CPLC Chief says 'Pakistan a safe heaven for cyber criminals'

CPLC Chief says 'Pakistan a safe heaven for cyber criminals'

The cyber crimes of multiple kinds in Pakistan have increased by five times over the past four years. Pakistan Daily Times News today reported that, Citizen Police Liaison Committee (CPLC) Chief through a letter on Saturday, apprised the Federal Law, Justice & Parliamentary Affairs Minister that in the absence of Prevention of Electronic Crime Ordinance (PECO) Law 2007, lapsed in 2010, Pakistan had become a safe heaven for cyber criminals and con artists whereas the law enforcement agencies were unable to take legal action against them.

According to the Cyber Crime Unit (CCU), a branch of Pakistan's Federal Investigation Agency (FIA), 62 cases were reported to the unit in 2007, 287 cases in 2008 and the ratio dropped in 2009 but in 2010 more than 312 cases were registered in different categories of cyber crimes.

There are numerous complaints regarding fake calls deceiving citizens into receiving a phony prize. The normal practice is that the criminals calls the supposed prize winner, and gives him three options to collect his prize money i.e. have the amount transferred in his account through cheque, visit Islamabad to receive the prize money or receive the prize at door step. Thereafter, the caller asks the victim to pay Rs 10,000 through easy paisa transfer and or by cellular easy load for the prize to be processed and once sent the receiver disappears. “ CPLC Chief said.

Cybercrime in Pakistan has its global impact especially with cyber terrorism, example of this, the disappearance of the The Wall Street Journal correspondent on Jan. 23, 2002, from Pakistan's southern city of Karachi and his captors started sending e-mails to newspapers, then the investigators starting to trace the e-mails sent by the kidnappers, this was one of the important reason for establishing the National Response Center for Cyber Crimes in Pakistan to combat against cybercrimes.

After receiving several complains, Sindh CPLC Chief Ahmed Chinoy asked FIA to take up such cases for necessary action as per law. In response to Chinoy’s letter, FIA told him that due to the absence of PECO, they were unable to take any action against the offenders.Sindh CPLC Chief wrote a letter to the Federal Law, Justice & Parliamentary Affairs Minister to draw his attention towards the PECO Law 2007, which had been lapsed in 2010.

Urging the federal minister to revoke PECO, Chinoy stated that these criminals were intentionally harming the physical, mental and financial position of their victims by using modern telecommunication networks such as internet and mobile phones.

There are a number of cyber crimes in Pakistan mainly including cyber pornography, sale of illegal articles, online gambling, intellectual property crimes, email spoofing, cyber stalking, forgery, unauthorized access to computer systems/networks, theft of information contained in electronic form, virus attacks, Trojan attacks, Internet time theft, password cracking and financial cyber crimes (hacking of ATM card numbers and bank accounts).Official data suggest that the hacking of ATM card numbers and bank accounts are on the rise in Pakistan.

Warez-BB Hacked By 1337

The worlds best warez forum has been (warez-bb.org) Hacked by 1337 & KhantastiC Haxor.
Warez-BB is one of the worlds largest warez forum / site on the net. The hackers had given a security warning to the administrators.

Site Hacked: http://warez-bb.org/

Mirror: http://www.zone-h.com/mirror/id/16395971

Why US Aircrafts Drop Spy Devices in Syrian ?

Why US Aircrafts Drop Spy Devices in Syrian ?


Last week Iranian engineer claim to hijack U.S. drone by hacking GPS system using GPS spoofing. On December 14, residents of a small town in northern Syria reported seeing unidentified aircraft circling overhead, and dropping several small items attached to mini-parachutes , which entered Syrian airspace through the Turkish border. The gadgets, pictured here, look suspiciously like surreptitious listening devices. Residents say the question is : who dropped them, and why?

The sources explained that the aircrafts that dropped the devices were American, not Turkish. They added that the aircrafts took off from Incirlik air base, southeast of Adana, which is 130 km away from the city of Afrin, mainly to belong to the Kurdish nationalists.

