Follow us on Twitter!
Capitalism is an Island of wealth in a sea of poverty
Thursday, April 24, 2014
Navigation
Home
HellBoundHackers Main:
HellBoundHackers Find:
HellBoundHackers Information:
Learn
Communicate
Submit
Shop
Challenges
HellBoundHackers Exploit:
HellBoundHackers Programming:
HellBoundHackers Think:
HellBoundHackers Track:
HellBoundHackers Patch:
HellBoundHackers Other:
HellBoundHackers Need Help?
Other
Members Online
Total Online: 30
Guests Online: 23
Members Online: 7

Registered Members: 82895
Newest Member: kevy90
Latest Articles
View Thread

HellBound Hackers | Computer General | Hacking in general

Page 1 of 2 1 2 >
Author

The NSA


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 17-07-06 16:51
I have been doing some reseach on super computers and i have came across some intersting stuff and the topic that we need to shed some light on is the "Cray" super computer if u know what im talling about. in conjuction with the Cray super computer is the "ECHELON" project. THe "ECHELON" project is pretty much them seaching out emails and other devices ex cell phones(gps), They say that they are searching 4 keywords but do u belive them....??? What does the NSA do...??? do they try to protect us how far would they go to do this... invasion of
privacy. If u have some words of wisdom to tell us or ne infomation or if u think i am incorrect plz do so the tell ur opinion.
http://hilbert.ma. . .r/cray.jpg

~zer0pain~


Author

RE: The NSA


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 17-07-06 17:06
i think you guys are paranoid...

I mean, what can they do? its a bunch of computer geeks on computers all day. Theres really nothing they can do to you if youre not breaking the law. 0_0

I havent read that article, but i would assuem theyre tracking keywords for terrorists...just maybe. Are you one? lol. so there, you hvae nada to worry about.




but of course i didnt read the article so im probably wrong.


Author

RE: The NSA


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 17-07-06 17:42
Why not test this theory?

Write an e-mail that contains a whole bunch of possible "keywords". Also include something like "For more information, my friend, check out [link to IP logger]."

Check your logs later on and see if anyone visited that specific page. If so, you know the NSA does in fact search our e-mail for specific keywords.


Author

RE: The NSA


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 17-07-06 17:52
that is a great idea im going to have to test and i will share my resutls


Author

RE: The NSA

Mr_Cheese




Posts: 2468
Location: Brighton, UK
Joined: 30.11.04
Rank:
Uber Elite
Posted on 17-07-06 17:55
all the ECHELON program does is just mointor emails / IM conversations etc, for certain keywords.

if your IM conversation / email has a keyword, then they read your email tos ee what it is saying, if tis something they want to investigate they then monitor every one of your IM's / Emails. Its nothing to be worried about if you just send normal emails and dont plot terroist attacks over your MSN chats.

there was a plan a few years ago when it started that a massive massive chain letter would be sent / forwarded / copied etc and would contain every keyword it detects. the idea was to crash this program, but sadly that plan didnt work. ehcelon has been operational for several years now.

im not saying its justfied, i still think its a massive invasion of privacy. but i was just clearning up a few facts.


http://www.hellboundhackers.org/
Author

RE: The NSA


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 17-07-06 19:02
If the NSA do that in America, are the SS (MI5) or SIS (MI6) doing the same sort of thing ?

And I was speaking to a careers perosn a while ago, and as a joke a friend of mine asked what sort of jobs there were for assasins Pfft

The carers person started talking about how he had known people who have sent applications to MI5 and go interviews, and then said that MI5 were looking for computer security specialists Wink

Did you know that if you applied for a job at MI5, youre only allowed to tell your immediate family and close friends ? Sound like an interesting job Pfft

- AbSoRb


Author

RE: The NSA


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 17-07-06 19:02
I hate the fact that our conversations are being monitored. . . And they are. MD5 Library has been shutdown about 4 times now because certain 'Keywords' were detected. This is one of the main reasons why I'm looking into programming my own chat client/server


Author

RE: The NSA


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 17-07-06 19:15
what kind of keywords are we talking about here Jake?


