Sunday, November 14, 2010
CRIMINALS IN FRIENDS LIST
Dear friends I never thought my book ‘Cyber Terror’ would ever have this kind of investigative story in it. One Pakistani Hacker (Mastermind) with multiple identities, one video upload, a few negligible activities, one cell phone number and one target the other side face book admin, three countries intelligence, every crime has traces and every Mastermind has one bad day. Nothing is beyond Law, The whole story started on 16th October 2pm, I am a damn fool, whose faith was betrayed and would have never regained on a journey across the hacker’s world if few hackers and my co writer, few face book friends, one journalist and some agencies wouldn’t have helped me tracing them.. Being well educated, deeply spiritual, and by the evil of social networking what I have gone through these days was horrible. My enthusiasm turns to disillusionment: my life drained out of me, faith, betrayals, bad words, violence and pretentions and wearied insecurity of a hacker, who has in-depth knowledge and potentials of web world and cyber crime. Man with tremendous brains and meager earnings, wanted to do big landed frustrated doing crime, his exploits, his coding, his way of hacking and over and above the skills of social engineering he uses are undoubtedly amazing. He has his group of small time hackers.
It’s been a long struggle. Why he came my way, how he made perfect strategy to harass me? His Kashmir links, his probes in my personal life. A terrorist who is heartless? Made me scapegoat, Social networking is an invention that has the Internet still at the edge of its seat due to its popularity with people. This is mostly because it really is for the people. Bringing every kind of social group together in one place and letting them interact is really a big thing indeed. Everything about it lies on the advantages and disadvantages of social networking and what it can do for you or what it takes from you never know. Definitely, it's cheaper to use online social networking for both personal and business use because most of it is usually free. While personal use is rather simple for anyone, the business functions are underestimated by many. In a social networking site, you can scout out potential customers and target markets with just a few clicks and keystrokes, adding a boost to your usual advertisements and promotional strategies. It lets you learn about their likes and dislikes, which is tremendous. If you want to fine tune your business, then this is the way to go, whether on a budget or not.
You definitely can gain so many things, earlier for an investigative journalist like me has to make tremendous efforts to work on story but now internet has given us a new platform, this builds confidence if you can connect to them on both a personal and professional level. Despite having to do a bit of work, it definitely pays off as you can be tapped for an offer if someone catches wind of your products or services. As long as you don't pursue them too aggressively, you will do well here.
You are friends with people who have other friends, and so on. There is potential in such a common situation. By using a social networking site, you can do what you can and get connected with these people to form a web of connections that can give you leverage if you play your cards right. As long as you give as well as you receive, then they will most likely stick with you. These connections are definitely valuable in the long run. That definitely sounds enticing. However, what about the disadvantages though? You are putting out information about your name, location, age, gender, and many other types of information that you may not want to let others know. Most people would say be careful, but no one can be certain at any given time. As long as people can know who you exactly are, then some can find ways to do you in. There is a potential for failure of security in any context. While many sites apply certain measures to keep any of these cases of harassment, cyber-stalking, online scams, and identity theft to an absolute minimum, you still may never know. If this is not your kind of thing then it would just be a waste of time for you. The key to social networking is that it is supposed to be fun, whether you are just doing it for kicks or clicking around for certain purposes. That should be reasonable enough for anyone, but there are those people who don't see the point. For them, it can be a disadvantage. Now there is something to really think about. Nothing is without a blemish, but those of this type of networking shouldn't really be that much of a concern regarding your safety. As long as you go along without making big mistakes, then it is all good.
One man with multiple identities, few fellow hackers, so many ids, and one pretends to be dumb and other sound IT and cyber security expert, every one plays perfect role and drags the target to that particular window..Yes they are player..Great player.. Great social engineering, Each move was calculative like chess.. One makers comments at his wall and other replies to it like fool, one again comments like a ruler of security system and then one of his own fake id comments at it like a dumb hacker, all this is done by one person and fools like us fall prey to these tricks and land in that wall commenting at their statements and this makes you adding them as friends. These few names are part of every hacker’s friend list, there are another type of people in this community as yesterday I posted on a few walls That “DON’T BELIEVE IN RUMORS- LAST NIGHT WHEN I WAS CHATTING WITH MY LITTLE HACKER FRIEND, HE SURPRISED ME SAYING, “DIDI DON’T CHAT WITH EVERY PAKISTAN HACKER BECAUSE SOME OF THEM ARE HERE ON BEHALF OF FIA”. AND HE WAS ASKED TO SPREAD THAT NEWS IN COMMUNITY. No intelligence agency has time or concern to vigil your activities. Believe me you all are victims of Someone’s social engineering skills.
The poor little hacker was harassed by that hacker who used him to spread the rumors and threatened to an extent that he disabled his account itself, I never mentioned any name but the culprit reached to his target, Poor little boy tried doing well any landed as victim of circumstances and deactivates his account.
See how crime and criminal make their way in your life quite unknowingly. To site another example, you all must be aware of Unix Root a good source of news portal which gained mileage popularity in no time. This portal has given good jolt to existing news blogs. The girl gave good show maintaining this portal, but some so called custodians of news blogs tried their level best putting pressure on her, URDU Hackers, some face book groups, some face book friends every one pounced at her. Reason no one knows. I don’t think this news portal has ever harmed anyone.
Last night I was not in good state of mind because I lost my grandmother who was the only family member left with me. But the night was much darker, these so called groups of hackers were tried penetrating me with their modus operand, initially I pleaded, I cried, I even begged to stop because they were very close to my heart, I couldn’t take that emotional jolt. It took time for me to digest that my friend is dealing with me with multiple ids just to cripple me. He randomly took me for granted. Some of my friends have witnessed amazing thing on face book window. I salute my Indian hackers, at least they are not into these kinds of cheap traits unfortunately they were also used as the gate ways to these people’s activities. Code breaker, dark look, and entire indishell group has focus, they know why and what are they doing. I am not endorsing their misdeeds but yes whatever they are doing at least doing with some ethics. This group will always remain in good books of any Indian. There are few very good Pakistani hackers, their behaviors, conduct, their vision is clean and they are the only few examples of Pak-hacking sect or community.
My dear friends I don’t know why, who and where is the next victim but they are very much active, and they are none other than your face book friends. I can say be careful. Record each suspicious activity, I had to record it because I am writing book and as you all know we are filming the same. Don’t forget to read how I traced them, how crime leaves traces over the period of time. What is needed is just patience and determination to clutch the culprit.
Now you must be having big question.. what was the intention of that hacker to harrasse me? why are they not nabbed? Why I have not disclosed their names?
Only thing I can say wait and watch…khel abhi
baki hai mere dost...