Webster

The Constitution was made to guard the people against the dangers of good intentions." --American Statesman Daniel Webster (1782-1852)


Monday, April 20, 2026

Nancy Sinatra "These Boots are Made for Walking.

 


I figured after doing a song last week from the 80's(YAY My Musical Decade :) ) I would do an older song.  I remembered this song for my Dad would play it a lot and it was very popular with the GI's from Vietnam.  It became part of the lexicon of the time and indelibly linked to the War in Vietnam by popular culture.  Nancy Sinatra would do many USO shows for the troops , and even now she is still involved with rolling thunder and many veteran causes.  She did some anti-war stuff also, but that was part of the culture of the times.  Nancy still supported the troops unlike a lot of her contemporaries and the troops have never forgotten that.  Even now she is a very popular figure and many veterans remember her with great fondness and respect.  What brought this one on, one of my friends at work was playing a few lyrics of this song and I first thought it was early  "Doobie brothers" then it hit us, and he looked it up, she is still around, about 86 now.


"These Boots Are Made for Walkin'" is a pop song written by Lee Hazlewood and recorded by Nancy Sinatra. It was released on February 22, 1966, and hit No. 1 in the United States Billboard Hot 100 and in the UK Singles Chart.
Subsequently, many cover versions of the song have been released in a range of styles: metal, pop, rock, punk rock, country, dance, and industrial. Jessica SimpsonGeri HalliwellJewelOperation Ivy and KMFDM also released covers of the song.

The second single taken from her debut album Boots, and follow-up to the minor hit "So Long, Babe," the song became an instant success. In late February 1966, the song topped the Billboard Hot 100 chart, a move it replicated in similar charts across the world.
When the single was first released, some thought it had to do with the subway strike in New York.That same year, Sinatra recorded an early music video for the song. It was produced by Color-Sonics, and played on Scopitone video jukeboxes. In 1986, for the song's twentieth anniversary, cable station VH1 played this music video.




     Nancy Sinatra was encouraged by Lee Hazlewood to sing the song as if she were "a sixteen-year-old girl who fucks truck drivers." Sinatra's recording of the song was made with the help of Los Angeles session musicians known as the Wrecking Crew. This session included Hal Blaine on drums, Al CaseyTommy Tedesco, and Billy Strange on guitars, Ollie Mitchell, Roy Caton and Lew McCreary on horns, Carol Kaye on electric bass, and Chuck Berghofer on double bass, providing the notable bass line.
According to Carol Kaye, "Arranger Billy Strange believed in using the two basses together. Producer Lee Hazlewood asked Chuck to put a sliding run on the front of the tune. Chuck complied by playing notes about three tones apart (4-6 frets apart), but Lee stopped the take. 'No Chuck, make your sliding notes closer together', and that is what you hear."
According to Al Casey, "Well, Lee and I had been friends forever, and he said, 'I've got this song I'm working on, and I want the guitar to play this.' And he showed me, because there's a little bit more than banging on an 'E-chord', which is what most people do. There's more to it than that. He said, 'I want you to do this on the song,' and he sang the song and played the rhythm guitar lick, and I went 'Oh, that's cute!', little suspecting it was gonna be huge."
Nancy Sinatra would later record one of Don Lanier's songs on her 1969 album NancyNick Bonney was the guitarist for the Nelson Riddle Orchestra.



In 2006, Pitchfork Media selected it as the 114th best song of the 1960s. Critic Tom Breihan described the song as "maybe the finest bitchy kiss-off in pop history".
The song was used in a number of ways related to the Vietnam War:
  • During television news coverage in 1966/67, the song was aired as a soundtrack as the cameras focused on US Infantrymen on patrol during the Vietnam War.
  • In 1966 and 1967 Sinatra traveled to Vietnam to perform for the troops. Many US soldiers adopted the song as their anthem, as shown in Pierre Schoendoerffer's academy award winning documentary The Anderson Platoon (1967).
  • The song's popularity with US Infantrymen in Vietnam was reprised in a scene in Stanley Kubrick's Full Metal Jacket (1987).
  • Sinatra played herself, re-enacting her 1960s performance of the song in Vietnam, in episode 6 (June 1988) of the television show China Beach.
  • In 2005, Paul Revere & the Raiders recorded a revamped version of the song using Sinatra's original vocal track. It appeared on the CD Ride to the Wall, Vol. 2, with proceeds going to help Vietnam veterans.
  • Variation of title used in dialog for Four for TexasFrank Sinatra's character says "They tell me those boots ain't built for walking" when Dean Martin's character is walking back towards him after trying to get away. At the end of the scene when Dean's character gets the drop on Frank's, he says "And you're right about those boots. They sure ain't made for walking."
Goodyear Tire and Rubber used portions of the song for its 1960s' ad campaign promoting its "wide boots" tires. Nancy Sinatra unsuccessfully sued Goodyear for using the song, claiming that it had violated her publicity rights. In the 1997 film Austin Powers: International Man of Mystery, the Fembots were introduced to the strains of the opening and closing notes of the song.

