Wednesday, September 29, 2010

Surprise | Hackers Magazine Hacker5 | India's First Hackers Magazine by Newsmakers Broadcasting & Communication Pvt. Ltd

Surprise | Hackers Magazine Hacker5 | India's First Hackers Magazine by Newsmakers Broadcasting & Communication Pvt. Ltd




We are glad to inform you that Newsmakers Broadcasting & Communication Pvt. Ltd is coming up with a niche magazine based on the cyber happenings which is the need of today in the IT industry. The magazine ‘Hacker5' would be launched on 7th October, 2010 at Chandigarh Perss Club, Sector 27, Chandigarh, Punjab.

The event will be organized with the presence of high profiled dignitaries from Punjab, Haryana and New Delhi. Shri Prakash Singh Badal, Chief Minister of Punjab, Shri Bhupender Singh Hooda, Chief Minister of Haryana are some to name.

Kindly grace the event with you presence. This is an OPEN event and all of your are Invited. If you face any problem, you can catch me @ +91-9953926905


Surprise for hacker friends, after the survey on Title of the magazine: Finally we have decided to title the magazine as HaCKER5, instead of CYB3R GH057




---Like this post, Just leave a comment as your feedback. If you want us to post an article on some specific topic OR have a suggestions for us...you can also drop an email on amarjit@freehacking.net

Monday, September 27, 2010

CYBER GHOST: CYBER TERROR: NBC Company Profile Updated & Added Hackers Faces

CYBER GHOST: CYBER TERROR: NBC Company Profile Updated & Added Hackers Faces


Vaidehi, always dreams of doing something different and she started crafting her dreams from scratch. Today, she has made it big in Mumbai, the city of dreams. A little something about herself in her own words. “After a long stint in journalistic career pursuits, I decided to start my own publication and this was another turning point and one more milestone in my life.

On graduating from Law College in 2000, I chose Journalism. Formerly, I was already a freelance reporter to West Side Plus (Times of India), Mumbai Sandhya Group of Publications, and Sunday Observer. This was an amazing experience. Before coming to Afternoon, I was writing for Free Press Journal.


In 2000, I joined ‘In Mumbai’ (In Times News) as a crime correspondent. Here I was introduced to new gametes of visual media. I learnt compilation of news & visuals, scripting, language, timing and video editing. This was like an institution for young journalists. I have worked with various reputed news channels but always wanting to learn more. I joined ‘Digital Academy’ to acquire proper training in video editing, dubbing, cinematography techniques, etc.

I have produced, directed & edited over fifty documentaries under the Newsmakers banner and for all leading channels. My first corporate film was for ‘MHADA’ about SRA scheme which gave me recognition. Thus, I moved towards entertainment media and produced some good TV serials, and to satisfy the journalist in me, I wrote several books. My books were published by Vatsala Baliram Prakashan Kendra, Latur, Maharashtra.

Vaidehi Sachin
editorafternoonvoice@gmail.com

Newsmakers is one of the fastest growing progressive media houses in India. We bring to you 'Beyond the News' fortnightly magazine, a monthly 'Maritime Bridge' and the 'Afternoon Voice' daily. Our core competency lies in providing extensive coverage to all spheres of information. To this end we have build a team expertly poised with the right balance of experience and youth to give our publications freshness and depth. Honest reporting with an emphasis on ethics is our forte. We especially pride ourselves in being a self-funded organiz-ation without relying on big industrial housesfor sustenance. We intend to champion the new brand of journalism widely dubbed as 'citizen-journalism', with over two hundred citizen reporters all over Mumbai and special correspondents to cover every department. We also mentor young journalists filled with new ideas without the burden of intellectual dictatorship. These young minds are the USP of the company. Our exclusive content allows us to build strong readership loyalties which become our coveted reward. We are here to play a long innings and continue to play an integral part of our reader 'slives.

TO DOWNLOAD FULL COMPANY PROFILE CLICK HERE

---Like this post, Just leave a comment as your feedback. If you want us to post an article on some specific topic OR have a suggestions for us...you can also drop an email on amarjit@freehacking.net

Hacking: An act to gain cheap publicity


---Like this post, Just leave a comment as your feedback. If you want us to post an article on some specific topic OR have a suggestions for us...you can also drop an email on amarjit@freehacking.net

Lovers Beware: You are Observed, Hacked


---Like this post, Just leave a comment as your feedback. If you want us to post an article on some specific topic OR have a suggestions for us...you can also drop an email on amarjit@freehacking.net

Hacking is not a crime, It's our passion: Chit Chat with Hacker on Social Networking Site

Hacking is not a crime, It's our passion: Chit Chat with Hacker on Social Networking Site

This post has been REMOVED INTENTIONALLY

---Like this post, Just leave a comment as your feedback. If you want us to post an article on some specific topic OR have a suggestions for us...you can also drop an email on amarjit@freehacking.net

Sunday, September 26, 2010

Vaidehi Sachin, Group Editor of News Maker: Success Story from Print Media to Cyber Media

Vaidehi Sachin, Group Editor of News Maker: Success Story from Print Media to Cyber Media

Afternoon newspaper Vaidehi Sachin victim of good bad and ugly traits.UNBELIEVABLE SHOCKING INSIDE STORIES AND THE DIRTY POLITICS PLAYED BY the frustrated soles in ADC




Behram Contractor (1930 – 2001), also known as Busybee, was one of the popular figures in Indian journalism. He worked at the "Free Press Journal", "Times of India" (Bombay), and "Midday" before founding his own newspaper "The Afternoon Dispatch and Courier" in 1985. The usp of this paper was Behram’s columns "Eating Out" which featured one of the best Mumbai restaurants giving a glimpse of many Indian and international cuisines. He was awarded the Padma Shri in 1990, and the Goenka Award for Excellence in Journalism in 1996. In 1998, Behram published "From Bombay to Mumbai", a collection of the best of Busybee's columns from 1996 and 1997. Behram Contractor died in 2001 from a heart attack. After his death for some time his widow Farjana took over the show and was trying to manage doing her best. But 2001 onwards this paper saw major fall in the market and Mid-day just gulped its remained existence. Einancer of this paper Kamal Morarka just took over the paper from Ferzana and moved it out of Afternoon House, The imminent demise of the Afternoon Despatch & Courier –once praiseworthy evening newspaper of Mumbai.

Regular readers of the Afternoon since its inception were greatly saddened by the paper’s sudden disappearance; and delighted at its sudden reappearance on 30th November it was probably the most understated and unobtrusive re-launch in the history of journalism. There were no promos announcing its second coming; and no explanation whatsoever, in its new avatar, as to why it ceased publication so mysteriously; and what the circumstances were that led to its rebirth. Be that as it may, but the happiness of the readers was short lived.


