D ID MEN IN
The Original proparanoid.com?
Back to Home Page
The Web Pirates!
This article will explain:
What happened to the original proparanoid.com Web site
Did Men in Black Hijack proparanoid.com? Someone did!
You, the reader,
can decide if they are covertly funded by MIIM, the Military-Industrial-Intelligence-Media
complex. My suspicion is, when it can't suppress the truth adequately,
government operatives steal it. I can't quite prove it in court, YET, but
the means is at hand for we activists and investigative writers who might
be targeted now or in the near future. Everyone needs to be warned, not
just those who have such sites, but THEIR VISITORS, who may find themselves
instead visiting an intelligence community site where visits could be covertly
logged. This is true even though the new resulting 'generic' site merely
states '(Web site) is under construction.'
If your Web pages point to proparanoid.com - consider this graphic a simplified link-repair solution, just link it to proparanoid.NET
The bad guys
to get proparanoid.com back. DO
NOT VISIT proparanoid.com:
there is nothing there but unfriendlies that might track your visit and
a bogus search engine. Instead, visit the new proparanoid.NET,
the replacement pending return of the hijacked site. The ridiculous nature
of this absurd ransom sum, when it is rare to charge even $1,000 in 'normal'
cybersquatting domain name sales, is an indication of just how badly they
want to keep me 'off the air.' I told them "I don't pay blackmail/ransom
to government operatives, I expose them." This article seeks to
do just that, though as more is learned, this page may be updated.
PERMISSIONS to reproduce this page in
full or in part with credits and link to proparanoid.NET are hereby granted
-- please so advise. Spread the word, because
anyone can become
a victim, including those seeking to go to a targeted site and find themselves
being misdirected or turned away empty handed by men in black with ulterior
If you would like to nominate a site as worthy of the Good Light Award, let me know.
If your Web site has been awarded the Good Light Awared, please substitute this graphic and an appropriate link.
Why was the site hijacked? We may never know for
sure, but it took place just weeks after prerecording a Sphinx Radio show
with host William Kennedy, providing promotional Web material to Michael
Corbin's A Closer Look radio show, and contacting Coast to Coast AM's George
Noory -- all regarding the planned release of my new book, Fatal
Rebirth. Also immediately thereafter, Michael Corbin suffered
numerous mysteries involving vandalism of his station's security system,
a fire in his apartment, and a hit-and-run on his car. Hmm… come to think
of it both of my cars engines blew up in the same week! Regardless of any
relationships, de facto censorship was achieved, even if just a
delaying tactic (proparanoid.NET
and fatalrebirth.com were established,
though a total loss of hit volume and site income nearly bankrupted me
-- making $157,800 all that more impossible).
IF YOU ARE ALSO AN ACTIVIST VICTIM OR CAN ADD ANYTHING TO MY UNDERSTANDING OF THE MATTERS ON THIS PAGE, CONTACT ME!
George Tenet and Donald Rumsfeld: Web Pirates?
Navigational headings in this article:
2. How as site is hijacked (background)
3. The principle players (background)
4. How activist site hijacking works
Politically motivated or legitimate business?
6. Is there evidence suggesting targeting?
7. Is there evidence of conspiracy?
Is there evidence of SPAM attacks?
Is there evidence of military-intelligence?
Evidence of a pattern of deceit and fraud?
Like the background
How a site is hijacked: Background for the lay Web user
There are many ways to achieve a hijacking, but all revolve around a central theme of lapsed domain name registry (renewal of the registry of the domain name). In my case, the hijacking methods used illustrate the calculated nature of the mechanism and reveal the intent was as a political weapon. But to understand any of this, the reader must have a good grasp of basic Web mechanics. So I must first offer a little background on Web domain names so no one will be confused or left behind in the dust of Internet jargon.
A Web site name is called a domain name, and it must be 'registered' in order for people to be able to access it on the Internet. Registration makes it legally the property of the registrant, much like a trade name or business name, and the registration provides all necessary facilitation of the Web processes which allow a Web browser to 'find' the Web site by simply typing in its name, often called the URL (Uniform Resource Locator, which might make more sense if thought of as Unique Reference Location). In essence, the name is 'looked up' to find the true IP address, which is a numerical Internet Provider code which 'points' directly to the correct Web server where the files (the Web pages in question) are stored. You can see who owns a given Web site (normally) by typing in their name or IP address into any of the WHO IS search tools (type WHO IS into your favorite search engine). The system works, and works perfectly well… almost.
To hijack a Web site would only require the changing of these numbers to some other server, where an entirely different content or purpose might be encountered. However, since registration is also ownership, any such change would normally be a criminal act, and one easily detected and dealt with by the true owner and/or the registry service. The registry service is usually a victim, too, because if found culpable they could loose their business. So this form of hijacking is rare. When it happens, it is usually for short-term gain and is the result of hacking or perhaps an angry employee, or similar dirty deeds which are easy to uncover.
Registration is sometimes undertaken to 'reserve' a name for possible future use, or perhaps for profit. This is often called 'parking' or 'cybersquatting.' Such registrations are in hopes that someone else will want that name, in which case it can be 'sold' or transferred to the new owner for cash payment. In the early days when the Web was growing at a faster rate, parking could be quite profitable, especially if someone knew of a large firm that had not yet jumped onto the Web but which should. A person could register 'GeneralElectric.com' for instance, in hopes that when the deep-pockets firm wanted a Web presence, they would be willing to pay big bucks to get it.
Sometimes that worked, if not asking too much money. More often than not, the big firm simply sued to get the name ("You can't register that name, it is our legal property as a registered trade name!") or chose an equally useful alternative such as 'GeneralElectric.net' or 'GE.com.' An example is that the same firm involved in my hijacking tried to park on usbank.us, and would have sold it for $30, but US BANK preferred to spend five digits to take it by legal action. It's not nice to fool around with Mutha' F*!
With new .us, .biz, .name, and other .such-and-such variations, the combinations are endless and thus squatting for profit is less profitable now than it has ever been. One would have to literally register dozens of variations to truly lock up a potential name for just one possible sale, and that means hundreds of dollars a year in renewable registration fees for each potential sale. The value of a name is usually a few hundred to perhaps a few thousand dollars, though there have been larger sums paid in the old days. All prices are almost always subject to negotiation — or heated exchanges which force legal recourse. It is a dangerous and risky game.
is fleeting, needing to be 'renewed' each year, though one can prepay for
multiple years, usually at a discount. When a registration expires, if
it is not renewed, the name becomes available for use by someone else,
though such reuse seldom makes a lot of sense: if the name had a lot of
'recognition' and traffic, it is likely there was some high degree of loyalty
to the former owner of the name, and there would be danger of great resentment
to finding a new owner. Unless the new owner was offering something better
than the original, it would be risky. No one likes to feel like they've
been sidetracked into a pretender's lair to do business by some form of
electronic manipulation. Likewise, once a Web domain name has been around
for a while, it assumes its own trademark identity in real legal terms,
and subject to legal recourse.
More Background: The Principle Players Return to Top
As a last point of explanation, we need to talk about domain registrars in more specific detail. When the Department of Defense's DARPA (Defense Advanced Research Projects Agency) turned the Internet over to the public (and you though Al Gore invented it?), they created something called the InterNIC to manage access, which resulted a 'private' corporation staffed with 'ex' military and intelligence types. This was eventually to become known as Network Solutions. They were originally the ONLY game in town. Roughly a decade later, their monopoly was broken through legal action and competitors were allowed to play, including Alternative Identity, one of the firms playing a key role in all the hijackings in question. Even Network Solutions, in turn, spawned a new firm called Verisign.
Network Solutions & company is bit of a spooky outfit that, in addition to providing domain name registry, seems to be the ONE central place that ALL Web site calls goes through regardless of where in the world the call originates from or where the destination Web site is located. So, if anyone WAS tracking Web surfing activities, THIS would be the way to do it, and these would be the people behind arranging it, the people with the needed resources (spooks, funding, experts), and a motive (government spying on citizens). Of course, the government does not want to spy on us (Cheshire grin), and therefore, there is no reason to worry about this possibility. Besides, that is not our focus, here, but it is useful to know the players as well as possible.
Alternative Identity is different, however. The whole INTENT of domain registry is not only to prove who owns the name, but to make them RESPONSIBLE for it. If you have a real world storefront or "brick and mortar" business name, you have a responsibility to conduct fair business practices, or be held accountable. The MEANS for holding firms accountable is based on being able to IDENTIFY the owner through their registration with the State Corporation Commissioner (or similar, every state has some such agency). In fact, in a business name registration, it is required that there be a legal contact person and address used for serving legal papers and notices. This is all public record information to allow anyone seeking recourse for a wrong to obtain it. If it were not public, business crooks could get away with atrocious behavior because you could never know who to sue or file charges against.
