OSA's Cyber-Terror Division

dr3k

Patron with Honors
I think that OSA's Cyber-Terror division has become quite operational in the last few months. In fact, to me, there are indications that they have beefed it up considerably.

Given the policy and orders of Scientology that they operate from, the rise of Anonymous would be enough for them to go full speed ahead on this program. And, like I've said, there are personal observations I have made that this is the case.

All the right people are being notified. :)

This will be the biggest footbullet they have ever shot themselves with.

This is the one that will produce the warrants necessary to search and seize all their computer data.

Which, will, of course, produce all the other evidence of their felonies in other areas. It will lead to the information necessary for government agencies and law enforcement to prosecute all their crimes.

So keep it up, OSA!!!

Your fanatic cyber-terror ops will be your downfall.

I assume you have some kind of proof right?
 

scientrollogy

Patron with Honors
Hi Guy's just dropping by with update/request.

i don't often get time to drop by.. last time i was in there had been one of those almighty posts, and it was like a month old by the time i saw it.. :duh:

i've been working on some *things*. a web-based project designed to be very "public facing" and matter of fact.
when done, i need to find someone to own this. the domain, software and everything totally FOC. it is pleasure itself to give a fine instrument to someone who will be heard playing it

i don't want to telegraph specifics in a thread, but if anyone *sensible* wants to know, there's a exOT8 i've been pestering to bits on enturb...
 

number 6

Patron
Some anti-cult websites, particularly one that starts with an F, have been hit with virus after virus. Is that the new strategy to take down anti-cult organizations? A modified version of the attacks against the former CAN.
 

Zinjifar

Silver Meritorious Sponsor
Some anti-cult websites, particularly one that starts with an F, have been hit with virus after virus. Is that the new strategy to take down anti-cult organizations? A modified version of the attacks against the former CAN.

More likely a reflection on the webmaster/sys admin. Factnet has always been a bit slipshod, about maintainence, accuracy and (ahem) security.

Not that it isn't a valuable collection of documents, but, it's far less valuable than it could be, if it was better maintained and updated.

Zinj
 

Alanzo

Bardo Tulpa
How hackers usually obtain your password

Most malicious hackers just wait for security update news. Whenever some forum or cms software like drupal, vbulletin, phpbb or invision board releases a security update, they try and find what the discovered exploit was. They google search for forums that may have the affected system and use the exploit. Forums can give tons of emails / passwords.

The ones who are skilled enough and actively attempt to discover the exploits are more rare.

Even worse is when the skilled programmers make simple automated exploit programs for script kiddies to use without even understanding the code. This is where the majority of the attacks come from, losers that use programs made by hacker and call themselves hackers.

It's super rare that you would be targeted or your password has been hacked from large sites like google, hotmail or myspace. Most of the big sites have capchas and DDoS protection, which cripples speed, It's more likely they hacked some other site that you long forgot about and found you conveniently use the same password for all your accounts including your email. From there they find even more passwords.. Most people get hacked from phising attempts or other forms of social engineering rather than real hackers, although they can use XSS vulnerabilities to help trick people. People also get trojans from opening email extensions and downloading pirate stuff off p2p without a decent antivirus. Hackers with skills enough to find open ports / exploit them and get shell access are much more rare than people claim.

This is a post from a blog located here
 

Smitty

Silver Meritorious Patron
reply to number 6

Some anti-cult websites, particularly one that starts with an F, have been hit with virus after virus. Is that the new strategy to take down anti-cult organizations? A modified version of the attacks against the former CAN.

The Factnet.org website has used Linux as an operating system and Apache websever since at least March of 2002, so virus infection is not possible. Are you speculating or did someone tell you that?
Smitty
 

alex

Gold Meritorious Patron
The Factnet.org website has used Linux as an operating system and Apache websever since at least March of 2002, so virus infection is not possible. Are you speculating or did someone tell you that?
Smitty

Linux is most definately suseptible to virus. And factnet as a repository and deseminator of information also has the burden of watching for viruses that may not infect its system but be passed on to "windoze" users.

