KnujOn

KnujOn (nûj-ôn)


PAGE NO LONGER MAINTAINED, PLEASE VISIT USPOLICEBOX.COM



Spam is not magical or self-generating. There are real flesh and blood criminals behind it making real money. The yearly cost of electronic fraud is in the billions. KnujOn gladly offers its services to the Law Enforcement and Fraud Investigation Community.

Coming Soon: KnujOn Police Box


Jim Christy, Defense Cyber Crime Institute(DCCI or DC3), complained that "Cybercops are drowning in data" and called for "the industry to create tools to help us investigate large volumes of data." KnujOn has heard this call clearly and has responded by expanding our ability to accept more junk email samples from the public and process them faster to deliver higher volumes of actionable information. We are now processing over 20,000 pieces of junk mail per day, tracking several hundred thousand fraud websites, and rapidly increasing the rate of site shutdowns through policy enforcement. In the process we have accumulated important data on the growth of illicit traffic and transnational crime on the Internet.

There are several major areas where our work is having an impact and can continue to help:

What does KnujOn do?

Coming Soon: KnujOn Police Box

More Resources

Forensic Tools|      Training|      Resources|      Publications|      Groups|     

Want to post a link or make an announcement? Send it to contact@knujon.com


Forensic Tools

"Illicit traffic is not about products, it's about transactions." - Moisés Naím, Illicit



Training




Resources

dshield.org
FBI: HAS YOUR BUSINESS BEEN HACKED?
itsecurity.com
FBI Computer Analysis and Response Team
techpathways.com
Back to Information Security Basics
security-books.com
NSA Information Assurance
Hetherington Information Services
Laboratoire d'EXpertise en Sécurité Informatique
PEI Systems
AlliedBarton Security Services
securityhorizon
Mandiant(formerly Red Cliff)
Mares and Company
Medford Police
LAPD Online
LAPD Crimemaps
computer-forensic.com
forensicts.co.uk
tucofs.com
CygnaCom Solutions
MITRE
Password Recovery Pro recovers hidden passwords by simply holding the mouse cursor over the asterisks field
Hidden Keyboard Memory Mod



Publications

Journal of Digital Forensic Practice
NY State DCJS Forensic Services Publications
Sassinsky Data Services
The International Journal of Digital Forensics & Incident Response
Digital Investigation FAQ
Computer Evidence : Collection & Preservation
Handbook of Computer Crime Investigation: Forensic Tools and Technology



Groups and Organizations

  • HTCIA

    The High Technology Crime Investigation Association (HTCIA)
    "The High Technology Crime Investigation Association (HTCIA) is designed to encourage, promote, aid and effect the voluntary interchange of data, information, experience, ideas and knowledge about methods, processes, and techniques relating to investigations and security in advanced technologies among its membership."

  • NCFTA

    National Cyber-Forensic & Training Alliance
    "The ongoing evolution of technology has compelled business, communications, and the nation’s critical infrastructures to become increasingly dependent upon the Internet. Criminals have followed the same course, expanding their illicit activities to the virtual world."

  • Northeast Ohio Information Security Forum

    Northeast Ohio Information Security Forum
    "The Northeast Ohio Information Security Forum is a professional organization for people interested in information security. Members are in the information security, networking, system administration/engineering, and IT industry who are either involved in or interested in the information security field. The composition of the membership range from professionals working in the public sector (at colleges, universities, government agencies) to private industry (banks, manufacturing, tech, services) to college students. The group comes together monthly to discuss issues, watch presentations from members and speakers from outside of the group, and demos of various tools and techniques in the information security arena."

  • RCFG

    The Regional Computer Forensic Group (RCFG)
    "The Regional Computer Forensic Group (RCFG) symposium is sponsored by RCFG, Inc. The RCFG is a non-profit Virginia corporation supporting the Law Enforcement and computer forensic community training needs. Membership is free and is comprised of local, federal, state employees and contractors sponsored by the government in support of law enforcement and combating cyber crime."

  • ICFP

    Institute of Computer Forensic Professionals
    "The standardization, education, and foundation of the principles and practices in digital forensics. "

  • SEARCH

    SEARCH The National Consortium for Justice Information and Statistics
    "SEARCH is dedicated to improving the quality of justice and public safety through the use, management and exchange of information; application of new technologies; and responsible law and policy, while safeguarding security and privacy."

  • InfraGard

    InfraGard
    "InfraGard is a Federal Bureau of Investigation (FBI) program that began in the Cleveland Field Office in 1996. It was a local effort to gain support from the information technology industry and academia for the FBI’s investigative efforts in the cyber arena. The program expanded to other FBI Field Offices, and in 1998 the FBI assigned national program responsibility for InfraGard to the former National Infrastructure Protection Center (NIPC) and to the Cyber Division in 2003. InfraGard and the FBI have developed a relationship of trust and credibility in the exchange of information concerning various terrorism, intelligence, criminal, and security matters. "

  • IAFCI

    International Association of Financial Crimes Investigators
    "The Association, a non-profit international organization, will provide services and an environment within which information about financial fraud, fraud investigation and fraud prevention methods can be collected, exchanged and taught for the common good of the financial payment industry and our global society."