Internet registry is SUPPOSED to be like that, too, and for the same exact reasons. What Alternative Identity does is to offer anonymous (often called 'proxy') domain name registration services, which is completely contrary to the original intent of registration. They become the sole contact point and refuse under any means short of law enforcement intervention (warrant) to reveal who owns a domain name. They might pass a complaint or inquiry along to the owner, but the owner is not obligated or expected to respond, able to 'hide' behind AI's protective interference. They sell and promote anonymity on the notion of 'personal security' against 'Web stalkers,' but this is a thinly veiled excuse. Thus whenever legal steps are taken in CIVIL matters, Alternative Identity is the sole representative, and they generally choose NOT to respond, leaving it up to the domain owner to choose to defend, or not. More on what that translates to in another section. But it is the relationship between Alternative Identity and Network Solutions which may need some examination.
There is a long list of gripes and complaints about Network Solutions within the industry and by customers which are important to know about, as it is Network Solutions who was my registrar. They are not squeaky clean and are, according to many other victims are, hijacking suspects, too. These complaints include matters relating to fraud and negligence, specifically having to do with expiration and renewal of domain names. Imagine this: you are a Network Solutions customer and you get a polite 'courtesy warning' from Verisign (as if they were your domain registry service) stating your domain name is about to expire (when it is more than a year away) and give you instructions for renewal which are, in fact, disguised orders to cancel with Network Solutions and move to (Network Solutions) Verisign at a HIGHER rate. They did this not only with their own customers, but hundreds of thousands of customers of other registrars. They were even sued for the offense.
It is the registration
renewal issue which can become the central tool for hijacking, especially
when Network Solutions and Alternative Identity are involved, as they both
apparently stand to benefit from a hijacking, and it is even possible there
is collusion between them at some level according to some victims. More
on that in another section, too. The question is, how do you cause someone
to fail to register so you can hijack? There are apparently lots of ways,
as mentioned earlier, ways made much easier if you are a registrar like
Network Solutions and Alternative Identity, and willing to play games with
user accounts. This is especially true, perhaps, when one wants to move
to a different registrar to save money (Network Solutions and Verisign
charge up to 3 times as much as some others). And, when it comes to activists,
there just might be a surefire way to implement set the stage for (enable)
How Activist Site Hijacking Works: Return to Top
Activists tend to be under funded and overworked. I don't know very many of them who are terribly good at management duties with respect to their Web presence, especially the business and technical sides. That includes me. I can run a retail chain or an international marketing operation flawlessly, but ask me to manage my checkbook against bills, and I screw it up. It may also be true that activists tend to procrastinate, perhaps because we are too busy working on the latest 'battle' to be bothered with mere business details. I know that is true of me. These traits are likely found in the psychological profile of any given activist.
Activists have special problems, as a rule, and any well organized enemy would likely know of this and take advantage. One way government (via the intelligence community) routinely takes advantage is to create psychological profiles for anyone who stands visibly opposed to abuse of power in government. They will go to great lengths to create a profile on an activist or protester who gets in their cross hairs. This will include everything from the mundane matters just described to sexual habits and how they react when cut off on the freeway. Detailed personal observation and surveillance can be involved, even to include cameras in the bedroom. With a profile in hand, it can be accurately predicted as to just how the subject will react in a given situation. This is scientific fact, and CIA has a special computer program and a lot of psychologists on staff just to facilitate such determinations. Learn more in my books, The Professional Paranoid, 2nd edition, or its sequel on political control technology, MC Realities.
As a result, they know our activist weaknesses and move to take advantage of them in calculated ways. As we tend to fit a generic 'mold' there are surely enough things in common that certain procedures can be calculated to have good effect against the majority of us. If that were true, it would be a simple matter to create businesses (front operations) designed to take advantage in specific ways, or simply modify an existing firm in some way suitable for the same capabilities. That may be what has happened here. More on the firms involved, later, that you may decide for yourself.
But first, the steps undertaken by these firms with respect to hijacking must be reviewed. The hijacking would seem to involve a plan based on a methodical process roughly two years long. That figure is based on consistencies in multiple examples, and is well within the norms of intelligence community strategy and use of profiles. Of course, any given activist might have unique circumstances that might allow variations on a theme, or even skipping some of the steps. For my hijacking and, according to Web postings by other victims, it apparently works like this:
Step one: Massive spam/virus attacks. A normal day for me in the early days would see between 30-100 legitimate e-mail contacts from Web site visitors and clients. There might be 5-20 assorted spam messages on a bad spam day. There would be typically 10 Nigerian scam spams for a given week (I'm exceptionally targeted because I offer more information on them than does the Secret Service, and I reveal possible ties of the scam directly to the intelligence community), and unless there was a current Web-wide virus infection underway, I would get 3-10 virus e-mails a week. This was all very manageable.
Slowly, so as not to arouse too much attention, the spam levels began rising until out of control. Toward the end, I got as many as 200 spams a day, as many as 10 Nigerian scams a day, and perhaps 50 virus e-mails. The same exact message (in any of the spam, virus, nigerian categories) could originate from as many as 15 or 20 different (seemingly bogus) points of origin/senders on a given day. The net effect was to make it harder and harder to find the legitimate e-mail, and harder and harder for spam filters to avoid accidental identification of true mail as spam.
Step Two: CARNIVORE. Carnivore is the Federal Bureau of Investigation's covertly installed (supposedly requires a warrant) e-mail surveillance tool created in the early days of antiterrorism legislation (pre 911). Allegedly aimed at terrorism, it is believed by many fellow paranoids (activists) that virtually every e-mail server in the US has a Carnivore attached to it by now. Carnivore has become the focus of an international furor which has been completely ignored by FBI and government in general, and allowed to die down to a dull whimpering roar. After all, there are newer and fresher wrongs to start yelling about almost every month.
I and others have long held that the reason FBI has refused to make public its code for their Carnivore software is that it did something MORE than merely filter e-mail of 'warrant' targets for possible 'evidence.' We believe it is intended, as the name implies, to selectively allow the 'eating' of e-mail to prevent it from reaching destination, and we also believe it will filter all the e-mail on the entire hosting mail server, which is well outside of the mandate of any legal warrant. This is not, IMO, a tool intended to result in prosecution of criminals, but primarily aimed at activists and other government critics, or anyone they wish to limit in terms of access to information (such as the truth). So you sent an e-mail to a web site and never got an answer or an error message? Do you think an activist would ignore your interest? Think again.
In my case, synchronous with the growth in spam attacks, it seemed my regular Web visitors and clients began failing to 'write me.' Slowly but surely the number legitimate e-mails a day dropped further and further. Over the space of two years the numbers have continually dropped despite the fact that Web hits have increased. There is also some evidence that mail sent me and mail I've sent was altered prior to a late delivery. Additionally, some e-mail, once read, simply vanishes from the mail folders after some period of time. Again, this is for mail I've sent as well as received. Many activists complain of vanishing and altered e-mail. Life is fun, when you make waves. Splash, splash…
Statistically, My Web site is more popular than ever, with tens of thousands of visitors each month, and more when I do a radio show. Try a thousand in an hour! The average visitor of a typical Web site, according to Web site promotion services, visits for only a few seconds ("Nope! Not what I wanted…") and visits something just over one times (i.e., 1.3 visits), seldom bothering to go on to more than one additional page ("Might be what I want"). My visitors AVERAGE 1.3 hours per visit and 5 plus visits, each visit looking at page after page. Just one file alone has had over 12 million downloads (The 25 Rules of Disinformation)! So why, in the last days, have my legitimate e-mails numbered less than 5 a week? Today, I get none. NOT ONE LEGITIMATE E-MAIL, except for test messages to myself. Not even from people who include me on their DAILY group mailings. This was remedied when I obtained a new ISP for my mail, forcing the 'other side' to start all over.
SOMETHING was eating them. In fact, over the last few years, at least a half dozen clients have gone out of their way to reach me by postal mail or alternate e-mail means specifically to say they are sending e-mail and I'm not responding -- because I never got the mail. This, too, makes it harder and harder to find legitimate mail amid the spam -- to the point where eventually, there was no legitimate mail to find, at all. In point of fact, it has completely stopped 100% of my Web-based income, and is an actionable matter, if deliberate meddling can be proven. Actually, the mechanics of the theft of the Web site may well provide the needed means for such a proof, so let us continue. If this turns out to be the case, everyone effected (clients and others who tried to reach me) could join in such a suite: a class action suit, which could be for multimillions of dollars, and are generally easier to win, and much easier to staff with lawyers willing to jump in for a cut as opposed to regular billing. Stay tuned to this station…
Enable the theft via domain registry expiration. When
my domain registry neared expiration, I was sent e-mail notices that renewal
payments were due . There were also a few mailed pieces through the post
office (in the past, I even had some from Verisign), but these were sent
so early as to be ignored. I don't need and can't use a three-month advance
notice, since I, like every activist I know, tend to procrastinate. The
e-mail versions were mostly treated as spam by the heavy-handed spam filters
(they fit the profile of spam -- full of marketing information and links).