Friday, April 17, 2026

"Warsaw New Shield: Inside Poland's High Low Abrams and K2 Tank Mix

 

I have talked before about "Poland" and her security concerns, she has been rearming unlike the western European who has forgotten what defense appropriations are.  Poland has purchased "K2" and M1 tanks to bolster her defenses.  I also know that she has purchased Korean supersonic trainers for her airforce.  She know that her neighbor Ukraine is fighting Russia and if Ukraine falls, then Poland may have a hostile power on her border and Poland has a long institutional memory.  They never forgot the betrayal of 1939 then living under the boot of the Soviets for 44 years until the dissolution of the "Warsaw Pact" which was signed in Warsaw, but was controlled by the Soviets in Moscow who used it to control their client states.

        I got this from "Military Channel" on farcebook



READ πŸ’¬: In the high-stakes landscape of 2026, Poland has emerged as the undisputed heavy-armor capital of Europe. Facing a volatile "Zero Line" to the east, Warsaw has executed a "Full-Stack" procurement strategy that many Western observers initially doubted: the simultaneous deployment of two world-class Main Battle Tanks (MBTs), the American M1A2 Abrams and the South Korean K2 Black Panther.
By mastering the transition to this "High-Low" hybrid fleet, the Polish Land Forces (Wojska LΔ…dowe) are building an "Iron Ceiling" designed to achieve total overmatch against any potential armor threat in the Suwalki Gap.
Poland’s acquisition of 366 Abrams (a mix of M1A2 SEPv3 and M1A1 variants) serves as the "Sledgehammer" of the military. πŸ”»
πŸ“Œ Strategic Positioning: The Abrams fleet is primarily assigned to the 18th Mechanized Division (the "Iron Division") stationed in eastern Poland. Their mission is clear: act as a "Digital Trench" that stops an invading force in its tracks.
πŸ“Œ Survivability and Punch: With its depleted uranium armor packages and the legendary 120mm smoothbore gun, the Abrams is the "High" component capable of absorbing massive punishment while delivering "Industrial Warp Speed" destruction to enemy MBTs.
πŸ“Œ The Logistics Hub: In 2026, the Abrams Regional Sustainment Center in PoznaΕ„ has reached full operational capacity. This ensures "Industrial Resilience," allowing Poland to maintain and repair the fleet locally without relying on the "Silicon Ceiling" of overseas shipping.
While "low" usually implies inferior, in the Polish context, the K2 Black Panther represents a lighter, more agile "High-Tech" maneuver element. Poland’s order of 1,000 K2s (including the K2PL variant) is the "Industrial Endurance" play. πŸ”»
πŸ“Œ Agility in the Mud: Weighing roughly 55 tons compared to the Abrams’ 70+ tons, the K2 is perfectly suited for the soft, marshy terrain of northern Poland and the Masurian Lake District. Its hydropneumatic suspension allows it to "kneel," providing a superior "Digital Ghost" profile in defensive hull-down positions.
πŸ“Œ Autoloaded Lethality: The K2’s autoloader reduces the crew to three, allowing for a higher rate of fire and a smaller turret profile. This makes it an ideal "Software-Defined" predator for rapid-reaction maneuvers where speed is the primary defense.
πŸ“Œ Sovereign Industrial Capacity: The "K2PL" program represents Poland’s path to "Digital Sovereignty." By 2026, domestic production lines in PoznaΕ„ have begun rolling out Polish-made hulls, ensuring that Warsaw owns its "Full-Stack" armored supply chain.
Critics once argued that a dual-tank fleet would be a "logistical nightmare." However, Warsaw has turned this into a "Digital Resilience" advantage. πŸ”»
πŸ“Œ Operational Redundancy: By operating two distinct platforms, Poland avoids a "single point of failure." If a specific supply chain for American parts is throttled, the South Korean pipeline remains open, and vice versa.
πŸ“Œ Terrain Optimization: The high-low mix allows Polish commanders to match the tool to the task. Use the Abrams for "Iron Ceiling" static defense and urban breakthroughs; use the K2 for "Zero Line" flanking maneuvers and rapid reconnaissance in difficult terrain.
πŸ“Œ Training and Interoperability: Through "Minilateral" cooperation, Polish crews are training at the "Abrams Academy" in Biedrusko and South Korean facilities, creating a "Full-Stack" tank corps that is fluent in both Western and Pacific armored doctrines.
The Abrams and K2 hybrid fleet is the definitive signal that Poland has mastered the transition to a modern, multi-domain defense. By balancing American "brute-force" protection with South Korean "high-tech" agility, Warsaw has proved that "Industrial Resilience" is found in diversity. In the high-stakes landscape of 2026, Poland is no longer just a member of NATO; it is the Alliance's armored "Zero Line," standing ready with a shield made of both American steel and Korean silicon.