One of the qualities that made the Afternoon a class apart for some of its peers was its refusal to the demands of crass commercialism by entering to the lowest common denominator. Therefore, a cause of genuine distress for readers to observe this once-excellent periodical guilty of that very sin in its reborn avatar. The most glaring example was one of the daily column, entitled “Only Sex”, supposedly authored by some character who calls himself Kama Shastra . The obvious and only purpose of this travesty could be an ill-founded attempt to increase circulation, by means of cheap titillation. Another inanity is something that goes by the title of Bindas/Kay being totally perplexed by this piece of nonsense. Is it meant to be humorous or witty? It certainly is not. Then it was given to understand that the principal reason the Afternoon was discontinued, in its previous format, was that it was not generating sufficient revenue. This is perfectly understandable. The altruistic function of a newspaper may be to impart unbiased information to the general populace but, when all is said and done, it is a business, like any other. However, with a little more application of mind, the owner’s objective could be achieved in a less demeaning manner. The paper remained as dead horse in the market.

Some news team joined Afternoon, good stories, columns and little humor was back to news paper. Mobin Pandit really changed the paper upside down, every day I used to read Vaidehi Sachin with sensational new story, sometimes some Pradeep Gupta and many a times Vishnu and Shoeb. But over all paper could see only one name that was Vaidehi Sachin, everyone thought the news team could do wonders to our beloved tabloid, the paper started gaining mileage and as a reader I used to enjoy reading Front page. This continued for time some time and all of sudden again paper started struggling for its existence.Afternoon’s ambience got polluted one by one people started leaving the paper. The first person to get out of news paper was Mobin Pandit. Such a senior Journalist and vise desk person became victim of dirty politics. Morarka was never bothered to look into such things he just used to get carried away by hearsays. His P A was his birbal or you can call him anything, he started dominating editorial authorities, ammoniums letters, bad mails, and critics from all the side forced mobin quit Afternoon.


Again spare time associate editor took over the reins and Afternoon once again started shaking. During this period Vaidehi managed the show it seems along with Suresh Baliga. Vaidehi was educated young smart girl anyhow maintained good relations with management. Some what she was favored a lot by upper crust of Courier publication management. Or in other words due to her influences Management was just securing her to get done their unwanted jobs as such, getting admissions for morarka’s friends children, getting the license renewed for his relatives defaulted hotel, getting his PA’s relative transferred from one place to another…etc… more than anything Vaidehi’s visits to mantralaya and ministers was for these purposes. Some where the saturation came her way and more over no one used to like her in that office. She was talented, her proficiency at news was excellent but by nature she was not only arrogant but also very blunt. The so called old staff used to plan her exit. One fine day vaidehi made front page story favoring the statements of Morarka’s brother in her story on solar eclipse, because his brother is known as astrologer and here things went wrong against her because she was not aware of the dispute between two brothers.

Poor girl had to leave News paper with lots of pain and humiliation, Then the face of Afternoon Vaidehi Sachin, was not in a mood to get out of it and wisely started her magazine and then all of a sudden reached stalls with her own eveninger “AFTERNOON VOICE”..it was big threat to ADC’s existence. Beautiful content, strong marketing and sensing all kind of obstacles from dispatch she just rushed her way. All ADC readers initially criticized her but then they all became her fan. I should appreciate her guts; she compelled ADC to come down with its adamant prize of two rupees. She made them change the look of the paper. Under insecurities and threat from her paper, ADC had to do all that which they were not at all ready to do. ADC readers started bless her because it was blessing in disguise for them.

Readers and well wishers started enjoying this cold war between Afternoon and Afternoon, today Vaidehi has proved one thing, news paper is no more a prerogative of rich and famous people. Vaidehi could be owner, publisher and editor but if A business man desires to do so he can never ever think of it..at least now they have learned to respect their staff. They did all possible best but couldn’t sustain with good quality stuff.Call me a purist, but I believe an English language newspaper has a duty towards its readers to ensure that the English employed by its reporters and correspondents is impeccable. Hence, it was a shock to notice that the quality of English, in the Afternoon’s revised version, had deteriorated considerably.

This decline was particularly dramatic in a publication that had prided itself on its grammatical and linguistic correctness. The all-important front page – which should be checked by a senior sub-editor at the least, was replete with errors. The debacle continued till date. One can excuse – and even tolerate – bloopers like this in a fledgling publication, but certainly not in the Afternoon; which espoused a standard of journalism held up as an example to other newspapers. I sincerely hope the Afternoon soon regains its former glory. Else the rival paper is waiting for right time to take a leap. Young team, dedicated editor, clean and unpolluted ambience and right approach could take Afternoon Voice to good lead.It’s high time they need to understand good bad and ugly amongst them. ADC needs leadership like Mobin Pandit and Farzana Contractor.one can take over everything but cannot execute a brain child of such a legend the way did. One has to face the fact that Afternoon was Behram’s baby and it died with him. What is existing is nothing but sole-less body and false pride.

on 1st May Taj Hotel was over croweded with biggies of India, NBC had its awards night, simple dressed young lady was the gate to receive all the guests, many of the guests were from south mumbai and loyal reader of ADC. they were their with all sort of ciritc in them, the event ended with happy note and Vaidehi took over the mike to give vote fo thanks, she gave her heartist thanks to D.shivanandan, RA Rajiv and Nandini Sardesai..and began her speach with the struggle story of her Afternoon voice, she kept on expressing and no body moved.the kind of trauma she went through these years as ADC employee and then Editor of AV, every body stood and gave her standing ovation. I too got bog goosebumps, my heart was grilling me.there were many people went to stage to hug her, she gave a sweet smile with roling tears and asked for blessings.
The modest and honest team of her added charm to her personality. Aditi Taman 20yrs girl compared the show with pep english, giggling energy and surprised everyone with her ability to hoast the show.

Afternoon Voice team was moving around smoothly and the way they all presented was an example of parrlal journalism.
she deserves the best of support from all readers.

We need Mobin Pandit like journalist to carry legacy of evening tabloide. we need to respect scribs, the other side of the desk needs to give them proper respect, one need to understand the value of such young struggler.

Finally few months back Vaidehi Sachin took a revolutionary step with the support from intelligence sources, to unite all ethical & unethical hackers of India. Register them under cyber employment act & create a new young army for Cyber security of our country INDIA.The intention is to rehabilitate youth lured in cyber crime.

Who is Vaidehi Sachin?

Vaidehi Sachin is a graduate and-journalist by profession who’s the owner of NewsMakers Publications Pvt.lts Now. She started her carrier with Free Press and worked as city editor of the Afternoon Despatch and Courier, an eveninger published from Mumbai since last 23 years. At Afternoon she joined as correspondent and promoted as cityeditor and soon became face of ADC. That gave jolt to so many false custodians of ADC. Vaidehi’s attitude arrogance and straight forward tomboyish nature couldn’t give space to these unwanted goons at ADC to play politics. Very well resourced, well connected and her bench mark of writing gave her boost and she became famous overnight. She worked with ADC till March 2009. And in May 2009 she came up with her own newspaper called Afternnon Voice which is a great success story. And the so called ADC loyalists are begging jobs on the road and has no existence in media.

ABOUT THE AUTHOR OF THIS STORY: Who am I and why I am writing in favor of these people?

