PDA

View Full Version : Net Vigilance for WNs



White Iceland
Saturday, March 19th, 2005, 01:08 PM
http://groups.yahoo.com/group/snoops14/

I prepared a few simple tutorials for this yahoo group with the long term plan to hammer on rumour and gossip there in privacy before making any accusations on public/semi-public forums such as tNp.

I thought the launch articles were fairly useful but even within its small membership I suspect there are antis and scum.

Feel free to join and cross-post articles, in their entirety if you wish, to this thread. The material is the result of too much time spent online and could save you some hours and headaches.

I will post the introductory article as the first reply to this thread.

I am comfortable with the idea of moving the active project over to tNp...

Comments? Suggestions? Questions?

White Iceland
Saturday, March 19th, 2005, 01:10 PM
The integrity of our gathering places around the web and personal
contacts, whether encountered via chat, guestbooks, "private
messages" or emails from unknown parties, can be increased
dramatically by learning a few basic rules about internet
investigation.

This group will offer simple suggestions which, with practice, will
help us weed out the half-hearted and disruptive individuals who rob
time, effort and trust from our cyber activities.

The first function will be to introduce practical application of web
tools such as search engines, archives, catalogs, directories, site
registries etc.

We also hope to present step by step case studies as they unfold
based on requests from members who will gain experience by following
these investigations and performing the suggested searches.

We will handle gossip, doubts and concerns with great attention to
detail so that unfounded assumptions will not clutter up public
forums and our members won't "jump to conclusions" and make
accusations prematurely. The business of online finger-pointing is a
serious matter and can greatly damage the reputation of sincere
activists whose honest hunch merely needed more checking up on before
announcement.

Snoops 14 will teach you how to do free net-wide background checks to
help develop trust among your fellows. As the success of such
intelligence gathering gains followers, it will be a mark of meaning
to say, "They passed Snoop 14 inspection."

Use the group to develop your instincts and become a more efficient
moderator/contact in WN cyber circles. This training will come in
handy and save honest folks a lot of headache knowing there is one
more clever WN detective online.

Having joined this effort, please become an active participant. The
confidentiality of members is always respected and the list is
private, so if you have an issue that you wish to remain unpublicized
under your name, simply post your inquiry with "private" in the
subject heading and your name will be removed and the issue forwarded
by one of our moderators under their name.

The most practical example of how this group can be used would be
that you have a security issue concerning an online contact. Simply
post what information you can (email address, homepage, screen name
etc.) along with any questionable behavior (claims made via online
correspondence etc.) and our bureau will investigate the group or
individual and post the results along with instruction in the methods
by which they were attained.

Welcome to the age of saavy WN cyber-sleuthing!

White Iceland
Thursday, March 31st, 2005, 09:33 PM
(I am posting this material straight from an inactive group. The details may not be all that relevant here. -WI)

If you're one of the folks who read the bulletin boards, you've no
doubt noticed that a great number of the posts are concerned with
simple questions like:

"Where can I find this book?" or "What is the address for this
group's webpage?"

Even more detailed questions can usually be answered with one well-
conceived search with a reliable search engine such as Google, Yahoo
or AltaVista.

We will devote little space to such tactics here early on, assuming
you know about search engines. It is practical to keep one or more
engines in your favorites or even as your browser "home" page.

Each search engine has its advantages for specific search needs, but
for general purposes www.google.com and its subcategory search tools
are hard to beat.

Just in case you haven't mastered the basic search, let's introduce
perhaps the most useful method... that is, enclosing search terms in
quotation marks " ".

Since the specific aim of this group will be personality research,
let's choose a subject of general interest to WNs.

Remember, all research is in a sense "historical" because once it is
registered, whether in cyberspace, books, magazines, or merely the
memory of an individual, all information is history. Journalism is
concerned with straddling the fine line between current events and
history. Indeed, by the time a news article is written it becomes
history. Once a sentence is spoken it becomes history. Keeping this
in mind when we work our way around to background checks on
individuals, every person who has spent some time on the net,
particularly persons fond of posting in newsgroups, forums, bulletin
boards or even signing guest books and writing emails, has a history.