Thursday, April 16, 2026

"Stolen Identity Refund Fraud" (SIRF)

 

Since it is Tax season, I figured I would add this to my blog read, I shamelessly clipped this from "MalwareBytes Lab"  Every 2 weeks I get a news info from my employer on the latest scams that are running today and I make an attempt to stay informed.  I am amazed on the creativity of the scammers.  I cut and pasted the article, I hope the entire article came through, it is very informative.  

Your tax forms sell for $20 on the dark web

 | March 19, 2026
Tax scams on the dark web

Tax season is also peak season for identity theft. Criminals use stolen personal data to file fake tax returns and claim refunds before the real taxpayer does. Here’s how the fraud works, and how to protect yourself.

What is Stolen Identity Refund Fraud (SIRF)?

Stolen Identity Refund Fraud (SIRF) is a type of tax fraud where criminals steal someone’s personal information—such as a Social Security number and date of birth—and use it to file a fake tax return in that person’s name in order to claim a tax refund.

The fraudsters usually submit the false return early in the tax season before the real taxpayer files, so the refund is issued to them instead of the legitimate person.

The money is often sent to bank accounts, debit cards, or addresses controlled by the criminals. Victims usually discover the fraud only when their real tax return is rejected or when the tax authority, like the US Internal Revenue Service (IRS), reports that a refund has already been issued in their name.

How is it even possible? 

As Americans scramble to meet the annual tax filing deadline, a hidden ecosystem on the Dark Web kicks into overdrive, transforming tax season into a lucrative period of the year for international cybercriminals.  Shahak Shalev, Global Head of Scam and AI Research at Malwarebytes, said:

“People are expecting messages about taxes, refunds, and filings, which makes phishing emails and fake IRS alerts much easier to believe. At the same time, the personal data needed to commit tax fraud is shockingly cheap on the dark web. It’s no surprise scammers treat tax season like an annual opportunity.”

Behind the sudden influx of fraudulent refund claims lies a highly organized criminal supply chain deeply rooted in Russian-language underground forums. These specialized platforms act as the primary enablers of tax fraud.  

Rather than harvesting data from scratch, fraudsters can simply purchase massive datasets of stolen Personally Identifiable Information (PII), complete with ready-to-use W-2 and 1040 forms. For more sophisticated operations, Initial Access Brokers (IABs) auction off direct network access to compromised Certified Public Accountants (CPAs) and accounting firms.  

Beyond raw data and access, this underground economy provides a full suite of “fraud-as-a-service” tools—including on-demand services to forge supporting financial documents and dedicated instructional hubs featuring step-by-step tutorials. 

The black market of PII 

At the epicenter of this illicit commerce is one of the premier Russian-language underground forums, which serves as the definitive marketplace for fraudsters to buy and offload tax-related PII. The commoditization of this data is staggering in its efficiency, operating much like a traditional e-commerce platform.  

Our research team has captured several compelling samples of this trading activity, highlighting a clear pricing tier based on the freshness of the data and the target demographic. In one recently observed listing, a threat actor advertised a bulk package of 100 complete tax forms for $2,000—effectively pricing a fully documented stolen identity at just $20.  