  • Cybercrime Institute

    Cybercrime Institute
    "Originally known as the Southeast Cyber Crime Summit, the new and improved CyberCrime Summit starts its fourth year in existence. This is due to the growth and realization that the summit reaches beyond the Southeastern U.S. The CyberCrime Summit attracts attendees from all over the world. Last year in addition to the U.S. and many Northern European attendees, some of the farthest attendees came from Italy, and Colombia, South America."

  • TheTrainingCo

    TheTrainingCo
    "As a corporation, it is the culmination of a dream that we have been sharing with people for the past decade. In that sense, it is new. We officially opened our doors in early 1999. We are old in that the experiences of our senior staff are almost unmatched in their knowledge of the subjects being addressed at our conferences and speaking engagements. Every bit of that hard earned knowledge came as a result of years of highly specialized work and contact with thousands of people. Our two senior members alone bring more than one half of a century of pioneering efforts in the fields of Techno-Security and Cyber-Crime Prevention. "

  • APWG

    AntiPhishing.org
    "The Anti-Phishing Working Group (APWG) is the global pan-industrial and law enforcement association focused on eliminating the fraud and identity theft that result from phishing, pharming and email spoofing of all types."

Intelligence and Research


Why this page?

This site mostly deals with email-borne Internet threats but these events do not occur in a bubble. We must acknowledge that there is an off-line component to on-line bad behavior. Stolen bank and credit card funds are quickly turned into hard cash that vanishes on a faraway street. Terror groups use the Internet to spread hate. Even street gangs have websites. The line has blurred between narcotics smuggling and transborder terrorism. Are drugs funding terror is terror protecting trafficking? Neither can operate without a communication or information infrastructure. Phone calls are placed over Internet, email is delivered to cellular phones. The child pornography trade is international. Is the corporate information thief looking for proprietary information or weapons designs? All frightening prospects of the abuse of technology.

Conversely, technology provides investigators with a wealth of resources for collecting information. Navigating it can be overwhelming. Understanding existing and potential threats can be the key to building a good defense and following through with enforcement and prosecution.


Disclaimer

top

KnujOn.com cannot vouch for the accuracy of information at these external links. Please note that some linked websites may contain information or images of violent crimes, controversial subject matter or inflammatory political statements. The point is to draw information from a diverse set of sources and then generate an educated conclusion about a particular problem.


Threat/Risk Assessment

top

krollworldwide.com
globalsecurity.org
rand.org
interpol.int
The CIA World Factbook
The Ten Most Dangerous Travel Destinations
World's Most Dangerous Vacation Spots
Safest and Most Dangerous U.S. Cities, 2004
CIA Reports on Rogue Nations’ Efforts to Acquire WMD
How Rogue Nations Aid Terrorism
terraserver
Organized Crime Web Links
Federation of American Scientists
The Jamestown Foundation
defensetech.org
China and Cuba: Dangerous Liaison
Navy's Central Operational Authority for Network
Air Force Information Warfare Center
Divest Terror @ centerforsecuritypolicy.org


Espionage

Britain Recruiting Spies Through Video Games
top


General
The Law Regarding Audio Surveillance
INFRARED SPECTROSCOPY TECHNIQUES
COMMUNICATION / FORENSICS
EXPOSING THE GLOBAL SURVEILLANCE SYSTEM
U.S. Electronic Espionage: A Memoir
Electronic Espionage Detection and Prevention
Spy - Electronic Espionage - How do they get away with it?
International Intelligence Limited
The Crackdown on IP Crime
Electronic Espionage Act
prisonplanet.com
Telephone tapping
INSTITUTE FOR THE ADVANCED STUDY OF INFORMATION WARFARE
Cryptovirology
The Information Warfare Site
the Electronic Information System for International Law
Homeland Security in the Digital Age
60 Minutes ECHELON transcript

Equipment
AUDIO & TELEPHONE RECORDERS & SURVEILLANCE EQUIPMENT
Spymall Online Surveillance Catalog
covert listening devices
spysupplystore.com
surveillance-spy-cameras.com
Cellphone hidden camera, wireless spy camera, covert surveillance
The Bugs and Telephone Taps That Eavesdroppers Use
spyworld.com
Electronic Surveillance Equipment
hidden pinhole cameras

Industrial/Intellectual/Information Theft
Economic espionage now takes the place of Cold War spying
Industrial espionage and electronic eavesdropping surveillance
Defending Your Digital Assets
Employer's Asset Protection
The untold tally of 'Netspionage'
Hidden Keyboard Memory Mod

