Category Archives: (J) Security Focus

Online Activities That Could Send You In Jail

Internet is an unrestricted realm for its users. It brings you latest information, allows you to share movies, images and music without any bounds, allows you to communicate in a split second and share files. It is a medium which is full of advantages, but there are some disadvantages that come with it in some countries. Particularly if you don’t follow certain rules and regulations laid down by these countries while using the Internet.
cyber-crime-hackers-arrested

Cyber crimes and terrorist attacks have dramatically increased over the years and that may be one of the reasons that if one is seen violating rules of Internet, he/she may be put behind the bars.

So, see the below activities that can get you arrested in some parts of the world.

10 Online Activities That Can Get You Arrested

#1 Having An Open Wi-Fi

Have an Open Wi-Fi

Keeping your WiFi Open and not keeping it password protected can sometimes land you in prison. Your open Wi-Fi connection can be used by criminals or terrorists without your knowledge and this can land you in trouble with the law in almost any country.

This happened with a person name Barry Covert whose open WiFi was used by his neighbor to access child pornography websites. Though, police arrested his neighbour after investigations, Barry had to face the police questioning for a month before the correct person was arrested.

It is always better to password protect your Wi-Fi with WEP, WPA (WPA-Personal), and WPA2 (Wi-Fi Protected Access version 2).

#2 Deleting Your Search History

Deleting Your Search History
Sometimes erasing your search history can also land you behind bars. This happened in United States, when a person namely David Kernell was arrested for deleting information on his computer. A University of Tennessee student, Kernell was being investigated by federal authorities for allegedly hacking Yahoo Account of the then vice presidential candidate, Sarah Palin.

India to had brought about laws making it mandatory for users to save their browsing history for 3 months. But the same was scrapped after there was huge public outcry against it.

#3 Offensive Posts, Messages or Tweets

 

Making offensive posts or tweets or sending offensive messages can land you in trouble in any part of the world. Two persons from Leigh Van Bryan aged 26 and Emily Bunting aged 24 tweeted about their upcoming visit to USA, “Free this week for a quick gossip/prep before I go and destroy America”.
They were interrogated for about five hours by the authorities. Bryan and Bunting tried to convince the police that “Destroying” was a British  slang for “Partying.”

 

#4 Using VOIP services

This issue is country specific and only limited to Ethiopia. Using VOIP services like Skype is strictly prohibited in Ethiopia and can land you in prison (An user from Ethiopia has contradicted this). The country’s new telecommunications law strictly prohibits VOIP services, which consist of audio and video communication and transfer of information over VOIP clients. We advise you that if you are citizen or tourist of Ethiopia, kindly check up with authorities before using Skype or any other VOIP services.

#5 Dancing in a Video

This is a serious offence in Iran. In fact, six persons were arrested for dancing to a video from Pharrell Williams song “Happy”. The Iranian judiciary found them guilty and they received 91 lashes as well as year’s prison sentence. Though later, the sentences were suspended and they were let off in six months.

In Russia, a youth was jailed in Russia for 15 days and two women were jailed for 10 days after they were found to be allegedly dancing and making a video near a second world war memorial.

#6 Leaving Internet Comments

Syria is now a battlefield between different warring factions for control of territory. Even then, commenting on the Internet is a crime in Syria. Human Rights Watch reported that in 2007, Syrian authorities arrested two person and they were shifted to unknown place, apparently for offering their comments about the censorship laws in Syria on a website.

#7 Translating Articles

Translating banned books can land you in jail in any country. Thailand authorities arrested an American citizen who translated one such article on his blog. The article was termed as “offensive to the autocracy” by the Thai authorities who consider their King as a supreme being. Even posting on Facebook/tweeting against the King can land you in jail in the Lese Majeste laws.
In Indonesia, a person was put behind bars for two years after he posted “God does not Exist” on “Facebook”.

#8 Gambling

Online gambling is banned in many countries across the globe and can land you behind the bars. This includes if you organize gambling or play online games like Poker, Blackjack etc.

#9 File Sharing

File sharing is a contentious issue. In some countries you are free to share movies, images or files without the worry of the law but in many countries it is illegal to share what is considered as pirated content. In some places even downloading torrents is considered as being unlawful.

