Thursday, January 6, 2011

How To Tackle evil groups on Facebook


Facebook is one of the fastest growing social networking websites on the Internet. Each day countless numbers of people flock to Facebook.com and join up with visions of reconnecting with people and having the ability to maintain contact with people they know. But there are hundreds of such disadvantages too, so far face book never had any provision or option to give thought before deleting any profile if it is reported by more than fifty people. I n the recent past it has become trend over face book if you want to eliminate someone’s existence due to your personal enmity you just create a group and ask them to report and the profile used to be deleted. Now the new option says if your profile is genuine and you are victim of such circumstances then you can very well write a mail to face book customer care or profile managers, about your problem. They will definitely look into the matter before removing any such profile.

The second option is that if you know the person who initiated for the elimination of your real and genuine profile, which has caused you losses, trauma or inconvenient position as per the need of situation you can initiate legal action against the said profile, but to do so you need to have all his profile details and also seek info from Face book under right to information.
There are many advantages to becoming a Facebook member and once you've successfully integrated yourself as a savvy user you'll see just how Facebook is a great tool to use for many purposes. That being said, you should be aware there are some significant drawbacks to Facebook as well. After you get started, chances are you'll begin to see the disadvantages. The good news is once you recognize the drawbacks; you can avoid these pitfalls and make your experience an advantageous one. There are a few more disadvantages of Facebook other than above mention:

Most people find after becoming a Facebook member that interaction tends to become time consuming. If you are hard-pressed for time, it's important to set time limits for yourself or you'll likely find it's highly possible to lose valuable time that could have been more productive elsewhere.The time consuming aspect of Facebook doesn't have to be a problem as long as you don't let it and stay in control.Some people find once they've become immersed in the Facebook culture they become addicted. Depending on your perspective, spending too much time on a single website with nothing else to show at the end of the day may be a huge disadvantage. Many find once they log into Facebook and begin poking around profiles, walls, groups, applications and the plethora of other activities Facebook offers, hours have gone by. This can become a problem in one's personal or professional life if the time spent on Facebook begins to take hold of one's life. For those who are prone to log-in constantly all day long to check out what's happening in their circle of Facebook friends, this may become problematic, especially if feeds are sent to e-mail and cell phones with new updates that make constant log-ins compulsory. A Facebook addiction can be construed as a disadvantage because of inordinate amounts of time spent on the website and self-imposed time limits aren't set. It's important to recognize the addiction signs so a Facebook membership doesn't become a problem.
Any time you open any sort of online account, you give up a degree of privacy. While most sites the private information you enter remains between Even the most distinguished product can have its disadvantages and can cause some predicament with one's character. Here are some of Facebook's disadvantages when it comes to relationships, emotional procrastination and depression, industry, cyber stalking and superficiality. Talk about long distance relationships, Facebook would be the one answer friends, family and lovers can count on. Though conducted on a distance, the system can still connect relationships right that very moment. But because relationships are built and strengthened just because of an Internet site, it tends to become weaker and it supports less emotional and most especially physical contact. Some relationships tumble down due to facts like these. Because Facebook adapts a free-flowing information environment, some uses it to target on other's emotional depression. Others send out procrastination just to bring down a specific person or even bully a student in the lower years. Targeting the emotions may cause a negative attitude towards a person's social relationship, physical activity, and academic issues. Even if the system overflows with so much advantages that one can be joyful of, there are still numbers of flaws that one can pinpoint. Internet industry is greatly affected by sites popping out to render a technical community. This is where the rivalry starts. The crowding is also becoming an issue. The program is considered as a negative diversion especially to the schooling industry, affecting students to divert their attention. Cyber stalking is one thing. Barging into someone's privacy is another. Come to think about it, cyber stalking and invading one's privacy goes hand in hand. A person who is engaged in cyber stalking tends to know everything about a person and uses it firsthand. A lot of a user's personal information is so accessible that almost everyone, even those who know you but you don't know of, can view it.