Radio
worldofradio.com
Glenn Hauser's DX Listening Digest
DXing
Pirate radio
Shortwave Radio Listening Resource Center of NW7US
SHORTWAVE ESPIONAGE
Spy Numbers Stations on Shortwave Radio

Cellphone
How to Make a Smart Car Surveillance System Using a Mobile Phone
10 predictions concerning cell-phones
Surveillance Via Cell Phone
Phone Surveillance Equipment: Listen in and Record Phone Calls

Satellites
Spy Satellites
SPY SATELLITES
Spy satellite

Data Recovery
RECOVERING DELETED FILES
DiskInternals Uneraser
Recovering deleted files
Recover My Files
Password Recovery Pro recovers hidden passwords by simply holding the mouse cursor over the asterisks field


organized crime and street gangs

top

Organized Crime Web Links
LAPD Online
LAPD Crimemaps
Wanted by the FBI
World's Most Dangerous Gang
TRAFFICKING FROM RUSSIA & THE CIS: History & Trends
Narco-Terrorism: International Drug Trafficking and Terrorism -- A Dangerous Mix
Drug Cartels and Other Organized Crime Groups
Streetgangs.com
knowgangs.com
The United Nations Convention against Transnational Organized Crime and its Protocols
Gang Graffiti
gangwar.com
On-Line Guide to Gang Graffiti
KEEPING KIDS OUT OF GANGS
the-solution.org
Gang Signs
Some Principals Ban Dance With Gang Ties
Who Joins a Gang, Membership Levels and Signs to watch for


Terrorism

top

Germany wants to sic spyware on terror suspects
jamestown.org
List of Terrorist Organizations
Foreign Terrorist Organizations
Complete List of Terrorist and Insurgency Groups Worldwide
Who's who in al-Qaeda
jihadwatch.org
Secretary of State designates Foreign Terrorist Organizations
Terrorist Groups
Terrorist Incidents by Group
Watch List/Blocked from Entering U.S.
Al-Qaeda's Tactical Doctrine for the "Long War"
Divest Terror @ centerforsecuritypolicy.org


Dangerous Weapons, Detection, and Emergency Preparation

top

Ready.gov/the U.S. Department of Homeland Security
Chemical & Biological Weapons Resource Page
Public health response to biological and chemical weapons: WHO guidance (2004)
Cellphone sniffs out dirty bombs
Dirty Bomb Detection: What's Hot?
'Drive-through' security scanner to detect dirty bombs is under development
Nuclear Bombs vs Dirty Bombs vs Suitcase Bombs
Dealing with Dirty Bombs: Plain Facts, Practical Solutions
Elite U.S. team works to keep nuclear bombs from terrorists
HOW TO DETECT RADIATION


Offender Registries, Wanted Lists and Alerts

top

STATE SEX OFFENDER REGISTERS
Investigative Programs Crimes Against Children
Information on Sex Offender Registries
Watch List/Blocked from Entering U.S.
Wanted: War on Terrorism


Translation Dictionaries

top

Babel Fish Translation
dictionary.reference.com
Language Dictionaries and Translators
WordReference.com
Ultralingua.Net
Multilingual Translation Dictionaries
foreignword.com
Ukrainian Translation Dictionary
Ultralingua Dictionary, Translation and Grammar Software
German-French/German-English
German - English
Arabic Online Dictionary
Arabic, Farsi, Hebrew, Yiddish, Swahili, Afrikaans
Directory of Farsi Translations
Russian - English
English-Chinese
Chinese Translation Dictionaries
Chinese-English
English & Hindi Phrases


More...

‘Honeyclient’ Web crawlers try to find source of botnets (gcn.com)
Internet devices threaten NSA's ability to gather intelligence legally (govexec.com)
With robotic bugs, larger ethical questions (boston.com)
Report: China spies threaten U.S. technology (cnn.com)
Spy Flies All the Buzz at Washington, N.Y. Political Events (foxnews.com)
Executive Order on Terrorist Financing: Blocking Property and Prohibiting Transactions With Persons Who Commit, Threaten to Commit, or Support Terrorism (whitehouse.gov)
MI5: Kids Groomed for Terror Attacks Against Britain (foxnews.com)
Al Qaeda plans to launch an electronic Jihad on Nov. 11, attacking "Western, Jewish, Israeli, Muslim apostate and Shiite Web sites," according to an unconfirmed report. (foxnews.com)
Terror goes digital. With Canadian help (theglobeandmail.com)
Claims that anonymous domain registration aid terrorists are overblown (arstechnica.com)
To get information or give information, contact: information@knujon.com

Security Links

htcia.org
infragard.net
cybercrimesummit.com
apwg.org
leo.gov
usdoj.gov
websense.com
dshield.org
itsecurity.com
nsa.gov
dhs.gov
fbi.gov
nist.gov
cyber-response.org
ncfta.net
RFC 2196
secinf.net
security-books.com
Privacy Policy and Mission Statement