The few that did get through were visually missed since they also LOOKED
like spam at a glance. Thus, my domain registry expired, and I didn't even
know it. Hundreds of people (or more) were apparently e-mailing me to say
my Site was missing or down, but I didn't get any of those messages, because
CARNIVORE (or something) was eating them. Burp!
Note: The first three steps could be replaced by other opportunities. As it happens, there are about a half-dozen ways a Web master can either screw up or be tricked into doing or failing to do something which will end up in failure to renew or which invalidates the renewal or even the current registration. There are things the registrar can do to aid in that, especially if wanting to prematurely invalidate a registration (such as simply changing the contact information of the owner and then claiming it is inaccurate and in violation of the agreement). It appears that there are mechanisms deliberately in place at The NIC and at Alternative Identity which can INSTANTLY take advantage and proceed directly to step four once a registry is no longer valid. There have been levied charges against both firms for various combinations of all of the above over the years, but proof is hard to come by -- they hold all the records that would be useful as proof. Na-na na-na-na!
Step Four: Domain name put up for sale as 'available' by the domain registrar. So, THEY put my domain up for sale, and I didn't even know it. It must be a 'hot' property, as it apparently sold within minutes, which is the common way of these things. That can only be the case if the system is specifically designed to facilitate it, a kind of collusion. The registrars want it that way. They enable and seek hijacking for fun and (extra) profit. So I ask, how much further would they go to enable it? Premeditated spamming is just one additional step to someone who thinks that way, a kind of 'insurance policy' to help insure hijacking will be possible.
Step Five: Domain name purchased. Within minutes of expiration, the spooky outfit 'Alternative Identity' had 'facilitated' the purchase of my domain name AND instantly mounted a Web site 'under construction' at their sister Web hosting company, Direct Nic. These are just two of several business names used by CEO Sigmund Solares, all of which are under the umbrella Corporate name of New Orleans Leftover Data Centers (NOLD C), also known as simply, NOLD. Due to the speed of the transaction, it appears that there must be some close working relationship between these firms and The NIC, or how else would they even know to act? Again, both firms need to work together in some way to facilitate. I'm thinking that sounds a lot like conspiracy, or at least some form of FTC violation, but it is apparently legal, especially if victims can't access internal documents. Then, two more odd things happened.
Step Six: Ransom (blackmail) Note: Alternative Identity kindly informed me that they would sell me back my own domain name for $157,800. This is all perfectly legal, mind you, though there are some interesting legal ramifications discussed later. This contact was kind of unusual because it was delivered to my personal e-mail address, and what makes that unusual is that I did not contact them to give them that address, and it is not generally public information. Funny how this came to be, unless perhaps Carnivore assisted. Almost synchronous with this was an offer to pay me a COMMISSION of $6.57 for the sale of my domain name by Network Solutions to Alternative Identity. Hey! How about I sell proparanoid.NET for $150K leaving a quick $7K profit to the buyers? I'll gladly pay you $6.57 commission if you can find a buyer for me!
both of these messages then mysteriously vanished from my mail folders,
and are not found in my deleted mail folder, which has yet to be 'emptied'
into the trash. More suspected Carnivore symptoms. Fortunately, I had already
copied the blackmail message to my word processor, shown in the next section.
Is it Politically Motivated, or a Legitimate Business Tactic? Return to Top
Domain names do expire, accidentally and otherwise. There are people who do reregister (cybersquat) expired domains for profit. There are activists who find their domain names hijacked in this way. It is infuriating, to be sure. But non of this proves ill intent by some unknown third party for other than profit motive. It does not prove a conspiracy, or criminal intent. It does not prove government involvement. It does not prove anything except that an unfortunate situation exists -- unless…
There are some questions to ask that might determine a given specific case was some form of conspiracy, perhaps government fomented or backed at some level. There would have to be some unusual characteristics of such a situation, things which would NOT be true for 'legitimate' hijackings. So I have a couple of questions.
Where a domain name IS purchased, price is dependent on VALUE. A name like "warts.com" would be quite marketable to anyone in the medical trade treating warts and would sell better than a name based on a nonsense word such as "prowarts." And, there are more medical firms seeking to reach more 'warted' customers than there are people in my line of work, for which there are again far fewer (hopefully) afflicted victims. Too, the word wart (and paranoid) has meaning and intuitively tells you what the site is about, and will be a direct hit on a search engine (very marketable concept). A nonsense word like prowart or proparanoid will, at best, be an indirect match at the bottom of the list (unless someone already knows the word and what it means, and is using for that very reason to obtain a precise match without a lot of search engine clutter 'misses'). I have spent more than a decade making proparanoid known to those in need, but the average Joe still has no clue. It is not a high demand term, and it is ONLY valuable to ME.
Thus we might ask why so much? Because, perhaps, it is impossible to pay. That is to say, they want to shut down proparanoid and make it inaccessible to the public. They don't want the truth offered there exposed. They don't want people who need my help to be able to even know the help is available, much less actually get it. The odd sum almost makes it seem, in my mind, as if completely off the wall -- a figure made up out of the blue by someone thinking it amusing, perhaps. But they did have to cite a figure to make it least look like a legitimate business offer.
As stated, this
is all perfectly legal, of course, except perhaps for one thing. The WORD
proparanoid is copyright protected, and a de facto trade mark. I invented
and defined the word in my writings and on my very home page. Thus there
may be some legal recourse, and this is being researched. I'm considering
asking punitive damages for copyright infringement of $10,000 a day. Then
of course, there is the loss of income aspect, and punitive damages.
We will see what the lawyer's suggest is doable. The blackmail note follows:
From email@example.com Fri May 6 14:34:37 2005Now, compare how much they are asking from me to other sites they have hijacked. Here is the pertinent sections of the messages sent to two who DID inquire about getting their names back:
The domain tc-alumni.com is using our Domain Name Contact Services at NOLDC, Inc. We have contacted the owners and apprised them of your interest. They have agreed to sell you the domain name tc-alumni.com for US $350. There will be an escrow service fee of US $30 that must be applied to the final price of the domain name. Total price of the domain name will be US $380…
Victims prefer to fight rather than pay Return to Top
'parking' tends to fail on legal grounds, where the victim can afford to
pursue the matter that way. Here are sample charges against NOLDC by complainants
electing arbitration through any of several available resources. Other,
virtually identical samples were also found, almost all of them finding
against NOLDC. In fact, the CEO of Alternative Identity himself states
that 'virtually all arbitration findings are in favor of the complainant.'
He should know, as is apparently a fool under an old adage about lawyers,
for he is also his own firm's lawyer: "A lawyer who represents himself
has a fool for a client." Here is an example of Sigmund Solares' foolishness
in the first of two excerpts from two example rulings. The second example
is chosen to specifically highlight the findings on Bad Faith.
Example: Inept Defense
3. Procedural HistorySecond Arbitration Example: Bad Faith
2) Is there evidence suggesting a targeting pattern? Return to Top
I am not the only activist victim. The firms involved have also participated in hijacking of at least four activist sites known to me, including talkingaboutreligion.com, a discussion site which waxed political in nature. They have even targeted and hijacked foreign sites such as humandrightswatchgermany.org. Altogether, I have uncovered by GOOGLE search about five pages worth of sites taken over by these same people (some of which are possiblly activist sites unknown to me). Changing search criteria slightly finds even more. It is an iceberg for which I do not have the time and resources to fully guage its true size.
So some number greater than four of these are undoubtedly activist or critical of government in nature. Hower, to date, I've only encountered one of these where the owner of the Web site realized it may have been a deliberate takeover and who understood and talked openly any about the specific means, which was exactly the way my site was taken over. The rest simply wandered away into oblivion not suspecting they might have been deliberately targeted. Thus, any others who have been thus targeted and come to realize it as a result of this document, please contact me at once, and we can compare notes and plan a war council. I have not released everything I know, here -- I like to have ammunition in reserve, and to bait my enemy into making false assumptions. And, I want to know more. MUCH MORE!