The following is a partial list of known Linux malware:


[edit]Trojans
Kaiten - Linux.Backdoor.Kaiten trojan horse[5]
Rexob - Linux.Backdoor.Rexob trojan[6]
[edit]Viruses
Alaeda - Virus.Linux.Alaeda[7]
Bad Bunny - Perl.Badbunny[4][8]
Binom - Linux/Binom[9]
Bliss
Brundle[10]
Bukowski[11]
Diesel - Virus.Linux.Diesel.962[12]
Kagob a - Virus.Linux.Kagob.a[13]
Kagob b - Virus.Linux.Kagob.b[14]
MetaPHOR (also known as Simile)[15]
Nuxbee - Virus.Linux.Nuxbee.1403[16]
OSF.8759
Podloso - Linux.Podloso (The iPod virus)[17][18]
Rike - Virus.Linux.Rike.1627[19]
RST - Virus.Linux.RST.a[20]
Satyr - Virus.Linux.Satyr.a[21]
Staog
Vit - Virus.Linux.Vit.4096[22]
Winter - Virus.Linux.Winter.341[23]
Winux (also known as Lindose and PEElf[24]
ZipWorm - Virus.Linux.ZipWorm[25]
[edit]Worms
Adm - Net-Worm.Linux.Adm[26]
Adore[27]
Cheese - Net-Worm.Linux.Cheese[28]
Devnull
Kork[29]
Linux/Lion (also known as Ramen)
Mighty - Net-Worm.Linux.Mighty[30]
Millen - Linux.Millen.Worm[31]
Slapper[32]
SSH Bruteforce[33]
 

Smitty

Silver Meritorious Patron
reply to Alex

Linux is most definately suseptible to virus. And factnet as a repository and deseminator of information also has the burden of watching for viruses that may not infect its system but be passed on to "windoze" users.
The following is a partial list of known Linux malware:

[edit]Trojans
Kaiten - Linux.Backdoor.Kaiten trojan horse[5]
Rexob - Linux.Backdoor.Rexob trojan[6]
[edit]Viruses
Alaeda - Virus.Linux.Alaeda[7]
Bad Bunny - Perl.Badbunny[4][8]
Binom - Linux/Binom[9]
Bliss
Brundle[10]
Bukowski[11]
Diesel - Virus.Linux.Diesel.962[12]
Kagob a - Virus.Linux.Kagob.a[13]
Kagob b - Virus.Linux.Kagob.b[14]
MetaPHOR (also known as Simile)[15]
Nuxbee - Virus.Linux.Nuxbee.1403[16]
OSF.8759
Podloso - Linux.Podloso (The iPod virus)[17][18]
Rike - Virus.Linux.Rike.1627[19]
RST - Virus.Linux.RST.a[20]
Satyr - Virus.Linux.Satyr.a[21]
Staog
Vit - Virus.Linux.Vit.4096[22]
Winter - Virus.Linux.Winter.341[23]
Winux (also known as Lindose and PEElf[24]
ZipWorm - Virus.Linux.ZipWorm[25]
[edit]Worms
Adm - Net-Worm.Linux.Adm[26]
Adore[27]
Cheese - Net-Worm.Linux.Cheese[28]
Devnull
Kork[29]
Linux/Lion (also known as Ramen)
Mighty - Net-Worm.Linux.Mighty[30]
Millen - Linux.Millen.Worm[31]
Slapper[32]
SSH Bruteforce[33]
You omitted to provide a source of this information. Which ones are in the wild and which ones are laboratory curiousities?
Malware requires root access for installation on any Unix-type system. Windows is coded with an entirely different scheme, so has many root access vulnerabilities.
Smitty
 

alex

Gold Meritorious Patron
You omitted to provide a source of this information. Which ones are in the wild and which ones are laboratory curiousities?
Malware requires root access for installation on any Unix-type system. Windows is coded with an entirely different scheme, so has many root access vulnerabilities.
Smitty

Sorry. From: http://en.wikipedia.org/wiki/List_of_Linux_computer_viruses

See also the links from each footnote.

