Connect with us

Terrorism

Did The Paris Attackers Use PGP and Encryption For The Attacks?

Published

on

CNN aired the opinion of an expert regarding the likelihood that Paris attackers used the dark net and PGP – that is, peer-to-peer communication – in order to coordinate the Paris attacks Friday of multiple targets, including a show of California band Eagles of Death Metal.

// -- Discuss and ask questions in our community on Workplace.

The sites could be interpreted as symbolic. Symbols of western culture leisure and realization: a sports stadium, restaurants and a theatre where an American band played.

That the attackers apparently acted in unison, in three separate teams, raised suspicions about dark net use to carry out the abhorrent and outrageous attacks. The attackers, well-armed with assault rifles and suicide belts, began the assault at 9:20pm on Friday November 13th. A terrorist detonated a suicide bomb outside the gates of the soccer stadium on the northern outskirts of Paris. The attack ended at 12:20am when authorities entered a concert hall, The Bataclan, where 89 people had been killed.

French authorities are certain that three terrorist teams carried out the highly coordinated attacks in Paris that left 129 dead. Belgian authorities arrested three people allegedly linked to the massacres. French authorities carried out raids in the wee hours of Monday morning.

// -- Become a yearly Platinum Member and save 69 USD and get access to our secret group on Workplace. Click here to change your current membership -- //

French police, on high security alert Saturday evening, confirmed an “ongoing police intervention” at the Pullman Hotel near the Eiffel Tower, according to the BBC. Apparently, no shots had been fired.

The Paris prosecutor Francois Molins claimed all seven terrorists died during the attacks late Friday. One killed by French police and two who detonated their suicide belts as security forces closed in.

“We can say at this stage of the investigation there were probably three coordinated teams of terrorists behind this barbaric act,” he said at a news conference on Saturday 14th November.

Molins said the seven terrorists carried out the attacks in highly coordinated teams, beginning with the Stade de France, or National Stadium, at 9:20pm as a suicide bomber ignited his vest outside of a friendly soccer match between France and Germany.

The death toll surpassed the Charlie Hebdo massacre and were the deadliest in Europe since the 2003 train bombings in Madrid, which killed 191 people.

In the wake of the Charlie Hebdo attack, France passed stringent surveillance laws allowing authorities to spy on the digital and mobile phone communications of anyone linked to “terrorist” inquiries.

Protesters campaigned against the bill under the banner “24 hours before 1984” and Amnesty International warned of “extremely large and intrusive powers” sans judicial oversight.

Image from Wikipedia.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

Justin O'Connell is the founder of financial technology focused CryptographicAsset.com. Justin organized the launch of the largest Bitcoin ATM hardware and software provider in the world at the historical Hotel del Coronado in southern California. His works appear in the U.S.'s third largest weekly, the San Diego Reader, VICE and elsewhere.




Feedback or Requests?

1 Comment

1 Comment

  1. Danny

    December 12, 2015 at 4:31 am

    Are you looking for possible hacking solutions, do you want to check into your partner or wards social apps(FB, Whatsapp, Emails, Kik e.t.c). Erase unwanted files or clear bad records, then Contact: danielphills@cyberservices.com. it is done in no time!!!!!

You must be logged in to post a comment Login

Leave a Reply

Darknet

FBI Releases Darknet Marketplace Primer

Published

on

Darknet

The FBI released on November 1 a primer on darknet marketplaces, just one week after the Bureau wrapped up, along with other U.S. law enforcement, Operation Hyperion. The Operation intended to disrupt darknet marketplaces on the international level.

// -- Discuss and ask questions in our community on Workplace.

According to the FBI, the operation started with the Five Eyes Law Enforcement Group (FELEG), an international coalition of law enforcement agencies based in Australia, Canada, New Zealand, the United Kingdom, and the United States. They collaborate on intelligence operations to combat transnational crime.

One working group within FELEG, the Cyber Crime Working Group, targets “sophisticated perpetrators operating key criminal services in the cyber underground marketplace.”

FBI agents made contact with more than 150 Darknet marketplace-related individuals in the U.S. who they suspected purchased illicit goods on the darknet.

// -- Become a yearly Platinum Member and save 69 USD and get access to our secret group on Workplace. Click here to change your current membership -- //

“Some of these individuals confessed to ordering a range of illegal drugs and controlled substances online, including heroin, cocaine, morphine, and ketamine.”