Jyestha Arya
TV9
jyesthaarya@gmail.com

You must be surprised to notice why this girl all of a sudden stood up voicing for Vaidehi, and Mobinji and other journalists? You query is right. My sister too was working with sashidharan who is nothing but a page designer but has craving to become a reporter, sometimes he use to copy some business articles from mint used to modify them and gets published. My sis caught him, but never reacted looking at the hierarchy in media every one dose so. But this man started giving her indecent advances, he started dominating her and finally as he tried maligning Vaidehi madam’s image he did the same with my sister by sending all ammoniums post to her editor, he was bad mouthing about her, it’s not only she but he did the same with every new comer. Finally he got tit for tat, his smartness couldn’t work with vaidehi and he had to quit the paper. In ADC also he used to write fake letters, dirty posts but management didn’t pay much attention, out of frustration he chose this way and started blogging about a girl of his daughter’s age. One has to pay for his own deeds..god is great.

---Like this post, Just leave a comment as your feedback. If you want us to post an article on some specific topic OR have a suggestions for us...you can also drop an email on amarjit@freehacking.net

Vaidehi Sachin, Group Editor of News Maker: Success Story from Print Media to Cyber Media

Saturday, September 25, 2010

Myth About Indian Hackers: True Story Behind Underground Hackers

Myth About Indian Hackers: True Story Behind Underground Hackers

GUEST POST BY Vaidehi Sachin

Cyber war is nothing but an eye wash, actually speaking cyber war is a created hype by some old kids, in which one thinks himself a soldier and others as toy guns. And the computer as his Kingdome, little knowledge he possess is his wisdom, and tools he posses for hacking are his arms and ammunitions. The so called cyber war soldiers are living in their own imaginary world and each one of them thinks he is superior amongst them. By giving too much importance to this particular term ‘Cyber War” creates nothing but a fear in common public and hackers aspiring this carrier as his living and passion. These so called war participants are nothing but notorious small time criminals. They should be punished. If one particular group of hackers is clutched then maximum can be traced and the authentic hackers can sustain with integrity. its hight time to face of these disguised hackers and expose thenm to common masses.

The hacking rivalry between Pakistani and Indian hackers is known to almost everyone. Pakistani hackers are known to be most unethical hacker by Indian hackers. This cyber war is never going to stop. Because the group of hackers those who are hand in gloves with each other are making this trait as publicity gimmick. It’s just as you scratch my back and I scratch yours. This has infected several countries across the globe. In the age of Technology wars the battles are not fought by weapons or atomic powers but it’s on raise through the advent of Information Technology, the pace of cyber wars between Pakistan and India have also been increased. All these low profile hackers are either engineering students, or just school going kiddos those who learned hacking from various tools openly provided on search engine. It’s itch in them to create a horrifying aura and over hype the meager issues. One particular group from north is doing this. I know after publishing this article they may create trouble for me as their basic instincts are destructive. I give damn because I am blessed with best hacker friends and a brother to tackle these goons. Actually Information is a source of learning. But unless it is organized, processed, and available to the right people in a format for decision making, it is a burden, not a benefit.



Actually the genuine Cyber wars between the two countries first started in May 1998, when India conducted its nuclear tests. Soon after India officially announced the test, a group of hackers called milw0rm broke into the Bhabha Atomic Research Center web site and posted anti-India and anti-nuclear messages. This hacking had an intention to protest the deal. Recently it seems like a Cyber war has become publicity tool between Pakistani Hackers and Indian hackers. The irony is that they use country flags to display the bonding of love for own country. If by hacking Indian sites Pakistani hackers are doing crime then by doing the same even Indian hackers are criminals. In the recent past when I started interacting with hackers for my forthcoming magazine “cyber Ghosts”, I met different characters. They have got nothing to do with your country; they have got nothing to say expect displaying their credentials as some great hacker. Some groups have made mockery of this little knowledge, they peruse schools and collages conduct seminars, charge the students and make big money by making this subject a taboo. Young minds nowhere take any participation in securing system they just get attracted to word hacking, the practice starts with hacking girlfriends mail, password, then school website domain. And this extends in to hacking all wanted and unwanted arenas. By conducting these kind of unofficial seminars, ( I am calling it unofficial because so far government recognized such training centers are hardly in existence} private so called ethical hacking training camps are mushrooming in every part of India. Blogging on learn hacking is another blot to this black trait. If you have glance at all theses so called sites and blogs, they all somewhat similar. Hardly will you find something authentic. This particular group of hackers are worst than terrorists. They are misguiding youth of this country. They themselves have divided in to various groups, Andhra hackers, south hackers, Nepali hackers, Punjabi hackers, Maharashtra hackers, tiger hackers (from Kolkata) etc etc.. There is no harmony amongst them; they all are Indians but still big rivals to each other. Some of them even created Cyber army.
The history says this all started when IGCOE Hacker from India hacked Punjabi Pakistani Police official website. In Response to it Pakistani Hackers hacked India's several official websites. Cyber war has gone in so deep and hidden in horrifying layers. This techno war has taken a cruel shape. There are so many Indian hackers working for Pakistan, and at the same time there are many Pakistani hackers just committed to their work having to bad or malicious intention against India. For me these Indian hackers are the biggest threat for my country. Tracing these hackers is not a big issue but it’s difficult because they are operating from other countries. But the question remains here is why Government has failed to track down Indian unethical or Pak agencies agent hackers of India? There should be a combing operation to eradicate this evil. As per Indian constitution hacking is crime let it be ethical or unethical. The irony is that other nations are using these hackers to sabotage neighboring countries as well as protect their own cyber world. Actually if given a chance or If Indian hackers taken into confidence they can create wonders by protecting entire cyber network of India because India has most efficient hackers on the globe. But unfortunately they have gone haywire. I would like to site an example here buying domain is not difficult, the demine owner keeps all the security procedures, he posses all panels with him. Key panel excess is always with a demine owner. Let any password or admin go here and there but server’s crucial info is always with the domain owner and every activity is traced here. One can hack http but not the domain WHICH IS EASILY RECOVERABLE. The hacking is done on very superficial level of these particular websites, but hundreds of such low profile sites are hacked and yet not recovered. Why? Who is doing it? Who the supporters are? It’s a big mystery of this hacking industry.

No doubt Both Pakistani and Indian websites got hacked which means that both the countries suffered security threats. This battle may result in loss of innocent people who are not the part of war. So called great hackers website was hacked In December 2009 it was Fadia’s business site, hackingmobilephones.com was hacked by a spammer promoting pharmaceutical products for erectile dysfunction. The question remains here is why this so called “INDIA’S BEST HACKER” couldn’t protect his site from other hackers? If given a chance and assurance to capable hackers of this country they can do much much… more than Fadia. Its high time Government should take help of these hackers to protect our own cyber network and use them as cyber army. The recent Independence Day was a nightmare for some of the webmasters and website owners of both India and Pakistan. The attack was started by Pakistani hackers defacing some Indian websites on 14th August; this was followed by counter attack from Indian Hackers. In the counter attack from both the sides’ lot of websites were hacked and defaced. The attack was started by Pakistani groups called Pak Cyber Army and PakHaxors, these groups have defaced around 10-20 websites .the counter attack was lead by Indian hackers called Indishell and Indian Cyber Army who are claiming to deface more than 2000 Pakistani websites but Zone-h data confirms the 1000+ figure. Indian hackers always thought they were too sophisticated to fall into the hands of the rough cops in this country, whom various human rights groups routinely accuse of brutality. Why should government and police is so merciless with the hackers? They want to be on the official side of Internet security now but they are scared because they are treated as a criminal then it leaves an unpleasant taste. Indian hackers don’t have a strong united community, so it’s difficult to tell if there is a drop in activity may be that’s the reason the hackers are lying low. Nobody wants to mess again.