#10 Posting Lyrics on Facebook

This may have happened only once. Unites States authorities arrested rapper and school student, Cameron D’Ambrosio for posting rap lyrics on Facebook. The police allege that D’Ambrosio made terrorist threats under the garb of rap. Prosecutors sought to charge D’Ambrosio with threats to make a bomb or hijack a vehicle, carrying a maximum sentence of 20 years in prison.
There are many such laws which can put in a spot of bother while surfing online. Making racist comments or hurting religious sentiments is a strict taboo online like it is in the real world. If you know of any other such unknown laws exist in some country, kindly note them down in the comments section.

dnmap – Distributed Nmap Framework

dnmap – Distributed Nmap Framework
dnmap is a distributed Nmap framework which can hand off Nmap scans to several clients. It reads an already created file with Nmap commands and send those commands to each client connected to it. The framework use a client/server architecture. The server knows what to do and the clients do it. All the logic and […]

The post dnmap –…

Read the full post at darknet.org.uk


New feed

Everything You Need To Know About Web Shells

Everything You Need To Know About Web Shells
So let’s talk about Web Shells, something many of us are already familiar with, but to level the field – what is a web shell? A web shell is a script that can be uploaded to a web server to enable remote administration of the machine. Infected web servers can be either Internet-facing or internal […]

The post Everything You Need To Know…

Read the full post at darknet.org.uk


New feed

DMitry – Deepmagic Information Gathering Tool

DMitry – Deepmagic Information Gathering Tool
DMitry (Deepmagic Information Gathering Tool) is a UNIX/(GNU) Linux Command Line program coded purely in C with the ability to gather as much information as possible about a host. DMitry has a base functionality with the ability to add new functions, the basic functionality of DMitry allows for information to be gathered about a target…

Read the full post at darknet.org.uk


New feed

Automater – IP & URL OSINT Tool For Analysis

Automater – IP & URL OSINT Tool For Analysis
Automater is a URL/Domain, IP Address, and Md5 Hash OSINT tool aimed at making the analysis process easier for intrusion Analysts. Given a target (URL, IP, or HASH) or a file full of targets Automater will return relevant results from sources like the following: IPvoid.com, Robtex.com, Fortiguard.com, unshorten.me, Urlvoid.com,…

Read the full post at darknet.org.uk


New feed

Up1 – Client Side Encrypted Image Host

Up1 – Client Side Encrypted Image Host
Up1 is a client side encrypted image host that that can also encrypt text, and other data, and then store them, with the server knowing nothing about the contents. It has the ability to view images, text with syntax highlighting, short videos, and arbitrary binaries as downloadables. How it Works Before an image is uploaded, […]

The post…

Read the full post at darknet.org.uk


New feed

Criminal Rings Hijacking Unused IPv4 Address Spaces

Criminal Rings Hijacking Unused IPv4 Address Spaces
So apparently this Hijacking Unused IPv addresses has been going on for a while, but with quite a lot number of attempts recently it’s ramped up a LOT since the September announcement by ARIN about IPv4 depletion. There was only only 50 hijacking attempts between 2005 and 2015. Since September, ARIN has already seen 25 […]

The post Criminal…

Read the full post at darknet.org.uk


New feed

Cuckoo Sandbox – Automated Malware Analysis System

Cuckoo Sandbox – Automated Malware Analysis System
Cuckoo Sandbox is Open Source software for automating analysis of suspicious files. To do so it makes use of custom components that monitor the behaviour of the malicious processes while running in an isolated environment. In other words, you can throw any suspicious file at it and in a matter of seconds Cuckoo will provide […]

The post…

Read the full post at darknet.org.uk


New feed

Unicorn – PowerShell Downgrade Attack

Unicorn – PowerShell Downgrade Attack
Magic Unicorn is a simple tool for using a PowerShell downgrade attack to inject shellcode straight into memory. Based on Matthew Graeber’s PowerShell attacks and the PowerShell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18. Usage is simple, just run Magic Unicorn (ensure Metasploit is installed and in the…

Read the full post at darknet.org.uk


New feed

Web Application Log Forensics After a Hack

Web Application Log Forensics After a Hack
Sites get hacked, it’s not pleasant but it happens. A critical part of it, especially in my experience, has been the web application log forensics applied directly after an attack. You can usually piece together what happened, especially if the attacker doesn’t rotate IP addresses during the attack. With a little poking around and after…

Read the full post at darknet.org.uk


New feed