The FBI released its Primer to help readers understand the Darknet. The Primer details how the Clear Web works, which is what the general public is used to browsing.

“But there is a vast amount of web content out there on the Internet, and much of it is not indexed by traditional search engines—that part of the web is known as the Deep Web,” the Bureau writes. “Its content is still available to the general public, but it’s harder to find unless you have the exact URL. Examples of Deep Web content are websites and forums that require log-ins, websites that don’t allow for indexing or aren’t linked to anything, and databases.” The Bureau then describes the Darknet.

“DarkNet content is not indexed and consists of overlaying networks that use the public Internet but require unique software, configuration, or authorization to access,” the FBI writes. “And this access is predominately designed to hide the identity of the user.”

The Bureau says there is some criminal activity on the Clear Web and Deep Web. “…[T]here are some legitimate uses—and users—of the DarkNet. But because of the anonymity it offers, many criminals and criminal groups gravitate toward the DarkNet, often doing business through online marketplaces set up for nefarious purposes.” The FBI then lists products often found on Darknet marketplaces.

“Typically, products and services involve child sexual exploitation; drugs; guns; chemical, biological, and radiological materials and knowledge; stolen goods; counterfeit goods; and computer hacking tools,” the web post notes. “Payment for these goods and services is usually through virtual currency like bitcoin, also designed to be anonymous.”

fbi

The Bureau also goes over how on illicit DarkNet marketplaces buyers provide feedback on products and services in a manner similar to eBay, including internal messaging systems, website forums and so on.

“The difference, of course, is that the feedback, internal messaging, and forums on DarkNet marketplaces focus on topics like the quality of child pornography images, the potency of a particular poison, or the speed at which a cache of guns is mailed to its buyer,” the FBI warns.

The FBI focuses its investigations “not on individual criminals but on the most egregious criminal organization and activities.” The FBI admits difficult accessing Darknet marketplaces due to “their very nature. They say it’s not impossible.

“The Bureau, with its partners, uses all available investigative techniques to target buyers, sellers, marketplace administrators, and the technical infrastructure of the marketplaces themselves. And we have had success doing it.”

There are examples thereof. In November 2014, U.S. law enforcement filed charges against more than 400 hidden service Darknet addresses, such as dozens of illicit marketplace websites on the Onion Router or Tor.

Silk Road 2.0 website operator was arrested and chargedSuch actions are “vital” for the FBI’s actions.

“They allow us to dismantle illicit websites and go after those responsible for them,” the Bureau wrote.  But they also enable us to develop actionable intelligence on other websites, criminals, and criminal organizations. And the knowledge we gain from these investigations helps us create more sophisticated investigative tools to shine a brighter light into criminal activity on the DarkNet.”

Images from Shutterstock.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

Justin O'Connell is the founder of financial technology focused CryptographicAsset.com. Justin organized the launch of the largest Bitcoin ATM hardware and software provider in the world at the historical Hotel del Coronado in southern California. His works appear in the U.S.'s third largest weekly, the San Diego Reader, VICE and elsewhere.




Feedback or Requests?

Continue Reading

Cybersecurity

Scotland Yard Charge Man for Terrorism Over Encrypted Blog

Published

on

U.K.’s Scotland Yard is accusing a Cardiff man on six counts of terrorism after he was arrested last month by Scotland Yard’s counterterrorism squad.

// -- Discuss and ask questions in our community on Workplace.

In a pre-planned and pro-active investigation by the MPS Counter Terrorism Command, which is supported by the Wales Extremism and Counter Terrorism Unit (WECTU), 33-year-old Samata Ullah, who is a suspected ISIS member, was arrested in a street in Cardiff.

A detailed breakdown of the six terrorism charges can be found on the Metropolitan Police website.

As reported by Ars Technica, Ullah, was accused on one count of preparation of terrorism ‘by researching an encryption programme, developing an encrypted version of his blog site, and publishing the instructions around the use of [the] programme on his blog site.’

// -- Become a yearly Platinum Member and save 69 USD and get access to our secret group on Workplace. Click here to change your current membership -- //

He has also been accused of knowingly providing instruction in the use of encryption programmes that were being used for terrorist purposes.

He has been remanded in custody by Westminster Magistrates’ Court and will appear at the Old Bailey on October 28.