---Like this post, Just leave a comment as your feedback. If you want us to post an article on some specific topic OR have a suggestions for us...you can also drop an email on amarjit@freehacking.net

Myth About Indian Hackers: True Story Behind Underground Hackers

GUEST POST BY Vaidehi Sachin

Underworld of Hakka Noodles

In the recent past one largest country Chinese is in news due to hackers, these hackers are called Hakka noodles, and they have hit the headlines. Computer security specialists say there are so-called patriotic hackers who focus their attacks on political targets. Then there are the intelligence-oriented hackers inside the People's Liberation Army, as well as more shadowy groups that are believed to work with the government. This country is one of the most well to do and well managed country.

The government has empowered hackers in different sectors of China. The empowerments of hackers have reduced internal cyber crime and the entire force is used for securing the cyber network of country. This does not mean this country is not hacked by any other country. They are also part of Cyber war. The interesting fact is that the maximum hackers of this country are girls between the age group of 13 to 21. So far two illegal hackers Biyu a urban girl, in her 18s, operates underground, her biggest passion is to break in to websites. Another story is of a young Chinese hacker Majia, a soft-spoken college graduate in his early 20s, is a cyberthief. He operates secretly and illegally, as part of a community of hackers who exploit flaws in computer software to break into websites, steal valuable data and sell it for a profit. Majia started hacking in college.
After a degree in engineering, he took a job with a government agency, largely to please his parents. But every night after work, he turns to his passion: hacking. Most hackers are lazyOnly a few of us can actually write code. That's the hard part. Internet security experts say China has legions of hackers just like Majia, and that they are behind an escalating number of global attacks to steal credit card numbers, commit corporate espionage and even wage online warfare on other nations. He operates from a dingy apartment on the outskirts of this city in central China.

In addition to independent criminals like Majia, Here's a list of the people who've been infected with my Trojan horse,. As he explains it, an online "trapdoor" he created has already lured 2,000 people from China and overseas - people who clicked on something they should not have, inadvertently spreading a virus that allows him to take control of their computers and steal bank account passwords. Indeed, in China - as in parts of Eastern Europe and Russia - computer hacking has become something of a national sport, and a lucrative one. There are hacker conferences, hacker training academies and magazines with names like Hacker X Files and Hacker Defense, which offer tips on how to break into computers or build a Trojan horse, step by step. For less than $6, one can even purchase the Hacker's Penetration Manual. And with 380 million Web users in China and a sizzling online gaming market, analysts say it is no wonder Chinese youth are so skilled at hacking. Many Chinese hackers interviewed over the past few weeks describe a loosely defined community of computer devotees working independently but also selling services to corporations and even the military.

Because it is difficult to trace hackers, exactly who is behind any specific attack and how and where they operate remains to a large extent a mystery, technology experts say. And that is just the way Majia, the young Chinese hacker, wants it. Computer hacking is illegal in China. Last year, Beijing revised and stiffened a law that makes hacking a crime, with punishments of up to seven years in prison. Majia seems to disregard the law, largely because it is not strictly enforced. But he does take care to cover his tracks. He admitted the lure was money. Many hackers make a lot of money, he said. Exactly how much he has earned, he will not say. But he admits to selling malicious code to others; and boasts of being able to tap into people's bank accounts by remotely operating their computers.

Financial incentives motivate many young Chinese hackers like Majia, experts say. Scott J Henderson, author of The Dark Visitor: Inside the World of Chinese Hackers, said many had been seeking to profit from stealing data from big corporations, or teaching others how to hijack computers. "They make a lot of money selling viruses and Trojan horses to infect other people's computers," Henderson. "They also break into online gaming accounts, and sell the virtual characters. It's big money." Majia even claims to know details of the Google attack. These two chines hackers have recentely teamed up and gave many TV channel apperances.

---Like this post, Just leave a comment as your feedback. If you want us to post an article on some specific topic OR have a suggestions for us...you can also drop an email on amarjit@freehacking.net

Company Profile of Newsmakers Broadcasting and Communications Pvt. Ltd. AKA NBC

Company Profile of Newsmakers Broadcasting and Communications Pvt. Ltd. AKA NBC

Promoter's & company profile


NBC Awards


NEWS MAKERS


NBC Journalism Academy


NBC Voice



Cy3er Gh057


Cyber Terror


Beyond the News


Afternoon News


Maritime


ArtScape


Company Profile of Newsmakers Broadcasting and Communications Pvt. Ltd. AKA NBC

---Like this post, Just leave a comment as your feedback. If you want us to post an article on some specific topic OR have a suggestions for us...you can also drop an email on amarjit@freehacking.net

Friday, September 24, 2010

CYBER GHOST: We are live once again to provide you best cyber & hacking news

CYBER GHOST: We are live once again to provide you best cyber & hacking news

Hi Friends.. Amarjit Singh here and hope you all will be happy to see me once again. Well you will not find any old post here.. why no need to tell.

Do not ask me what happened and where I was....because I am only thinking about our new venture these days. As most of you guys are aware that Cyber Terrors will be launched on30th Oct in which I am working as co-author.....along with this we are also planning to launch a new Magazine..which will be first on its type. The magazine name is CYBER GHOST and published on monthly basis. The target is all you guys and I am damm sure the I will get a huge response from all you guys. This magazine will be launched on 7th OCT....and the venue for its launching party is CHANDIGARH, PUNJAB...Yes its my mother land Punjab.

So..I am closing here for today..keep you eyes open for tomorrow and keep visiting this blog. If you any query, just drop me a comment here

---Like this post, Just leave a comment as your feedback. If you want us to post an article on some specific topic OR have a suggestions for us...you can also drop an email on amarjit@freehacking.net

Beware of Fake Subject Notification: Afternoon Voice 24 September

Beware of Fake Subject Notification: Afternoon Voice 24 September

---Like this post, Just leave a comment as your feedback. If you want us to post an article on some specific topic OR have a suggestions for us...you can also drop an email on amarjit@freehacking.net

Remarkable Revenge against BURN QURAN DAY

Remarkable Revenge against BURN QURAN DAY

---Like this post, Just leave a comment as your feedback. If you want us to post an article on some specific topic OR have a suggestions for us...you can also drop an email on amarjit@freehacking.net

Little & Sensible Hacker Friend: Chit Chat with Hacker on Social Networking Site

Little & Sensible Hacker Friend: Chit Chat with Hacker on Social Networking Site


---Like this post, Just leave a comment as your feedback. If you want us to post an article on some specific topic OR have a suggestions for us...you can also drop an email on amarjit@freehacking.net

My Little Lonely Hacker: Chit Chat with Hacker on Social Networking Site

My Little Lonely Hacker: Chit Chat with Hacker on Social Networking Site


---Like this post, Just leave a comment as your feedback. If you want us to post an article on some specific topic OR have a suggestions for us...you can also drop an email on amarjit@freehacking.net

Cyber war between Porki and patriotic hackers

Cyber War Between Porki & Patriotic Hackers

SOURCE: Cyber Terror

The hacking rivalry between Pakistani and Indian hackers is known to almost everyone. Pakistani hackers are known to be most unethical hacker and our Indian hackers call them porkis.

