PayPal - Notice of security problems!
Title: PayPal Protect Your Account Info Make sure you never provide your password to fraudulent websites.To safely and securely access the PayPal website or your account, open a new web browser (e.g. Internet Explorer or Netscape) and type in the PayPal URL to be sure you are on the real PayPal website.https://www.paypal.com/us/) to be sure you are on the real PayPal site.PayPal will never ask you to enter your password in an email.For more information on protecting yourself from fraud, please review our Security Tips at https://www.paypal.com/us/securitytipsProtect Your PasswordYou should never give your PayPal password to anyone, including PayPal employees.Notice of security problems ! Dear PayPal Customer, This e-mail is the notification of recent innovations taken by PayPal to prevent security attacks at our servers. From now on all transactions of money will go through secure web server with SSL - Secure Sockets Layer support. Click here to log into your account Please confirm your email address and credit card information by logging in to your PayPal account and check if everything is ok with your acc. Thank you for using PayPal! The PayPal Team Please do not reply to this email. This mailbox is not monitored and you will not receive a response. For assistance, log in to your PayPal account and choose the Help link located in the top right corner of any PayPal page. To receive email notifications in plain text instead of HTML, update your preferences here.PayPal Email ID PP468
[Clips] Finger points to British intelligence as al-Qaeda websites are wiped out
--- begin forwarded text Delivered-To: [EMAIL PROTECTED] Date: Sat, 30 Jul 2005 23:01:38 -0400 To: Philodox Clips List [EMAIL PROTECTED] From: R.A. Hettinga [EMAIL PROTECTED] Subject: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out Reply-To: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] http://www.timesonline.co.uk/printFriendly/0,,1-523-1715166-523,00.html The Times of London July 31, 2005 Finger points to British intelligence as al-Qaeda websites are wiped out Over the past fortnight Israeli intelligence agents have noticed something distinctly odd happening on the internet. One by one, Al-Qaeda's affiliated websites have vanished until only a handful remain, write Uzi Mahnaimi and Alex Pell. Someone has cut the line of communication between the spiritual leaders of international terrorism and their supporters. Since 9/11 the websites have been the main links to disseminate propaganda and information. The Israelis detect the hand of British intelligence, determined to torpedo the websites after the London attacks of July 7. The web has become the new battleground of terrorism, permitting a freedom of communication denied to such organisations as the IRA a couple of decades ago. One global jihad site terminated recently was an inflammatory Pakistani site, www.mojihedun.com, in which a section entitled How to Strike a European City gave full technical instructions. Tens of similar sites, some offering detailed information on how to build and use biological weapons, have also been shut down. However, Islamic sites believed to be moderate, remain. One belongs to the London-based Syrian cleric Abu Basir al-Tartusi, whose www.abubaseer.bizland.com remained operative after he condemned the London bombings. However, the scales remain weighted in favour of global jihad, the first virtual terror organisation. For all the vaunted spying advances such as tracking mobile phones and isolating key phrases in telephone conversations, experts believe current technologies actually play into the hands of those who would harm us. Modern technology puts most of the advantages in the hands of the terrorists. That is the bottom line, says Professor Michael Clarke, of King's College London, who is director of the International Policy Institute. Government-sponsored monitoring systems, such as Echelon, can track vast amounts of data but have so far proved of minimal benefit in preventing, or even warning, of attacks. And such systems are vulnerable to manipulation: low-ranking volunteers in terrorist organisations can create background chatter that ties up resources and maintains a threshold of anxiety. There are many tricks of the trade that give terrorists secure digital communication and leave no trace on the host computer. Ironically, the most readily available sources of accurate online information on bomb-making are the websites of the radical American militia. I have not seen any Al-Qaeda manuals that look like genuine terrorist training, claims Clarke. However, the sobering message of many security experts is that the terrorists are unlikely ever to lose a war waged with technology. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire' ___ Clips mailing list [EMAIL PROTECTED] http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA When the hares made speeches in the assembly and demanded that all should have equality, the lions replied, Where are your claws and teeth? -- attributed to Antisthenes in Aristotle, 'Politics', 3.7.2
