KnujOn (nûj-ôn)


Spam is not magical or self-generating. There are real flesh and blood criminals behind it making real money. The yearly cost of electronic fraud is in the billions. KnujOn gladly offers its services to the Law Enforcement and Fraud Investigation Community.

Coming Soon: KnujOn Police Box

Jim Christy, Defense Cyber Crime Institute(DCCI or DC3), complained that "Cybercops are drowning in data" and called for "the industry to create tools to help us investigate large volumes of data." KnujOn has heard this call clearly and has responded by expanding our ability to accept more junk email samples from the public and process them faster to deliver higher volumes of actionable information. We are now processing over 20,000 pieces of junk mail per day, tracking several hundred thousand fraud websites, and rapidly increasing the rate of site shutdowns through policy enforcement. In the process we have accumulated important data on the growth of illicit traffic and transnational crime on the Internet.

There are several major areas where our work is having an impact and can continue to help:

What does KnujOn do?

Coming Soon: KnujOn Police Box

More Resources

Forensic Tools|      Training|      Resources|      Publications|      Groups|     

Want to post a link or make an announcement? Send it to

Forensic Tools

"Illicit traffic is not about products, it's about transactions." - Moisés Naím, Illicit


FBI Computer Analysis and Response Team
Back to Information Security Basics
NSA Information Assurance
Hetherington Information Services
Laboratoire d'EXpertise en Sécurité Informatique
PEI Systems
AlliedBarton Security Services
Mandiant(formerly Red Cliff)
Mares and Company
Medford Police
LAPD Online
LAPD Crimemaps
CygnaCom Solutions
Password Recovery Pro recovers hidden passwords by simply holding the mouse cursor over the asterisks field
Hidden Keyboard Memory Mod


Journal of Digital Forensic Practice
NY State DCJS Forensic Services Publications
Sassinsky Data Services
The International Journal of Digital Forensics & Incident Response
Digital Investigation FAQ
Computer Evidence : Collection & Preservation
Handbook of Computer Crime Investigation: Forensic Tools and Technology

Groups and Organizations


    The High Technology Crime Investigation Association (HTCIA)
    "The High Technology Crime Investigation Association (HTCIA) is designed to encourage, promote, aid and effect the voluntary interchange of data, information, experience, ideas and knowledge about methods, processes, and techniques relating to investigations and security in advanced technologies among its membership."


    National Cyber-Forensic & Training Alliance
    "The ongoing evolution of technology has compelled business, communications, and the nation’s critical infrastructures to become increasingly dependent upon the Internet. Criminals have followed the same course, expanding their illicit activities to the virtual world."

  • Northeast Ohio Information Security Forum

    Northeast Ohio Information Security Forum
    "The Northeast Ohio Information Security Forum is a professional organization for people interested in information security. Members are in the information security, networking, system administration/engineering, and IT industry who are either involved in or interested in the information security field. The composition of the membership range from professionals working in the public sector (at colleges, universities, government agencies) to private industry (banks, manufacturing, tech, services) to college students. The group comes together monthly to discuss issues, watch presentations from members and speakers from outside of the group, and demos of various tools and techniques in the information security arena."

  • RCFG

    The Regional Computer Forensic Group (RCFG)
    "The Regional Computer Forensic Group (RCFG) symposium is sponsored by RCFG, Inc. The RCFG is a non-profit Virginia corporation supporting the Law Enforcement and computer forensic community training needs. Membership is free and is comprised of local, federal, state employees and contractors sponsored by the government in support of law enforcement and combating cyber crime."

  • ICFP

    Institute of Computer Forensic Professionals
    "The standardization, education, and foundation of the principles and practices in digital forensics. "


    SEARCH The National Consortium for Justice Information and Statistics
    "SEARCH is dedicated to improving the quality of justice and public safety through the use, management and exchange of information; application of new technologies; and responsible law and policy, while safeguarding security and privacy."