Author

RE: The NSA

Mr_Cheese




Posts: 2468
Location: Brighton, UK
Joined: 30.11.04
Rank:
Uber Elite
Posted on 17-07-06 19:18
lol jake replies, then HBH gets taken down in 3minutes coz it contains the magic "keywords".


http://www.hellboundhackers.org/
Author

RE: The NSA


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 17-07-06 19:21
3 minutes....Shock

i thought they would act faster to stuff like that Grin


Author

RE: The NSA

Mr_Cheese




Posts: 2468
Location: Brighton, UK
Joined: 30.11.04
Rank:
Uber Elite
Posted on 17-07-06 19:34
lol faster? it isnt the SAS that deals with things like this, its american intelligence agencies! i think your giving them a bit too much credit there.


http://www.hellboundhackers.org/
Author

RE: The NSA


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 17-07-06 19:36
terrorist, plan, attack, al qaeda, bin laden, saddam, evil, muhahaha, rule, the, world, domination, muhahhaha, kill, murder, fabric, softener, hairdresser, perm, ooooo, flirt, bomb, green, biological, herbal, remedy, cookie, recipie......

^^ The sort of words you'd expect in a terrorist email....

*waits for HBH to be shutdown*


Author

RE: The NSA


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 17-07-06 20:03
you forgot... porno, masterbation, and i love you

Pfft


Author

RE: The NSA


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 17-07-06 20:06
we can just complie and crash this site wordlist....?!?!? (not here!)




Edited by on 17-07-06 20:25
Author

RE: The NSA


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 17-07-06 20:26
I got a hole list of these... They are called Spook words.


Author

RE: The NSA


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 17-07-06 22:29
I never even heard of this..