There are those who would want to be recognized as someone even in the Internet society. But thanks to sites like Facebook, some are already being characterized superficially because of the user's identification of their personal favorites. It's like being one with the world and being one with the trend without forming any kind of identity that one can point out to be unique. The important thing about having Facebook is that a person be discreet in the information that is given out. Privacy and other things stated above can be prevented if the user won't give out any kind of information that he considers private. There are groups on face book which actively works in reporting fake profiles just on the basis of assumptions or evil intentions..To avoid all above mentioned procedures the best you can do is stop participating in such evil intentions of a person.

Wednesday, January 5, 2011

Cattechie - soon to be launched


Cattechie

Catastrophe in Hackers world


F or the first time in the history, a journalist had turned into hacker and made her presence felt in the hacking arena. In a short span of time, the hacker aka Cattechie became a well known figure in the hacking world. Cattechie – Catastrophe in Hackers world is a book based on the true story of that journalist who tuned herself into a hacker to reveal the identities of large number of hackers and also tracing their criminal records. This book explains the trauma she went through during her research. Also, it throws light on all the hidden threats posed by the unethical hackers who portray themselves as patriotic and claim to do anything for India to the development of our country. But are they actually authentic? Who they are and who supports them, the good bad and ugly side of hackers are well emphasized in this book. Read the myths and misconceptions about the Injectors and exploit writers who are known for supporting Hactivism and terrorism. Flight of arrested hackers and their hair raising traumatic experiences with police and jail authorities is something worth reading. The book also speaks about the inadequate law and enforcement, corruption and unlawful gestures of our judicial systems which are the major curses to our society and many such issues regarding Hackers. Another interesting subject in this book is the enlightenment of the feminine side that is into this profession. Though they are equally capable as their male counterpart, they lack on many fronts and have to face many difficulties to maintain their existence. Who these girls are and why are they here? How they came into hacking, world’s top ten female hackers and exploit writers, their life and few guidelines to help authorities with substantial foothold in dealing with ongoing threats. The book will be launched very soon. Please grace the event with your presence.

Monday, January 3, 2011

FATE OF YOUNG HACKERS IN JAIL


W hile to Delhi I and chota hacker boarded in flight and we happened to meet a famous film director Shekhar Kapoor, for a moment it was like dream come true as I always wanted some intellectual director like him to work on cyber terror documentary or film of mine. Immediately I went to him and presented him my books.. Looking at the cover he was quite amazed and said “hey vaidehi how come you with Hackers? In reply i just smiled and gave him the proposal to work on same, he was excited and happy, immediately he gave me his cell number to get in touch, but I asked for his email. Very promptly he replied saying “I will never give you my e-mail id what if I get hacked and winked” I had to leave him as flight was above to take off.

It was perfectly alright that he refused to share his email details but somewhere that pinched me because the word Hacker is still a taboo in our society and country. hackers are not treated with due respect everyone are scared of them probably that can be the reason why young boys or hackers land in to juvenile jails and have to go through languishing life later, teenagers who are facing such charges in day to day life for cyber crimes are unnoticed. They are just dumped in jails on own fate. Go to any metropolitan cities, and visit juvenile jails and see how these young hackers are treated. Their crime is nothing more than spoofing, making porn, or hacking some website for some money paid by other person, carding and purchasing domain or website. The young adults are kept in the company of hardcore criminals, scamsters, and murderers. Is this fair? Crime committed by these children is not as harsh as the other crimes are, but crime is crim. No one is spared as per the law of land.