  • InfraGard

    "InfraGard is a Federal Bureau of Investigation (FBI) program that began in the Cleveland Field Office in 1996. It was a local effort to gain support from the information technology industry and academia for the FBI’s investigative efforts in the cyber arena. The program expanded to other FBI Field Offices, and in 1998 the FBI assigned national program responsibility for InfraGard to the former National Infrastructure Protection Center (NIPC) and to the Cyber Division in 2003. InfraGard and the FBI have developed a relationship of trust and credibility in the exchange of information concerning various terrorism, intelligence, criminal, and security matters. "


    International Association of Financial Crimes Investigators
    "The Association, a non-profit international organization, will provide services and an environment within which information about financial fraud, fraud investigation and fraud prevention methods can be collected, exchanged and taught for the common good of the financial payment industry and our global society."

  • Cybercrime Institute

    Cybercrime Institute
    "Originally known as the Southeast Cyber Crime Summit, the new and improved CyberCrime Summit starts its fourth year in existence. This is due to the growth and realization that the summit reaches beyond the Southeastern U.S. The CyberCrime Summit attracts attendees from all over the world. Last year in addition to the U.S. and many Northern European attendees, some of the farthest attendees came from Italy, and Colombia, South America."

  • TheTrainingCo

    "As a corporation, it is the culmination of a dream that we have been sharing with people for the past decade. In that sense, it is new. We officially opened our doors in early 1999. We are old in that the experiences of our senior staff are almost unmatched in their knowledge of the subjects being addressed at our conferences and speaking engagements. Every bit of that hard earned knowledge came as a result of years of highly specialized work and contact with thousands of people. Our two senior members alone bring more than one half of a century of pioneering efforts in the fields of Techno-Security and Cyber-Crime Prevention. "

  • APWG
    "The Anti-Phishing Working Group (APWG) is the global pan-industrial and law enforcement association focused on eliminating the fraud and identity theft that result from phishing, pharming and email spoofing of all types."

Intelligence and Research

Why this page?

This site mostly deals with email-borne Internet threats but these events do not occur in a bubble. We must acknowledge that there is an off-line component to on-line bad behavior. Stolen bank and credit card funds are quickly turned into hard cash that vanishes on a faraway street. Terror groups use the Internet to spread hate. Even street gangs have websites. The line has blurred between narcotics smuggling and transborder terrorism. Are drugs funding terror is terror protecting trafficking? Neither can operate without a communication or information infrastructure. Phone calls are placed over Internet, email is delivered to cellular phones. The child pornography trade is international. Is the corporate information thief looking for proprietary information or weapons designs? All frightening prospects of the abuse of technology.

Conversely, technology provides investigators with a wealth of resources for collecting information. Navigating it can be overwhelming. Understanding existing and potential threats can be the key to building a good defense and following through with enforcement and prosecution.


top cannot vouch for the accuracy of information at these external links. Please note that some linked websites may contain information or images of violent crimes, controversial subject matter or inflammatory political statements. The point is to draw information from a diverse set of sources and then generate an educated conclusion about a particular problem.

Threat/Risk Assessment

The CIA World Factbook
The Ten Most Dangerous Travel Destinations
World's Most Dangerous Vacation Spots
Safest and Most Dangerous U.S. Cities, 2004
CIA Reports on Rogue Nations’ Efforts to Acquire WMD
How Rogue Nations Aid Terrorism
Organized Crime Web Links
Federation of American Scientists
The Jamestown Foundation
China and Cuba: Dangerous Liaison
Navy's Central Operational Authority for Network
Air Force Information Warfare Center
Divest Terror @


Britain Recruiting Spies Through Video Games

The Law Regarding Audio Surveillance
U.S. Electronic Espionage: A Memoir
Electronic Espionage Detection and Prevention
Spy - Electronic Espionage - How do they get away with it?
International Intelligence Limited
The Crackdown on IP Crime
Electronic Espionage Act
Telephone tapping
The Information Warfare Site
the Electronic Information System for International Law
Homeland Security in the Digital Age
60 Minutes ECHELON transcript

Spymall Online Surveillance Catalog
covert listening devices
Cellphone hidden camera, wireless spy camera, covert surveillance
The Bugs and Telephone Taps That Eavesdroppers Use
Electronic Surveillance Equipment
hidden pinhole cameras

