Revealed – Feds Issue Bulletin on Google Dorking

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

 

An examples

A bulletin issued by the Department of Homeland Security, the FBI and the National Counterterrorism Center earlier this month warns law enforcement and private security personnel that malicious cyber actors can use “advanced search techniques” to discover sensitive information and other vulnerabilities in websites.  The bulletin, titled “Malicious Cyber Actors Use Advanced Search Techniques,” describes a set of techniques collectively referred to as “Google dorking” or “Google hacking” that use “advanced operators” to refine search queries to provide more specific results.  Lists of these operators are provided by Google and include the following examples:

allintext: / intext: Restricts results to those containing all the query terms you specify in the text of the page
allintitle: / intitle: Restricts results to those containing all the query terms you specify in the title
allinurl: / inurl: Restricts results to those containing all the query terms you specify in the URL
filetype:suffix Limits results to pages whose names end in suffix
site: Using the site: operator restricts your search results to the site or domain you specify
Minus sign  ( – ) to exclude Placing  a minus sign immediately before a word indicates that you do not want pages that contain this word to appear in your results
Phrase search (using double quotes, “…” ) By putting double quotes around a set of words, you are telling Google to consider the exact words in that exact order without any change

Here is an example of a query constructed from these operators:

“sensitive but unclassified” filetype:pdf site:publicintelligence.net

The bulletin warns that malicious cyber actors can use these techniques to “locate information that organizations may not have intended to be discoverable by the public or to find website vulnerabilities for use in subsequent cyber attacks.”  Hackers searching for “specific file types and keywords . . . can locate information such as usernames and passwords, e-mail lists, sensitive documents, bank account details, and website vulnerabilities.”  Moreover, “freely available online tools can run automated scans using multiple dork queries” to discover vulnerabilities.  In fact, the bulletin recommends that security professionals use these tools “such as the Google Hacking Database, found at http://www.exploit-db.com/google-dorks, to run pre-made dork queries to find discoverable proprietary information and website vulnerabilities.”

Several security breaches related to the use of “advanced search techniques” are also referenced in the bulletin.  One incident in August 2011 resulted in the compromise of the personally identifiable information of approximately 43,000 faculty, staff, students and alumni of Yale University.  The information was located in a spreadsheet placed on a publicly accessible File Transfer Protocol (FTP) server and was listed in Google search results for more than ten months prior to being discovered.  Another incident in October 2013 involved attackers using Google dorking to discover websites running vulnerable versions of vBulletin message board software prior to running automated tools that created administrator accounts on the compromised sites.  As many as 35,000 websites were believed to have been compromised in the incident.

Video – Russia’s ‘Stealth Invasion’ Of Ukraine The Opposite Of Stealthy – War

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

“Tanks, artillery and infantry have crossed from Russia into an unbreached part of eastern Ukraine in recent days, attacking Ukrainian forces and causing panic and wholesale retreat not only in this small border town but also a wide section of territory, in what Ukrainian and Western military officials described on Wednesday as a stealth invasion.

The attacks outside this city and in an area to the north essentially have opened a new, third front in the war in eastern Ukraine between government forces and pro-Russian separatists, along with the fighting outside the cities of Donetsk and Luhansk.

Exhausted, filthy and dismayed, Ukrainian soldiers staggering out of Novoazovsk for safer territory said Tuesday they were cannon fodder for the forces coming from Russia. As they spoke, tank shells whistled in from the east and exploded nearby.”* The Young Turks hosts Ana Kasparian, Ben Mankiewicz (Turner Classic Movies), and Jasmyne Cannick (Political Commentator) break it down.

*Read more here from Andrew E. Kramer and Michael R. Gordon / NY Times:
http://www.nytimes.com/2014/08/28/wor…

Für die STASI war und ist die Schweiz ein Feindstaat

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

index

Sie hörte Telefone ab und las plombierte Diplomatenpost: Die Stasi spitzelte jahrelang die Schweizer Botschaft in Ost-Berlin aus. Fazit eines Historikers: «Die DDR respektierte die Neutralität der Schweiz nicht.»

Die Stasi hat die Schweizer Botschaft in der ehemaligen DDR während 17 Jahren durch fünf Spitzel überwachen lassen. Sie hörte Telefonate ab, zeichnete interne Gespräche auf und öffnete regelmässig die verschweisste und plombierte Schweizer Diplomatenpost. Damit hat sich die Stasi auch Zugang zu den Briefen des Botschafters an den Bundesrat verschafft.

Die STASI

Das Ministerium für Staatssicherheit der DDR (MfS oder Stasi), auch Staatssicherheitsdienst (SSD), war der DDR-Geheimdienst im In- und Ausland. Er war auch Ermittlungsbehörde für politische Straftaten und diente der SED als Machtinstrument gegen vermeintliche Oppositionelle und Regimekritiker.

Dies geht aus der Stasi-Akte über die «Schweizerische Botschaft» hervor, welche die «Tagesschau» bei der Stasi-Unterlagen-Behörde in Berlin einsehen konnte. Die Akte wird von zwei Berliner Historikern in einem Buchprojekt aufgearbeitet. Diese umfasst mehrere Tausend Seiten und beinhaltet unzählige Fotos mit Aussenaufnahmen des Gebäudes und detaillierten Plänen vom Innern der Botschaft.

Der Chauffeur als Spion

Als Hauptspitzel agierte zwischen 1972 und 1989 der Chauffeur des Botschafters, Siegfrid Kringel. Sein Deckname war «Nicolai». «Da Kringel Zugang zur Botschaft hatte, war es für die Stasi einfach, detaillierte Pläne der Botschaft anzufertigen», erklärt Enrico Seewald von der Freien Universität Berlin der «Tagesschau».

