Thursday, November 29, 2007

Cyber Crime.


Aag Arrow webzine November 2007
Computers, despite being such high technology devices, are extremely vulnerable. In fact it may be easier to steal national secrets from military computers than to steal "laddoos" from a "mithai" shop.
Cyber crime is an evil having its origin in the growing dependence on computers in modern life. In a day and age when everything from microwave ovens and refrigerators to nuclear power plants is being run on computers, cyber crime has assumed rather sinister implications.
The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage.
In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!
At the onset, let us satisfactorily define "cyber crime" and differentiate it from "conventional Crime". A simple yet sturdy definition of cyber crime would be "unlawful acts wherein the computer is either a tool or a target or both".
There are several types of cyber crime. Financial crimes, Cyber pornography, Sale of illegal articles, Online gambling, Email spoofing, Forgery, Cyber Defamation, Cyber stalking and Intellectual Property crimes are some of them. These would include cheating, credit card frauds, money laundering, pornographic websites; pornographic magazines produced using computers (to publish and print the material), the Internet (to download and transmit pornographic pictures, photos, writings etc), sale of narcotics, weapons and wildlife etc., by posting information on websites, auction websites, and bulletin boards or simply by using email communication, software piracy, copyright infringement, trademarks violations, theft of computer source code etc.
There are millions of websites; all hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually fronts for money laundering. A spoofed email is one that appears to originate from one source but actually has been sent from another source. Email spoofing can also cause monetary damage. Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using sophisticated computers, printers and scanners.
This occurs when defamation takes place with the help of computers and / or the Internet. Cyber stalking involves following a person's movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc.
Frequently Used Cyber Crimes
Unauthorized access to computer systems or networks : This activity is commonly referred to as hacking.
Virus / worm attacks : Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms, unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory.
Logic bombs : These are event dependent programs. This implies that these programs are created to do something only when a certain event (known as a trigger event) occurs. E.g. even some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date (like the Chernobyl virus).
Theft of information contained in electronic form : This includes information stored in computer hard disks, removable storage media etc.
Email bombing : Email bombing refers to sending a large number of emails to the victim resulting in the victim's email account (in case of an individual) or mail servers (in case of a company or an email service provider) crashing.
Data diddling : This kind of an attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed.
Salami attacks : These attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed.
Denial of Service attack : This involves flooding a computer resource with more requests than it can handle. This causes the resource (e.g. a web server) to crash thereby denying authorized users the service offered by the resource. Another variation to a typical denial of service attack is known as a Distributed Denial of Service (DDoS) attack wherein the perpetrators are many and are geographically widespread. It is very difficult to control such attacks. The attack is initiated by sending excessive demands to the victim's computer(s), exceeding the limit that the victim's servers can support and making the servers crash.
Logic bombs : These are event dependent programs. This implies that these programs are created to do something only when a certain event (known as a trigger event) occurs.
Trojan attacks : A Trojan as this program is aptly called, is an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing.
Internet time thefts : This connotes the usage by an unauthorized person of the Internet hours paid for by another person.
Web jacking : This occurs when someone forcefully takes control of a website (by cracking the password and later changing it). The actual owner of the website does not have any more control over what appears on that website
Theft of computer system : This type of offence involves the theft of a computer, some part(s) of a computer or a peripheral attached to the computer.

Physically damaging a computer system : This crime is committed by physically damaging a computer or its peripherals

Cyber Criminals
Kids (age group 9-16 etc.)
It seems really difficult to believe but it is true. Most amateur hackers and cyber criminals are teenagers. To them, who have just begun to understand what appears to be a lot about computers, it is a matter of pride to have hacked into a computer system or a website. There is also that little issue of appearing really smart among friends. These young rebels may also commit cyber crimes without really knowing that they are doing anything wrong.
Organized hacktivists
Hacktivists are hackers with a particular (mostly political) motive. In other cases this reason can be social activism, religious activism, etc.
Disgruntled employees
One can hardly believe how spiteful displeased employees can become. Till now they had the option of going on strike against their bosses. Now, with the increase independence on computers and the automation of processes, it is easier for disgruntled employees to do more harm to their employers by committing computer related crimes, which can bring entire systems down.
Professional hackers (corporate espionage)
Extensive computerization has resulted in business organizations storing all their information in electronic form. Rival organizations employ hackers to steal industrial secrets and other information that could be beneficial to them.
What are the reasons for the vulnerability of computers? Computers store huge amounts of data in small spaces, ease of access, complexity and human error are some of them. Hackers easily exploit the numerous weaknesses in operating systems and security products. People who guard confidential papers with their lives would not think twice about using simple passwords. Most people don't realize the security implications and ramifications of a simple 'guessable' password.
Vladimir Levin, Johan Helsingius, Kevin Mitnick, Robert Morris, Dennis Ritchie and Ken Thompson are the World's Most Famous Hackers

Cover Story.
Aag Arrow Webzine.
November 2007 Issue.
www.aagneyam.com/arrow

Aag Arrow [Oct.2007 isue]


