Author Topic: NWO is freaking out, Mumbai false flag might as well have happened in U.S.  (Read 8897 times)

0 Members and 1 Guest are viewing this topic.


  • Guest

Open Wi-Fi Aids Terrorists, Mumbai Cops Say

By Noah Shachtman EmailJanuary 12, 2009 | 12:51:55 PM

Open wi-fi is a terrorist tool and has to be shut down, right this second. That's the conclusion, at least, of the Mumbai police. Starting today, the Times of India reports, "several police teams, armed with laptops and internet-enabled mobile phones, will randomly visit homes to detect unprotected networks."

"If a particular place's wi-fi is not password-protected or secured then the policemen at the spot has the authority to issue notice to the owner of the wi-fi connection directing him to secure the connection," deputy commissioner of police Sanjay Mohite tells The Hindu. Repeat wi-fi offenders may receive "notices under the Criminal Procedure Code," another senior officer warns the Times.

Mohite notes that e-mails taking credit for terror attacks in New Delhi and Ahmedabad were sent through open wireless networks. "Unprotected IP addresses can be misused for cyber crimes,'' he says. Other Indian cities now require cyber cafes to install surveillance cameras, and to collect identification from all customers.

But plugging up all those perceived security sieves in Mumbai is going to take some work. A quick Sheriff's Brigade survey on Sunday showed that 80 percent of wi-fi networks in South Mumbai were left unlocked. And it's not like terrorists are all that 802.11-dependent, of course. An e-mail also took credit for December's massacre in Mumbai. Whether that came from an open wi-fi connection or not is unclear -- the mailer used an anonymizer service, to cover his electronic tracks.


  • Guest
Remember this scumbag piece of traitorous filth?

"The Neighborhood Network Watch announced today the start of a new community program, the Home Network Awareness Program (HNAP). HNAP is aimed at providing an easy way for people to get involved and to contribute to the efforts of the Neighborhood Network Watch as well as providing the group with valuable information on the states of networks that reside in the homes of our nation.

Participants in HNAP would collect sample network traffic from their own home networks as well as samples from networks within the vicinity. The Neighborhood Network Watch will be making a set of freely available instructions on how to capture network traffic, using the open source packet sniffer TCPDUMP, and how to log onto nearby wireless networks that maybe being operated by neighbors.

These samples of network traffic would then be sent to the Neighborhood Network Watch for analysis using the latest revision of the NNWKAA. The participants would then be sent back a rating for each network along with a rating for the area as a whole."

Home Network Awareness Program Announced

Well, I guess it's safe to say the Mumbai false flag was planned as in the beginning of 2008, and now they got their pretext to go with this Nazi Blackshirt tyranny.

Citizen Involvement in "Homeland Security"

Former KGB General Yevgeni Primakov

"Homeland Security"= Aleksandr Solzhenitsyn treatment under Fmr. KGB Primakov & Stasi


  • Guest
Re: NWO is freaking out, Mumbai false flag might as well have happened in U.S.
« Reply #2 on: February 18, 2009, 03:16:09 pm »

Wi-Fi networks offer rich environment for spread of worms

[INSERT: Translation:  "Use NWO Govt. Wi-Fi or you will not be safe, and you will be considered homegrown Jihad if you don't."]

    *  By William Jackson
    * Jan 30, 2009

An international team of computer scientists has demonstrated in the lab that it is possible for overlapping Wi-Fi networks in densely populated areas to support the rapid spread of malicious code that could infect an entire city in a matter of weeks.

The study, results of which are published in the Jan. 26 issue of the Proceedings of the National Academy of Sciences, showed that by exploiting known security weaknesses tens of thousands of routers could be infected in as little as two weeks from a single point of infection.

“Within six to 24 hours, you could take control of the largest part of the network,” said Alessandro Vespignani, professor at Indiana University’s School of Informatics in Bloomington, one of the study’s authors. “The good news is that this type of network can be protected.”