RE: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out
Gee, that's great. A global organization that has taken the task of worldwide censorship into its sweaty little hands. Did the google cache'd versions of these sites dissappear too? Tor networks, anyone? -TD From: R.A. Hettinga [EMAIL PROTECTED] To: cryptography@metzdowd.com, [EMAIL PROTECTED] Subject: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out Date: Sat, 30 Jul 2005 23:02:53 -0400 --- begin forwarded text Delivered-To: [EMAIL PROTECTED] Date: Sat, 30 Jul 2005 23:01:38 -0400 To: Philodox Clips List [EMAIL PROTECTED] From: R.A. Hettinga [EMAIL PROTECTED] Subject: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out Reply-To: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] http://www.timesonline.co.uk/printFriendly/0,,1-523-1715166-523,00.html The Times of London July 31, 2005 Finger points to British intelligence as al-Qaeda websites are wiped out Over the past fortnight Israeli intelligence agents have noticed something distinctly odd happening on the internet. One by one, Al-Qaeda's affiliated websites have vanished until only a handful remain, write Uzi Mahnaimi and Alex Pell. Someone has cut the line of communication between the spiritual leaders of international terrorism and their supporters. Since 9/11 the websites have been the main links to disseminate propaganda and information. The Israelis detect the hand of British intelligence, determined to torpedo the websites after the London attacks of July 7. The web has become the new battleground of terrorism, permitting a freedom of communication denied to such organisations as the IRA a couple of decades ago. One global jihad site terminated recently was an inflammatory Pakistani site, www.mojihedun.com, in which a section entitled How to Strike a European City gave full technical instructions. Tens of similar sites, some offering detailed information on how to build and use biological weapons, have also been shut down. However, Islamic sites believed to be moderate, remain. One belongs to the London-based Syrian cleric Abu Basir al-Tartusi, whose www.abubaseer.bizland.com remained operative after he condemned the London bombings. However, the scales remain weighted in favour of global jihad, the first virtual terror organisation. For all the vaunted spying advances such as tracking mobile phones and isolating key phrases in telephone conversations, experts believe current technologies actually play into the hands of those who would harm us. Modern technology puts most of the advantages in the hands of the terrorists. That is the bottom line, says Professor Michael Clarke, of King's College London, who is director of the International Policy Institute. Government-sponsored monitoring systems, such as Echelon, can track vast amounts of data but have so far proved of minimal benefit in preventing, or even warning, of attacks. And such systems are vulnerable to manipulation: low-ranking volunteers in terrorist organisations can create background chatter that ties up resources and maintains a threshold of anxiety. There are many tricks of the trade that give terrorists secure digital communication and leave no trace on the host computer. Ironically, the most readily available sources of accurate online information on bomb-making are the websites of the radical American militia. I have not seen any Al-Qaeda manuals that look like genuine terrorist training, claims Clarke. However, the sobering message of many security experts is that the terrorists are unlikely ever to lose a war waged with technology. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire' ___ Clips mailing list [EMAIL PROTECTED] http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA When the hares made speeches in the assembly and demanded that all should have equality, the lions replied, Where are your claws and teeth? -- attributed to Antisthenes in Aristotle, 'Politics', 3.7.2
Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out
On Mon, Aug 01, 2005 at 10:54:26AM -0400, Tyler Durden wrote: Tor networks, anyone? Caveat when running Tor on a production machine, I got DDoS'd recently with some ~300 MBit/s. (Yes, my exit policy didn't contain IRC). -- Eugen* Leitl a href=http://leitl.org;leitl/a __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE signature.asc Description: Digital signature
[EMAIL PROTECTED]: [IP] US-VISIT RFID passes @ 3 US-CDN border xings beginning 8/4/05]