Interestingly, enough, one Reddit user, Withabeard, recently published a comment stating that Ullah ‘hasn’t been charged for helping terrorists’, but that he’s ‘been charged for having an encrypted blog’ and that ‘the reason authorities have chosen to charge him, is because that blog may contain material that helps terrorists.’

Withabeard, who mentions that he uses encryption every day and trains staff to use encryption, goes on to say that:

It shouldn’t matter what the encryption was going to be used for, no-one should ever be charged with doing that.

However, another user, Hesh582, hits back by stating:

He was charged with a terrorist offense. The encryption was part of it, but the ‘purpose of terrorism’ bit is why it was criminal. Training someone to use encryption for non-terrorist purposes is not illegal. Replace ‘encryption’ with ‘gun’. It’s not illegal to train someone to use a gun (though there are obviously regulations there). It is illegal to train a terrorist to use a gun for terrorism.

Featured image from Shutterstock.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...





Feedback or Requests?

Continue Reading

Law

A Judge Has Approved a Lawsuit to be Served via Twitter

Published

on

Non-profit St. Francis of Assisi has been prosecuting a lawsuit on behalf of the estates and families of Assyrian Christians were murdered and had their property destroyed as a result of ISIS/ISIL/Islamic State activities in the middle east. The group is suing Kuwait Finance House, Kuveyt-Turk Participation Bank Inc., and a man named Hajjaj al-Ajmi for having financed the terrorist groups, but has had trouble serving papers on al-Ajmi.

// -- Discuss and ask questions in our community on Workplace.

The plaintiffs noticed that al-Ajmi has an active Twitter account and asked a federal court to allow them to serve the papers that way. US Magistrate Judge Laurel Beeler assented to this request, saying in a ruling:

The court grants St. Francis’s request because service via Twitter is reasonably calculated to give notice and is not prohibited by international agreement.

Also a Twitter Rebel

Hajjaj al-Ajmi was kicked off Twitter in 2014 following a Treasury Department sanction. However, in May of this year he created at least one new account, and currently has over 100,000 followers. At the time, al-Ajmi was actively raising funds for Islamic State efforts, even posting phone numbers for people to call and make donations through. Archived tweets and news coverage would provide ample evidence in a case against him.

4-al-ajmi-tweet

// -- Become a yearly Platinum Member and save 69 USD and get access to our secret group on Workplace. Click here to change your current membership -- //

The St. Francis of Assisi is acting specifically on behalf of Christian victims of the Islamic State. Al-Ajmi’s status as a banned transactor by the Treasury Department, his history of being kicked off social media platforms for terrorist activities, and his general repertoire of anti-Christian, extremist Islam make him a ripe target for the proceedings. The other parties named in the suit have already been served by traditional means.

Not a First

The ruling notes that other cases in the past have allowed for the use of social media as an alternative means of serving papers. It noted the case of a trademark infringement suit against a Turkish citizen who could not be located. In that case, the court authorized e-mail, Facebook, and LinkedIn to be used. In a scam artistry case in which the Federal Trade Commission could not reach the alleged scam artists and could not get help from the Indian government, a federal court gave them permission to use the Facebook accounts of the parties named.

Probably Not a Normal Thing

Don’t worry, though. If you’re named in a lawsuit and you’re reachable by traditional methods, most likely you’re still going to be served in the traditional ways. One can imagine a future where frustrated process servers push for legislation to allow for the regular serving of papers via social media, and such an explicit law could conceivably make this ordeal the norm, but in all three of the largely known cases where this has happened, the plaintiffs had to get special permission from the court before considering social media serving to be in line with due process.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

5 stars on average, based on 1 rated postsP. H. Madore has covered the cryptocurrency beat over the course of hundreds of articles for Hacked's sister site, CryptoCoinsNews, as well as some of her competitors. He is a major contributing developer to the Woodcoin project, and has made technical contributions on a number of other cryptocurrency projects. In spare time, he recently began a more personalized, weekly newsletter at http://ico.phm.link




Feedback or Requests?

Continue Reading

Recent Comments

Recent Posts

A part of CCN

Hacked.com is Neutral and Unbiased

Hacked.com and its team members have pledged to reject any form of advertisement or sponsorships from 3rd parties. We will always be neutral and we strive towards a fully unbiased view on all topics. Whenever an author has a conflicting interest, that should be clearly stated in the post itself with a disclaimer. If you suspect that one of our team members are biased, please notify me immediately at jonas.borchgrevink(at)hacked.com.

Trending