Tarang is a National Brand of Engro Foods. They recently Launched a Reward Program for its customers wide Pakistan. The Company Say It will Distribute Rs. 50 Lacs within its Consumers. a Seven Digit Code is written on Every Pack of Tarang Chai. Consumer needs to SMS the Code to 8655 & 939301. It has been reported that these Codes are abused by people in large. What they are doing is the Tarang has a specific Structure of Code:- AB AC AD AE then its consist of 4 number in a random serial like AE 8986 AE 8987 AE8985 Now What the Abuser do they Send Random SMS from their mobile Numbers and in Each 100 SMS they at least earns RS. 100 With out buying any of Tarang Product. LIKE AE 8686551 (SEVEN DIGIT CODE) Now AE 8686552, AE 8686553, AE 8686554 ,AE 8686555, AE 8686556, AE 8686557, AE 8686558, AE 8686559, AE 8686560,........... until AE 8686599. This Way in each 100 SMS one can get from Rs. 50. to RS. 700/- Depending upon the TARAND Random code if it fits. A large number of people are abusing this method gaining thousands of rupees each day from the Day Tarang Started its Campaign. On the other hand Consumer Lose their Money as well as TRUST on the wide spread National BRAND. It should Ban Its System for Rapid entries from a Single SIM. I did not found Any of Tarang Contact So i could Tell them. Please spread this News. And Contact Tarang Officials. Thank You
0 Comments
IBNE ZUBAIR.Studying the Pakistan Cyber Space is not a narrow subject and is hard to narrate in this single article. Pakistan Cyber Space is a wide spectrum much broader than what we may think. To define this spectrum we first need to identify it. The Internet social media is widely used by Masses in Pakistan. Most of the male users opens a Fake Female Facebook ID just for fun. Many other likes to upload Personal Pictures and videos of Girls which are captured secretly and then share it with friends, a Taboo of watching Genuine Girls Pictures and Videos. Most of these innocent girls often commit Suicide or killed by their relatives. Many Facebook Users Design Fake Pages of Political leaders, University Professors and many Celebrities and then widely use the same for either Propaganda or just for fun. Activities like Internet Trolls are also widely used by the Social Media Users. The Social Media of Pakistan is also dominant by Pakistan Print & Electronic Media. Their Mass interaction and wide range of Fans and followers makes them able to use the medium for any desired news spread or propaganda. Recently a CHAI WALA took over the Social Media and was on Top Trend for many days. This Chai Wala also denotes a simple following behavior upon the society. Soon after Chai Wala took pace and was famous, Burger Wala, Rakshe, Dil Wala, Cigar wala, Bike Wala & Many others went on board but none of them went viral except Cigar Wala (Shaikh Rashid) who took his Political stunts by riding on bike and got famous. Trending is an Aspect of Social media it not only helps the Top Tender’s to gain Fame but also they make some bucks from Advertisement (On Line ads). Qandeel Balooch is one of the Example whom earning was basically based upon (Online Ads, She owned a YouTube Channel, a Google Ad Sense Account and Bidvertiser) for which she often used publicity stunts. The Social Media is also widely used for fraudulent activities as well. The most common (in Pakistan) of which are DATING SCAMS, a group of women advertise their services for Paid Dating, however after payment being made the advertiser simply change their mobile numbers. Some version of Dating Scams are too much freaky in which a group either try to record a naked video of the Dating Customer or simply kidnap the victim for a Ransom. There are also other variants of Dating Scams in Pakistan like Marriage Beau rue Scam, Massage Parlor Scam, Hire a Job Scam and many others. Beside the above mentioned Female Operated Scams in which the victims are male, there are also Male Dominant Scams in which the operator persuade to be from a rich family seeking simple and honest girl for marriage and friendship. They try to make their victims love them. Phone Sex is a variant of this segment of Fraud where the male records either the voice of female or record a Video Cam or Video Call. These videos are used for many variants of Frauds by much stronger Gangs in Pakistan. The victims are blackmailed in a various ways including ransom Extortion, Drug Trafficking, Sexual abuse and are used as Honey pots for the Gangs. These videos are also sold to the underground Markets, Mostly known as Dark Net, Deep Net and TOR. These hidden Internet