Zusammen mit Historiker Jochen Staadt erforscht Seewald die umfassende Akte. Anhand von anderen Stasi-Akten konnten die beiden die restlichen vier Spitzel ausfindig machen.

Die SED-Spitzen interessierten sich vor allem für die Wirtschaftsberichte des Botschafters, die er regelmässig nach Bern verschickte. Die DDR nutzte den Schweizer Finanzplatz als Kreditgeber und hatte in der Schweiz Briefkastenfirmen, über welche sie internationale Rüstungsgeschäfte abwickelte.

Versiegelter Brief? Kein Problem

Die Briefe des Schweizer Botschafters wurden aus Sicherheitsgründen in ein Lederetui verpackt, verschweisst und plombiert zum Flughafen gebracht. Dennoch gelang es der Stasi diese Briefe wohl auf dem Weg zum Flughafen Schönefeld unbemerkt zu kopieren. «Die Stasi hatte Fälscherspezialisten, welche auch verschweisste und versiegelte Briefe öffnen und wieder verschliessen konnten», erklärt der Historiker Jochen Staadt.

Schweizer Botschaft in Berlin Typ Plattenbau Pankow III 

Bildlegende: Das Objekt der Spionage: Die damalige Schweizer Botschaft in Ost-Berlin an der Esplanade 21 (1973). Bundesarchiv Berlin / Peter Koard

1981 notierte die Staatssicherheit eine «erhöhte Kontaktaktivität» der Botschaft mit 49 Auslandschweizern. Aus 143 Briefwechseln interpretierte sie potentielle Spione und Fluchthelfer und schrieb in einem Bericht, «dass die Schweizerische Botschaft über günstige Voraussetzungen zur Auswahl geeigneter Kandidaten für eine Feindtätigkeit verfügt.»

Noch haben die Historiker die umfangreiche Akte über die Schweizer Botschaft nicht ganz ausgewertet, dennoch zieht Jochen Staadt erste Schlüsse. «Die DDR respektierte die Neutralität der Schweiz nicht. Sie betrachtete die Schweiz als Feind, wie jedes andere westliche Land, das mit einer Botschaft in Ost-Berlin vertreten war.»

Die Schweizer Botschaft an der Esplanade 21 in Pankow wurde am 3. Oktober 1990 infolge der Wiedervereinigung geschlossen. 25 Jahre nach dem Mauerfall zeugt nichts mehr von den Stasipraktiken. Die Schweizerische Botschaft von einst ist heute ein unscheinbares Wohnhaus.

 

Video – News and Response of Islamic State’s Barbaric Murder of James Foley

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

 

News and Response of Islamic State’s Barbaric Murder of James Foley

NOTE: This video does NOT include any of the disturbing footage from the video posted by ISIS referenced.

On August 19 2014, the Islamic State posted a graphic and shocking video of the murder and beheading of James Foley, an American journalist that had been missing since November 2012. The video was sent as a warning to the United States to end military operations in Iraq and ended with a threat to kill Steven Sotloff, another journalist also held captive by ISIS.

The video was met with disgust and shock around the world, and prompted a strong response from President Barack Obama as shown in this video. Watch James Foley in his own words describe his experiences in Libya during the revolution and overthrow of the Qaddafi regime in this fascinating video.

World at War TV – Ukraine and Russia – Forever Linked By Chernobyl

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

 

Ukraine and Russia have a long contentious history and perhaps no more significant event marks this history more than the catastrophic Chernobyl nuclear reactor accident that occured in 1986.

This fascinating video takes you to the infamous city of Pripyat, a town of 50,000 that was abandoned overnight in the hours after the accident. This eerie ghost town marks the passage of time with silent decay, uninhabitable for another 20,000 years.

After a visit to modern day Pripyat, a look back at that fateful day and the desperate measures that were taken to prevent even greater disaster and loss of life!

The National Security Archive – The United States, China, and the Bomb

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Washington, D.C. – The National Security Archive has initiated a special project on the Chinese nuclear weapons program and U.S. policy toward it. The purpose is to discover how the U.S. government monitored the Chinese nuclear program and ascertain what it knew (or believed that it knew) and thought about that program from the late 1950s to the present. Besides investigating U.S. thinking about, and intelligence collection on, the Chinese nuclear program as such, the Archive’s staff is exploring its broader foreign policy significance, especially the impact on China’s relations with its neighbors and the regional proliferation of nuclear weapons capabilities. Through archival research and systematic declassification requests, the Archive is working to collect key U.S. documents on important developments in Chinese nuclear history, including weapons, delivery systems, and strategic thinking. To put the nuclear issue in the broader context of the changing relations between the United States and China, the Archive is also trying to secure the declassification of key U. S. policy papers that elucidate changes in the relationship.

In particular, the Archive’s project is exploring Washington’s thinking about the Chinese nuclear weapons program in the context of U.S. nuclear proliferation policy. The Archive is probing Washington’s initial effort to brake the development of the Chinese advanced weapons program by encouraging allies and others to abstain from the shipment of products that could have direct or indirect military applications. Moreover, the Archive is seeking the declassification of materials that shed light on an important concern since the late 1980s, China’s alleged role as a contributor to the proliferation of nuclear capabilities in South Asia and elsewhere. To the extent possible, the Archive will try to document the U.S. government’s knowledge of, and policy toward, China’s role as a nuclear proliferator and its efforts to balance proliferation concerns with a policy of cooperation with Beijing.

In the spring of 1996, the Archive began a series of Freedom of Information and mandatory review requests to the CIA, State Department, Defense Department, National