Log in

Cyber-Warfare Community [entries|friends|calendar]
An Activist account against Cyber-warfare

[ userinfo | livejournal userinfo ]
[ calendar | livejournal calendar ]

Cyber_warfare: Russia <-----> Ukraine ... (live) [31 Mar 2010|09:14am]

Russia <-----> Ukraine ...

--->  community.livejournal.com/bryhada_ua/
post comment

[14 Feb 2008|11:11pm]

[ mood | busy ]

you might have a computer virus that attacks your windows core files, please install spywareblaster and do a scan, and if you dont have a virus scanner, please get one asap, get AVG its free, also do you have a firewall? You might want to get a firewall as well, its free if you get segate, you can download all these from www.softe.org free virus spyware downloads download section. Good luck and PM me if you have any questions.

PS: your computer might be to late to save at times if the virus has done its damage, and you might need to install windows again.
what operating system do you use?

post comment

[28 Sep 2005|12:08pm]

When my computer starts up I don't have a Start menu or desktop icons?
Anything I can do?
I did earlier today, I can only sign online because my AIM opens a internet windows.
post comment

[28 Dec 2004|11:27pm]

I have just learned from a friend that some fuckass has hijacked her email account at yahoo and messaged her that he won't give it back unless she gets naked on her cam. This friend also happens to be 16... The depravity of this person is offensive enough, but he's fucking with one of my favorite people and I don't know how quick yahoo will be to respond to this problem (she's already reported it). If anyone has any idea what to do about a problem like this (quick response tactics expecially appreciated), please let me know by YM (I am nix_nevermind on yahoo) or comment here and I will inform her immediately.
1 comment|post comment

Posted By N. Noftle [18 Nov 2004|03:27pm]

I think that with the ever-expanding global prowess of not only the internet, but within that, peer to peer file sharing, and other various types of file sharing programs, the definition of cybercrime will have to remain an ever changing one. I do not think that we as a country could set specific laws governing computers and their use, and have those laws last for more than a few days, a few weeks maximum.

The computer security software providers like Norton's and McAffee stay in business because they have an equally powerful adversary. The hacker. One really boosts the others growth potential. Think about it, if you were able to get rid of all the viruses on the net, and make it impossible for anyone to hack anyone elses computer, these companies would lose billions of dollars a year. Cybercrime is the crime of the future, and its doing pretty well right now. Growing at exponential rates, there is always the thrill of hacking a system that couldn't be hacked, or changing the grades in your college classes, or something even more beneficial to the hacker, hacking banking files and profiting off of it. Our laws will have to stay flexible, and be adapted to every case on a by-case basis.
2 comments|post comment

Definition of Cybercrime? (posted by Karthik Raman) [17 Nov 2004|11:40pm]

Colin Brine's paper was an excellent summary of Information Warfare. I'm sure it will be useful to anyone wanting an introduction to the subject.

In Information Warfare, people, groups, or governments may go as far as breaking cyberlaws in achieving their ends. Therefore, a topic closely related to Information Warfare is that of "Cybercrime".

In this discussion, I'd like to ask the reader to submit what they think Cybercrime is. Although there is no uniform definition of cybercrime, some literature suggests it to be crime that involves computers directly or indirectly as targets or vectors of attack.

What do you think? Also, because the Internet crosses borders, how universal can a definition of cybercrime be?
Karthik Raman
[for CJ 341 Cybercrime, Fall 2004]
1 comment|post comment

Pyramid Schemes by Anthony Robey [17 Nov 2004|11:38pm]

Anthony Robey
CJ 341
November 4, 2004

Pyramid Schemes

Pyramid schemes continue to fool people everywhere even though there is only a limited amount of people in the world. They get millions of people to buy into their tricks and lose great amounts of money. Pyramid schemes are very easy to get into and can help to make a lot of money fast. They can also be a very easy way to get into a lot of trouble and ruin people’s lives.

A pyramid scheme is a way to earn money quickly and easily. They get people to buy many different types of items and then they sell that same product to “recruits” under them. An example of something that might be sold is a package for bettering yourself as a sales person or something along those lines. The person who starts the business makes the product and for example he will sell it to ten people for one hundred dollars to each person. Each of those ten people will sell it too ten people each and so on. After each person sells the product to ten people they will have made $1000 and then they will give $100 of that to the person who sold them the product and then all of the people continue to pass $100 up to the head person who started the pyramid.