Markets are even some of the dangerous aspects of Internet. These Underground Markets are un-accessible through Normal Clearnet Networking and Browsers however they are accessible through special Browsers even from Pakistan. This aspect of Pakistan Cyber Space makes it even darker. In Political Campaigns, the Government often closes the signal of Mobile making Mobile Communication banned for a specific time period. In Various Religious Events like Eid, Dewali & Muharram Government Bans Mobile Communication in various cities of Pakistan. In Recent Protest of Pakistan Tehrek E Insaf, The leadership launched an android App Named “SHE SAFE”. Click here to view moreThe app will work by communicating critical Situation Messages even in offline Mode. Similar Mode of Applications are widely used in War Zone especially in Middle East War. Offline Contact Apps have many versions and most of them have been used by rebels in ARAB War, in recent Taliban Attacks on a Police Training Centre at Quetta it was Discovered that All the Attackers were Live on Face Book with their commander from Afghanistan. To study the means of communication among different militants groups are also important to cope the Challenges of Facilitators to these Militants groups. On Militant Attacks on APS, The attackers again were in continuous communication with their Masters in Afghanistan. The Military Leadership must work to restrict Access of Mobile in their Military Compounds, Schools, Training Centers and Government Offices etc where there is a possibility of Quetta like attacks. I will further explain the restrictions that, If there are 300 Soldiers in a Compound, The leadership must collect information about their cellular networks and may install devices which will restrict communication to the devices, mobiles already verified and all those who are guests will not be able to receive signals on their mobile as long as they remain in the compound. This restriction to mobile communication only for residence of a particular place, center or office will help a lot. Anonymous are one of the most famous Hacking Group. They are actually the Start of Revolution in the Middle East started from a Post on a Social Media which later on was named as the “ARAB SPRING”. Backing a WAR by a Hacking group denotes the Co-Relation of Drugs, Crimes and Wars. I am the view that Pornography, Prostitution, Sex Workers, Drugs, Crimes and War are Co-related to each other. My experience Show all these technology of Warfare came from the Underground World of Darknet. JANDULLAH is Militant group who started working on if they can Hack Communication signals from the Air. Their Idea leads them to a Russian Group “Sky Scraper” who were selling a Software combined with a Dish Antenna for Using Free Satellite Internet. The Simple Software which was basically used (bought) by mostly Arabian teenagers for viewing of PORN Satellite Channels led JANDULLAH to Record the Communication of Helicopter Pilots as well as Drones. This Software helped the many groups involved in Iraq Rebellion to survive many of Drone Attacks. Later on the founder of Jandullah Abdolmalek Rigi, was captured and executed in Iran in 2010. This was the time probably Iran took over the Technology and intercepted Drones. Sky Scraper is sold by 45$ by Russian Hackers by which Iran intercepted American Drones. Hacking Wireless Communication, Intercepting Signals and Controlling Ariel Radio Waves someone may think how efficient a Cyber Warfare is. Cyberwarfare however was not such important to many unless the Israel stuxnet virus attacked the Iranian Uranium Pant. The Stuxnet variant virus remains silent. Whenever it reaches a Heavy Mechanical Machinery linked and operated by a Computer, it executes its commands and Sabotage the Heavy Mechanical Systems. Stuxnet variant of Virus and Trojans are threat to Industry. After Uri Attacks in India, Pakistan and India were engaged in a Counter Warfare. It was noted that a Hacker Group named PROPAKISTANIPro PakistaniIntercepted the Indian Airforce in Srinagar and bound them to listen to a National Song “DIL DIL PAKISTAN” in their Cockpit. Some weeks ago India reportedly blocked the GOOGLE EARTH and GOOGLE MAPS, hours after the Pakistani Hackers identified the Geo Location of their Traffic Police in various Cities. These types of Activities makes us proud with hope that if we can force them to listen Songs, we can control their crafts. We can even Sabotage their Strategic Equipment’s and soon we will be able to make the enemy space and their digital infrastructure Encrypted, Self-controlled