This action aims at eavesdropping on communications between the Syrian troops, locating their spots accurately and collecting any information about it in order to provide them to U.S. and Turkish authorities, and perhaps to the Syrian Free Army as well as monitoring any military movement by the PKK in the region,” from the sources.

Syrian newspaper Al-Hakikah (The Truth), which supports the opposition Syrian National Council, said the suspected spy gadgets weigh about 90 grams each and bear “Made in Germany” labels, as well as “GRAW DFM-06” inscriptions. Graw is a Nuremberg-based German company that produces radiosondes, small radio transmitters used in weather balloons, that measure various atmospheric parameters and transmit them to fixed receivers. But Al-Hakikah reports that the devices found in Afrin seem to transmit GPS coordinates, and appear to have been modified to intercept radio communications. Some suspect that the devices are aimed at eavesdropping on the communications of Syrian government troops and of Syrian Air Force planes, which are engaged in an increasingly bloody conflict against the opposition Syrian National Council. This, says Al-Hakikah might point to American intelligence agencies, which are known to support the opposition Syrian Free Army, as the originators of the modified radiosondes.

This can be attempt to monitor suspected activities of the Kurdistan Workers Party (PKK), an armed secessionist group fighting the Turkish government, which is known to operate from bases in northern Syria.

On other Hand U.S. intelligence agencies have pin pointed many of the Chinese groups responsible for spying in the U.S., and most are sponsored by the Chinese military, according to people who have been briefed on the investigation.

A spy drone came down in Iran - no apology from Obama Administration - give us the drone backThe US has asked Iran to free "without delay" a US man of Iranian descent described by Tehran as a CIA spy. So Why is America spying on others ?

Call spoofing - Evolution of Cybercrime in Growing Children

Call spoofing - Evolution of Cybercrime in Growing Children

The Hacker News & 5 Other Top IT Security Sites are Sponsoring a Special Edition January 2012Magazine under a Cyber Security Awareness Campaign called "ENTER AT YOUR OWN RISK". Our goal is to provide the most up-to-date information on a wide variety of topics that address the tricky and complicated world of hackers and hacking. Lets know about "Call spoofing" and How much easy it is for kids to do Call spoofing.

First of all the term ‘cyber crime’ is a misnomer. The concept of cyber crime is not radically different from the concept of conventional crime. Both include conduct whether act or omission, which cause breach of rules of law and counterbalanced by the sanction of the state. Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime.

The computer may be used as a tool in the following kinds of activity- financial crimes, sale of illegal articles, pornography, online gambling, intellectual property crime, e-mail spoofing, forgery, cyber defamation, cyber stalking. The computer may however be target for unlawful acts in the following cases- unauthorized access to computer/ computer system/ computer networks, theft of information contained in the electronic form, e-mail bombing, data didling, salami attacks, logic bombs, Trojan attacks, internet time thefts, web jacking, theft of computer system, physically damaging the computer system.

Call spoofing or Caller ID Forging the practice of causing the telephone network to display a number on the recipient's caller ID displaywhich is not that of the actual originating station; the term is commonly used to describe situations in which themotivation is considered nefarious by the speaker. Just as e-mail spoofing can make it appear that a message came fromany e-mail address the sender chooses, caller ID forging can make a call appear to have come from any phone number thecaller wishes. Because people are prone to assume a call is coming from the number (and hence, the associated person,or persons), this can call the service's value into question.

Children are a lot smarter than we always give them credit for. This is especially true when it comes to technological issues. Few could argue that they know more about the Internet, computers or cell phones, than their children do. Changing times have called for an increased awareness in how your kids’ extensive knowledge of the Internet may not be a good thing. In this article you will come to know that , How much easy it is to do a prank spoofed call Free of Cost.

Caller ID spoofing has been available for years to people with a specialized digital connection to the telephone company, called an ISDN PRI circuit. Collection agencies, law-enforcement officials, and private investigators have used the practice, with varying degrees of legality.The first mainstream Caller ID spoofing service, Star38.com, was launched in September 2004. Star38.com was the first service to allow spoofed calls to be placed from a web interface. It stopped offering service in 2005, as a handful of similar sites were launched.In August 2006, Paris Hilton was accused of using caller ID spoofing to break into a voicemail system that used caller ID for authentication. Caller ID spoofing also has been used in purchase scams on web sites such as Craigslist and eBay.