A clue that the
above process is an actual tactic is found in this quote from the Web master
of nimud.org, who lost his Web site in an identical fashion: "For
longtime fans, you might be wondering 'what happened to nimud.org'? The
answer: capitalism. Nimud.org was purchased when I tried to transfer it
from Network Solutions to Godaddy. I was a little spammed to death and
a bit broke at the time the domains came up for renewal…"
3) Is there evidence to suggest a conspiracy?
a) Is there any evidence of involvement with spam attacks? Return to Top
A casual search of the Web will show that NOLD C, and under other of its names, is indeed responsible for significant spam on the Web. Rhyolite.com, which operates extensive mailbox server systems, has set server level filters to block dozens of NOLD registered .coms including both NOLDC.com and yet another of NOLD's firms, Intercosmos Media Group and its .com, Intercosmos.com. In fact, NOLD was responsible for so many that it was assigned two 'group identifier' groups, #50 and #259 among 400 other such spam 'collectives.' One might ask if a domain name registrar should be in the business of spam under ANY circumstances? Well, yes, if perhaps a primary covert function is use of spam to hijack Web sites. From Rhyolite:
Group #50 and
#259 of related unwelcome domains and IP address: The following domain
names and IP addresses have appeared at one time or another to be related
by owner, URLs advertised in unsolicited bulk mail (spam), service providers,
or other characteristics…
That was just
one diligent Web host doing an excellent job of protecting clients. Another,
Intercosmos (NOLD under another name) as the second biggest spammer in
their 2003 comparisons, with 'scores' of domain names involved -- so many,
they don't list them by name, but by I.P. block addresses (IP
Range 220.127.116.11 ~ 18.104.22.168). The
capacity of that block is (223-192 = 31 * 256) nearly 8,000
potential spammer domains established at Intercosmos.
Now, assigning a block of IP addresses to any given function, reveals deliberate,
organized, methodical dedication to the function -- and tons of money for
Federal Spam 'Investigation' Return to Top
seem to be tied to the promotion and sale of drugs of the type marketed
by lots of spammers. The document comes from <http://makunu.com/browse/show/110318>.
FOR FURTHER INFORMATION CONTACT: Jay H. Reiziss, Esq., Office of Unfair Import Investigations, U.S. International Trade Commission, telephone 202-205-2579.
It would be even
easier if, (as Alternative Identity's Direct NIC does) the registrar/ISP
ALSO offered its hosted-in-house Web clients a broad range of off-the-shelf
and CUSTOM marketing software solutions, able to 'automate' such attacks,
a task which could be easier through simple to achieve back door access.
Thus, the actual spammers might not even be responsible, directly, were
they using modified software designed to unleash them like robotic attack
dogs. A search of the Web will produce a long list of press releases on
software tools for Direct NIC customers, though non of them would dare
mention spamming support as a feature. Thus, this is mere hypothetical
conjecture as to how such a thing might be done by someone seeking to target
Web sites with spam.
b) Is there evidence of involvement with the military-intelligence community? Return to Top
CIA's fund was originally intended to be named In-Q-It. You can see the importance of the word "It" at CIA's own Web site <http://www.cia.gov/cia/publications/inqtel/#space>, which shows the rollout date was in 1999, well before the founding of NOLD's myriad of dba names. At the bottom of the page, NOTE #1 even shows the original In-Q-It name. Why didn't they use that name?
Ironically, SOMEONE had apparently parked on ALL variations of the original In-Q-It name (.com, .net, .org) shortly after the CIA announced formation of the firm. Yours truly never was contacted about releasing the domains. They instead elected to ignore me, and rename the firm -- which goes to show just how unprofitable cybersquatting really can be. OK, I lost $60 bucks. The chuckles it bought me were worth much more than that! Yet no one contacted me to renew, the site apparently 'magically' hijacked back into CIA ownership, a feat which would require cooperation of the registrar. Gee, I seem to remember the search engine sending me to DirectNic's Web page for 'under construction' sites.
At this time
I have no knowledge of how Alternative Identity was funded, or by whom.
I do know it was started by NOLDC in 2002, shortly after CIA actually started
handing out money. And, I seem to remember that when I first tried to find
the new CIA Web site for In-Q-Tel, it was at the time hosed by Direct Nic
using the same 'under construction' Web page as used by hijacked sites.
At best, it would be highly speculative to presume CIA funding a possibility
with nothing more to go on. What is needed, is something more concrete,
something additional to suggest intelligence ties. In my book, Fatal
Rebirth, I discuss the traits of a
CIA proprietary, having uncovered nearly a dozen of them locally in my
investigations of crimes of the intelligence community. Understand. There
are no 'legitimate' CIA proprietaries. CIA was ordered out of the proprietary
world by Congress, selling their companies to 'civilians' (who just happened
to be retired CIA). For new proprietaries, they simply invest (fund) new
firms and put their key people in place on the Boards of Directors, and
elsewhere. Of course, an 'ex' operative has a better chance at funding,
than one who is not.
Proprietary Trait: Multiple Firms Same Address
Enron, it turns out, started out in life as Hughes Tools, an oil-industry giant which was taken over (infiltrated and operated, eventually owned) by CIA in my history book (Fatal Rebirth). That puts a whole new light on the Enron swindles, doesn't it. Funny no one in Congress or media has dared mention these little facts, though the history is documented in books (earlier) written by CIA experts such as Jim Hougan, John Marks, and Victor Marchetti. How else do you suppose CIA front Evergreen Air wound up with Hughes' most prized possession, the Spruce Goose? In the Enron facilities, Zipa inherited a ton of special Internet access provisioning hardware/wiring, a matter which interests me greatly — and will make a good deal of sense, shortly. In fact, the Enron relationship with Zipa and Direct NIC is very worthwhile reading, as it provides a great deal of illumination on the inner workings of these firms. But I digress from multiple names…
It is odd enough to conduct business under a blizzard of names from the same location(s). But what about multiple unrelated firms at the same address? Well, it is a large building, but they list their address as 838 Camp Street as well as 838 C Camp Street. So if they can be reached with just the primary address, that leads me to presume that whatever other addresses (i.e., B, D, E, etc., are ALSO somehow theirs. How else could a poor postman cope? Especially if the other firms ALSO list the same primary address — or is this standard fair for addressing multiple unrelated businesses in the same building? There are several who do share NOLD's address, and some that interest me more than the others.
One such firm is called Daisy Dukes, which is a Junior Apparel Importer according to Trade-India.com. But that is the only mention of the firm anywhere on the Web. All GOOGLE will find is reference to the Dukes of Hazard TV show character, Daisy Dukes. What kind of firm fails to advertise itself with a Web presence when it literally resides in 'Web Central?" There is a trait of CIA proprietaries which could prove the answer: They don't advertise because they have no need -- they don't have legitimate customers, don't even want them. They only need the veneer of a business (also called a business shell, or shell company).
But perhaps this is merely a 'vanity business' for Vivian Solares, who as Sigmund's wife, is also listed publicly as working for his firms (presumed partner, as press released describe Solares ventures as 'family owned'). Keeping the little woman busy doing whatever hobby she wants (even a business) is often a ploy used by the rich to free up time for other activities, typically extramarital. Or perhaps, as is often true, there is a Husband and wife team working together for Agency in New Orleans on Company business. I've seen this trait before, as CIA likes to keep agents where they can watch each other very closely. Again, this is documented by other experts on CIA, such as Jim Hougan in his book, Spooks. Either possibility might leave us with a firm not in need of advertising or other traditional business trappings. On that note, I ask about Daisy Dukes promoting its business to India:
What kind of
firm gives as its address as the address of a bigger firm when doing 'business'
in another country? Again, another trait of CIA proprietaries. When
Agency wants to infiltrate a foreign country with agents, it sometimes
gives them a cover as a salesman for a bogus firm (ask James Bond). For
this to work, there must be some 'evidence' the firm exists, such as a
mention in the trades (tradeindia, for instance) and some kind of real-world
address and phone number in case anyone checks up. What is NOT needed is
a real-world office or a warehouse, employees, or customers. All you need
is a phone and a desk, and that can be anywhere, but likely, will
be placed in some other CIA front for convenience sake. This is fully demonstrable
in the large number of CIA proprietaries which operated out of the same
location as the National Intelligence Academy in Florida in the days prior
to its total destruction by Hurricane Andrew. There was this hotel that
was also a manufacturer of electronics and an news distribution outlet
and a… well, you get the idea.
Proprietary Trait: Excessive Security
to Joseph E. Kean,
tried to visit NOLDC to file complaints in person, YOU CAN'T GET INTO THE
BUILDING AT ALL. It is manned AND locked 24-7, but no matter what you do
at the front door, the people inside ignore you and won't let you in.
While non of the server locations I've been to were like that, there was
ONE PLACE where I experienced a similar situation. It WAS a CIA proprietary.
Unless you have prearranged permission to get in, as I did (to discuss
suspicion of another firm they were associated with being a proprietary,
an adventure described in my latest book set,
Fatal Rebirth), you
can't get past the front door. Does Kean's description as follows, dated
04/02, sound like a legitimate business, to you?