Yes while it would require root access to seriously screw up a *nix box as bad as a windoze box, these things can live in files and get root access when the owner logs into his root account and then opens the file. Harder than windoze. Not impossible. And with the increasing migration of *nix variants to the desktop and less sophisticated users, the threat grows.

A virus does not have to install in the system to run, either. It can run in a user account with out root access. It just wont screw the system, but just that directory.

Also the very real situation occurs frequently where a file is infected that doesnt affect the *nix machine but is passed on by it. Mac users are famous for it. "What? the file was fine! I had no problem..."

But then who would want to screw with venerable unix machines, whats on them except business data....and oh yea the internet.

No its not the problem it is on windows, but given the sophistication of unix users (and potential for exploits) and the more significant role unix machines play in our lives, it it something to be aware of.

Screw up a windoze machine and some guy cant surf porn. Screw up a *nix box and some business is down or parts of the net disappear.

alex
 
Last edited:

EP - Ethics Particle

Gold Meritorious Patron
Possible "Heads Up"

Not intending to "cry wolf" but find this strange.

Someone who uses an old cellphone of mine has always got some $cn messages on it - but not too many (screens all calls, so no problem) - recently mentioned that one was received from someone in "OSHA" 0r that's what it sounded like. Thought it might be important - sounded different somehow.

Any similars out there?:confused2:

Hi Pixie!:)
 

DartSmohen

Silver Meritorious Patron
Not intending to "cry wolf" but find this strange.Someone who uses an old cellphone of mine has always got some $cn messages on it - but not too many (screens all calls, so no problem) - recently mentioned that one was received from someone in "OSHA" 0r that's what it sounded like. Thought it might be important - sounded different somehow.Any similars out there?:confused2: Hi Pixie!:)


OSHA ? Sounds like a troll with a lisp. :hysterical: :hysterical: :hysterical:
 

alex

Gold Meritorious Patron
Not intending to "cry wolf" but find this strange.

Someone who uses an old cellphone of mine has always got some $cn messages on it - but not too many (screens all calls, so no problem) - recently mentioned that one was received from someone in "OSHA" 0r that's what it sounded like. Thought it might be important - sounded different somehow.

Any similars out there?:confused2:

Hi Pixie!:)

ASHO, American Saint Hill Organization, in LA. Home of the briefing course in the US.

The church is on a BIG project now days calling every number they have ever had and cleaning up their records of who is where and such.

Nothing devious.

alex
 

EP - Ethics Particle

Gold Meritorious Patron
Ambivalance is rampant!

Shit, Alex - thanks - but not sure whether relieved or dissapointed :nervous: .

Must be "hung up on a maybe" or some such nonsense.

Was about to gird for battle there for a while :horse: see! Pixie oughta have known that, but she's playin' the field right now, I think - that little :devil:
 

Neo

Silver Meritorious Patron
A question for those with more computer knowhow than me -

I have put some art up at a website called http://www.deviantart.com.
The day after the Today Tonight child labour expose was released I noticed someone had left a comment to a visitor of my page, but it was left in my name. It was somewhat derogatory and rude, designed to offend. It appeared to have been 'triggered' by a comment I did leave to this user. It is the only comment I have left in the last couple of weeks, so I am making the assumption that someone was able to have their own comment (but left in my name) triggered by my own actual comment.

In other words - a visitor sees one of my photos, and leaves a comment. I reply. Another comment (that appears to have been left by me, under my user name) appears. No other comments of this nature have appeared, however I have left no more comments of my own that could possibly trigger this 'attack'.

I have been in touch with the website but have yet to hear back from them.

I have checked my own computer for viruses, malware, spyware, etc. I do this regularly. I have a firewall. There have been no other computer related problems that I have noticed.

I am of the assumption that it is a server based situation, but don't know for certain, as I don't have that much knowledge of these things.

Does anyone know what could explain this?

It's timing to me is quite self explanatory. I just want to make sure I understand what I can about this, and change my actions/behaviour as appropriate.

Neo
 
Top