What India lack is the interpreters of laws, laws are made effective but these interpreters are not confident enough to defend the accused so the judge and judiciary are equally ignorant about the subject on a large. The hacking and crime related cyber space are generally misunderstood to the extent, that convincing the authorities becomes difficult, in such cases generally hackers family has to be influential enough to apply sources or they have to be resourceful to pay enough bribe and rescue their child or else leave the child on his or her own fate. As per the statistics 398 cyber crime cases are under trial and the trauma their families are going through is heir rising. More over our system and police department is capable enough of arresting a cat and making it confesses to be lion. Why, who and where are sub-judicial matters. Moreover media plays every possible spicy role when it comes to highlight such things. It never fails to gain TRP in such issues, the court verdict is always far way thing due to lengthy judiciary procedures in India but media decides the fate nothing less than the judge.
Between the judiciary and media family reaches to such a traumatic situation either they are forced to accept the social stigma or leave the convict on its fate. Right now cyber terrorism is the biggest or the prime concern to government. Government needs strong thread to grab these so called devils of hidden world they are none other than the hackers. God forbidden if tomorrow the combing operation gets started to clutch the hackers, then nobody knows who to be blamed and where to look up for the rescue.
They say anything for India, agreed! I love this army of young boys trying to disagree on certain atrocities done to our country. But the question at large is, are they capable enough stopping terrorist coming down to India? Are they capable enough of tracing the terrorist and informing government? Are they able to control cyber crime and threat to our country? When they are not capable of doing anything rather just defacing websites, and by doing this they are provoking others to do the same with us. They are ruling your embassy; your important websites without leaving any traces are we capable enough of stopping them doing this? Even if you are capable, government has no faith in you. Whenever Indian government websites were compromised, Pakistani government has always replayed saying its reaction to the action taken by the Indian hackers.
Any ways read Cat techie book to get the statistics of Indian hackers lured in crime and yet scot free from legal clutches, and read the horrifying plight of arrested hackers.
Recently arrested Hackers nobody knows what happened to them...............

These hackers also send you sometimes send you deceptive e-mails which will look like they're coming from a bank. It'll ask you to click on some link which will take you to some website which is not your bank's website ask you to give your details and the moment you give your details, you're in trouble," explains cyber crime lawyer, Pawan Duggal.Experts also say that accessing your account from a cyber cafe could be the biggest mistake you could make as the information gets saved in some form in the system making it very easy for a hacker to use your account at his will.

• As reported in the Times of India, Prashant Amarnarayan Jha and his accomplice Sudipkumar Sinha were arrested for hacking a travel agent’s website and booking international air tickets leading to a fraud of Rs. 65,000 to Indigo Airlines. Prashant was held at his Nallasopara residence on July 6 for cyber crime.

• On November 4, 2010 the Mumbai Mirror reported that the when Gauri More, and IT professional from Andheri lost her debit card, which was swiped for Rs 33,000 minutes after it was lost, she had little hope of finding the culprit who used it. However, the thief was arrested when she went back to the store from where she had bought a laptop with the card, as it wasn’t functioning properly.

• On November 19, 2010, the Mid-Day reported that three people were arrested recently after the Malad police unearthed a nexus of misuse of fake credit cards at a shopping centre in Malad, the police said yesterday. The accused include the promoter of the shopping centre Ganesh Jaiswal, cashier Prathamesh Nayakar and their accomplice Pawan Yadav.

• On 28th December 2010, The Times of India reported that Cyber Crime investigators of the Crime Investigation Department (CID) have arrested three members of a Nigerian fraud team in Delhi. The gang had been duping people in the name of Microsoft and Coca Cola lotteries. Police recovered Rs 20,000 cash from the accused.

• On 31st December 2010, The Hindu reported that the Central Crime Station police on Thursday arrested a four-member gang and seized Rs. 3.3 lakh from it in connection with different attention-diversion theft cases reported in the city during the last one year. Briefing media persons on the arrests, Deputy Commissioner of Police M. Ravindranath Babu said that the accused used to select their targets at banks and ATM centres.

• On 30th December 2010, The Times of India reported that Delhi Police have blown the lid off a banking scam in the city in which former and serving bank agents duped customers to open accounts in several banks and diverted the amounts to their own accounts. The fraudsters appointed telecallers who talked to customers they picked from bank databases, especially those who rarely visited banks and weren’t very conversant with procedures. They sweet talked customers luring them with offers of high interests, free credit card and attractive benefits.

