Thursday, October 18, 2012

"asked whether Simon, which was surnamed Peter" - Remote Control False Charges

Around the National Diet Bldg., Tokyo

Remote Control False Charges

Some false charges have attracted big attentions from the Japanese society.

Some citizens allegedly sent anonymous blackmail mails over the Internet to some public institutions in Japan, though from their homes using their own PCs.

Some of these mails were sent to a primary school where a grandson of the Emperor studies.  Others were sent to a notable shinto shrine.

The police however soon identified the senders to arrest almost all of them.  It seems that policemen in charge checked IP addresses included in data accompanying the mails.

Those Japanese who got haplessly arrested resisted arrest, but finally confessed that they actually did the crimes.

But, later it was found that some of their PCs used for the criminal acts had been clearly contaminated by computer viruses.  These viruses allowed for remote control of the contaminated PCs from somewhere in the world over the Internet.  A hacker who manipulated this virus could write a blackmail letter and send it to his target from a hijacked PC someone owned.

So, public prosecutors decided to discharge defendants whose PCs were found to have been attacked by some hacker who secretly sent viruses  into those PCs.

And, finally, the hacker sent an e-mail to a TV station and a certain lawyer, telling that he is the one who hijacked others' PCs to use them as platforms for sending the blackmail mails.  The hacker presented critical evidence, as revelation of a secret, that proves that he is the very culprit who has done the Internet crime.

So, it is now clear that the police arrested and indicted several innocent persons for crimes they have never committed.  The Japanese police, of course, know this kind of remote control technique, but failed to carefully check those PCs as to the state of virus contamination after they confirmed IP addresses of those remotely-controlled PCs.

The hacker even used servers operated in Europe as a means to access PCs those innocent Japanese users were using  in their homes.  So, it is almost impossible for the Japanese law enforcement authority to trace the hacker by his footprints left in communications logs of those PCs.

One Japanese university student aged 19 was arrested for the above stated blackmail case.  The young man contended that he was innocent when the police started to investigate him in a police station.  But after days of hard interrogation, he finally falsely confessed that he had sent a blackmail mail to a certain school.  Then, he was placed on probation after a month-long judicial process.  But now the police and the society know that this young man is innocent.

So, do not use the PC and the Internet so often to protect yourself from hackers and policemen acting imprudently.

Malware Dubbed "The Remote Control Virus" by Japanese Media Used to Make Death Threats in Japan 
October 11th, 2012 by Symantec Leave  
News broke over the weekend in Japan that police had arrested three people over the past few months in relation to death threats being posted on bulletin boards and sent through email. However, it was also reported that the suspects were subsequently released without charge due to the discovery of a particular malware infection on all of the suspect’s computers that is believed to have been used to make the threats. Examples of some of the threats include a posting to a government website stating that the person posting the threat will commit mass murder in a popular shopping area; a posting to an Internet forum saying that he/she will blow up a famous shrine; an email sent to an airline company threatening to use a bomb to destroy an aircraft; and an email threatening the kindergarten where a child of the royal family attends. Police are currently investigating the connection between the threats and the malware. 
From our analysis, we have confirmed that the malware is capable of controlling a compromised computer from a remote location, which is not anything new to malware. Furthermore, from the various functions we have confirmed, the creator has the capability to command the malware to make the threats mentioned above. We have also discovered that a string of characters used to process encrypted communication with the creator is in Japanese and the code is taken from a Japanese website. Therefore, we believe the creator is most likely a person who has a good understanding of the Japanese language.

http://www.kashifali.ca/2012/10/11/malware-dubbed-the-remote-control-virus-by-japanese-media-used-to-make-death-threats-in-japan/

http://www.police.gov.hk/ppp_en/04_crime_matters/tcd/smart.html



*** *** *** ***



Act 10:17 Now while Peter doubted in himself what this vision which he had seen should mean, behold, the men which were sent from Cornelius had made enquiry for Simon's house, and stood before the gate,
Act 10:18 And called, and asked whether Simon, which was surnamed Peter, were lodged there.
Act 10:19 While Peter thought on the vision, the Spirit said unto him, Behold, three men seek thee.
Act 10:20 Arise therefore, and get thee down, and go with them, doubting nothing: for I have sent them.