WHETHER MYSTERY OR MYTH…..
Jesus, the Christ did visit India? Affirms Subhrajit Mitra, producer of feature film “The Unknown Stories of the Messiah”. Obvious, as it is, to kick interest and anxiety amongst faithful, skeptics and other academically inclined scholars and historians.
When did Jesus, if at all? He was crucified on a Friday by the Jews and being hitherto down the ages observed as ‘Good Friday’, the supreme sacrifice by the godman to the mankind. Gospels speaks of Jesus resurrected the following Sunday, and which is celebrated as Easter, but never attribute any givings about the Subhrajit’s claim.
Jesus journeyed to the East after the crucifixion, stayed and studied Hinduism and Buddhism, and was buried in a tomb in Kashmir…thus goes Mitra’s version. He even substantiates his belief from the mention found in scriptures and holy books of faiths in Jerusalem, Alexandria, Turkey, Persia, Afghanistan, Pakistan, Tibet and India. Quoting evidence in Hindu, Muslim and Buddhist scriptures that a “Jesus-like man” did traverse India’s Himalayas.
There is a book called “The Unknown Life of Jesus Christ” by the nineteenth century Russian adventure Nicolai Notovitch. This was inspiration for the film maker. The Russian was at Ladakh region in Jammu and Kashmir State on an expedition in the late 19th Century A.D. German scholar Holga Kersten, evincing interest in Notovitch’s account of Jesus traveling to the East, wrote two books “Jesus Lived in India” and “The Jesus Conspiracy” which was best selling.
Both the Germanian and Russian authors afloat the interesting episode of hearsays and down to ages stories of Jesus visiting Ladakh and the Kashmir Valley, as well as Uttar Pradesh, in particular the Varanasi city. They allege that in the Kan Yar area of Kashmir’s Srinagar District was Jesus buried in a tomb.
One aspect further deepening the mystery, rather still puzzling was, these two authors further propound that prior to resurrection Jesus indeed came to India as a young lad to take to learning from Hindu Gurus. Then, later returned to Palestine to teach what he studied in the East. He survived the crucifixion and returned to India and lived up to full bloom life of 120 years.
Notovitch asserted that while he was at Ladakh, he was shown a manuscript by the monks in the secleded Himis monastery which had detailed account of the hitherto “unknown life” of Jesus, or “Issa”, as he was generally referred to in the East. This Issa text, translated by a Lama for Notovitch from Tibetan, allege that during his “lost years” Jesus was educated by Yogis in India, Nepal and “the Himalaya Mountains”.
Notovitch declares that he has every reasons to believe that the manuscript purportedly dated from the third Century of the Common Era to be “true and genuine”, as its contents were written “immediately after the Resurrection”. Further, he maintained that the “two manuscripts” he perused at Himis were “compiled from diverse copies written in the Tibetan tongue, translated from rolls belonging to the Lassa library and brought from India, Nepal and Maghada 200 years after Christ”.
One could infer the dust Notovitch kicked when returned to Europe. The authenticity of the manuscript he clamed to have studied was much debated. He was even accused an impostor never visited the places he decribed.
One Swami Abhedananda, who rubbished Notovitch, himself journeyed into the arctic region of the Himalayas. His travelogue, “Kashmir O Tibetti” vividly portrays his visit to the Himis gonpa and has translation of two hundred twenty four verses in Bengali ended seconding the Notovitch text and his conviction of Issa legend.
In 1925, another Russian Philosopher Nicolai Roerich came to Himis. He was a scientist also. He apparently saw the same documents as Notovitch and Abhedananda and recorded his opinion adhering others’ of Issa.
There is one more interesting subsidiary to Issa’s imbroglio. In Hinduism, there are countless Puranas and Maharishi Veda Vyas compiled and classified them under 18 heads. One such is Bhavishya Maha Purana. While doing research for his film “The Unknown Stories of the Messaih”, Subhrajit Mitra was chanced up on a story elaborated in the Bhavishya Maha Purana. There described in it an encounter between King Shalivahana and a holy man near Srinagar referred to as Issa- Masih. Incidentally, Jesus is called the Messiah. This is long after the crucifixion. It portrays Issa’s arrival in the Kashmir region and how King Shalivahana the then ruler of the Kusham area (39-50 C.E.), entertained and treated the visiting holy man as a guest for some time. Bhavishya Maha Purana was supposedly dated back to 115 C.E.
Author and researcher Holga Kersten of Germany, who credited himself with his extensive research works, in his publication “Jesus Lived in India” accounts more than twenty historical documents standing testimony to the existence of Jesus in India, who referred as Issa and also widely known as “Yuz Asaf”. The vividly offers a thorough. Methodical and authoritative examination of the evidence of Christ’s life beyond the Middle East before the crucifixion and in India and elsewhere after it.
According to Kersten, “each story revolves round Jesus’s voyage to the East are vital source of information in itself to know better the eternal and central truths of Christ’s message, which are at peril by the profane ambitions of more or less secular institutions arrogating to themselves a religious authority. This is an attempt to open a way to a new future, firmly founded in the true spiritual and religious sources of the past”.