• On 30th December 2010, The Hindu reported that all the four accused in the State Bank of Travancore fraud case were produced before the Chief Judicial Magistrate’s Court here on Wednesday afternoon. The court remanded the accused, K.V.Princy, a 25-year-old data entry operator at the SBT main branch here; her mother, Anandavally, 48; brother, K.V. Pradeepkumar, 21; and an acquaintance, Sunilkumar, 40, of Ezhamkulam, to Pathanamthitta Sub-Jail for 14 days.

• On 28th December 2010, The Times of India reported that Cyber Crime investigators of the Crime Investigation Department (CID) have arrested three members of a Nigerian fraud team in Delhi. The gang had been duping people in the name of Microsoft and Coca Cola lotteries. Police recovered Rs 20,000 cash from the accused.

• After a Noida businessman reported the loss of Rs 1.6 crore from his bank account, police have cracked a ring of criminal hackers who exploited several common loopholes in the internet banking system. The Uttar Pradesh police have arrested five hackers who allegedly siphoned off Rs 1 crore 66 lakh from the account of a Noida based exporter.

read tomorrow the punishment awarded by Government of India for the bloggers and website owners promoting Hacking tutorials and tools. and the laws related piracy.
--------------------------------------------------------------------------

Sunday, January 2, 2011

About public pages

About public pages

CATTECHIE HERE AGAIN

Jeff Moss sold Black Hat to CMP Media

It will just be background noise, or a constant low-intensity battle going on between hacking groups. Legislation is not going to stop it because it's basically a technical problem. After the recent incidence of CBI site getting hacked by the Pakistani hackers, I felt that India too should have one like Jeff Moss, a black hat hacker. As we have entered a new phase of dependence on the internet, we have moved beyond consumer oriented shopping sites, addicting puzzle places, and social networking platforms. The internet has become the default platform to rally support for political candidates, voice dissent with the status quo, expose governmental misdeeds, spread news from citizen to citizen, and, if necessary, plan civil disobedience. These are the very underpinnings of civil society and governance. Sure it is nice to search Amazon for a new movie to buy, but that pales in comparison when you can participate in the debate and election of a new president. These days, I am busy doing intense research on cyber crime, underground forums, and what has come in my way and hooked my attention is inj3ct0rs, the amazing brains but the curse for cyber security. During my search, once I landed at milw0rm, and JF name came across me. His profile was so attractive that it really impressed me. Actually I wanted some info about Jeff moss. There are lots of myths and misconceptions about him amongst hackers. While some says that he never comes across people, some others say that he hides his face while addressing seminars. Few say that nobody is aware of his age, his face, and his existence. <>Jeff Moss, also known as The Dark Tangent, is the founder of the Black Hat and DEF CON computer hacker conferences. Moss graduated from Gonzaga University with a BA in Criminal Justice. He worked for Ernst & Young, LLP in their Information System Security division and was a director at Secure Computing Corporation where he helped establish the Professional Services Department in the United States, Asia, and Australia. In 2005 Jeff Moss sold Black Hat to CMP Media, a subsidiary of UK-based United Business Media, for a reported $13.9 million USD. DEF CON was not included in the sale. In 2009 Moss was sworn in to the Homeland Security Advisory Council of the Barack Obama administration. About 4,500 hackers have attended his various conferences over the past three years, but the actual number of hackers is much higher, He says political-motivated hacking will continue to escalate and more countries will get involved.

to download this entire magazine please log on to www.hackers5.com

CATTECHIE HERE AGAIN

What is Cyber-terrorism?