"I was directed to DirectNic by an unscrupulous Web hosting company that has now turned my site into a porn site. I have been trying to get Directnic to block access to the site since early January. It is now March 5th. They will not respond by e-mail or telephone. It looks like I will now have to go to my wallet to hire lawyers to fix this. In the meantime, my reputation built over 32 years is being trashed. Directnic Tel: 504-679-5170 Vivian Solares ext. 551. Owner/CEO Sigmund Solares. I sent a representative to the office (650 Poydras St., Ste. 2311, New Orleans, LA) and the door was locked and no one would answer although it was obvious that people were there. The security guard in the lobby said it is staffed 24/7. These people have registered such domains as TimothyMcVeigh.com & bombWTC.com. Draw your own conclusions."
Why would Alternative
Identity/Direct NIC CEO Sigmund Solares go out of his way to create endless
press releases about creating Zipa and then making it sound like they bought
and moved into, and renovated these premises AFTER DirectNIC was already
there. This would only make sense if covering something up, such as
a covert operation. In fact, Solares specifically stated publicly that
Direct NIC was running out of space and looking for something new just
prior to the announcements. If you run out of space, does moving out of
and back into the same space with yet another firm somehow give you more
room? There is deliberate deceit, here, also an Agency trait (more examples
And, if his wife, who is likely in fact to be Sigmund's business partner, was actually over at Poydras, I guess we can rule out the vanity business angle for Daisy Dukes. But wait… there is yet another mystery and one more firm name associated with Vivian Solares. It seems that she is listed as a credit/trade reference for a construction firm called Donnahue Favret. The only problem is, the reference indicates Vivian works not in the Poydras facility for her husband, but for the world's largest concrete company, Lafarge Concrete, which operates in 75 countries. A phone number is given for her where she apparently (at least at the time) had a desk in the New Orleans offices of LaFarge some ten miles from Poydras/Camp streets. Of course, we don't really know where that phone is located, or why. Could this be an additional clue that there are fronts involved? YES!Hillary Clinton-CIA-Iraq Connection?
From J. Orlin Grabbe, author-publisher and former U. of Pennsylvania professor turned intelligence guru/insider with expertise in cryptology and security we lean something about Lafarge. His pointed article Hillary Clinton, Lafarge, and Kennametal, reveals that Hillary was, while at Rose Law and wife to Governor Clinton, a director at Lafarge. He (and as confirmed from two other resources of mine retired from NSA) points out Lafarge subsidiaries and Hillary were involved in illegal weapon sales to Iraq involving CIA proprietaries (i.e., Kennametal). My sources indicated Hillary had just before invested a modest low five-didget sum in the proprietary just in time to reap a high six-didget return after the deal. This all dovetails neatly, according to Grabbe, with the Vince Foster murder, the NSA, questionable political support and business dealings with the Red Chinesse, and Banking Transactions Spying during the Clinton White House.
And who else
is Lafarge involved with? Non other than the nefarious and CIA enmeshed
which now outright owns former Lafarge subsidiaries. In fact, at least
one director at Lafarge, Oscar Fanjul,
is also on the Board at Carlyle. Cozy, eh? Kennametal, of course, went
on to infiltrate China as business partner with the Red government, much
the at least three CIA proprietaries have done before them. Full circle,
et. al, we find Carlyle Group and Enron (Solares?) were business buddies,
too. Is there anyone in the CIA Solares has no ties with?
There is a more interesting potential tie to the intelligence community. At least one other company uses the 838 Camp Street address, as listed for one of their registered agents. The fellow is a management type for a company which is a military contractor in the area of software. His firm, Plexos International, is affiliated with and works for Quantico,which is FBI's training facility now under US Marine occupation (co-headquartered, as if there was no such thing as a Police State coming). They have similar ties with other military contractors and law enforcement. Their specialty is database software, and in addition to the military/law enforcement industries, they cater to the large oil firms, who provide their bread and butter. Hmm… that's the second oil firm associated with Solares family interests. Wonder if these all these bedfellows know the Bush family?Military Intelligence Connections? Return to Top
Now, if there
is any CIA connection, the words database and CIA put together
a database software developed by CIA for extremely broad sales under an
ENDLESS stream of evolving products and company names to unsuspecting clients…
clients who, by installing the software, were providing backdoor access
to CIA and anyone else hip to the deed (i.e., military intelligence). Now
in fairness, Plexos does not seem to fit the profile of the normal PROMIS
purveyor, since their client focus seems rather narrow and includes other
intelligence resources (though it is also common for a proprietary to cite
bogus clients of such 'prestige' to better 'legitimize' their existence,
or even to have actual 'contracts' with such governmental resources which
funnel funds into the proprietary as a means of avoiding Congressional
oversight). Regardless, whenever I see military or intelligence community
ties to a database firm, I get nervous about the darker possibilities.
My hunch about Plexos, thus far invalidated by a lack of proof, is that
they are ramping up for Homeland Security applications, where PROMIS would
have, well… great PROMISE. Here is a registered agent listing for PLEXOS
featuring a Mr., Hook, who as 'Member' is a full partner in Plexos, but working out of offices at 838 Camp Street:
35832642K 12/10/2004 PLEXOS INTERNATIONAL, L.L.C. 12437 CARDEZA AVE. BATON ROUGE, LA 70816These are not just some 'agents' or 'managers' in this list, they are top executives -- the top three listed at Plexosinternational.com. David F. Odem is President and CEO of Plexos, for instance. Arne is listed as VP of Sales. So I ask, what kind of top-level employee gives as his contact information an address with another firm? The answer is simple and goes directly to the heart of all suspicions: someone who works there A LOT. Yet there is NO PUBLIC MENTION of it. I wonder why that is? Plexos lists its biggest clients at its Web site but apparently, having the number two man at a client's location full time is not indicative of a major client... or is it that they don't want anyone to know about the relationship for some other reason?
And how does a major corporation sacrifice its V.P. of Sales to the dedicated service of a single client without risking damage to the greater sales effort? I know one possible answer. If the firm was a proprietary, it really cares nothing for general sales, but only what it needs to do to serve black projects. In fact, such proprietaries are usually quite small in their actual manpower size, so it might be absolutely necessary for someone listed in top management to actually be doing the field work for a black 'client' project. Perhaps this is why they do not list Solares firms as clients?
Likewise, Sigmund is quite fond of issuing press releases on all his partnerships, especially with software firms, announcing almost constantly the availability of some new utility for his customers to use to create their Web sites and manage their operations. Yet there is Plexos-like silence about the relationship at his end, too. Is it because one thing Plexos does, apparently, is what they call InfoCenter, which is a distributed Web (over many Internet connected computers) 'application framework?' It is an innocent sounding thing by their description <http://plexosinternational.com/without_fl/html/infocenter.html>), but perhaps it is how you use it that is more important. But there are yet two other observations which tend to amplify my concerns over this possible cause of silence.
One is that a search of the Web will produce something called Plexos Java scripts, and Plexel, which appears to be a library of such scripts. Seems to be an entirely unrelated product, offered free through plexos.com (which appears unrelated to plexosinternational.com). Java scripting? You know Java scripts -- those little Web-based execution files that get computers to do all kinds of things with simple 'calls' to the routine, often the basis for hacks, snoops, and back doors. You wouldn't find Java used in Promis, but you could use Java hooks to interface with it directly from a Web page. Of course, there are clearly no visible ties between Plexos Java and Plexos International other than the name. We will call that (another) coincidence, for now. But the second thing of interest is what else Plexos International does do, and it bothers me a lot:
RFID technology is perhaps the greatest threat to the average citizen's right to privacy that anyone in the military-intelligence community has ever thought up. Radio-Frequency Identification Devices are super tiny microchips which are intended to be implanted or embedded into all products sold in the US. One version, Digital Angel, is even being bioimplanted into people, rightly earning the nickname of 'Mark of The Beast.' Each chip broadcasts on command a simple identification number that is serial number unique and which, when correlated to buyer database information, identifies whomever the chip is associated with. Scary enough thought for an implanted chip, since it means the end of privacy with respect to where you go and what you do. But even if NOT implanted, these chips hold that potential when installed on commercial products.
Purchaser information can be obtained AUTOMATICALLY by RFID credit cards (over 6,000,000 cards already issued -- does your card say 'Smart Card' or have a lot of zeros in it?) and money (the new currency with the strips between paper layers) implanted with the chips, enabled by automated but covert data capture at the point of sale. This creates a database which can be used to tell who the owner is or was, as well as when and where it was acquired, and how paid for. The Department of Defense's Office of Total Information Awareness (since renamed to Terrorism Information Awareness after a public outcry to fool us into thinking it was not about spying on citizens, when clearly, their model called for interfacing data capture at points of sale) NEEDS RFID to function. RFID offers the capability to track every movement and transaction of EVERY CITIZEN from birth to grave. It ends privacy as we no it. Learn more at <http://www.proparanoid.net/rfid.htm>.