On Internet you will get various Free and Paid Call Spoofing Services, One of them we have tested and going to Demonstrate here. A website called "Crazycall.net" is giving to service to do Free Spoofed Calls in any Country Free of Cost and Yes it is as much easy as to prepare sandwich :P
Steps to Do Spoofed Call :
1.) Open Crazycall.net and Select Country where you want to call.
2.) Enter Number A = The Fake number you want to Display to Victim
3.) Enter Number B = Victim's Number
4.) Now Click "Get me a Code" . Done !
5.) On right side of page you will get A mobile number + Five Digit Unique Code.
6.) Now do a call from another number (say Number C) on Given number in Step 5.
7.) It will ask you to Enter the Code, that you get in Step 5.
8.) Done ! The Victim with Number B will Get a Call from Fake number A, Even you are using Number C for calling.

This way anyone can easily perform a Spoofed call attack ! It would be a fair assessment to say that child related Internet crime levels have increased in the past two decades. The Indian government has asked Internet companies and social media sites like Facebook to prescreen user content from India and to remove disparaging, inflammatory or defamatory content before it goes online, three executives in the information technology industry say. But Google says won’t remove material just because it’s controversial.

Also Every other tweet today has been about SOPA and American Censorship Day. SOPA stands for the Stop Online Piracy Act. It is one of two bills being considered by congress today. The other is the Protect-IP Act. The Electronic Frontier Foundation describes SOPA as the "blacklist bill" because it would "allow the U.S. government and private corporations to create a blacklist of censored websites, and cut many more off from their ad networks and payment providers."That means the Attorney General would have the power to cut off select websites from search engines like Google. It could also cut off advertisers and payment processors like Visa from the sites. The Attorney General could essentially kill all of a site's traffic and revenue in a matter of days.SOPA only allows targeted sites five days to submit an appeal. That doesn't leave much time for them to defend themselves before losing their site and their revenue altogether.

With the ever-present risk of becoming a victim of cybercrime, surfing the internet can be a terrifying experience. Identity theft is increasingly on the rise, with cybercrime being the leading cause. As issues around cybercrime are expected to continually rise in the coming year.

Microsoft Introduced Picture Passwords For Windows 8

The experience of signing in to your PC with touch has traditionally been a cumbersome one. In a world with increasingly strict password requirements—with numbers, symbols, and capitalization—it can take upwards of 30 seconds to enter a long, complex password on a touch keyboard. To get rid of all these stuffs Microsoft is introducing a new technology. Using that you can login ti your Windows 8 PC with apicture passwordLikely designed for touchscreens, users are prompted with a familiar picture of their choice and asked to make a series of finger gestures on the screen to setup password protection. Microsoft recommends that users pick at least three gestures and can choose between a circle, a tap and a line drawn between two points. When a user logs into a Windows 8 machine using Picture Password, they simply have to replicate the correct placement, order and direction of all gestures.

Microsoft dictates the set of three different gestures after research showed that login time was cut from 17 seconds using free form gestures to 4 seconds using preset gestures. Users don’t have to be 100 percent accurate with the placement of the gestures as the image is broken up into a grid and the combination of replicating the three gestures is assigned a percentage score each time the login process is attempted through an algorithm. If the score is 90 percent or above, the user gains access to the system. Microsoft also outlined how security is increased with the Picture Password method. For instance, if a user creates a six-character text password with at least one uppercase letter and one number, there would be 7 billion combinations available. However, if a user creates a picture password with six gestures using only taps, that number increases to 1.3 trillion combinations. Even further, reducing the amount of gestures to five and including at least one circle and one line gesture within the group increases the number of combinations to approximately 70 trillion. The Windows engineering team has just started building the Picture Password functionality and hopes to include it within the final version of Windows 8 likely released during 2012.
You can find more information about this article on the Windows 8 Developer Blog 