Securing a relatively small number of routers and endpoints could effectively stem the spread of malware and localize the epidemic, said Vespignani, who also works at the Complex Networks Lagrange Laboratory at the Institute for Scientific Interchange in Turin.

Also contributing to the study were Hao Hu of IU’s School of Informatics and Physics Department; Steven Myers of IU’s School of Informatics; and Vittoria Colizza of Turin’s Complex Networks lab.

The fact that Wi-Fi routers are vulnerable to malicious code comes as no surprise, Vespignani said. “The surprise here is the extent of the proximity network you create with Wi-Fi.”

Wi-Fi is wireless local-area networking based on the IEEE 802.11 family of standards. Routers and access points typically have a range of from 10 to 80 meters, depending on their power and local conditions.

The fact that the networks are built on interoperable standards is both a strength and a weakness.

“If two routers are within that range, they communicate,” Vespignani said. Again, this is not a surprise. But the number of networks located close enough to communicate with each other in densely populated urban areas such as New York City or Chicago is greater than expected. “Basically, the entire city is a connected component. People didn’t expect that the network created by proximity would be that large.”

That is a problem because although Wi-Fi security features are available, many routers and access points are not securely configured.

“A lot of people just take the routers out of the box and deploy them completely open,” Vespignani said. Many routers that are configured to use security are not using the latest and strongest protocols.

The team conducted the study using mathematical models that simulate the spread of infectious diseases. This idea is not new. “Biological models have been used to study computer viruses and worms for a long time,” Vespignani said.

The simulations were run against mapping databases created by “war driving” through urban areas with Wi-Fi and Global Positioning Systems equipment to identify and accurately locate open networks. “This was made from real data,” Vespignani said, but the infections were carried out only in simulation.

“Is it possible to write this worm? Yes,” Vespignani said. “But we didn’t want to try this, even in the lab.”

Why hasn’t such an outbreak occurred already? “I don’t know,” he said. But much of the attention of the hacker and security world has been focused on the continuing game of exploit-and-defend being played out on the Internet, and only in recent years has the density of Wi-Fi networks reached the point that they could support an epidemic outbreak. Writing malicious code for Wi-Fi routers also is more difficult than for standard computers and servers because of their limited memory and the need to make the malware work in firmware.

The success of mathematical models in predicting the behavior of biological viruses gives a high degree of confidence to the results of this study, Vespignani said. “I am confident in the methodology.” But, he added, “what will happen in the real world will be different” from the simulation, depending on local conditions. “A lot of what will happen will depend on the characteristics of the worm. But the mathematical model is a good approach.”

The purpose of the study is not to frighten people away from Wi-Fi but to alert them to the need for security, he said. By adequately securing as few as 60 percent of Wi-Fi routers, using strong passwords and WPA (Wi-Fi Protected Access) rather than WEP (Wired Equivalent Privacy) protocols, an infection could be stopped before it was able to spread throughout an entire ecosystem.


  • Guest
Indian government forcing cybercafes to install keyloggers

Police in Mumbai, India have mandated that every single one of the city's cybercafes install software that will monitor the Internet activities of their customers and report back to a central server. The police say that this is to keep an eye out for terrorist activities, but privacy advocates aren't so sure.

By Jacqui Cheng | Last updated September 10, 2007 11:19

The roughly 500 cybercafés in Mumbai, India, will soon have police-sanctioned keylogging software installed on their machines in the name of fighting terrorism. The software will track everything entered into web forms, chat rooms, e-mail, and more, and report it back to the government. Mumbai police say that cybercafé owners must agree to the installation of the software or else they will lose their licenses.

The president of India's Foundation for Information Security and Technology, Vijay Mukhi, told India-based newspaper MiD Day late last month that the decision was based on the fact that terrorists look to hide their Internet activities by using cybercafés instead of their home computers. "The police needs to install programs that will capture every key stroke at regular interval screen shots, which will be sent back to a server that will log all the data," he said. "The police can then keep track of all communication between terrorists no matter which part of the world they operate from. This is the only way to patrol the net and this is how the police informer is going to look in the e-age."