Conversely, older data dumps from the 2024 tax year are heavily discounted to clear inventory; highly sensitive records specifically belonging to wealthy retirees and pensioners from that period are currently being traded for less than $4 per identity. 

Access for sale 

This staggering volume of tax-related data must originate from somewhere, and threat actors have identified the ultimate jackpot: US companies that handle tax preparation and accounting procedures.  

From an attacker’s perspective, it is infinitely more efficient to breach a dedicated business that serves as a centralized vault for this sensitive information than to cast a wide net trying to trick individual citizens into handing over their personal details. 



Our research team recently intercepted a prime example of this strategy in action, identifying a Dark Web listing for compromised network access to a US-based tax service firm. The victimized organization is a small business; a typical target of criminals looking for easy access for exploitable information.

Exploiting these systemic weaknesses, the threat actor was able to quietly infiltrate the company’s internal infrastructure and is now auctioning off direct access to a database containing the complete, highly sensitive PII of over 1,600 clients. 

A threat actor auctioning off access to a database of PII of more than 1,600 customers
A threat actor auctioning off access to a database of PII of more than 1,600 customers

Additional data for sale 

Even when threat actors encounter roadblocks during the fraud process—such as a missing piece of PII or a highly specific financial document required for verification—the cybercrime underground offers a comprehensive suite of on-demand services to seamlessly solve these issues.  

Our research team has tracked a dedicated black market known as “Cypher – Fullz and Docs,” which specializes in selling complete, ready-to-use sets of stolen US identities (commonly referred to in the underground as “fullz”) for as little as $0.75 per set.  

However, having the basic data is sometimes not enough to bypass required checks.

When additional paperwork is required to legitimize a fraudulent claim, threat actors simply turn to specialized forgery services like “Fakelab.” For a nominal fee ranging between $20 and $40, Fakelab operates as an illicit digital design studio, meticulously forging any tax-related document an attacker might need, from customized W-2s to realistic bank statement, ensuring the scam can proceed without a hitch. 

Tutorials and guidance 

The culmination of the tax fraud lifecycle—and often the most precarious phase for the attacker—is the cashout. To successfully finalize the scam and extract the stolen funds, fraudsters require a robust financial infrastructure, typically relying on compromised “drop” bank accounts and supplementary financial tools designed to launder the money and obscure their tracks.  

Unsurprisingly, the Dark Web ecosystem provides not just the tools but the detailed education necessary to execute this critical phase. Our research team identified a dedicated underground resource known as “Flava,” which serves as a centralized instructional hub. This platform is brimming with comprehensive, step-by-step tutorials specifically detailing how to orchestrate these complex cashout schemes targeting US citizens and residents. 

A Russian-language marketplace related to financial fraud techniques.
A Russian-language marketplace related to financial fraud techniques.

How to stay safe

Stolen Identity Refund Fraud is a reminder that identity theft doesn’t just lead fraudulent purchases. It can impact something as fundamental as filing your taxes.

Cybercriminals take advantage of underground marketplaces that sell stolen personal data, compromised business access, and tools designed to support fraud. It makes it easier for criminals to file fake tax returns quickly and at scale.

For taxpayers, the best defense is limiting the amount of personal data available to criminals, filing your taxes early, and paying attention to any warning signs that someone may be trying to use your identity.

Tax fraud often depends on criminals getting access to your personal information first. The less data they have, the harder it is for them to impersonate you. Here are some steps that can help reduce your risk:

  • File your taxes early. Submitting your legitimate tax return early makes it much harder for criminals to file one in your name first.
  • Protect your Social Security number. Avoid sharing your Social Security number unless it’s absolutely necessary.
  • Watch out for phishing emails and texts. Scammers often pose as the IRS, banks, or tax services to trick people into revealing personal data.
  • Use strong, unique passwords. If criminals gain access to your email or financial accounts, they may be able to collect the information needed to impersonate you.
  • Monitor your accounts and credit reports. Unexpected tax notices, rejected returns, or unfamiliar financial activity can all be warning signs of identity theft.
  • Consider an IRS Identity Protection PIN (IP PIN). An IP PIN adds an extra verification step when filing your tax return, helping prevent criminals from filing in your name.

Note: These dark web screenshots have been roughly translated from Russian. 


What do cybercriminals know about you?

Use Malwarebytes’ free Digital Footprint scan to see whether your personal information has been exposed online.