- Forwarded message from David Farber [EMAIL PROTECTED] - From: David Farber [EMAIL PROTECTED] Date: Mon, 1 Aug 2005 11:32:33 -0400 To: Ip Ip ip@v2.listbox.com Subject: [IP] US-VISIT RFID passes @ 3 US-CDN border xings beginning 8/4/05 X-Mailer: Apple Mail (2.733) Reply-To: [EMAIL PROTECTED] Begin forwarded message: From: Ari Ollikainen [EMAIL PROTECTED] Date: August 1, 2005 11:22:16 AM EDT To: David Farber [EMAIL PROTECTED] Subject: US-VISIT RFID passes @ 3 US-CDN border xings beginning 8/4/05 For IP... High-tech border pass raises alarm Friday, July 29, 2005 - 07:00 Local News - By Jennifer Pritchett Whig-Standard Staff Writer Kingston's closest U.S. border crossing will employ high-tech radio frequency technology to monitor visitors from other countries who want to enter the States from Canada - a move that alarms both a Kingston privacy expert and an immigration specialist. The U.S. Department of Homeland Security said this week that the crossing between Lansdowne and Alexandria Bay, N.Y., will be one of three Canada-U.S. land borders to require non-Canadians to carry wireless devices as part of a pilot project. Travellers will be required to carry the devices as of Aug. 4. The technology is part of US-VISIT, a billion-dollar anti-terrorism initiative launched last December that has kept about 700 criminals, including one posing as a Canadian, out of the States. US-VISIT uses biometric information from photos and fingerprints taken from non-Canadians at border crossings to track residents from other countries who enter the U.S. Canadian citizens are the only people in the world exempt from US-VISIT. Travellers required to use the technology include landed immigrants living in Canada, Canadian citizens who are either engaged to a U.S. citizen or who have applied for a special business visa. They'll have to carry the wireless devices as a way for border guards to access the electronic information stored inside a document about the size of a large index card. Visitors to the U.S. will get the card the first time they cross the border and will be required the carry the document on subsequent crossings to and from the States. Border guards will be able to access the information electronically from 12 metres away to enable those carrying the devices to be processed more quickly. Two other border crossings between Surrey, B.C., and Blaine, Wash., will also be implementing the technology as part of the pilot project. Kimberly Weissman, spokeswoman for the US-VISIT program at the U.S. Department of Homeland Security told The Whig-Standard yesterday that the new devices can't be tracked outside the border crossing area. It has a range of 10 to 15 metres, she said. The UHF frequency that we've chosen makes it impossible to locate a specific person. But the use of the wireless technology raises alarm bells for Queen's University law professor and privacy expert Art Cockfield. It's intrusive and these are worrisome developments, he said. Often these technologies are introduced in a fairly minor form and then the technology is extended.What would be very troubling to me would be the tracking of visitors after they've crossed the border. Cockfield, who's part of a Queen's research group called the Globalization of Personal Data Team, said he's so alarmed by these new devices that his team will likely investigate them further after learning about them yesterday. Though the new devices don't violate Canadian law, because visitors are under the jurisdiction of American law once inside the U.S., Cockfield said their use raises disturbing questions about how the technology may be used in the future. If I'm close to the border and still on Canadian ground and a U.S. customs guard is scanning me and finding out personal information about me, that actually might be a violation of Canadian law because they're collecting information on a Canadian resident who is still in Canada, Cockfield said. He said the devices smack of a Martha Stewart-like prison tracking device. It's one thing to have a police officer approach you and ask for your identification, but it's another thing for somebody sitting in an office somewhere in Washington to track all your movements through a satellite signal, he said. It's in the realm of possibilities. He said the devices move the world closer to a total surveillance society. It certainly tracks you as you approach the border and as you cross the border, he said. If we think we're subject to government surveillance, that immediately changes our behaviour, he said. If you want to swear about Bush, you might hold yourself back. It inhibits political dissent because if we think the government is watching us, we'll be less likely to call a town hall meeting to protest something we're upset about. Cockfield, who just moved back to Canada from a seven-year stint teaching in Texas, also believes the devices will result in less cross-border traffic. I
Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out
What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy but that sounds suspiciously like someone loaded up an OC-3's worth of traffic and then slammed your node. Ain't no hacker gonna do that. Any indication the ostensible originating IP addresses are faked? -TD From: Eugen Leitl [EMAIL PROTECTED] To: Tyler Durden [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out Date: Mon, 1 Aug 2005 17:15:17 +0200 On Mon, Aug 01, 2005 at 10:54:26AM -0400, Tyler Durden wrote: Tor networks, anyone? Caveat when running Tor on a production machine, I got DDoS'd recently with some ~300 MBit/s. (Yes, my exit policy didn't contain IRC). -- Eugen* Leitl a href=http://leitl.org;leitl/a __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out