This cyber war is never going to stop. This has infected several countries across the globe. In the age of Technology wars the battles are not fought by weapons or atomic powers but it’s on raise through the advent of Information Technology, the pace of cyber wars between Pakistan and India have also been increased. Actually Information is a source of learning. But unless it is organized, processed, and available to the right people in a format for decision making, it is a burden, not a benefit.Cyberwars between the two countries first started in May 1998, when India conducted its nuclear tests. Soon after India officially announced the test, a group of UK based hackers called milw0rm broke into the Bhabha Atomic Research Center web site and posted anti-India and anti-nuclear messages.
Recently it seems like a Cyber war has been started between Pakistani Hackers and Indian hackers. This all started when IGCOE Hacker from India hacked Punjabi Pakistani Police official website. In Response to it Pakistani Hackers hacked India's several official websites. Whenever Indian hacker hacks Pakistani website they leave message on that website “You Porki You is hacked”. Porki word had come from pork, Muslims they hate pork and they treat this term as slang. May be that’s the reason Indian hackers have preferred using this word for pakihackers.

As per Indian constitution hacking is crime let it be ethical or unethical. The irony is that other nations are using these hackers to sabotage neighboring countries as well as protect their own cyber world. Actually if given a chance or If Indian hackers taken into confidence they can create wonders by protecting entire cyber network of India because India has most efficient hackers on the globe. Definitely one would like to know that who wins the battle Pakistani hackers or Indian Hackers, the answer is nun. There is nothing to win but it’s a loose .Both Pakistani and Indian websites got hacked which means that both the countries suffered security threats. This battle may result in loss of innocent people who are not the part of war. The common method which is used widely is SQL Injection.SQL Injection involves entering SQL code into web forms, eg. Login fields, or into the browser address field, to access and manipulate the database behind the site, system or application. The other methods which were used are Brute force or Dictionary Attacks. The hackers might have cracked FTP password to gain access to Server. Earlier Pakistani hackers used to be called Pakbugs and Indian hackers named HMG.
There are some so called ethical hackers over rated by media and over hyped more than their actual caliber, but some hackers do not even know who this Ankit Fadia is, There are lot of arguments and facts against him, Some people says he is not a HACKER he is just a businessman.

At the age of 14 Ankit Fadia started a website called “HackingTruths”, which he claims was judged as the “second best hacking site in the world by the FBI”. The question is that no one knows when did FBI started rating hacking sites? And suppose if FBI do so then why should they over look or neglect rating other such sites and blogs which has much more potential than fadia’s claims. FBI is and investigation agency and it has got nothing to do with the ranking of any such website. Fadia’s claims seems to be flopped because he has never created any tools for hacking. Most intelligence agencies like NSA have expert cryptanalyst with PhD’s and super fast clusters to get their job done why will they require this mature guy to do such serious job? So called great hackers website was hacked In December 2009 it was Fadia’s business site, hackingmobilephones.com was hacked by a spammer promoting pharmaceutical products for erectile dysfunction. The question remains here is why this so called “INDIA’S BEST HACKER” couldn’t protect his site from other hackers? If given a chance and assurance to capable hackers of this country they can do much much… more than Fadia. Its high time Government should take help of these hackers to protect our own cyber network and use them as cyber army.
The recent Independence Day was a nightmare for some of the webmasters and website owners of both India and Pakistan. The attack was started by Pakistani hackers defacing some Indian websites on 14th August; this was followed by counter attack from Indian Hackers. In the counter attack from both the sides’ lot of websites were hacked and defaced. The attack was started by Pakistani groups called Pak Cyber Army and PakHaxors, these groups have defaced around 10-20 websites .the counter attack was lead by Indian hackers called Indishell and Indian Cyber Army who are claiming to deface more than 2000 Pakistani websites but Zone-h data confirms the 1000+ figure.

Indian hackers always thought they were too sophisticated to fall into the hands of the rough cops in this country, whom various human rights groups routinely accuse of brutality. Why should government and police is so merciless with the hackers? They want to be on the official side of Internet security now but they are scared because they are treated as a criminal then it leaves an unpleasant taste. Indian hackers don’t have a strong united community, so it’s difficult to tell if there is a drop in activity may be that’s the reason the hackers are lying low. Nobody wants to mess again.

Cyber War Between Porki & Patriotic Hackers

SOURCE: Cyber Terror

---If you want us to post an article on some specific topic OR have a suggestions for us...you can also drop an email on amarjit@freehacking.net

Tuesday, September 14, 2010

Cyber Terrors Coming Soon: Unite Indian Hackers

Cyber Terrors Coming Soon: Unite Indian Hackers
Is it true that only Certified can join the campaign??? What is the requirement to join this?

This campaign is against Cyber Terrorism for people who are anti Indian. There is no legal certification or formal qualification to join this cause .So whether you are a Black Hat, White Hat or Grey hat id doesn’t really matter .We want to unite all the hackers in the India under one roof for their benefit, and put their skills in right and approved manner.

Saturday, September 11, 2010

GOOD NEWS ALL MY FRIENDS: Cyber Terror Book to be Launched on 30th October


Thanks To one and all - By Vaidahi Sachin

Before I start introducing you to this book i would like to say thanks to all my little friends mayank,vishvajeet, Rafay Baloch, chandu,ankit,nagarjun,aditi,cyber expert Sachin Vaze and top cops of Mumbai police, leagal think tanks, my staff gayatri, sandeep, amit and rohini.

Amarjit Singh - Reason for writing this book.

Special thanks to Indian Cyber Army, pakistan cyber Army, all black hat hackers, white hat hackers and every hidden sourece who made this venture possible for me.My heartise thanks to Mumbai police, cyber crimes expert Mr.Vijay Mukhi and entire police force of our country,who dedicate their lives to stop crime.

Proposed title- Cyber terror

Pages (tentative)- 300

Index-
Chapter 1- why I am writing this

Chapter 2- my friend hackers across the nation

Chapter3- Why unite hackers

Chapter4- who these hackers are?

Chapter5- good bad ugly side of hackers

Chapter 6- Indian cyber army Vs Pakistan Cyber army

Chapter7- how I was troubled and protected by hackers.

Chapter8- My family of united hackers and struggle uniting

Chapter9- Legal lapses and amendments

Chapter 10- signature campaign

Chapter 11- Hackers around the globe

Chapter12- what India lacks

Chapter 13- fairer side of hackers (female hackers)

Chapter14- the trauma of prisoners and under trials (hackers)

Chapter15- myth, misconceptions and misleading stories about hackers.