Pyramid schemes attract everyone. They try to get anyone and everyone to buy into them because this helps the people who started the scheme to make more money without doing any work at all. Even government workers and police fall for the pyramid schemes. An example of this is in 1995 just about 67 employees of the Sacramento Police Department were investigated for being part of a pyramid scheme. Several of the officers were fired and others were punished. Pyramid schemes often aim for people who work for the government or people who are admired by the rest of the public. This is done because if the public sees that the schemes are being done by these people then they will be okay to do them also and they will not get punished for their actions.

Many of the people who fall into pyramid schemes are the type who are “money hungry” and want to get rich quick with as little work as possible. This just happens to be most of the population on earth. Everyone wants to get rich quick and do as little work as possible. Little do these people know; chances are that they are at the bottom of the scheme and the people at the top are still making all of the money and the people at the bottom are getting absolutely nothing but a hole in their pockets. Then there are the people who stop and think about what they are getting into. They realize it’s too good to be true and do some investigating and find out they were about to get scammed.

Many of the pyramid schemes get people to buy into them because they look very professional and have a good business appearance to them. A lot of the time people will lose a lot of their money just putting money into making their business look good. They buy websites and put all sorts of nice things on their website to make them look professional and to help suck people into the schemes. If they are good then they will make this money right back from the recruits that go to their website and buy into the scheme. Some people even pay for some sort of long distance plan so they can call the recruits that sign up on their web pages and talk to them first hand. This also helps to get the recruits to buy into pyramid schemes because the person on the other end of the phone line can act very innocent and say that pyramid schemes are the best things in the world and tell them everything they want hear. This gives the potential recruits a false sense of security and makes them feel more comfortable about what they are doing. Recruiters often send information about their schemes to potential recruits via e-mail and this is often known as spam. Some people read the spam and get sucked into the pyramid schemes and others use common sense and say that the e-mails are too good to be true and delete them. Pyramid schemes can be very professional looking and others not so much.

Very rarely will someone find a scheme like these that aren’t illegal. Some multilevel marketing plans are legal but you are not very likely to find one. These schemes are only illegal for one reason. That is because most of the time they promise the recruits that if they buy the product they will make money from selling it to other recruits when in fact people are not guaranteed to make anything at all. This is fraud. Webster’s dictionary defines fraud as “a. intentional perversion of truth in order to induce another to part with something of value or to surrender a legal right. b. and act of deceiving or misrepresenting.” This is the exact definition of how a pyramid scheme is illegal. They aren’t illegal for any other reason such as hiring recruits to recruit other people and they are not illegal for giving money to other people because both of these are legal and are done in most businesses.

If caught up in a pyramid scheme people usually get sued and are forced to pay back the people they scammed. In other cases courts can impose up to a $200,000 fine or a prison term of one year, and even sometimes both a fine and a sentence. In more severe cases the courts can set a fine to any extent they want or a prison term of up to five years, and they can also do both if necessary. No matter what the punishment is they are illegal and very few people come out on top and profit from them. Some of the multilevel marketing scams are legal and most of the time they have proof to show that they are legal businesses. In some cases illegal pyramid schemes will try to make ways or get people to buy into their businesses being legal when in fact they are not.

There are many ways of getting sucked into pyramid schemes but fortunately there also ways of preventing people from getting tricked into losing their money. The best way to avoid becoming a victim of a pyramid scheme is to research anything you think even comes close to being an illegal pyramid scheme. The best places to do research are on the internet. There are many websites that deal with legal and illegal aspects of pyramid schemes.

There are several ways to avoid being schemed. One is to try to stay away from any businesses that involve commissions for getting more people to join a business or group. Another is to avoid plans from companies that begin with you buying a product in order to get started. Also, look out for businesses that say you will make money through the people under you hiring more recruits. This is usually the easiest way to realize a pyramid scheme because it is the obvious pyramid model of recruiting other people and the multiplying of them down the chain. Pyramid schemes often involve e-mail and the best way to avoid these is to ignore the spam e-mails and realize when something is too good to be true. The best thing to do with a spam e-mail is to report it and turn in the person who sent it to you, hoping this will prevent other innocent people from getting caught up in pyramid schemes. One thing that tends to get people sucked into the schemes is signing documents that get them locked into something they didn’t know about. The best way for people to avoid this is to insist on taking their time and thinking about it to the recruiter or whoever it is they are talking to about the business. The best way to avoid being caught up in a pyramid scheme is to use common sense and do research on them. If something seems to good to be true then chances are it is. They usually end up being pyramid schemes and cost people a lot of money and take up a lot of their time.