On Mon, Aug 01, 2005 at 01:51:57PM -0400, Tyler Durden wrote: What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy but that sounds suspiciously like someone loaded up an OC-3's worth of traffic 300Mbits (using Eugen's quote), is 2xOC-3. (OC-3 carries 155Mbit/sec ATM, but if it's IP/PPP/OC-3 you use more of the 155Mbits/sec). A couple of hacked university zombie armies can generate that kind of traffic. I'm *not* a telecom guy, but don't most U's have at least an OC-3 out to the backbones today? I'm surprised that the target node has that much INBOUND bandwidth, quite frankly. Dan
Diebold - might be of interest (fwd)
-- Forwarded message -- Date: Fri, 29 Jul 2005 16:01:13 -0700 From: Lance James [EMAIL PROTECTED] To: cryptography@metzdowd.com cryptography@metzdowd.com Subject: Diebold - might be of interest Hi all, I don't know if this is appropriate on this list, but I know that diebold voting systems have been an issue in the cryptography community for a while now. Having said that, I'm pasting an article that I received (from my parents actually) that might be of interest to this group. If it is not, just moderate :) *Subject:* Black Box Darkness is settling over the election process in San Diego. I say get rid of anything electronic that has to do with elections. Realistic sentiment?! Gene VIEWING THE DIEBOLD VOTE-TALLYING SCREEN PROHIBITED Jim March, a member of the Black Box Voting board of directors, was arrested Tuesday evening for trying to observe the Diebold central tabulator (vote tallying machine) as the votes were being counted in San Diego's mayoral election (July 26). (- online discussion: http:/www.blackboxvoting.org -) According to Jim Hamilton, an elections integrity advocate from San Diego, he and March visited the office of the registrar of elections earlier in the day. During this visit, March made two requests, which were refused by Mikel Haas, the San Diego Registrar of elections. 1) March asked that the central tabulator, the computer that tallies up the votes from all the precincts, be positioned so that citizens could observe it. According to Hamilton, this would have required simply moving a table a few feet. 2) March also asked for a copy of the .gbf files -- the vote tally files collected during the course of tabulation - to be provided for examination after the election. During the tallying of the election, the Diebold computer was positioned too far away for citizens to read the screen. Citizens could not watch error messages, or even perceive significant anomalies or malfunctions. Unable to see the screen, March went into the office where the tabulator was housed. Two deputies followed him and escorted him out. According to Hamilton: He was not belligerent, not at all. After he went inside the tabulator room he came [was escorted] out and he said clearly 'I'm not resisting.' They handcuffed him, took him out of the building. They put him in a squad car. They're going to take him to the police station, book him and take him to jail, said Hamilton. He's getting charged with a felony, 'interfering with an election official.' March's actions are the culmination of two years of increasing frustration with the refusal of election officials to respond to security deficiencies in the voting machines. The software that tallies the votes in San Diego is made by Diebold Election Systems, a company that has already paid the state of California $2.8 million for making false claims, due to a lawsuit filed by March and Black Box Voting founder Bev Harris. On July 4, a report was released by European computer security expert Harri Hursti, revealing that the Diebold voting system contains profound architectural flaws. It is open for business, says Hursti, who demonstrated the flaws on Leon County, Florida Diebold machines. He penetrated the voting system in less than five minutes, manipulating vote reports in a way that was undetectable. Despite the critical security alert issued by Hursti, San Diego County sent 713 voting machines home with poll workers, increasing the risk that the memory cards housed in the machines could be hacked, and removing the argument that inside access was carefully safeguarded. The arrest of Jim March underlines a fundamental problem facing Americans today as, increasingly, they lose the ability to monitor, verify, or watch any part of the counting process. The San Diego registrar of elections knew of the security flaws in the voting system. Diebold has never denied the vulnerability identified in Hursti's report, found at http://www.blackboxvoting.org/BBVreport.pdf. Despite knowledge of the increased risks, Haas made the decision to create additional vulnerability by sending the machines home with hundreds of poll workers. While San Diego officials will no doubt point to a small seal on the compartment housing the memory card (the component exploited in Hursti's study), Black Box Voting has interviewed a former San Diego poll worker, who reported that all that is necessary to dislodge and then reaffix the seal is a small pair of pliers. IN A NUTSHELL: - The machines have been demonstrated to be vulnerable to undetected tampering - The San Diego registrar of voters chose not to take appropriate precautions - The main tally machine was placed in a location that was impossible for citizens to observe - Many voting integrity advocates have come to believe that voting machine reform now rivals the urgency of the Civil Rights movement in the 1960s. Jim March acted on those beliefs. * * * * * If you share the feelings that Jim March