and defused. We have heard about the Israel Laser based Anti-missile System. Laser warfare is important part of Next generation Warfare and are the game changers in industry. However laser have some drawbacks the one is that it do not pass across one medium. We should try other form of Violent Radio Active Rays to configure a Remotely Operated Laser Beam which is critical to destroy the Attacking Aircrafts, Missiles and evenRockets. Russia Recently Tested its first of the kind Anti-Aircraft and Anti Drone Radar. It EmitsMicro Waves to the Air Space hence the Signals of the UAV UN Manned Aircraft are Disabled, while it’s Ultra Violet Micro Waves FRYS the Crafts. Americans are working on Combination of Laser beams which eliminates and destroy not only the High Quality Steel that is running in a particular Air Space but also breaks the Electronic Circuits of the Stealth Technology making it useless in Seconds. On the other hand The Micro Waves Will Eliminate the ability of Explosive to Explode and will Jam all the Communication of the Whatever enters in the Air Space if It is a Rocket, Air Jet or a Shell fired from a canon. The Russian however use Magnetic Field which makes the Air Jets UN balanced in a particular airfield. Beside the above advancement in Technology of Warfare the current situation is Freakily Amazing. The Communication between two Peers, Systems and Networks is encrypted for ultra-security. Some Russian hackers designed a RAT comprising ofEncryption Logs. When installed to a System it encrypts All the Computer and Display a Message to the owner asking for Ransom Money in order to decrypt their Files. Thismalware is called as Cyber Ransom ware. Cryptography is an Art for Securing Communication Systems however making it for Ransom keeps the Digital Systems on a high risk. Cyber Ransomware will lead the Warfare Technology towards an edge and will become a Game Changer in future because Scientist are working on Electric Cryptography. If successful in all the Electronic Devices and Electrical equipment’s Electric Current and its flow will be encrypted. If intercepted by a Hacker on the other hand one will encrypt all the Electronics and Electrical Devices of an enemy Military. The Under Ground Internets which is inaccessible by common internet and is wider and deeper than the Real Internet comprises of millions of websites, WIKIS, Blogs and Under Ground Markets. The Most dangerous aspect of Dark net is that Almost everything illegal is available and accessible from Pakistan, Making (This aspect of) the PakistanCyber Space darker than we normally think. Studying the effect of Darknet that may cause the Criminal networks in Pakistan vulnerable is of vital importance. Psychedelic drugs are widely available in Darknet, Most of these psychedelic drugs are called as recreational drugs i.e Love Pills, LSD, and Acid & MDMA which are widely used in late night parties, Sexual recreational gathering and Fun parties. However studying the effect of psychedelic drug like Ecstasy which creates Hallucinogenic effects are more likely to be given to those Non State Actors who are involved Suicide Bombing in a War against Pakistan. The Darknet also have WIKI’s & HOWTO which guides and explain the creation of Drugs, Explosives & many other Frauds which directly affect the War that Pakistan is involved in. This War has multi dimensions and is waged on various sectors of Pakistan comprising of Many Non state Actors is likely the NEXT GENERATION WARFARE which the brilliant Soldiers of Pakistan Army is Tackling and admirably they have the world most success ratio. Studding this Warfare Element of Pakistan Cyber Space we can see this spectrum is too much dangerous. However it is very critical yet sensitive for a person like me to write on. Pakistan has a world most powerful military, they have brilliant officers and are aware about all the above mentioned Aspect of War. Pakistan Army has a Cyber Warfare Cell. Pakistan has institutions like FIA and the Cyber Crime and Warfare are their own subject. However being a citizen of this country anywhere if we see a Suicide Bomb the first question arises in my mind is if there is any way we can ISOLATE these Bombers and if we could find any technique where we can DE-ACTIVATE the Explosive, These two Questions leads my way to All the Clearnet Search Engines, Articles, Books and Blogs and when I could not find any Answer to the above, I dived in to the Internet Underground where the Possible Answer to my Quest lies. From all these experience and reading I had concluded an Opinion.