The police are in talks with M/s Micro Technologies to license its monitoring software, Cyber Access Remote Monitoring System (CARMS). CARMS will be able to provide monitoring of everything, from chats to file transfers and e-mails, even if they are encrypted. All cybercafés in Mumbai will need to work with the police to register the number of computers available, the types of computers, and the IP address of each machine. If they do not follow police orders, the owners of the cybercafés face stiff fines and "stringent action" under the Bombay Police Act.

Unsurprisingly, privacy advocates decry the move as Orwellian and unlikely to achieve the alleged goal (fighting terrorism), but Mukhi's response to the concern is very telling about the priorities of the Indian government. "The question we need to ask ourselves is whether a breach of privacy is more important or the security of the nation. I do not think the above question needs an answer," he said.

But some believe that the terrorism angle is just a thin veil over the government's efforts to get more information on the casual activities of its citizens. As Indian blogger Amit Varma pointed out, terrorists utilize many different communication methods—in many different locations—in order to carry out operations. Therefore, shouldn't the police also be monitoring telephones, cars, homes, and hotel rooms?

Instead, he believes the police may simply resell the data it collects from the cybercafés or perhaps use it to make arrests for smaller crimes. For example, a Bangalore man was arrested earlier this month for uploading "blasphemous" material to social networking site Orkut. The police needed 10 months to gather enough information in this case to justify the arrest—with such stringent monitoring software installed in cybercafés, carrying out arrests for this type of crime would make the process much more streamlined.
Police to Monitor Indian Cyber-Cafes
Darknet spilled these bits on October 22nd 2007 @ 2:37 pm

It seems India are getting serious about terrorist activities being co-ordinated via the Internet, they are starting to run extremely deep surveillance on many cyber-cafes in Mumbai.

The solution appears to be some kind of ‘legal’ trojan system that will collect logs and send them to the police.

    The Mumbai police will soon have khabris deployed (not physically) at over 500 cyber cafes in the city. A new software will allows cops to swoop down on terrorists the moment a keystroke is pressed at any cyber café across the city.


    Investigations into the recent Hyderabad and Mumbai blasts have revealed that the planning was done using the Internet especially, chat rooms.

    In fact, it is a well-known fact that terrorists all over the world do not use paper and pen or the phone to communicate. Everywhere, all over the world, it’s the net.

It seems to be fairly basic, key stroke logging and time lapsed screenshots fed back to a main server. There doesn’t seem to be any clever analysis going on, perhaps a few thousand Indian programmers will be sifting through the screenshots to identify anything dodgy amongst all the Telegu Karaoke videos and Punjabi Porn.

    Vijay Mukhi, President of the Foundation for Information Security and Technology says, “The terrorists know that if they use machines at home, they can be caught. Cybercafes therefore give them anonymity.”

[INSERT:  Try:  There are NO terrorists for one, but if their were, they would by default know that "Cybercafes" were a JOKE, and would use WARDRIVING, decrpyting encrypted transmissions of OTHER companies to make it look like they were the originator, DUH!  14 year old "hackers" know this.]

    “The police needs to install programs that will capture every key stroke at regular interval screen shots, which will be sent back to a server that will log all the data.

    The police can then keep track of all communication between terrorists no matter, which part of the world they operate from.This is the only way to patrol the net and this is how the police informer is going to look in the e-age,” added Mukhi.

Is it a privacy concern? Well yeah I guess it is, but then who conducts anything important from a cyber-cafe anyway?

All you need to do is find an un-encrypted wifi point…
[INSERT:  An unencrypted one?  Because there's no such thing as decrypting WEP in a matter of seconds, and of course, the "superior" WPA security is "bulletproof".  The goal here is to make everyone scared to death of using anything but "government free wifi".]
Indian Police Urged to Tap Cybercafes to Fight Terrorism
John Ribeiro, IDG News Service

An organization in Mumbai, India has proposed that police use key-logging software at cybercafes to keep track of communications between terrorists.