Warning: antivirus system report
Âíèìàíèå: Â îòïðàâëåííîì Âàì ñîîáùåíèå îò: '[EMAIL PROTECTED]' îáíàðóæåí âèðóñ 'Win32:Mydoom-M [Wrm]'. Ñîîáùåíèå áûëî óäàëåíî. Ñîîáùåíèå ñîäåðæàëî çàãîëîâîê: Received: from minder.net ([80.73.80.54]) by mail.sakha.ru (Merak 8.0.3) with ESMTP id KJP74863 for cypherpunks@minder.net; Tue, 02 Aug 2005 09:23:34 +1000 From: The Post Office [EMAIL PROTECTED] To: cypherpunks@minder.net Subject: Delivery failed Date: Tue, 2 Aug 2005 09:23:34 +1000 MIME-Version: 1.0 Content-Type: multipart/mixed; boundary==_NextPart_000_0002_12E146CD.F5A602DB X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2600. X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600. Warning: Virus 'Win32:Mydoom-M [Wrm]' detected. Message was deleted. Message's header: Received: from minder.net ([80.73.80.54]) by mail.sakha.ru (Merak 8.0.3) with ESMTP id KJP74863 for cypherpunks@minder.net; Tue, 02 Aug 2005 09:23:34 +1000 From: The Post Office [EMAIL PROTECTED] To: cypherpunks@minder.net Subject: Delivery failed Date: Tue, 2 Aug 2005 09:23:34 +1000 MIME-Version: 1.0 Content-Type: multipart/mixed; boundary==_NextPart_000_0002_12E146CD.F5A602DB X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2600. X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600. The original message was received at Tue, 02 Aug 2005 09:23:34 +1000 The message was sent from: The Post Office [EMAIL PROTECTED] The message was sent to: cypherpunks@minder.net The virus found was: Win32:Mydoom-M [Wrm] ---BeginMessage--- multipart/mixed; boundary="=_NextPart_000_0002_12E146CD.F5A602DB": Unrecognized ---End Message---
How to Exit the Matrix
Network Forensics Evasion: How to Exit the Matrix https://n4ez7vf37i2yvz5g.onion/howtos/ExitTheMatrix/ Tor (tor.eff.org) required Privacy and anonymity have been eroded to the point of non-existence in recent years. In fact, in many workplaces, employers spy on and control their employees Internet access, and this practice is widely considered to be acceptable. How we got to a legal state where this is allowed, I'm not quite sure. It seems to stem from an underlying assumption that while you are at work, you are a slave - a single unit of economic output under the direct and total control of your superiors. I believe this view is wrong. This document seeks to provide the means to protect your right to privacy and anonymous net access anywhere, even under the most draconian of conditions - including, but not limited to, criminal investigation. So what are you saying? That I can dodge bullets? No.. What I am trying to tell you is that when you're ready, you won't have to.
Re: Well, they got what they want...
--- Tyler Durden [EMAIL PROTECTED] wrote: That's an old pattern to character assassins: I've attacked you publically but I really don't want to have defend what I've said or reply to suggestions about my own motivation. And psychopaths are sometimes said to accuse their victims of the malice and violence the psychopaths perpetrate. Great. Fuck you too. Hope the new Stazi grab you while you bitch and complain and do nothing. Likewise, although I rather suspect you would be one of very 'Stazi' you pretend you hate. But there is an up-side: you're too fucking stupid to be of permanent use to the 'Stazi', and so you can anticpate outliving your usefulness eventually. Regards, Steve __ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com
Re: Well, they got what they want...
On Mon, 1 Aug 2005, Steve Thompson wrote: --- Tyler Durden [EMAIL PROTECTED] wrote: That's an old pattern to character assassins: I've attacked you publically but I really don't want to have defend what I've said or reply to suggestions about my own motivation. And psychopaths are sometimes said to accuse their victims of the malice and violence the psychopaths perpetrate. Great. Fuck you too. Hope the new Stazi grab you while you bitch and complain and do nothing. Likewise, although I rather suspect you would be one of very 'Stazi' you pretend you hate. But there is an up-side: you're too fucking stupid to be of permanent use to the 'Stazi', and so you can anticpate outliving your usefulness eventually. Why don't you two get a room? I'll even subsidize it. -- Yours, J.A. Terranson [EMAIL PROTECTED] 0xBD4A95BF I like the idea of belief in drug-prohibition as a religion in that it is a strongly held belief based on grossly insufficient evidence and bolstered by faith born of intuitions flowing from the very beliefs they are intended to support. don zweig, M.D.
Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out
On Mon, 1 Aug 2005, Dan McDonald wrote: On Mon, Aug 01, 2005 at 01:51:57PM -0400, Tyler Durden wrote: What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy but that sounds suspiciously like someone loaded up an OC-3's worth of traffic 300Mbits (using Eugen's quote), is 2xOC-3. (OC-3 carries 155Mbit/sec ATM, but if it's IP/PPP/OC-3 you use more of the 155Mbits/sec). A couple of hacked university zombie armies can generate that kind of traffic. I'm *not* a telecom guy, but don't most U's have at least an OC-3 out to the backbones today? I'm surprised that the target node has that much INBOUND bandwidth, quite frankly. Well, I am a telecom *and* a data guy, and I think I can clear it up :-) First, I suspect that the Tor node did *not* have a 300mbit ingree or egress, which is why the 300mbps was an effective DDoS ;-) Second, as the guy who spent several years being the carrier schmuck on call for these kinds of attacks, a 300mbps attack is a pretty small one. Big enough to knock off the average web site or small ISP, but pretty small from the carrier perspective. He probably knew the sizeof the incoming attack because the voice on the other end of the phone (the carrier schmuck on call) told him how much data he saw coming down the pipe at the target. Dan Hopefully that'll clear some of the muddy stuff? -- Yours, J.A. Terranson [EMAIL PROTECTED] 0xBD4A95BF I like the idea of belief in drug-prohibition as a religion in that it is a strongly held belief based on grossly insufficient evidence and bolstered by faith born of intuitions flowing from the very beliefs they are intended to support. don zweig, M.D.
[Clips] Finger points to British intelligence as al-Qaeda websites are wiped out
--- begin forwarded text Delivered-To: [EMAIL PROTECTED] Date: Sat, 30 Jul 2005 23:01:38 -0400 To: Philodox Clips List [EMAIL PROTECTED] From: R.A. Hettinga [EMAIL PROTECTED] Subject: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out Reply-To: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] http://www.timesonline.co.uk/printFriendly/0,,1-523-1715166-523,00.html The Times of London July 31, 2005 Finger points to British intelligence as al-Qaeda websites are wiped out Over the past fortnight Israeli intelligence agents have noticed something distinctly odd happening on the internet. One by one, Al-Qaeda's affiliated websites have vanished until only a handful remain, write Uzi Mahnaimi and Alex Pell. Someone has cut the line of communication between the spiritual leaders of international terrorism and their supporters. Since 9/11 the websites have been the main links to disseminate propaganda and information. The Israelis detect the hand of British intelligence, determined to torpedo the websites after the London attacks of July 7. The web has become the new battleground of terrorism, permitting a freedom of communication denied to such organisations as the IRA a couple of decades ago. One global jihad site terminated recently was an inflammatory Pakistani site, www.mojihedun.com, in which a section entitled How to Strike a European City gave full technical instructions. Tens of similar sites, some offering detailed information on how to build and use biological weapons, have also been shut down. However, Islamic sites believed to be moderate, remain. One belongs to the London-based Syrian cleric Abu Basir al-Tartusi, whose www.abubaseer.bizland.com remained operative after he condemned the London bombings. However, the scales remain weighted in favour of global jihad, the first virtual terror organisation. For all the vaunted spying advances such as tracking mobile phones and isolating key phrases in telephone conversations, experts believe current technologies actually play into the hands of those who would harm us. Modern technology puts most of the advantages in the hands of the terrorists. That is the bottom line, says Professor Michael Clarke, of King's College London, who is director of the International Policy Institute. Government-sponsored monitoring systems, such as Echelon, can track vast amounts of data but have so far proved of minimal benefit in preventing, or even warning, of attacks. And such systems are vulnerable to manipulation: low-ranking volunteers in terrorist organisations can create background chatter that ties up resources and maintains a threshold of anxiety. There are many tricks of the trade that give terrorists secure digital communication and leave no trace on the host computer. Ironically, the most readily available sources of accurate online information on bomb-making are the websites of the radical American militia. I have not seen any Al-Qaeda manuals that look like genuine terrorist training, claims Clarke. However, the sobering message of many security experts is that the terrorists are unlikely ever to lose a war waged with technology. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire' ___ Clips mailing list [EMAIL PROTECTED] http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA When the hares made speeches in the assembly and demanded that all should have equality, the lions replied, Where are your claws and teeth? -- attributed to Antisthenes in Aristotle, 'Politics', 3.7.2
RE: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out