In the wake of the recent computer attacks, many have been quick to jump to conclusions that a new breed of terrorism is on the rise and our country must defend itself with all possible means. As a society we have a vast operational and legal experience and proved techniques to combat terrorism, but are we ready to fight terrorism in the new arena – cyber space? A strategic plan of a combat operation includes characterization of the enemy’s goals, operational techniques, resources, and agents. Prior to taking combative actions on the legislative and operational front, one has to precisely define the enemy. That is, it is imperative to expand the definition of terrorism to include cyber-terrorism. As a society that prides itself on impartiality of justice, we must provide clear and definitive legislative guidelines for dealing with new breed of terrorism. As things stand now, justice cannot be served as we have yet to provide a clear definition of the term. In this light, I propose to re-examine our understanding of cyber-terrorism. There is a lot of misinterpretation in the definition cyber-terrorism, the word consisting of familiar "cyber" and less familiar "terrorism". While "cyber" is anything related to our tool of trade, terrorism by nature is difficult to define. Even the U.S. government cannot agree on one single definition. The old maxim, "One man's terrorist is another man's freedom fighter" is still alive and well. The ambiguity in the definition brings indistinctness in action, as D. Denning pointed in her work Activism, Hactivism and Cyberterrorism, "an e-mail bomb may be considered hacktivism by some and cyber-terrorism by others" It follows that there is a degree of "understanding" of the meanings of cyber-terrorism, either from the popular media, other secondary sources, or personal experience; however, the specialists’ use different definitions of the meaning. Cyber-terrorism as well as other contemporary "terrorisms" (bioterrorism, chemical terrorism, etc.) appeared as a mixture of words terrorism and a meaning of an area of application. Barry Collin, a senior research fellow at the Institute for Security and Intelligence in California, who in 1997 was attributed for creation of the term "Cyberterrorism", defined cyber-terrorism as the convergence of cybernetics and terrorism. In the same year Mark Pollitt, special agent for the FBI, offers a working definition: "Cyberterrorism is the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents." Since that time the word cyber-terrorism has entered into the lexicon of IT security specialists and terrorist experts and the word list of mass media "professionals". One of the experts, a police chief, offers his version of definition: "Cyber-terrorism – attacking sabotage-prone targets by computer – poses potentially disastrous consequences for our incredibly computer-dependent society." The media often use cyber-terrorism term quite deliberately: "Canadian boy admits cyberterrorism of his family: "Emeryville, Ontario (Reuter) - A 15-year-old Canadian boy has admitted he was responsible for months of notorious high-tech pranks that terrorized his own family, police said Monday" A renowned expert Dorothy Denning defined cyber-terrorism as "unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives". R. Stark from the SMS University defines cyber-terrorism as " any attack against an information function, regardless of the means" Under the above-mentioned definitions of cyber-terrorism one can only point to the fact that any telecommunications infrastructure attack, including site defacing and other computer pranks, constitute terrorism. It means that cyber-terrorism has already occurred and we "live " in the epoch of cyber terror. However, another expert, James Christy the law enforcement and counterintelligence coordinator for the DIAP (Defense-wide Information Assurance Program), which is steered by the office of the assistant secretary of defense for command, control, communications and intelligence, states that cyber-terrorism has never been waged against the United States. "Rather, recent hacking events – including a 1998 web page set up by a supporter of the Mexican Zapatistas rebel group, which led to attacks on the U.S. military from 1,500 locations in 50 different countries – constitute computer crime. William Church, a former U.S. Army Intelligence officer, who founded the Center for Infrastructural Warfare Studies (CIWARS) agrees that the United States has not seen a cyber terrorist threat from terrorists using information warfare techniques. "None of the groups that are conventionally defined as terrorist groups have used information weapons against the infrastructure" Richard Clarke, national co-ordinator for security, infrastructure protection and counterterrorism at the National Security Council offered to stop using "cyberterrorism" and use "information warfare " instead The above-mentioned observations drive a clear line between cyber-terrorism and cyber crime and allow us to define cyber-terrorism as: Use of information technology and means by terrorist groups and agents. In defining the cyber terrorist activity it is necessary to segment of action and motivation. There is no doubt that acts of hacking can have the same consequences as acts of terrorism but in the legal sense the intentional abuse of the information cyberspace must be a part of the terrorist campaign or an action. Examples of cyber terrorist activity may include use of information technology to organize and carry out attacks, support groups activities and perception-management campaigns. Experts agree that many terrorist groups such as Osama bin Ladenn organization and the Islamic militant group Hamas have adopted new information technology as a means to conduct operations without being detected by counter terrorist officials. Thus, use of information technology and means by terrorist groups and agents constitute cyber-terrorism. Other activities, so richly glamorized by the media, should be defined as cyber crime.