Chapter16- Action/cut/ and adventure

Chapter 17- Rafay Baloch a friendly acutance

Chapter 18- Me and my face book hackers

Chapter 19- My dream project

Chapter20- Make difference

Chapter21-Indian Hacker's Groups

Chapter22- Swiss accounts and politicians of India

Chapter 23- rivalary and compitition in hackers

Chapter24- communications,social celebrations,life style of hackers

Chapter25- New inventions in Hacking

The book is written/researched and edited exclusively by Vaidehi Sachin -Co-research aditi taman, Amarjit singh

Sub editing- Sandeep / prakash s

Cover- Amit jha and page designers- Mayank Agarwal, Dhaval Bhat

Publisher- newsmakers broadcasting communication

Printed at Mumbai - Publicity All Over India by- Vipin Gaur
book your copy today- Vipin Gaur/ Delhi 09810226962
Amarjit Singh/Punjab 0995396905
Rohini /Mumbai 09820199881
Anushka/ rest of India 08097451883

So grab your copy today

Wednesday, September 8, 2010

Hackers create 57,000 fake web addresses weekly

According to a three month long study carried out by PandaLabs – the research arm of Panda Security – each week, hackers are creating 57 000 new fake web addresses to trick or infect users.

Panda says that in an average week, hackers use some 375 different high-profile names and company brands to lure users.

Interestingly, Panda claims that 65% of fake websites imitate bank pages, followed by online stores and auction pages at 27%.

For its research, PandaLabs says it analysed malicious URLs positioned on the internet that hackers use to trick users into downloading malware or directly steal their bank details.

As well as banks, fake online stores such as eBay are used by hackers to steal users' login credentials.

Other financial institutions, such as investment funds, stockbrokers, and government organisations, occupy the following positions, with 2.3% and 1.9% respectively. The latter government organisations are, says Panda, largely accounted for by the US revenue service or other tax collecting agencies.

Payment platforms, led by Paypal, and ISPs are in fifth and sixth place, whilst gaming sites – topped by World of Warcraft – complete the rankings.

Luis Corrons, PandaLabs' technical director, said that the problem is that, when users visit a website through search engines, it can be difficult for users to know whether it is genuine or not. "For this reason, and given the proliferation of this technique, it is advisable to go to banking sites or online stores by typing in the address in the browser, rather than using search engines", he said.

This article is featured in:

Hackers Exploit Twitter XSS Flaw



A dangerous XSS bug surfaced on Twitter on Monday, and researchers have seen active exploits for the bug, which allows an attacker to steal the session cookie of a Twitter user with a simple click-and-you're-owned technique.

Experts say that the attacks seem to be emanating from domains in Brazil, and that more than 100,000 users had already clicked on one malicious shortened URL related to the attack.And that's just one link. It's unclear how many other malicious links have been created to exploit this flaw.

"The malicious JavaScript payload that's being distributed is rather simple. It uses an XSS (Cross-Site Scripting) vulnerability to steal the cookie of the Twitter user, which is transferred to two specific servers. Essentially, any account which clicked on the malicious links is compromised," Stefan Tanase, an anti-malware researcher who specializes in social networking threats at Kaspersky Lab, said in an analysis of the Twitter exploit.

"All clues point to Brazil as the originating country for this attack. First, the 2 domain names used to get the stolen cookies are registered under Brazilian names. More than that, one of them is actually also hosted in Brazil."

One of the tweets used to direct users to the malicious site exploiting the XSS bug is written in Brazilian Portuguese and references a Brazilian band.

Twitter officials said on Tuesday morning that the vulnerability has been fixed. However, the XSS flaw, which was on one of the many sub-domains that Twitter maintains, may just be the tip of the iceberg for the massively popular social networking platform. The shortened URLs that are essentially mandatory on Twitter, thanks to the platform's 140-character limit on messages, are a serious weak link in the site's security.

How to Defend Your Account & Passwords From Hackers

How to Defend Your Account & Passwords From Hackers

GUEST POST BY DarkL00k aka Ajay Dhaka

How many times have you heard someone ask "how do I hack Orkut or Gmail?"
It’s become a type of joke among frequent visitors of hacker related chat rooms and websites. This article is being written for the sole purpose of defending yourself against such actions.


Lets start by going over a few terms I use so there is no confusion. If you think this is silly, you’d be surprised at the # of emails I get asking what is a...
I figure I’ll just spell it out.

UN = username
PW = password
SW = software
HW = hardware
DL = download
KL = keylogger
RAT = remote administration / access tool.

Dispelling a few rumours:

1. You can use a bruteforcer program to get a Orkut/Gmail or Hotmail password.

This simply is not the case. Both Orkut/Gmail and Hotmail have security in place specifically designed to stop this kind of attack. Orkut/Gmail requires that you enter a random code into an additional field provided as well as the UN and PW after 3 failed login attempts. Failure to enter the correct code will result in a failure to log into the account, even if the UN and PW are correct. Hotmail has a different security feature which sends the user to a ‘lockout’ page, which has NO fields to enter the UN or PW after just one failed attempt. These two methods are effective for eliminating bruteforcing to exploit their service.

2. There are programs that hack Yahoo and Hotmail.

Once again, that’s not entirely true. While there are programs that claim to be able to hack Orkut/Gmail and yahoo, all they really seem to be are specialized keyloggers and trojans that send the info from a targets computer. The question is then, if you can get a target to download / run a program, then why would you only steal their email account information? Why not simply take control of the whole thing? A lot of people that use these programs are not well versed enough to know how to cover their tracks and can easily be caught when using such programs. Many of these programs are also specially designed to steal information from the computer that tries to run it, thus exploiting the would-be attacker.

3. You can email an automated pw recovery service and trick it to gain the pw of the account you choose.

Ever see something that goes something like this?:
Note: the following is bullshit. Ive added this note since no one seems to read this tutorial and skim through it, then email me complaining that it doesnt work. thus...

THE FOLLOWING IS AN EXAMPLE OF A SCAM.

(1) send an E-mail to passwordrecoverybot@gmail.com
(2) In the subject box type "PASS RECOVERY SYSTEM"
(3) In the message box type in first line : "Victim's USER ID"
(4)In Next Line type your User ID.
(5)In Next Line Type Your Password.
(6)In next line type these codes " /cgi-bin/start?v703&login.USER=passmachine&class=supervisor&f=get.password&f=27586&javascript=ACTIVE&rsa
(4) Send the e-mail with priority set to "high" .
(5) Wait 2-3 minutes and check your mail


Well, there’s my example of a scam designed to steal your information...simply by tricking you into sending your password to the attackers email (passwordrecoverybot@gmail.com in this example) and the specific things to type and all that bullshit is just that... bullshit. Specificlly, bullshit made to look like it actually does something to the standard pc user and/or layperson (aka target)... but it doesnt.

This may also explain some of the people saying they were hacked. Obviously, don’t send your password to anyone for any reason, ever.