Public computers at cyber cafes offer terrorists the anonymity they require, said Vijay Mukhi, president of the Foundation for Information Security and Technology (FIST) in Mumbai in a telephone interview late Tuesday. Terrorists are known to use instant messengers (IM) from companies like Microsoft Corp. and Yahoo Inc., and these companies do not share information from IM chats with the police, he added.

Keyloggers are software on a computer that record a user's key strokes--whatever the user types--on a computer keyboard. Data from keyloggers will be uploaded to centralized servers where it will be available to the police for scrutiny. The move does not as yet have the approval of the Mumbai police. The keyloggers would be activated centrally as and when a suspect walks into a cyber cafe or when suspicious activity is noted, Mukhi said.

A number of bloggers have criticized Mukhi's proposal, saying it will put personal data of ordinary individuals at risk. But some other blogs said that it is too small a price to pay to protect against loss of life from terrorism. The police should put in place a mechanism for citizens to seek redress from any misuse of their private information, Mukhi said.

Bomb blasts by terrorists have killed a large number of people in the country. In July last year, seven bombs planted in Mumbai's suburban trains killed over 200 people and injured another 700. Terrorists are increasingly using the Internet to communicate with one another, as they are aware that telephone and mobile phones connections are under Indian government surveillance, according to Mukhi.

FIST, a non-profit organization in Mumbai, is focused on cyber-security and has worked with the police on related issues. It aims to get keyloggers on computers in cybercafes throughout India, Mukhi said.
German Police Creating Law Enforcement Trojan
Darknet spilled these bits on February 1st 2008 @ 8:37 am

After banning hacking tools it looks like the German police are looking into digital wiretapping and creating ‘whitehat’ trojans for monitoring the bad guys…

Of course they define who the bad guys are, and according to law 202(c) it could be us..

This is very definitely questionable when it comes to ethics, it’s almost as bad as backdooring highly secure encrption algorithm just so the government has a universal yes you say what happens when the bad guys get the key? Same things happen when the bad guys take over this ‘remote forensic software’ network..

    German cops are pushing ahead with controversial plans, yet to be legally approved, to develop “remote forensic software” - in other words, a law enforcement Trojan.

    Leaked documents outline proposals by German firm Digitask to develop software to intercept Skype VoIP communications and SSL transmissions. A second leaked document from the Bavarian Ministry of Justice outlines costing and licensing proposals for the software. Both scanned documents (in German, natch) have found their way onto the net after being submitted to Wikileaks.

They are even looking at jacking Skype so they can monitor net based VoIP calls..and intercepting SSL communications, although that shouldn’t be too tricky.
Either way they are both very dodgy.

    Proposals to give explicit permission for law enforcement officials to plant malware stem from a Federal Court ruling last year declaring clandestine searches of suspects’ computers to be inadmissible as evidence, pending a law regulating the practice. Germany’s Federal Court of Justice said the practice was not covered by existing surveillance legislation.

    Joerg Ziercke, president of Germany’s Federal Police Office (BKA), expressed frustration about their inability to decipher the encryption used by Skype in order to tap into the VoIP calls of suspected terrorists. Digitask, if the leaked documents are to be believed, has stepped into the breach.

Ok so normal people can’t make security tools to test their networks….but the government can create malware to monitor private communications?

Yah that really makes sense.

Once again - this is ridiculous!

Skype and SSL Interception letters - Bavaria - Digitask

Offline Revolt426

  • Member
  • *****
  • Posts: 6,190
Anti_Illuminati : India arrested a Saudi National for funding the Mumbai attacks.
"Liquidate labor, liquidate stocks, liquidate the farmers, liquidate real estate … It will purge the rottenness out of the system..." - Andrew Mellon, Secretary of Treasury, 1929.