“Small and handy Laser Based Weapons including Micro Wave Technology which have the ability to be operated from a remote location, Access the Electronic Circuits of All the Devices present in the Area of Accessibility and Makes it ENCRYPTED (ELECTRO CRYPTOGRAPHY). Based on a very genius Processor, Process the Electric Flux (Virtually) and if Find anything Explosive attached, breaks the Circuit which is already encrypted, hence Defuses the BOMB/ EXPLOSIVE by making it Impossible to be exploded. Using the Magnetic Flux and Microwave in an Air Space makes Wireless Communication Disabled. UAV Crafts, Drones and Laser Guided Missiles can by Defused in the Air from the ground using the same Technology. There are some Waves, Radiations, and Chemicals which are called Fire Extinguisher. Recently a German Company E Lide (www.loeschball.de) has designed a Fire Ball which they call E Lide Fire Balls. If these fire balls are placed in an area where there is the possibility of a bomb Explosion. The Chemical makes the area a Bit safe because in the very moment a Bomb Explodes the Chemical also explodes making the Fire (Explosive) Materials Extinguished. By Combining of all the Three We can Design Products which can save us from Mass Destruction, On the other hand Implementing these Products on Enemy War heads We can simply make them Encrypted, Circuit Breakers and Defused before they Operate. Even in their Operation We can Use Micro Waves and Toxic Laser to UNDO them in Air, Even if they are fallen within our Territory by Applying the Dutch Fireball like Chemicals We can make them less explosive”. To summarize all of the above, Pakistan Cyber Space is of crucial importance, To defend the motherland from the Hazards of Next Generation Warfare, To Disable all the communication among the extremist groups and to Invade a proxy type of cyber war on those countries either they are friends like enemies or enemies who are manipulating these extremists groups. Cyber warfare is not limited only to Hacking, Cracking, Freaking, Hoaxing, Spamming, Spoofing and invading each other’s systems. It is a Professional Organ of an Army establishing crucial Intelligence Database Systems operated by Virtual Intelligent Processors which Helps Making Military Decisions and precise the warfare scenario. Cyber warfare is the Strategic Warfare organ comprising of but not limited to:- Cyber Intelligence, Cyber Extortion, Cyber Espionage, Cyber Hacking- CCTV of Military Installations Using Google Dorks, Cyber Optimizing Strategic Installations. Controlling Remote Administrating Trojans, Coding and De coding all the Radio and laser Signals in a particular airspace. Embedding these Signals into personal INSIGHT Information and Taking Controls of Strategic Applications and Installations, are what Cyber Warfare means. Pakistan is a country where genius people live, the habitat of this area grows very healthy brains. Pakistanis are by sense Computer Literate. Our kids often wins International Computing competitions. We have a powerful military and obviously they must have a Cyber Wing. I am nothing in front of all those officers who have dedicated their whole life to defend this Mother land and who are still on the front lines of a multinational warfare, they know the game and players as well. What I had written above is the summarized version of almost 30 Books that I had written in Past 16 years but could not publish any of them because a common person cannot takes a risk. All these knowledge are exclusively belongs to my Soldiers. This summary may be consider as a Whistle Blower to the concerned authorities if they can find anything helpful. I am of the view that It may be taken as “the world as I have seen it”. With hope if there is a way our Military leadership could establish a very powerful and strong Warfare Council Which could lead its way to dominant the war in hand. If somewhere in the industry a device develops to help a single life of my brave soldiers, my aim of this book fulfils. I had tried to restrict all the contents of this book in way that a common man may not be able to get to the Idea. For those who are already in Cyber warfare they know what I mean and those who don’t know, I do not need to explain them. IF YOU LIKE MY WORK PLEASE SHARE IT. ANY ONE WHO IS WILLING TO BUY MY BOOKS CAN CONTACT ME[email protected] IF YOU ARE A VICTIM OF FRAUD, BLACKMAIL OR HARASSMENT PLEASE CONTACT ME FOR HELP. |
Author
|