Industrial/Intellectual/Information Theft
Economic espionage now takes the place of Cold War spying
Industrial espionage and electronic eavesdropping surveillance
Defending Your Digital Assets
Employer's Asset Protection
The untold tally of 'Netspionage'
Hidden Keyboard Memory Mod

Glenn Hauser's DX Listening Digest
Pirate radio
Shortwave Radio Listening Resource Center of NW7US
Spy Numbers Stations on Shortwave Radio

How to Make a Smart Car Surveillance System Using a Mobile Phone
10 predictions concerning cell-phones
Surveillance Via Cell Phone
Phone Surveillance Equipment: Listen in and Record Phone Calls

Spy Satellites
Spy satellite

Data Recovery
DiskInternals Uneraser
Recovering deleted files
Recover My Files
Password Recovery Pro recovers hidden passwords by simply holding the mouse cursor over the asterisks field

organized crime and street gangs


Organized Crime Web Links
LAPD Online
LAPD Crimemaps
Wanted by the FBI
World's Most Dangerous Gang
Narco-Terrorism: International Drug Trafficking and Terrorism -- A Dangerous Mix
Drug Cartels and Other Organized Crime Groups
The United Nations Convention against Transnational Organized Crime and its Protocols
Gang Graffiti
On-Line Guide to Gang Graffiti
Gang Signs
Some Principals Ban Dance With Gang Ties
Who Joins a Gang, Membership Levels and Signs to watch for



Germany wants to sic spyware on terror suspects
List of Terrorist Organizations
Foreign Terrorist Organizations
Complete List of Terrorist and Insurgency Groups Worldwide
Who's who in al-Qaeda
Secretary of State designates Foreign Terrorist Organizations
Terrorist Groups
Terrorist Incidents by Group
Watch List/Blocked from Entering U.S.
Al-Qaeda's Tactical Doctrine for the "Long War"
Divest Terror @

Dangerous Weapons, Detection, and Emergency Preparation

top U.S. Department of Homeland Security
Chemical & Biological Weapons Resource Page
Public health response to biological and chemical weapons: WHO guidance (2004)
Cellphone sniffs out dirty bombs
Dirty Bomb Detection: What's Hot?
'Drive-through' security scanner to detect dirty bombs is under development
Nuclear Bombs vs Dirty Bombs vs Suitcase Bombs
Dealing with Dirty Bombs: Plain Facts, Practical Solutions
Elite U.S. team works to keep nuclear bombs from terrorists

Offender Registries, Wanted Lists and Alerts


Investigative Programs Crimes Against Children
Information on Sex Offender Registries
Watch List/Blocked from Entering U.S.
Wanted: War on Terrorism

Translation Dictionaries


Babel Fish Translation
Language Dictionaries and Translators
Multilingual Translation Dictionaries
Ukrainian Translation Dictionary
Ultralingua Dictionary, Translation and Grammar Software
German - English
Arabic Online Dictionary
Arabic, Farsi, Hebrew, Yiddish, Swahili, Afrikaans
Directory of Farsi Translations
Russian - English
Chinese Translation Dictionaries
English & Hindi Phrases


‘Honeyclient’ Web crawlers try to find source of botnets (
Internet devices threaten NSA's ability to gather intelligence legally (
With robotic bugs, larger ethical questions (
Report: China spies threaten U.S. technology (
Spy Flies All the Buzz at Washington, N.Y. Political Events (
Executive Order on Terrorist Financing: Blocking Property and Prohibiting Transactions With Persons Who Commit, Threaten to Commit, or Support Terrorism (
MI5: Kids Groomed for Terror Attacks Against Britain (
Al Qaeda plans to launch an electronic Jihad on Nov. 11, attacking "Western, Jewish, Israeli, Muslim apostate and Shiite Web sites," according to an unconfirmed report. (
Terror goes digital. With Canadian help (
Claims that anonymous domain registration aid terrorists are overblown (
To get information or give information, contact:

Security Links
RFC 2196
Privacy Policy and Mission Statement