US Chamber of Commerce Under Massive Cyber Attack From China

Massive cyber attack on US Chamber of Commerce.  According to an exclusive report it is said that A group of hackers in China breached the computer defenses of America's top business-lobbying group and gained access to everything stored on its systems, including information about its three million members, according to several people familiar with the matter.
The break-in at the U.S. Chamber of Commerce is one of the boldest known infiltrations in what has become a regular confrontation between U.S. companies and Chinese hackers. The complex operation, which involved at least 300 Internet addresses, was discovered and quietly shut down in May 2010. It isn't clear how much of the compromised data was viewed by the hackers. Chamber officials say internal investigators found evidence that hackers had focused on four Chamber employees who worked on Asia policy, and that six weeks of their email had been stolen. It is possible the hackers had access to the network for more than a year before the breach was uncovered, according to two people familiar with the Chamber's internal investigation. One of these people said the group behind the break-in is one that U.S. officials suspect of having ties to the Chinese government. The Chamber learned of the break-in when the Federal Bureau of Investigation told the group that servers in China were stealing its information, this person said. The FBI declined to comment on the matter. A spokesman for the Chinese Embassy in Washington, Geng Shuang, said cyberattacks are prohibited by Chinese law and China itself is a victim of attacks. He said the allegation that the attack against the Chamber originated in China "lacks proof and evidence and is irresponsible," adding that the hacking issue shouldn't be "politicized." 

In Beijing, Foreign Ministry spokesman Liu Weimin said at a daily briefing that he hadn't heard about the matter, though he repeated that Chinese law forbids hacker attacks. He added that China wants to cooperate more with the international community to prevent hacker attacks. 
The Chamber moved to shut down the hacking operation by unplugging and destroying some computers and overhauling its security system. The security revamp was timed for a 36-hour period over one weekend when the hackers, who kept regular working hours, were expected to be off duty. For more information click Here 

Mochahost Web Server Rooted, More Than 1250 Sites Hacked By Teamgreyhat

Few days earlier well known hackers group Teamgreyhat has rooted the Guyana Server and thus they hacked more than 1500 websites. Now TGH strikes again, this time another big attack happens. Mochahost Web hosting company's server compromised and more than 1250 websites get hacked by TGH hackers. After this attack TGH authority claimed them selves as the "Achilles of Cyber World". To emphasizes this statement they changed the background music of the hacked page and used the famous quotes of well-known movie Troy. If you dig the history you will find that TGH has already made their own identity on the web by hacking many web servers such as Theexpert ServerMalaysian Web-hostCybertek Web-Server5gbfree.comGuyana Server and many more. Again this attack proves the strength of TGH. All the hacked sites can be found on a pastebin written by Teamgreyhat. 

Press Release of TGH:- 
"Guyana Server Rooted, 1500 Websites Hacked By Teamgreyhat
T-Series Official Website Hacked By Teamgreyhat (TGH)
Theexpert Server Rooted By TGH
Malaysian Web-Hosting Company's Security Compromised, Entire Server Dumped By TeamGreyhat
Cybertek Web-Server Rooted By TGH 
& & & Many more..............
Yet moooooooooooore to Come.................

The Common question arise and that is who is TGH and what we are capable of???
Here is the Answer

We are TGH 
We are Warriors 
We are Achilles of Cyber World
"Remember, I will still be here
As long as you hold me, in your memory

Remember, when your dreams have ended
Time can be transcended 
Just remember me

I am the one star that keeps burning, so brightly,
It is the last light, to fade into the rising sun

I'm with you
Whenever you tell, my story
For I am all I've done

Remember, I will still be here
As long as you hold me, in your memory
Remember me

I am that one voice in the cold wind, that whispers
And if you listen, you'll hear me call across the sky

As long as I still can reach out, and touch you
Then I will never die

Remember, I'll never leave you
If you will only
Remember me

Remember me...

Remember, I will still be here
As long as you hold me
In your memory

Remember, when your dreams have ended
Time can be transcended
I live forever 
Remember me

Remember me
Remember... me..."

Related Posts Plugin for WordPress, Blogger...