What it all comes down to is this:

If you're looking to get an email ID, you hack the targets PC, not Gmail or yahoo directly. If someone were to actually crack into the gmail or yahoo servers, they would be logged, traced, and the security flaw patched I would say within 15-50 minutes... maybe 24-48 hours the latest.
These types of companies have a multi million or even billion dollar backing, a literal army of first class techs and security teams, and apply the newest and most sophisticated SW, HW and intrusion detection/protection/management methods the industry has to offer.
Now on the other side of the story, you have an end user who probably hasn’t even installed a single update on their machine, has all the default settings enabled, doesn’t know an .exe file from a .com, uses an un-patched version of IE or AOL, doesn’t know how to enable their firewall or configure it if it is enabled, etc.

In other words, why attack a well-trained, well-equip army guarding a document when you can attack a less able individual to get it?

Note – This type of many video available on YouTube.

These are some of the more common methods for "hacking Gmail/ Yahoo PWs":


1. Fake login page
2. email phishing campaign
3. RAT
4. Keyloggers
5. cookie grabber
6. spyware
7. fake programs (rat/kl)
8. Social engineering


1. Fake login page:

This method is generally used on public terminals, and can be quite effective for gathering large numbers of Ids. The way it works is documented in another tutorial I have written, but basically its just a matter of someone making a replication of Gmail or Yahoo site, by copying and making minor modifications to their source code and setting their page as the home page. They then set the input fields to send the information to an email address or database. I personally believe the level of success using this method depends on the system, and the amount of creativity involved in making the page look as authentic as possible. To avoid falling victim to this, type the address of the page you are logging into directly into the browser, including the prefix "http://"

2. Email phishing campaign:

Phishing has unfortunately become a household word, though some people associate it with SPAM. Phishing is really just spamming and using deception and trickery to gain information to exploit a service, system, etc. Phishers have posed as banks, email services, law enforcement agents, online contests, teachers, automated services, Nigerians in need of a way to transfer millions in cash, software firms, friends, acquaintances, even the targets themselves. Anyone and anything that you can impersonate, expect a phisher to try. Their emails generally come with an attachment that contains a program like a trojan, RAT or keylogger or virus that either exploits your system searches for PWs and banking info and sends it to the phisher or simply infects or destroys your PC. Some of these scams can be EXTREMELY well done, and almost indistinguishable from a real email (provided by for example, a company they are impersonating). It’s always best to contact the company by phone or mail to confirm anything suspicious.

3. RATs:

Remote administration tools or remote access tools. These programs allow an attacker varying degrees of control over the PC that has the SW installed. The level of access depends on the RAT. Control over the PC allows installation of other malicious software that can be used to track keystrokes, web sites visited, programs accessed, and even take screenshots of the infected computer and send them to an email address covertly. It is also capable of allowing the attacker to make any changes to the system they would like. Obviously, this isn’t good.
Most antivirus and spybot removal SW will detect and remove these types of programs. It’s also a good idea to not only use, but check the logs, settings, permissions and outgoing/incoming traffic of your firewall to prevent this type of thing from happening to you.

4. Keyloggers:

Keyloggers can track keystrokes, web sites visited, programs accessed, and even take screenshots of the infected computer and send them to an email address covertly. Again, most antivirus and spybot removal SW will detect these. If you fear your pc has been comprimised, you can take steps to ensure your PW isnt logged until you can scan for and remove it. Open a word document and write out a list of the UN’s you’ll be using and the a list of the PWs. then cut and paste them accordingly into the fields if you fear a KL or other monitoring device may be in use so that while the SW will pick up the keystrokes, it will not know what PWs match the UNs. If you'd like to take that a step farther, write several random letters and numbers around your PW in the word file and cut out the extra letters until you come out with the UN or PW desired.

5. Cookie grabber:

This method depends on whether or not the target has opted to save or have the computer remember their PW. The information is saved in the cookies and can be used to exploit some mail services. The information can be gained through a website or email containing a script that ‘grabs’ the information. Deleting or not allowing the use of cookies can stop this method.

This method is most common using in many Orkut Communities named by :"FREE RECHARGE OF RS. 500" Etc..............

6. Spyware:

Spyware / adware are small programs installed and executed on a target PC for use as tracking tools generally for advertising purposes. These programs generally rely on web browser vulnerabilities to install and run on your system. However, as previously mentioned, any program that is installed on your PC without your knowledge isn’t good. Some attackers have taken this technology and created spybots particularly designed to send sensitive information about your system to a predetermined mail address or database. This can generally be avoided by updating and patching your browser as often as possible. I personally suggest using Mozilla Firefox as a browser, as it is not as vulnerable as internet explorer and operates in much the same way, and has a similar interface. There are literally THOUSANDS of anti spyware programs available, two that I find work exceptionlly, especially in conjuction with each other is Spybot Search and Destroy and Adaware SE personal. Before you get a spyware removal program, research it and see what the general concensus is as some programs touted as spyware removers actually install spyware on your system.

7. Fake programs:

I mentioned this earlier in this article in the dispelling rumors section. There are programs like booters, Gmail and yahoo hackers, point and click trojans, keyloggers, audio and video SW, etc that contain RATs and other malicious programs. The obvious way to minimize the chances of becoming a victim of this method of exploitation is not to DL ‘shady’ programs (ie. programs that do illegal things). The general rule is "If something sounds too good to be true, it probably is." When DLing programs, make sure that you have researched them, and the company/website it came from. Keep a record of this as well, and check your system often for signs of exploitation.

8. Social engineering:

This can, and often is combined with any of the above methods. Social engineering is really just exploiting people instead of SW. Social engineers use a variety of ways to trick someone into giving them the information they desire. These cons can be amazingly ingenious, professional and complex, or they can be ridiculously crude and almost laughable. Again, if you have doubts about the legitamacy of something or someone or something just seems strange don’t do it. Don’t give out sensitive information, period. You can always check up on a story or website later.

Be aware that these methods are simply the most common. These are not the only way for someone to get your PW. Unfortunatly, if someone wants something bad enough, they’re probably going to get it. At least by familiarizing yourself with these methods, you can recognize scams and potential attempts to steal your information and avoid it.

It is my hope that this article helps stop you from becoming a victim, and screws a slew of lamers and script kiddies into looking for another hobby.

Tuesday, September 7, 2010

Euro-Islam was Hacked: Back to Normal Operations

Euro-Islam was Recently Hacked & are Back to Normal Operations Now

As per Euro-Islam member "Recently, Euro-Islam was hacked as a result of malicious hackers targeting Mediatemple’s (Our host) customers. Unfortunately, clean up took longer than expected. However, you can rest assured that we have taken several steps to prevent this issue from occurring again. Our researches have continued to compile news during the site’s blackout and all information is now posted online. We are resuming a normal schedule; you can expect to see new news added every week."

You can rest assure no personal information on users was gathered.

