the manner being considered by ICANN (posting the bogus cards). This might be expected from someone representing a firm that benefits from fraudulent registrations, as many have charged against NOLD, et. al. But this is not Simonton's greatest sin.

No. It happens that Donny, aside from not wanting to do anything to stop use of stolen credit cards, has been a bad boy. At <http://www.icannwatch.org/comments.pl?sid=953 &op=&threshold=-1&commentsort=0&mode=thread&tid=8&pid=10783> we find out about it. Icannwatch.org thinks that the ICANN folks are little more than an elite club for registrars to scheme of ways to make more money. ICANN itself, of course, makes a minimum of $1,500 every time a domain registry is challenged, so they could be right. In fact, Sigmund Solares, Donny, and other NOLD players are members of ICANN, Sigmund even nominated to a post as an officer. So speculation that general cybersquatting is not so much for profit at the squatter's side as it is at the arbitration side ($1,500-$2,500 a pop) may not be entirely unfounded. But it is Donny we are interested in, here. The watchers report that Donny made claims on behalf of registrations that did not quite hold water - not for even one of the many he submitted (note: "TMs" refers to trademarks, a common basis for validating claims to a domain name):
 

"And why did Afilias accept preposterous Sunrise applications even from Registrars they knew personally, like Donny Simonton of Intercosmos, who took one look at the agreements and submitted these names in the Sunrise (all of which he claimed he had TMs for, and all of which were registered for him personally): 
 Donny Simonton 404.info 
 Donny Simonton asian.info 
 Donny Simonton celebrity.info 
 Donny Simonton cellular.info 
 Donny Simonton cheerleaders.info 
 Donny Simonton donny.info
 Donny Simonton fat.info 
 Donny Simonton hardcore.info 
 Donny Simonton jackpot.info
 Donny Simonton marijuana.info 
 Donny Simonton roulette.info 
 Donny Simonton sextoys.info 
 Donny Simonton shit.info 
 Donny Simonton spanking.info 
 Donny Simonton teen.info 
 Donny Simonton videopoker.info 
 Donny Simonton voyeur.info
 Of course, in reality, Donny didn't have TMs for these - not even for Donny.info" 


But what examples like these demonstrate is the systematic way the processes were abused, both by Registry directors and also (as in this case) by the very Registrars the public were supposed to be able to trust. While registrars were selling preregistrations to vulnerable land rush customers, some of them were also abusing the system themselves, submitting fraudulent applications. And look at the kinds of sites: porn, drugs, gambling… just the kind of stuff Siggy likes to push.

Icannwatch.org is not the only ICANN and registrar watchdog group out there. GTLD Registries also called Donny on the carpet (and got nowhere in response) for the same offenses. They say at <http://www.gtldregistries.org/mailing/gtld/200204/ 0018.html> that "Several people have made this connection, but I  guess I'll leave that to Neulevel or ICANN. I hope Jeff Neuman will act on this, because I've got TWO MORE companies each with 2000 names from the .biz 2B which I haven't even reported to him yet. In total the number of problematical registrations appears to be between 20% and 25% of the total registered last week." 

Did he say 4,000 bogus names a week from just two registrars? Does this make you feel any better about proxy registrars? Does it make you feel any better about Sigmund's businesses to know his high-level employees do the same? What does that say about corporate ethics, policy, and culpability? As I said in the beginning, YOU decide. 

Clearly, by charging me almost 500 times as much as everyone else, it seems they don't want proparanoid back on line. They don't want victims of government targeting (or other harassment) to be able to get help. They don't want people to learn the truth about crimes of the military and the intelligence community. Clearly, it is a politically motivated, government friendly hijacking. But I am not the victim, it is YOU. Even so, you are less the victim than truth and freedom. 

But, after all, it is just coincidence, and perfectly legal.  Just ask Siggy.  UPDATE: Donny and Siggy Team UP in Tampa! Donny has not been liquidated, though he has a blog which indicates brain surgery of the type CIA finds useful for bioimplants of the Political Control Technology kind (Donny, it you hear voices or get shooting pains when doing something the boss would not like, give me a call - I offer consulting services to targeted individuals. In your case, it will only cost $157,800!). His value to Siggy would seem to be at a partnership level, and lead us to more examples of CIA traits fulfilled. Donny went of and started his own business, Parked Technology Services, which would by description seem to be the 'mechanism' which would afford the darker manipulations described for nefarious uses of parked domains. This is located at 5505 WEST GRAY STREET in Tampa. A little research with that address finds that Siggy also maintains that address in association with (again) a long list of Web firms at the same address. Funny thing is, the entire building is shown elsewhere as belonging to McNichols, a firm offering a wide variety of steel products used in construction. Elsewhere it is described as a nightclub. Do you suppose they sell steel grates by day, mixed drinks by night, and stolen domain names and credit cards by Web? Not likely, but neither is it likely that any such mix of firms is due to legitimate business relationships or endeavors. All of this, by the way, is a short drive away from the CIA operated terrorist flight schools (both of them), and about a half dozen other CIA fronts in the area, including those used in drug smuggling operations. Like New Orleans, Tampa is a 'Company Town.' So once more we find a lot of firms operating out of the same address. A large number are LLCs and the like for .coms - most of them sporting the same old bogus search engine as their only Web page. Whatever is really located at tampa (McNichols lists other Tampa addresses as well, and there are more addresses for Simonton, as well), the Interdictor, an RSS blog feed by Siggy, indicates there is air travel back and forth for several persons in his organization - so it must be an important operation. The interdictor, by the way, in addition to a military sounding name, sports an iconic image of what appears to be a KA-BAR bayonett knife designed for hand-to-hand combat.

<document end

Return to Home Page

Return to Top

 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 


Contact The Professional Paranoid:
Snail: PO Box 1941, Clackamas, OR 97015