Reference:Computer Crime reserch center

CATTECHIE HERE AGAIN

Hacker between Wikileaks, attempts at censorship and chaos

Rob Gonggrijp, founder of the Amsterdam provider XS4ALL , hacker scene said at the opening of the 27th Chaos Communication Congress ( 27C3 ) in Berlin on Monday that the coming years after the by Wikileaks triggered the Cable Gate are simply not quite mastered. The publication of hundreds of thousands of previously classified as secret U.S. diplomatic papers "is pressure to increase internet censorship," said the former editor of Hack-Tic . The FBI and U.S. intelligence agencies pressed for a new law on Internet surveillance, after which they Provider encrypted communication in plain text would have passed already. Overall, attempts to deprive the world, internet freedoms, including freedom of information massively restrict. The hacker community share the principles of Wikileaks, but not all their relatives were in a "war" with a superpower, Gonggrijp said: "We do not compromise the freedom of expression." The Dutchman criticized in this sense, the union activists Anonymous . It does not work, the server PayPal or Mastercard, the Wikileaks spinning off of the money supply, short term tie up and little attention to direct an order. Real "hackers" would but at least not their real names in the metadata can be sent out press releases here, quipped Gonggrijp. Those who do not have enough "maturity" as a traveler reaches have data yet, should be better not to connect to the network. For the hacker to enter rulers and citizens with similar whistleblower Wikileaks and Internet platforms in the new territory together. "Many politicians recognize that their advisers to tell them not to what is going on." Is the tax they had in hand, but it could not really move, let alone turn things around. The most sought therefore looking engine only halfway relaxed and hope "that the accident happened later." This opening sets the stage for tens of thousands of spin doctors who examined her speed to sell the truth to the public. Hackers and geeks would not know all the answers to the current problems, but had at least parts of it. remained generally Gonggrijp in his skeptical view of 2005 that the hacking community after 11 September 2001 and then built up the monitoring infrastructure, "lost the war" did. He sees the consequences but not as fatal as it was five years ago. It will probably a bit "chaotic" in the coming years - and many news sites would look similar, as is already the conspiracy specialized in the hacker's Blog Fefe . The data not only travelers from the Chaos Computer Club ( CCC ), the conference traditionally held after the Christmas understood, but already slightly better than the rest of the world, "how does chaos" and to master it. Also, a small group of thoughtful people could thus change the world, but before were still enough slots available. Gonggrijp therefore considers it important, and trust between hackers to strengthen cohesion. He advocated for it, even the annual meeting in more and more from all seams bursting Berliner Congress Center ( bcc ) at Alexanderplatz "can grow to be careful" and to seek a larger venue. This year CCC had the much sought after around 4,000 tickets available for four days for 70 € per piece only available in advance among the people brought. The Congress was thus well within a few hours before sold out, single day tickets will only be on Tuesday in manageable quantities to give it. This was despite the streaming offers too much "fresh blood" from outside the conference held and prevented from visiting, complained Gonggrijp. That the Chaos Communication Congress with an increase to a similar fate befall the event as a mass without great networking factor decried Defcon in Las Vegas, believes the veteran hackers do not like. These have been at a lower number of visitors on a problem of booze and too many participants from military and government also suffered. Jeremie Zimmermann, spokesman for the civil rights group La Quadrature du Net warned, also warned that "increasing power" politics and economics from attacking the network. This copyright will, above all, the hook of "piracy" and the enforcement effort, as the negotiations on the disputed ACTA showed. "We have a battle to beat the heads, called Zimmermann, therefore the hackers. This is about staking psychological frameworks. to make clear "is about is to exchange and share" culture that promotes. Culture and knowledge, ultimately exist only if they were shared. Wikileaks assured full support to Zimmer. courtasy- heise online CATTECHIE HERE AGAIN

STORY OF CATTECHIE and VAIDEHI SACHIN

CATTECHIE HERE AGAIN
CATTECHIE HERE AGAIN

A true story of CATTECHIE

CATTECHIE HERE AGAIN