Author

RE: The NSA


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 17-07-06 23:58
following:
CDC, DOE, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, 312, NB, CBM, CTP, Sardine, SBIRS, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, 3B2, BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO, afsatcom, CQB, NVD, Counter Terrorism Security, Rapid Reaction, Corporate ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, Lacrosse, Flashbangs, basement, data-haven, black-bag, TEMPSET, Goodwin, rebels, ID, MD5, IDEA, Blackbird, plutonium, Texas, jihad, SDI, Uzi, Fort Meade, supercomputer, bullion, 3, Blackmednet, Propaganda, ABC, Satellite phones, Planet-1,card, b9, fraud, assassinate, virus, anarchy, rogue, mailbomb, 888, Chelsea, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, Competitor, EO, Chan, Alouette, executive, Event Security, Mace, Cap-Stun, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case, Tools, Telex, Corporation, Wackenhut, EO, Wackendude, mol, Hillal, GGL, CTU, botux, Counterterrorism, spies, eavesdropping, debugging, interception, COCOT, cryptanalysis, nuclear, FBI, Panama, fissionable, Sears Tower, NORAD, Delta, DSD, BVD, 1984, Flintlock, cybercash, government, hate, speedbump, Egret, Iris, Hollyhock, Jasmine, Juile, Vinnell, B.D.M., Sphinx, Stephanie, espionage, PI, TSCI, industrial intelligence, H.N.P., Juiliett Class, Fetish, Yobie, CTP, CATO, Phon-e, Chicago Posse, l0ck, spook keywords, PLA, FIS, MSW, Spyderco, UOP, SSCI, NIMA, MOIS, SVR, SIN, advisors, SAP, OAU, Force, SEAL, virtual, Dolch, secure shell, screws, Black-Ops, Area51, SABC, garbage, market, beef, Stego, unclassified, utopia, orthodox, Alica, SHA, Global, gorilla, Bob, Pseudonyms, MITM, Gray Data, VLSI, mega, Leitrim, GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, Hackers, Encryption, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secret, Harvard, 1080H, SWS, Asset, Satellite imagery, force, Cypherpunks, HRT, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, illuminati, president, freedom, cocaine, $, Roswell, ESN, COS, E.T., credit, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Digicash, zip, SWAT, Information Warfare, Offensive Information, Offensive Information Warfare, Intiso, r00t, lock picking, Beyond Hope, csystems, passwd, 2600 Magazine, Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cornflower, Daisy, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, LUK, Cohiba, Soros, Standford, niche, 51, H&K, USP, ^, sardine, bank, EUB, Lynch, 414, Face, Pixar, IRIDF, eternity server, Skytel, Yukon, Templeton, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, press-release, Macintosh Internet Security, Macintosh Firewalls, Unix Security, VIP, Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR, MF, VHF, UHF, SHF, SASP, WANK, Colonel, domestic disruption, smuggle, 15kg, Military Intelligence, Scully, Flame, Infowar, Bubba, Freeh, Archives, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS, Spetznaz, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO, TELINT, TEXTA. ELF, LF, National Information Infrastructure, InfoSec, Reno, Compsec, Computer, Nike, Atlas, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, nitrate, Pretoria, M-14, enigma, Bletchley Park, Clandestine, nkvd, argus, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, Ortega, PPP, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, Middleman, KLM, PEM, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, penrep, racal, OTP, OSS, Blowpipe, CCS, GSA, Kilo Class, squib, primacord, PFS, Aladdin, chameleon man, Hutsul, CESID, Bess, rail gun, Peering, 17, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Pornstars, AVN, Playboy, Anonymous, Sex, chaining, codes, Nuclear, 20, Privacy, Information Terrorism, Terrorism Defensive Information, Defense, Protection, SIG, sweep, Medco, TRD, TDR, sweeping, TELINT, Audiotel, quiche, DES, 1*, NATIA, NATOA, sneakers, counterintelligence, industrial, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom, D-11, SERT, VIP, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, Covert Video, ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active X, rhost, rhosts, SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy, RSP, Becker, Nerd, fangs, Austin, Comirex, GPMG, Speakeasy, humint, GEODSS, Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security, Security Evaluation, Electronic Surveillance, MI-17, Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, HoHoCon, SISMI, SONANGOL, Flu, &, Loin, PGP 5.53, EG&G, AIEWS, AMW, WORM, MP5K-SD, 1071, SORO, M5, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Submarine, Locks, loch, Ingram Mac-10, sigvoice, ssa, E.O.D., SEMTEX, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, the, Elvis, Sundevil, jack, Investigation, ISACA, NCSA, spook words, Verisign, Secure, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, Terrorism, Firewalls, Secure Internet Connections, ISS, Passwords, DefCon V, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable, UKUSA, veggie, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, UNCPCJ, CFC, DREO, CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, USP, PCS, NRO, Red Cell, Glock 26, snuffle, Patel, package, ISI, INR, INS, Virii, CCC, Blacklisted 411, Internet Underground, XS4ALL, Retinal, Fetish, Waihopai, INFOSEC, Information Security, Information Warfare, IW, IS, WINGS, cdi, DynCorp, UXO, Ti, THAAD, package, chosen, PRIME, SURVIAC, Wireless, CSE, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, Yakima, Sugar Grove, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton

damn those dudes... search some friends and go out :s

E911 is a highway overhere Smile that'll be a whole bunch of work ^^
and what if your name is Jasmine or Stephanie or...? Smile




Edited by on 18-07-06 00:00
Author

RE: The NSA


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 18-07-06 00:07
YAY for Echelon. I know a hacker that uses Echelon as a nick. anyway you're paranoid... get over it.


Author

RE: The NSA

Mr_Cheese




Posts: 2468
Location: Brighton, UK
Joined: 30.11.04
Rank:
Uber Elite
Posted on 18-07-06 00:12
paranoid? im not paranoid abuot it, i know it exsists, its a fact.

it was publically announced when it was released. theres plenty of publically avaible information on it.




http://www.hellboundhackers.org/
Author

RE: The NSA


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 18-07-06 00:17
Wow! I'm astowned. I mean, isn't that a felony or something? How far is it true? That is a massive conspiration... I think that something like that is unaceptable and serious. But you know, that's just me.
Page 1 of 2 1 2 >