Cover Story.
Aag Arrow Webzine.
October 2007 Issue.
www.aagneyam.com/arrow

Aag Arrow [Sep.2007 Issue]


VACCINES – the bitter truth behind.!
A
ll of us want to protect ourselves and our children from crippling diseases, in particular, from crippling childhood diseases. For the past several decades traditional medicine has said the best way to do that is to have yourself and your children vaccinated. Many states have, in fact, passed laws.
But not everyone thinks immunizing your children (or yourself) is a good idea. In fact, a growing chorus of doctors, researchers and concerned parents are waging a ferocious battle with the medical establishment to get both the federal government and mainstream doctors to admit that the medicine they are prescribing is more dangerous than the diseases they are trying to prevent. requiring parents to immunize their children before their children can attend public schools.
A March 6, 1995 issue of NEWSWEEK reports that "new research from Romania has shown that babies who get shots of antibiotics shortly after being vaccinated for polio run a higher than average risk of contracting the crippling disease. They get it from the vaccine itself--though nobody is sure what role the antibiotics play."
In addition, a growing number of studies are indicating that adverse reactions to vaccinations in childhood may not be the only problem vaccinated people have to worry about. Many adults who were vaccinated as children are beginning to show signs of long-term adverse effects, including an increased susceptibility to cancer, immune system failures and various neurological disorders.
In the 1960s it was discovered that polio vaccines manufactured in monkey kidney tissue between 1955 and 1963 were contaminated with a monkey virus. Although this virus causes cancer in experimental animals, health authorities insist it does not cause problems in human.
But evidence of Simian Virus number 40 (SV40) genetic material has been popping up in human cancers and normal tissue. Researchers are now connecting SV40 contaminated polio vaccines to an increasing number of rare cancers of the lung and bone marrow.
Using kids as guinea pigs in potentially harmful vaccine experiments is every parents’ worst nightmare. Unbelievably, the measles vaccine caused long-term suppression of the children’s immune system for six months up to three years. As a result, the immuno depressed children died from other diseases in greater numbers than children who had never received the vaccine.
In the poor inner cities across the United States the number of asthma cases is exploding and health officials don’t know why. According to the US Centres for Disease Control, 5000 asthma deaths occur annually: and it is estimated that around 17.3 million people suffer from the disease.
With vaccine experiments frequently performed in Africa and now on black Americans, no wonder one out of every four African-Americans believes AIDS was developed as a genocide program by the US government to exterminate black population.
But vaccine experiments in the 1990s have not been limited to blacks. Millions of female Mexicans, Nicaraguans and Filipinos have been duped into taking tetanus vaccines, some of which contained a female hormone that could cause miscarriage and sterilization. In 1995, a Catholic human rights organization called human Life International accused the WHO of promoting a Canadian – made tetanus vaccine laced with a pregnancy hormone called human choriogonadotropic hormone (HCG).
Suspicions aroused when the tetanus vaccine was prescribed in the unusual dose of five multiple injections over a three month period, and recommended only to women of reproductive age! When an unusual number of women experienced vaginal bleeding and miscarriages after the shots, a hormone additive was uncovered as the cause.
Apparently the WHO has been developing and testing anti-fertility vaccines for over two decades. Women receiving the laced tetanus shot not only developed antibodies to tetanus, but they also developed dangerous antibodies to the pregnancy hormone as well. Without this HCG hormone the growth of the fetus is impaired. As a result, the laced vaccine served as a covert contraceptive device.
Commissioned to analyse the vaccine, the Philippines Medical Association found that 20 % of the WHO tetanus vaccines were contaminated with the hormone. Not surprisingly, the WHO has denied all accusations as “completely false and without basis”.
Newly approved vaccines may also pose serious risks. In October 1999 a vaccine against “rotavirus” infection was pulled off the market.
Although the public has heard about side effects of vaccines, most people are clueless about the manufacture of vaccines. Few people know that viruses used in vaccine production need to be grown on animal parts like monkey kidneys or in chicken embryos or in human and fetal “cell line”. Harvesting viruses in human cell-lines can be perilous because some human cell lines are derived from cancer cells.
Most people assume vaccines are “sterile” and germ free. But sterilizing a vaccine can destroy the necessary immunizing protein that makes it work. Thus, contaminating viruses or virul “particles” can sometime survive the vaccine process.
Vaccine contamination by fetal calf serum and its possible relationship to HIV was the subject of a letter by J.Grote, published in the Journal of the Royal (London) Society of Medicine before 20 years. Bovine visna virus – looks similar to HIV – is a known contaminant of fetal calf serum used in vaccine production and virus-like particles have been detected in vaccines certified for clinical use.
Another theory of AIDS is that HIV originated from polio vaccines contaminated with chimpanzee and monkey viruses. There is certainly evidence connecting contaminated vaccines to AIDS. And HIV is a cancer-causing virus. Robert Gallo, the co-discover of HIV in 1984, has clearly stated AIDS is an epidemic cancer.
It is clear that vaccines can be dangerous. The contamination of vaccines is a reality, and vaccine experiments can be hazardous to one’s health.

Cover Story.
Aag Arrow Webzine.
September 2007 Issue.
www.aagneyam.com/arrow