Plexos is knee deep into giving this capability to them, busy developing data software for the purpose. Plexos calls it 'Wheels of Zeus,' and while they mention it on their main home page (bottom right), they don't talk about it like they do their other products. Well, guess what. There may just be a reason: The Internet is one giant point of sale, and if RFID is going to work the way Big Brother wants it to, they will need to close off any avenue of sale that does not collect purchaser information. For this to work, there would need to be some form of experimental but operational test bed -- a real world Internet Web host with real world Web sites and real world Web customers. And if this is indeed a government-fomented (military-intelligence) project, you can bet the test bed is IN BED with the military-intelligence community, too. Just thinking out loud here, mind you. All it is, is an 'out of place' address. I just want to know why.
I'm also curious about a Web site called WheelsofZeus.com. Google shows there was at one time content on the home page, but the link goes to… DirectNic's page used to display hijacked Web sites 'under construction.' Curiously, even the cached page for the original is missing, going instead to the same dead end page. Now I wonder who would have enough juice to replace a cached Web page at a search engine? The only other times I've ever seen this happen is when the intelligence community felt the page in question was too critical of government or somehow damaged THEIR opinion of what was 'National Security,' which is to say it referenced a crime by government. All that was at WheelsofZeus.com was an explanation of the Greek mythology of the term, Wheels of Zeus: "Greek Gods · Master Of Olympus · Algorithm Animation · Timing Gears ... Wheels Of Zeus · Zeus Poseidon · Olympic Steel · Poseidon Zeus…" Now, why do you suppose this site had to go away, and how do you suppose NOLD came to be involved in its demise?
intelligence community likes to name things after Greek mythology, and
usually, there IS relevance in the choice. From Homer's Iliad, we
find reference to the Wheels of Zeus which describe it as a kind of weapon,
one used to quickly destroy a particular hero named Tantalus. One reviewer
describes it this way: "Tantalus ends badly shortly thereafter (very shortly
thereafter -- the wheels of Zeus grind quickly and they grind exceeding
small)…" Sounds like RFID to me. Methinks we are all Tantalus, who
was the Son of Zeus who, being also mortal, ate the food of the Gods. We
consumers eat (consume) the food of the Gods (manufacturers of the Globalist
kind), and are their sons (customers). We will be made small (powerless)
very quickly by the tiny grinding wheels of RFID. Plexos will profit.
In addition to the traits of a proprietary already pointed out, what kinds of things might a domain registry and Web hosting service be involved with if working for anyone in the military or intelligence world? If I were to tell you that my book, Fatal Rebirth, shows direct connections between terrorist organizations and the military and CIA working TOGETHER to foment terrorism (I make a case that the goal is overthrow of the Constitution in favor of a military police state), what kind of things might an Agency front do to support such a notion? If they actually DID support terrorism in some way, would it indeed be telling if FBI and CIA actually IGNORED those relationships and neither they nor the supporting firms did anything about it in the wake of Sept. 11? Would you find it interesting to discover NOLD/Solares firms had MULTIPLE ties to terrorist Web sites?Terrorist Web sites? Return to Top
Visit <http://haganah.org.il/jihadi/pij.html>, which is an Israeli Web site devoted to confronting the Islamic Jihad. Scan down the page just over 1/3 the way and you find a Web site listed as the official Web sites of the Palestinian Islamic Jihad. It is sarayaalquds.org, a site registered with Intercosmos Media Group by Kamel abouid, from Beirut, Lebanon. This is not the only site Haganah says was registered through Intercosmos. Abrarway.com was not only registered through Intercosmos but also hosted at Direct NIC. At <http://haganah.org.il/harchives/003681.html>, haganah reveals that Sigmund Solares' Zipa hosted almahanna.com which terrorists used to upload files for sharing -- snuff films, communiqués, photos, etc.
US Law states
that it is illegal to provide material support for terrorist organizations.
I guess the law is unequally applied, and corporate policy unequally adhered
to. Some of these sites have indeed been shut down, but some have been
'hijacked' to other, seemingly 'kinder' purposes, still Islamic in nature,
and at least one (almahanna.com) is
still listed as current with WHO IS, but for sale, presumably by cybersquatters.
So for public relations use, they can claim that they have obeyed the law
and/or enforced policy. For others, including some perhaps we perhaps don't
know about, we wonder what the hell is going on in New Orleans.
What else happens on Camp Street? There are a lot of hotels, and hotels mean conventions and other get togethers. Some of these might be of interest to the intelligence community, and especially, CIA. For instance, the Society of Neuroscience 2003 gathering (a must if you are into mind control); the Child Welfare League of America 2005 (a name right out of traditional CIA front naming conventions, a group which serves 900 agencies involved in helping abused children -- and one form of mind control involves ritual abuse of children to create manchurian candidate and other specialist 'tools'); Open Group 2004 (an organization devoted to developing global and national standards for information exchange, which would be a critical component/consideration for anyone involved in backdoor database software development); Sans Institute's Network Security 2003 & 2004 (also important if you have backdoor software); a federally sponsored Management Information Systems Conference 2005 (more back door); and something called the Democratic Underground Forum held at least one rally on Camp Street, and a group called Anarchist Librarians promoted a book fair, there. There was also CFO's Finance Transformation Forum 2003 (great for globalist interests, and the entire intelligence community is quite pro globalist); Society for Industrial and Applied Mathematics 1997 & 2005 (advanced scientific math programming as I've sold to the intelligence community when I worked for a supercomputer software provider); the Forward Together Conference (which has to do with governments and banks in the Caribbean, longtime playground of CIA banking and target of covert government manipulations); the Association of College and University Clubs 2005 (which would include Skull and Bones and other CIA recruiting grounds). There are more, but this paragraph is too long, and its all mere conjecture, anyway. But it is also very interesting.
What else is nearby? Well, within a short walk (i.e., half-dozen blocks) you will find no fewer than 25 consulates of foreign nations. Remember, what spies do, is to use consulates as a base of operations in other countries. So, what spies also do in their own country, is watch the consulates. That means having lots of CIA (and FBI) fronts nearby, even if that is NOT their prime mission. Fronts play together to watch each other's backs. Now, among these consulates are at least 8 which are from countries known as CIA playgrounds in the Caribbean and South America. Also present, are the US Immigration and Naturalization Office and the US Passport Agency, which would be convenient if you were a nearby CIA front that needed to bring in special talent which might not otherwise get past US borders -- which is how virtually every World Trade Center terrorist entered the US thanks to CIA's manipulative intervention. In fact, many of the consulates are located right in the Poydras complex, some in the same building with (insert favorite Solares firm here, since we don't know which version of the 'official' story to believe). We also find CIA-Bush-Cheney dynamo, and Carlyle Groups' darling, Halliburton.
So we have two different addresses and each has multiple firms operating at the same address, both similar and dissimilar, both with examples of duplications of function. But wait! There is yet one more example. In the arbitration ruling sample quoted from above, notice there is an address given for legal response to NOLD, at al. What address? 2201 Fern Street, New Orleans, LA 70118. Who else uses that address? According to <http://www.la-dir.com/new-orleans-beauty- salons.htm> Ingrid's Beauty Salon is also located there. I guess Sigmund likes to have his hair permed while he dictates his lawyer responses. Perhaps that's why his weak attempt at fighting the arbitration resulted in humiliation -- he couldn't see what he was doing because his head was deep into one of those hair machines. Just guessing.
No, the truth
of his ineptness is this. Sigmund is simply the wrong kind of lawyer. The
clue lies in a paper he has written which reveals his true expertise: Preventing
Medical Malpractice of Team Physicians in Professional Sports: A Call for
the Players Unions to Hire the Team Physicians in Professional Sports.
And, likely, Sigmund's offices are not actually shared by the Salon as
implied, since his address additionally carries a '2C Apartment A' descriptor.
But it was fun to image him that way in my mind, and in print. Nice perm,
Proprietary Trait: More Bedfellows
There were multiple
Bob Graham political spam e-mails sent to him through multiple domain origins,
and associated with multiple 'marketing' firms. In
each case, Intercosmos was involved, and
in each case, the marketing firms appear to have corporate ties with Fairfax. In
both cases the marketing outreach was e-mailed to e-mail addresses which
existed in only one place -- at domain registrars.
Why would Equifax and friends push politics via Alternative Identity (among
others) and using spam in this way? Not a very fiduciary responsible thing
for a credit bureau, unless they were more interested in promoting (yet
another) CIA-backed candidate into office than doing what was morally right
with their database.
Proprietary Trait: Deceit and Fraud
c) Is there any evidence to show a pattern of deceit, fraud, or criminal activity? Return to Top
Solares is very up front about hijacking -- sort of. He warns people about
it, but then conveniently fails to tell people that HE enables, facilitates,
and cosponsors it. Take the World Association
of Domain Name Developers (WADND) meeting
called Traffic West,
in Las Vegas, for instance. Solares was a guest speaker at a Seminar on
domain hijacking. The discussion points were very interesting, according
to Traffic West's literature, since most of these evils (perhaps all) could
describe Solares various hijacking participations. Now, do you suppose
Solares would stand up and persecute himself in front of hundreds of professionals,
or would he prostitute himself?