Gee, that's great. A global organization that has taken the task of worldwide censorship into its sweaty little hands. Did the google cache'd versions of these sites dissappear too? Tor networks, anyone? -TD From: R.A. Hettinga [EMAIL PROTECTED] To: cryptography@metzdowd.com, [EMAIL PROTECTED] Subject: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out Date: Sat, 30 Jul 2005 23:02:53 -0400 --- begin forwarded text Delivered-To: [EMAIL PROTECTED] Date: Sat, 30 Jul 2005 23:01:38 -0400 To: Philodox Clips List [EMAIL PROTECTED] From: R.A. Hettinga [EMAIL PROTECTED] Subject: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out Reply-To: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] http://www.timesonline.co.uk/printFriendly/0,,1-523-1715166-523,00.html The Times of London July 31, 2005 Finger points to British intelligence as al-Qaeda websites are wiped out Over the past fortnight Israeli intelligence agents have noticed something distinctly odd happening on the internet. One by one, Al-Qaeda's affiliated websites have vanished until only a handful remain, write Uzi Mahnaimi and Alex Pell. Someone has cut the line of communication between the spiritual leaders of international terrorism and their supporters. Since 9/11 the websites have been the main links to disseminate propaganda and information. The Israelis detect the hand of British intelligence, determined to torpedo the websites after the London attacks of July 7. The web has become the new battleground of terrorism, permitting a freedom of communication denied to such organisations as the IRA a couple of decades ago. One global jihad site terminated recently was an inflammatory Pakistani site, www.mojihedun.com, in which a section entitled How to Strike a European City gave full technical instructions. Tens of similar sites, some offering detailed information on how to build and use biological weapons, have also been shut down. However, Islamic sites believed to be moderate, remain. One belongs to the London-based Syrian cleric Abu Basir al-Tartusi, whose www.abubaseer.bizland.com remained operative after he condemned the London bombings. However, the scales remain weighted in favour of global jihad, the first virtual terror organisation. For all the vaunted spying advances such as tracking mobile phones and isolating key phrases in telephone conversations, experts believe current technologies actually play into the hands of those who would harm us. Modern technology puts most of the advantages in the hands of the terrorists. That is the bottom line, says Professor Michael Clarke, of King's College London, who is director of the International Policy Institute. Government-sponsored monitoring systems, such as Echelon, can track vast amounts of data but have so far proved of minimal benefit in preventing, or even warning, of attacks. And such systems are vulnerable to manipulation: low-ranking volunteers in terrorist organisations can create background chatter that ties up resources and maintains a threshold of anxiety. There are many tricks of the trade that give terrorists secure digital communication and leave no trace on the host computer. Ironically, the most readily available sources of accurate online information on bomb-making are the websites of the radical American militia. I have not seen any Al-Qaeda manuals that look like genuine terrorist training, claims Clarke. However, the sobering message of many security experts is that the terrorists are unlikely ever to lose a war waged with technology. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire' ___ Clips mailing list [EMAIL PROTECTED] http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA When the hares made speeches in the assembly and demanded that all should have equality, the lions replied, Where are your claws and teeth? -- attributed to Antisthenes in Aristotle, 'Politics', 3.7.2
Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out
On Mon, Aug 01, 2005 at 10:54:26AM -0400, Tyler Durden wrote: Tor networks, anyone? Caveat when running Tor on a production machine, I got DDoS'd recently with some ~300 MBit/s. (Yes, my exit policy didn't contain IRC). -- Eugen* Leitl a href=http://leitl.org;leitl/a __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE signature.asc Description: Digital signature
Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out
What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy but that sounds suspiciously like someone loaded up an OC-3's worth of traffic and then slammed your node. Ain't no hacker gonna do that. Any indication the ostensible originating IP addresses are faked? -TD From: Eugen Leitl [EMAIL PROTECTED] To: Tyler Durden [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out Date: Mon, 1 Aug 2005 17:15:17 +0200 On Mon, Aug 01, 2005 at 10:54:26AM -0400, Tyler Durden wrote: Tor networks, anyone? Caveat when running Tor on a production machine, I got DDoS'd recently with some ~300 MBit/s. (Yes, my exit policy didn't contain IRC). -- Eugen* Leitl a href=http://leitl.org;leitl/a __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out
On Mon, Aug 01, 2005 at 01:51:57PM -0400, Tyler Durden wrote: What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy but that sounds suspiciously like someone loaded up an OC-3's worth of traffic 300Mbits (using Eugen's quote), is 2xOC-3. (OC-3 carries 155Mbit/sec ATM, but if it's IP/PPP/OC-3 you use more of the 155Mbits/sec). A couple of hacked university zombie armies can generate that kind of traffic. I'm *not* a telecom guy, but don't most U's have at least an OC-3 out to the backbones today? I'm surprised that the target node has that much INBOUND bandwidth, quite frankly. Dan
Re: Well, they got what they want...