Pyramid schemes continue to fool millions of people into trying to make money quickly and easily. For the most part people end up losing in the end and very few people make what it is they were looking for. Pyramid schemes mostly always come to an end due to lack of recruits. Therefore pyramid schemes should try to be avoided at all costs in order to save many people time and money.

Works Cited

Pyramid schemes, chain letters and ponzi schemes. 2002. Robert Todd Carroll.

The Bottom Line About Multilevel Marketing Plans. 2000. Federal Trade Commission.
post comment

[11 Nov 2004|12:13pm]

Since I'm ridiculously bored... I do consulting work for NASDAQ, Bear Sterns, Prudential, and two other companies in the financial district in NYC that I can't name as I'm still under NDA. I deal mainly with enterprise level firewalls and IDS (PIX, Checkpoint, Watchguard, etc.) Right now I’m working on creating a custom IDS/honey pot for one of the above companies. Network security is my thing so if you have any questions ask away, although chances of me remembering to check back here aren’t that high.
post comment

Colin Brine's Information Warfare paper [10 Nov 2004|12:14pm]

Colin Brine
CJ 341
Final Paper
Date Due: 11/4/04
Date Submitted: 11/4/04

Military Information Warfare

The role of the Military has particular interest on how to prevent, deal, and work with information warfare and it many components. Before it can be dealt with, it must first be defined: “Information warfare is the offensive and defensive use of information and information systems to deny, exploit, corrupt, or destroy, an adversary's information, information based processes, information systems, and computer-based networks while protecting one’s own. Such actions are designed to achieve advantages over military or business adversaries. –Dr. Ivan Goldberg, Institute for Advanced Study of Information Warfare”(Ch. 7) Information warfare does not only affect the military, it also affects the civilian sector.

Information warfare is not like any other traditional war, it hits much closer to home and often without people even noticing. “When we speak of information warfare, we are by no means limiting our consideration to computer technology and networks. We shouldn't have a limited view of that.”(interview) There is no clear enemy, no clear sides, everything is obfuscated from easy identification. “...the ubiquitous nature of computers and associated technology has created new forces, new threats, new targets, and an accompanying need for new offensive and defensive weapons”(Ch. 7) There is little chance of a life or death situation, so the press does not record what is happening directly in these “white collar wars.” Because informational war only has economic and political consequences most cases, it does not come up in most peoples' lives for it is not something that is easily noticed and that people are often on the look out for.

There are varying levels of information warfare, defined specifically by Winn Schwartau. The first level is considered interpersonal damage, which is mostly regulated to the civilian sector. It includes fraud and theft, such as credit records, harassment, such as interruption of medical services, and loss of privacy, such as stolen medical reports. The second level is of inter-corporate and business damage. This can also go on between different military operations and embassies. This often includes industrial espionage, sabotage, or theft of money or services. The third and final level of information warfare set by Winn Schwartua is that of international and inter-trading block damage. This is the systematic use of the first two levels of information warfare in a way to disrupt and destabilize societies and entire economies. This can be used by terrorists, extortionists, and foreign governments.(Ch. 12) The levels of information warfare directly correlate to both the military and the civilian sector.

Since information warfare can be considered quite broad, almost all of the armed forces of the Military can be considered to work with it in one shape or another to further their own goals. Much of any war now has to do with communication, and in the new millennium computers are a vital factor in a majority of governments and militaries. With the new threats that come with the new technologies, there are ever changing ways to deal with these problems.

The civilian sector of information warfare and the military sector both focus on different aspects, though they are closely intertwined. This was best presented in an interview with M.E. Kabay: “Most people in the civilian government don't think about aggressive cyberwar, most people on the civilian side are concerned with defensive strategy ... [of] thinking of cyberwar from the point of view of the victim. ... from a military standpoint, however, there has been a great deal of interest around the world in offensive information warfare as well as defensive.”(interview) The military is well known for having advance technology, many of the leading civilian technologies being released top secret technology from years past. There are many different techniques used for attacking systems, in both the civilian and military sides of information warfare.