- lapses in security by registrars which facilitate hijackings
Here is another
example. At <http://www.antichildporn.org/intercosmos.htm>
you will find a very nice (unsigned) statement from Intercosmos regarding
their efforts to fight pornography, in this case, on behalf of someone
(described only as "Lisa") not even a client of their firm who was being
involved with porn unwillingly by a form of identity theft, a hijacked
domain registry — in this case, by a competing registrar. The unstated
author of this document a) fails to identify themselves by name or title;
b) hints at ties to the intelligence community (FBI, in this case, but
it is not unusual to find ex FBI types in a given CIA front operation,
ask Guy Bannister
and G. Gordon Liddy);
and c) writes in a manner quite like a lawyer (like Sigmund Solares). Here
is the opening of the statement:
"As an employee of Intercosmos Media Group, Inc., ("Intercosmos"), I am personally made aware on a daily basis that my company is on the forefront of legal accountability with the Internet community for unjust practices. Being a part of a corporation that is growing as quickly as ours, I find it personally necessary and rewarding to be responsible for many decisions our company makes regarding such practices as it shapes our future.
The last sentence of the first paragraph indicates the author is high-level management. The next sentence indicates "working knowledge and educational training in respect to the criminal accountability of child pornographers." To my knowledge, the only 'working knowledge and educational training' anywhere out there on this topic is FBI. Thus I am left with the notion that Solares has some formal FBI training, a matter not uncommon to members of other intelligence agencies and the military intelligence community, as FBI courses are often required fare. But how do these grand statements and the rest of the document which features a blow-by-blow example of how they dealt with the bad guys in this instance, square with the rest of NOLDC's business practices?
Do pornographers want anonymous domain registry? Absolutely. Does Alternative Identity and their Web hosting services cater to their needs? Absolutely. This was revealed in the quote from Mr. Kaen, which was virtually identical in nature to the case of Lisa, in that a form of identity theft was involved (Web identity). While Intercosmos went to bat for a non customer (Lisa) against a competitor, they were apparently not willing to do so for someone who was victimized by one of THEIR clients. More deceit. In fact, there are perhaps hundreds to thousands of pornographers operating within Intercosmos protections.
Just one of the
hits on one of several Web pages resulting from a search for Intercosmos
produced a single entry where there were over 110
different porn Web sites catering to ALL flavors of sexual preferences.
Each link clicked on yielded even more porn sites. There could be thousands.
I didn't have the time to see if they were all registered with Intercosmos,
but others on the Web have already documented large numbers of such sites.
That Solares does it in volume is not in debate. There will simply never
be a good way to know the absolute size of this particular iceberg without
a confession. Nice that such a firm helped Lisa out, eh? Good PR, Siggy.
You are sooo sincere!
Could there be
a relationship between these sites, Intercosmos, and the Agency's porn
programmer? Yes, anything is possible. But regardless of who the sinister
CIA perpetrator actually works for, or what sites are involved, such things
would also be difficult to prove short of a confession. Even then, a confession
does not prove culpability for either the domain host or registrar, unless
that was also part of the confession. I'm only reporting that all the pieces
are in place to facilitate, and that this particular animal seems to walk
like that duck. Sans confession, it could also be proven, however, by looking
at the TRUE domain name registry information of those profiling sites (if
not using fraudulent names, which is more likely) to see if it tracks to
Mr. CIA. Alternative Identity, perhaps conveniently, shields all access
to such records.
When Fraud is not Fraud, but Fraud in Name, Only
The principal reason this is CONSISTENTLY so is that Alternative Identity is SHIELDING THE GUILTY by PROXY registration in NOLD (etc.) names to conceal the true identity. Well, excuse me, but while that does not prove NOLD guilty, it serves the same purpose. In legal matters, law suites and investigations, Sigmund's firms RIGHTLY take all the heat. Only NOLD operatives appear at hearings or prepare written responses, and judgments are against NOLD. Unless the crime is such that it goes beyond civil and into the world of felony (resulting in a warrant), they DO BEAR ALL RESPONSIBILITY unto themselves. That is the price they pay for 'selling' anonymity via the proxy domain registry.
They pay this price GLADLY, I believe. Not necessarily because it is profitable thought I suspect it is. One REQUIREMENT in setting up a proprietary is finding a way to insure plausible deniability. In the spy trade, this is the ability to say you are not guilty or participatory (especially when you actually are) and have people believe the claim true without demanding proof. Proxy domain name registry gives absolute plausible deniability. Any manner of Web crime could be undertaken and gotten away with 'because it wasn't us, but one of our clients - but our agreement with them forbids us to say who…' Convenient.
Make no mistake.
I do not accuse them of these frauds, but I do say they are EQUALLY CULPABLE
in all practical and moral ways. More to the point, as we shall see in
a quote from another critic (charging fraud), a registrar using proxy anonymity
creates for ITSELF the perfect disguise for any wrongdoing it wishes to
perpetrate. It can, after all, use fraudulent identity to create a bogus
registry, and then protect it from all but a warrant. The warrant will
reveal nothing useful as the names are bogus, and the registrar (who was
most helpful to authorities) can walk away clean. This alone is smoke enough,
for me. Put Siggy behind bars, I say. His crime against the entire Web
community is proxy registry, and all which it beget in turn.
Specific Fraud Charges Against NOLD:
There is an interesting
but hardly substantiated claim by "nobatteriesrequired,"
which is an anonymous party on an ezboard.com
chat group. Anonymous and unsubstantiated is hardly worth noting, normally,
except for some interesting details in his commentary, which if true, are
telling, after all. He said, in response to reports from another chat room
denizen about being taken for $1,500 by the domain in question:
"You lost money on BETTERBUSINESSUPPORT.COM? What have YOU done to shut the site down? I spoke to the company that registered the site on 6-23 and requested its removal. Their lawyer (scare tactic) called me yesterday. Intercosmos Media Group, 504-675-5170. I also spoke to "customer service" at the hosting ISP: powweb.com. I was told, in a nasty manner, that the site would only be taken down with a court order. Talk to a lawyer… those companies are charging the site to a stolen credit card. That's against the law. The site is still up AFTER they were informed of this."
claim by another person indicts Network Solutions as similarly effecting
bogus purchases. In such a scenario, depending on intent, they might prefer
to transfer registration (or sell to a shell firm that transfers) to Alternative
Identity in order to shield the fake transaction. In my mind, it would
take a criminologist or lawyer to decide if that was collusion or conspiracy,
but it is fraud on the part of at least the original registrar. There is
evidence this may have happened in some variation in my case. If you read
the tail of the ransom note from Alternative Identity, you will note it
mentions that Network Solutions still holds the registration (only the
'purchaser' is shielded by Alternative Identity). Sigmund himself has spoke
to this issue in his presentation to TRAFFIC West ("blatant stealing of
domain names by registrars"). See <http://www.webmasterworld.com/forum25/1434.htm>
which hints at the possibility with this text:
"Over the weekend, Network Solutions has made a drastic change in their policies; they're now snatching up all domains that appear on the Pending Delete list--even if it is registered through another registrar. It appears that if a domain name is on the Pending Delete list, Network Solutions is somehow inheriting it, changing the status and expiration date to a year from now. This may be their attempt to get ready for the WLS list, but forget about getting an expired domain anymore. You cannot backorder one because you just won't get it. Over the weekend I was watching several hundred domain names that had a status of 'pending delete' and now ALL of them are now registered through Network Solutions, with an expiration date of next year. Expired domains and the hopes of registering domain names with good PageRank, links, and traffic coming to it is over, folks. Network Solutions has now made it a reality."
#2 - Employment Scams: This serious threat
leaves job hungry victims bankrupt and with criminal record. At first it
looks completely innocent, even when you read it knowing it is a scam.
You have no clue as to what is wrong with the picture. Visit <http://www.scam.com/showthread.php?p=19677#post19677>,
where you will find that the ad and the opportunity to be victimized originate
from a NOLD registered Web site, higaservices.com,
at Direct NIC, and it reads like this:
Employer Name: HiGA Agency
"I responded to a work at home job opportunity on Monster.Com. I filled out an employment app with all my info (ssn, date of birth, signature). 3 weeks later I was told what I have to do - it was very simple. Merchandise would arrive at my house - then I would repackage it and ship it overseas to eastern european addresses. I did this for an entire month until I found it it was a terrible scam. I was never even compensated for my work . Credit cards were opened up in my name with two separate addresses. Then the statements started to arrive. Also, cell phone service, loans, bank accounts and other **** was opened under my name. Now the credit card companies cant do **** - because all merchandise was shipped to my address with my approval. Im in debt for over 50K and my credit is ruined. DON'T EVER TRUST WORK AT HOME SCAMS . I spoke with an attorney and he said to file for bankruptcy."