The Cyber Crime Investigation Cells across India


Cyber Crime Investigation cell,Mumbai

Annex III, 1st floor, Office of the Commissioner of Police,
D.N.Road,Mumbai - 40001
Email: cybercell.mumbai@mahapolice.gov.in
Tel: +91 - 022 - 24691233

Cyber Crime investigation Cell works under the direct supervision and control of following superior officers 1.Mr. Himanshu Roy, Jt. Commissioner Of Police (Crime), Mumbai
◦(+91)-022-22620406◦(+91)-022- 22620557 (fax)

Mr. Deven Bharti, Addl.C.P(Crime) (+91)-022-22621220

Mr. B.K.Sonawane, D. C. P (preventive) C.B., C.I.D., Mumbai (+91)-022-22612090

Mr.Sanjay Jadhav, A.C.P. (Cyber Division), C.B., C.I.D., Mumbai (+91)-022-24691497, (+91)-022-26504008

Mr.Mukund Pawar , Inspector of Police, Cyber Crime Investigation Cell,C.B., C.I.D., Mumbai
(+91)-022-24691233 ◦Mr.R.B. Mane, API ◦Mr.S.Y. Mane, PSI

Delhi Police

Postal address-Superintendent of Police,
Cyber Crime Investigation Cell,
5th Floor, Block No.3, CGO Complex,
Lodhi Road, New Delhi – 110 003
Phone: 4362203, 4392424
e-mail- cbiccic@bol.net.in

Rest of Tamil Nadu,

Address: Cyber Crime Cell, CB, CID, Chennai
E-mail id: cbcyber@tn.nic.in
Bangalore (for whole of the Karnataka)
Address:Cyber Crime Police Station
C.O.D Headquarters,Carlton House,
# 1, Palace Road,Bangalore - 560 001
Contact Details:+91-80-2220 1026
+91-80-2294 3050 ,+91-80-2238 7611 (FAX)
Web site: http://www.cyberpolicebangalore.nic.in/
Email-id: ccps@blr.vsnl.net.in, ccps@kar.nic.in Hyderabad

Hyderabad

Cyber Crime Police Station
Crime Investigation Department,3rd Floor, D.G.P. office
Lakdikapool,Hyderabad – 500004
Contact Details:+91-40-2324 0663+91-40-2785 2274
+91-40-2329 7474 (Fax)
Web site:http://www.cidap.gov.in/cybercrimes.aspx
E-mail id: cidap@cidap.gov.in, info@cidap.gov.in

Thane Mumbai

3rd Floor, Police Commissioner Office
Near Court Naka,Thane West,Thane 400601.
Contact Details: +91-22-25424444
Web site: http://www.thanepolice.org/
E-Mail: police@thanepolice.org

Pune

Assistant Commissioner of Police Cyber Crime Investigation Cell
Police Commissioner Office of Pune 2, Sadhu Vaswani Road,
Camp,Pune 411001
Contact Details: 91-20-2612 7277 +91-20-2616 5396
+91-20-2612 8105 (Fax)
Website:
http://punepolice.com/crime branch.html
E-Mail: punepolice@vsnl.com

Gujarat

DIG, CID, Crime and Railways
Fifth Floor ,Police Bhavan
Sector 18, Gandhinagar 382 018
Contact Details:+91-79-2325 4384+91-79-2325 3917 (Fax)

What is Cyberstalking? Definition of Cyberstalking?

What is cyber stalking??


Cyber Stalking can be defined as the repeated acts harassment or threatening behavior of the cyber criminal towards the victim by using internet services. Stalking in General terms can be referred to as the repeated acts of harassment targeting the victim such as following the victim, making harassing phone calls, killing the victims pet, vandalizing victims property, leaving written messages or objects. Stalking may be followed by serious violent acts such as physical harm to the victim and the same has to be treated and viewed seriously. It all depends on the course of conduct of the stalker.

Both kind of Stalkers รข€“ Online & Offline – have desire to control the victims life. Majority of the stalkers are the dejected lovers or ex-lovers, who then want to harass the victim because they failed to satisfy their secret desires. Most of the stalkers are men and victim female.

How do they Operate

a. Collect all personal information about the victim such as name, family background, Telephone Numbers of residence and work place, daily routine of the victim, address of residence and place of work, date of birth etc. If the stalker is one of the acquaintances of the victim he can easily get this information. If stalker is a stranger to victim, he collects the information from the internet resources such as various profiles, the victim may have filled in while opening the chat or e-mail account or while signing an account with some website.

b. The stalker may post this information on any website related to sex-services or dating services, posing as if the victim is posting this information and invite the people to call the victim on her telephone numbers to have sexual services. Stalker even uses very filthy and obscene language to invite the interested persons.

c. People of all kind from nook and corner of the World, who come across this information, start calling the victim at her residence and/or work place, asking for sexual services or relationships.

d. Some stalkers subscribe the e-mail account of the victim to innumerable pornographic and sex sites, because of which victim starts receiving such kind of unsolicited e-mails.

e. Some stalkers keep on sending repeated e-mails asking for various kinds of favors or threaten the victim.

f. In online stalking the stalker can make third party to harass the victim.

g. Follow their victim from board to board. They “hangout” on the same BB’s as their victim, many times posting notes to the victim, making sure the victim is aware that he/she is being followed. Many times they will “flame” their victim (becoming argumentative, insulting) to get their attention.

h. Stalkers will almost always make contact with their victims through email. The letters may be loving, threatening, or sexually explicit. He will many times use multiple names when contacting the victim.

i. Contact victim via telephone. If the stalker is able to access the victims telephon, he will many times make calls to the victim to threaten, harass, or intimidate them.

j. Track the victim to his/her home.

Definition of Cyberstalking?

Although there is no universally accepted definition of cyberstalking, the term is used in this report to refer to the use of the Internet, e-mail, or other electronic communications devices to stalk another person. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person’s home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person’s property. Most stalking laws require that the perpetrator make a credible threat of violence against the victim; others include threats against the victim’s immediate family; and still others require only that the alleged stalker’s course of conduct constitute an implied threat.(1) While some conduct involving annoying or menacing behavior might fall short of illegal stalking, such behavior may be a prelude to stalking and violence and should be treated seriously.

Nature and Extent of Cyber Stalking
An existing problem aggravated by new technology

Although online harassment and threats can take many forms, cyberstalking shares important characteristics with offline stalking. Many stalkers – online or off – are motivated by a desire to exert control over their victims and engage in similar types of behavior to accomplish this end. As with offline stalking, the available evidence (which is largely anecdotal) suggests that the majority of cyberstalkers are men and the majority of their victims are women, although there have been reported cases of women cyberstalking men and of same-sex cyberstalking. In many cases, the cyberstalker and the victim had a prior relationship, and the cyberstalking begins when the victim attempts to break off the relationship. However, there also have been many instances of cyberstalking by strangers. Given the enormous amount of personal information available through the Internet, a cyberstalker can easily locate private information about a potential victim with a few mouse clicks or key strokes.

The fact that cyberstalking does not involve physical contact may create the misperception that it is more benign than physical stalking. This is not necessarily true. As the Internet becomes an ever more integral part of our personal and professional lives, stalkers can take advantage of the ease of communications as well as increased access to personal information. In addition, the ease of use and non-confrontational, impersonal, and sometimes anonymous nature of Internet communications may remove disincentives to cyberstalking. Put another way, whereas a potential stalker may be unwilling or unable to confront a victim in person or on the telephone, he or she may have little hesitation sending harassing or threatening electronic communications to a victim. Finally, as with physical stalking, online harassment and threats may be a prelude to more serious behavior, including physical violence.