On Mon, 1 Aug 2005, Steve Thompson wrote: --- Tyler Durden [EMAIL PROTECTED] wrote: That's an old pattern to character assassins: I've attacked you publically but I really don't want to have defend what I've said or reply to suggestions about my own motivation. And psychopaths are sometimes said to accuse their victims of the malice and violence the psychopaths perpetrate. Great. Fuck you too. Hope the new Stazi grab you while you bitch and complain and do nothing. Likewise, although I rather suspect you would be one of very 'Stazi' you pretend you hate. But there is an up-side: you're too fucking stupid to be of permanent use to the 'Stazi', and so you can anticpate outliving your usefulness eventually. Why don't you two get a room? I'll even subsidize it. -- Yours, J.A. Terranson [EMAIL PROTECTED] 0xBD4A95BF I like the idea of belief in drug-prohibition as a religion in that it is a strongly held belief based on grossly insufficient evidence and bolstered by faith born of intuitions flowing from the very beliefs they are intended to support. don zweig, M.D.
Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out
On Mon, 1 Aug 2005, Dan McDonald wrote: On Mon, Aug 01, 2005 at 01:51:57PM -0400, Tyler Durden wrote: What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy but that sounds suspiciously like someone loaded up an OC-3's worth of traffic 300Mbits (using Eugen's quote), is 2xOC-3. (OC-3 carries 155Mbit/sec ATM, but if it's IP/PPP/OC-3 you use more of the 155Mbits/sec). A couple of hacked university zombie armies can generate that kind of traffic. I'm *not* a telecom guy, but don't most U's have at least an OC-3 out to the backbones today? I'm surprised that the target node has that much INBOUND bandwidth, quite frankly. Well, I am a telecom *and* a data guy, and I think I can clear it up :-) First, I suspect that the Tor node did *not* have a 300mbit ingree or egress, which is why the 300mbps was an effective DDoS ;-) Second, as the guy who spent several years being the carrier schmuck on call for these kinds of attacks, a 300mbps attack is a pretty small one. Big enough to knock off the average web site or small ISP, but pretty small from the carrier perspective. He probably knew the sizeof the incoming attack because the voice on the other end of the phone (the carrier schmuck on call) told him how much data he saw coming down the pipe at the target. Dan Hopefully that'll clear some of the muddy stuff? -- Yours, J.A. Terranson [EMAIL PROTECTED] 0xBD4A95BF I like the idea of belief in drug-prohibition as a religion in that it is a strongly held belief based on grossly insufficient evidence and bolstered by faith born of intuitions flowing from the very beliefs they are intended to support. don zweig, M.D.
Re: Well, they got what they want...
--- Tyler Durden [EMAIL PROTECTED] wrote: That's an old pattern to character assassins: I've attacked you publically but I really don't want to have defend what I've said or reply to suggestions about my own motivation. And psychopaths are sometimes said to accuse their victims of the malice and violence the psychopaths perpetrate. Great. Fuck you too. Hope the new Stazi grab you while you bitch and complain and do nothing. Likewise, although I rather suspect you would be one of very 'Stazi' you pretend you hate. But there is an up-side: you're too fucking stupid to be of permanent use to the 'Stazi', and so you can anticpate outliving your usefulness eventually. Regards, Steve __ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com