Penetration techniques are used to break into any form of system, giving a government or civilian hackers free reign to do with what they will. The first and most common of these penetration techniques is called “Social Engineering.” This term is used to refer to the process of gathering information from places which people have discarded it, through physical and technical means. It could be anything from digging through a dumpster to find files that might give access codes, to scanning a hard drive for deleted files that might have important information. Social engineering is not set in stone, because it handles almost any way, shape, or form to acquire something that someone should not have access to. An example of this would be a hard disk with high security information on it that has been deleted, but not to the extent where it could be located again, and thought to have been cleared from the disk so that the disk may be reused in another computer, only for that person to find a large cache of possible classified information at their fingertips. Another example would be bribery, a unhappy person being paid money to give important files or disks over to someone that should not have access to them, just for a sum of money. The broad range of social engineering makes it very dangerous indeed. (Ch. 12)

Another way that the military or a civilian can get information is through eavesdropping. This practice has been in use for a very long time already, and now it has taken then step into the data world. Wire taps used for telephones now can monitor data over a modem, or radio emitters can send phone conversations outside buildings. There are also many more ways in which one can eavesdrop, or listen, to the information of someone else. Another simple way of getting into a system is called intrusion, or using bad security as a quick route. If something is not protected and easily accessible, through bad and easily crackible passwords, or an unprotected modem, it is almost free game for any form of hacker. These things are often left because of lack of knowledge on the subject of security, lazyness, or arrogance. Brute force techniques are used when programs are made to try almost every possible combination of codes and passwords to get into a system, allowing the computer access after a large amount of trial and error.(Ch. 12) There are also many more ways of which someone can gain access to information or a place where they should not be.

There are many different methods for the disruption of information in any field, and there are many specific programs designed to interrupt, record, disrupt or destroy data. “Programmatic attacks include, among others, Trojan Horse programs, logic bombs, worms, viruses, knowbots and cancelbots.”(Ch. 12) Trojan horse programs are programs that are used to mirror other working programs, but add additional functions that are beneficial to the creator of the program. One such program could be a login screen for a website, which may act and function the same as the website, but send the actual username and password to a third party source who can use it for their own personal gain. Logic bombs are sets of code in programs that are designed to destroy or change data with a certain trigger, often a time or a date. If the programmer who places such a bomb does not destroy it, much useful data can be lost because these are fairly difficult to find. Worms are programs that duplicate themselves on multiple computers over a network, often along with harmful code. Viruses are codes and programs designed specifically to be harmful to a system. Knowbots are like worms in that they move from system to system, but they are designed to send back specific information to their controller. Cancelbots are a specific type of knowbot that are designed to seek out and destroy e-mail and other communications, often associated with destroying spam, though it can destroy legitimate mail as well. These are all different types of programmable attacks, and there are still more ways of using such devices together to attack. (Ch. 12)

Denial of service attacks are also quite common, attacks that shut down a system because they are asked to perform too many different tasks at once, they overload the system capacity and cause the systems to have to shut down, or deny service. And one more kind of attack can be a physical attack on a system, including sabotage, and ElectroMagnetic Pulse Transformer bombs. All of these tools and more, worked together, are an amazing offense that any professional, civil or military, can have at their fingertips. (Ch. 12)

The ease of which civilians and the military both operate with such powerful tools really highlights the vulnerabilities in the systems that are set today. The military has some of its own completely private networks, but most of the networking is done over the same systems that the civilians use. This closeness makes it very important for the military to be on top of technology in both offense and defense, so that they will not be taken advantage of. “Just as emergency preparedness in the world of bridges and roads naturally involves close cooperation between civilian and military authorities, so should emergency preparedness in the world of gateways and networks.”(Ch. 12) The cooperation between military and civilian authorities is the key to the future of information warfare.


Bosworth, Seymour. “Chapter 7.” Computer Security Handbook. 4th ed. (.pdf file from Prof. M.E.

Kabay, M.E. “Edited version of Chapter 12” The NCSA Guide to Enterprise Security. McGraw-Hill, 1996.
Kabay, M.E. Personal interview. 3 Nov. 2004.
post comment

[ viewing | most recent entries ]