"You know what, I think Im in the same situation, as a matter of fact I am. I live here in chicago and i found the ad on Careerbuilder.com. I sent my ID and everything like the others. but in stead of them shipping me boxes. They are sending me money orders, and i just cash them and send them outside of the US… I knew something was wrong after the 2nd transfer. so I just stop cashing them and they sent me one e-mail asking what happen… I not for sure how true it is but from what I heard on here these guys are rip offs.. Stay away from HIGA services… DAM only if it was more jobs in this country we wouldn't have to be worried about this mess… Now im just sitting hopping that im not in trouble."
Fraud Type # 3 - Pop ups windows that auto-download software and bill victim's phone acct: You visit a Web site and a pop up window appears. If you don't close it right away, it downloads software to your computer (which is covert and does you know not what). Later, your phone bill shows an innocuous little charge for unstated services from a phone company sounding name. You probably pay the bill thinking it legit. If you protest, the phone company has no sympathy, it seems legit to them, they get them all the time. Learn more at <http://www.utahsearch.com/usbi.htm> including this scams ties (variants) to BOTH Direct Nic and Intercosmos, and some important instruction on how to successfully fight back if a victim. The fight won't be pretty, but should avoid the courts and legal expenses.
Fraud Type #4 - Renewal of services scams: Numerous scams involve renewal of some form of service, assuming that a certain percentage of recipients will think they forgot about or didn't know about something someone else in the firm undertook and click to renew. One such scam tied to both Direct NIC and Intercosmos is found at <http://www.chatmag.com/help/ scam2.html>. What makes this interesting is that the scam domain, top-sites.net, offers in its 'renewal statement' testimonials from two individuals whose e-mail is also located on the same servers. Thus, multiple domains were set up for this one scam, all on Solares enabled accounts.
# 5 - Property Escrow scams: There are
several domains listed involved in a set of well documented scams found
at the (multiple) pages at <http://www.sos4auctions.com/escrow/docs/Escrow-eCommerce.8m.com.txt>.
Again, we find Intercosmos and Directnic cited as supporting (at least
one) escrow scammer(s) as registrar and Web host.
Fraud Summary: Fight back
Proxy registration puts the entire Web community at constant risk, and gives us absolutely NO USEFUL RELIEF even when we identify a perp. Everyone needs to see the massive nature of this problem for what it is: NOLD's FAULT! They bear full responsibility for each and every wrong they conceal thru proxy. We should all take them to task regardless of any true intentional criminality or not. But if we can ever prove them guilty of even just one crime, they should be leveled to the ground. That they are willing to do what they do in defiance of all public charges against them, scattered about the Web, is proof they do not care, and implies dark intent. This work hopes, by its size and detail, and links, to illustrate just how large a problem they really are. My hijacking aside, these and some of the others in this article are dangerous to everyone's Web, social, and financial health. And in the case of scammers selling drugs, perhaps actual physical health.
Of course, we activists, if targeted the way proparanoid.com was by SPAM, may just have a way to prove the criminality: All we need do is trace the spam attacks back to NOLD firms. If the percentage of spam generated by NOLD is more than merely random sprinkling (using Rhyolite's two groups of 400 would mean anything above, say, 5% was more than normal). If the volume was significantly above this level, it would HAVE to be deliberate targeting. Fortunately, I still have some of my old email files, including the trash files. Once I figure out how to access these, there may be some fireworks. Meanwhile, other victims should do the same. Sleep well, Siggy!
So goes the disclaimer, and so goes the chest beating. But what if the disclaimer was wrong? What if there was something more to the coincidental evidence. Could there be yet something else we've overlooked. Perhaps there is yet one more, perhaps better-than-the-rest indicator NOLD and friends are up to no good: Enter Donny Simonton, an employee of some standing with the Solares empire (for now - liabilities have a way of being liquidated), manager of programmers, and more. He has represented the NOLD firm(s) at ICANN, ironically on topic of fraudulent credit cards being used for registration (<http://www.dnso.org/clubpublic/registrars/Arc01/msg03346.html>). His opening statement is AGAINST dealing with stolen cards in the manner being considered by ICANN (posting the bogus cards). This might be expected from someone representing a firm that benefits from fraudulent registrations, as many have charged against NOLD, et. al. But this is not Simonton's greatest sin.
No. It happens
that Donny, aside from not wanting to do anything to stop use of stolen
credit cards, has been a bad boy. At <http://www.icannwatch.org/comments.pl?sid=953
we find out about it. Icannwatch.org thinks
that the ICANN folks are little more than an elite club for registrars
to scheme of ways to make more money.
itself, of course, makes a minimum of $1,500 every time a domain registry
is challenged, so they could be right.
In fact, Sigmund Solares, Donny, and other NOLD players are members of
ICANN, Sigmund even nominated to a post as an officer. So speculation that
general cybersquatting is not so much for profit at the squatter's side
as it is at the arbitration side ($1,500-$2,500 a pop) may not be entirely
unfounded. But it is Donny we are interested in, here. The watchers report
that Donny made claims on behalf of registrations that did not quite hold
water - not for even one of the many he submitted (note: "TMs" refers
to trademarks, a common basis for validating claims to a domain name):
"And why did Afilias accept preposterous Sunrise applications even from Registrars they knew personally, like Donny Simonton of Intercosmos, who took one look at the agreements and submitted these names in the Sunrise (all of which he claimed he had TMs for, and all of which were registered for him personally):
Of course, in reality, Donny didn't have TMs for these - not even for Donny.info"
Icannwatch.org is not the only ICANN and registrar watchdog group out there. GTLD Registries also called Donny on the carpet (and got nowhere in response) for the same offenses. They say at <http://www.gtldregistries.org/mailing/gtld/200204/ 0018.html> that "Several people have made this connection, but I guess I'll leave that to Neulevel or ICANN. I hope Jeff Neuman will act on this, because I've got TWO MORE companies each with 2000 names from the .biz 2B which I haven't even reported to him yet. In total the number of problematical registrations appears to be between 20% and 25% of the total registered last week."
Did he say 4,000 bogus names a week from just two registrars? Does this make you feel any better about proxy registrars? Does it make you feel any better about Sigmund's businesses to know his high-level employees do the same? What does that say about corporate ethics, policy, and culpability? As I said in the beginning, YOU decide.
Clearly, by charging me almost 500 times as much as everyone else, it seems they don't want proparanoid back on line. They don't want victims of government targeting (or other harassment) to be able to get help. They don't want people to learn the truth about crimes of the military and the intelligence community. Clearly, it is a politically motivated, government friendly hijacking. But I am not the victim, it is YOU. Even so, you are less the victim than truth and freedom.
But, after all, it is just coincidence, and perfectly legal. Just ask Siggy. UPDATE: Donny and Siggy Team UP in Tampa! Donny has not been liquidated, though he has a blog which indicates brain surgery of the type CIA finds useful for bioimplants of the Political Control Technology kind (Donny, it you hear voices or get shooting pains when doing something the boss would not like, give me a call - I offer consulting services to targeted individuals. In your case, it will only cost $157,800!). His value to Siggy would seem to be at a partnership level, and lead us to more examples of CIA traits fulfilled. Donny went of and started his own business, Parked Technology Services, which would by description seem to be the 'mechanism' which would afford the darker manipulations described for nefarious uses of parked domains. This is located at 5505 WEST GRAY STREET in Tampa. A little research with that address finds that Siggy also maintains that address in association with (again) a long list of Web firms at the same address. Funny thing is, the entire building is shown elsewhere as belonging to McNichols, a firm offering a wide variety of steel products used in construction. Elsewhere it is described as a nightclub. Do you suppose they sell steel grates by day, mixed drinks by night, and stolen domain names and credit cards by Web? Not likely, but neither is it likely that any such mix of firms is due to legitimate business relationships or endeavors. All of this, by the way, is a short drive away from the CIA operated terrorist flight schools (both of them), and about a half dozen other CIA fronts in the area, including those used in drug smuggling operations. Like New Orleans, Tampa is a 'Company Town.' So once more we find a lot of firms operating out of the same address. A large number are LLCs and the like for .coms - most of them sporting the same old bogus search engine as their only Web page. Whatever is really located at tampa (McNichols lists other Tampa addresses as well, and there are more addresses for Simonton, as well), the Interdictor, an RSS blog feed by Siggy, indicates there is air travel back and forth for several persons in his organization - so it must be an important operation. The interdictor, by the way, in addition to a military sounding name, sports an iconic image of what appears to be a KA-BAR bayonett knife designed for hand-to-hand combat.
Return to Home Page