So, every search which nets any results is returning "historical"
information. Any "individual" who claims to be active and respected
in WN circles is more than likely to have a history to which we can
refer.

Let's get to that basic search engine personality search. As most of
us will be relying on English, let's start with the well-known
subject George Lincoln Rockwell.

If we open www.google.com and type:

George Lincoln Rockwell

in the search bar and call up results... we find many indeed! It may
be necessary to skim several pages of results before we find what we
are looking for.

The easiest way to pull in more reliable search results is to
set "limits." One of the easiest ways to "limit" our search is to use
quotation marks " ". This helps us create a search for a specific
phrase based on more than one word.

The search results for George Lincoln Rockwell will be arranged
according to the most relevant matches. Since GLR is a well-known
character and there is so much written about him, this search will
return many accurate results about the person in question. But let's
suppose that information on GLR was more scarce. The words George
Lincoln and Rockwell pulled at random from any page registered
through Google will return results which refer to George Washington,
Abraham Lincoln and Norman Rockwell, none of which concern us when
making this request.

So, to make sure that all your results refer to George Lincoln
Rockwell, simply enclose the name in quotation marks in the Google
search box:
"George Lincoln Rockwell"

Try this and notice that the number of search results through google
are reduced considerably. You have successfully reduced the amount of
additional browsing necessary to find the information you seek about
this individual.

I know this is rather dry and hopefully the quotation mark habit is
something you have already picked up. However, with more detailed
searches in the pipes, it is important to start basic.

The next step in setting limits is to realize that you can include
more than one phrase or a combination of phrases and keywords in the
same search.

Let's say that you are specifically seeking references to Rockwell's
autobiography This Time the World.

Enter the following search at www.google.com:

"George Lincoln Rockwell" "This Time the World"

This will return every document on the web indexed by google which
contains both the phrase "George Lincoln Rockwell" and "This Time the
World."

You will immediately be able to spot results of use such as online
versions of the book, reviews both sympathetic and anti, quotes,
bibliograhies etc.

It is also worth keeping in mind that many sources will refer to GLR
differently. In most "works cited" pages, for instance, personal
names are listed last name first.

So, to get results which will include research articles with
documentation which use George Lincoln Rockwell's writings, try the
following quotation marked search in google:

"rockwell george lincoln"

As, generally, it is not necessary to use capital letters to pull the
same results from a search engine.

If this introductory instruction has presented anything new to you,
please try a few of your own limited searches based on personal names
of your own choosing, perhaps your own!

If we're talking all "old hat" so far, good! That means the sort of
snoops we will soon work our way around to will seem relatively
familiar to you and hopefully serve you well.

***Please post any search suggestions you would like help with, along
with any special instructions for our moderators (such as "private"
in the subject line for anonymous reposts). Thanks for joining!***

White Iceland
Saturday, April 2nd, 2005, 12:02 AM
The most common personal online identifier is a screen name and/or
email address. Although these are often misleading, in the truer
meaning of a "screen" name being used to screen or mask the users
identity rather than "on screen" or merely the name which appears on
your monitor.

The screen name and email address are often tied together. Among the
most popular chat and messenger services, MSN, Yahoo and AIM (AOL
Instant Messenger), all offer the potential of having an email
identical to the screen name. In many cases, the email address can be
more valuable than the screen name, so it is a good idea to confirm
an email address as early in your background check as possible.

A screen name is most often used for informal purposes such as chat,
guest books or forums/bulletin boards. Personal names are used more
often for business or private communication.

As an obviously bogus example, let's say you encounter fedagent88
online. Perhaps you strike up a bit of conversation and are asked
about any web page you operate or online group you belong to.
fedagent88 seems a bit kosher, so you decide to run a quick check on
him/her.

By simply dropping the screen name fedagent88 into www.google.com you
may come up with some history on this identity. Most likely you will
find posts from public groups such as yahoo, bulletin boards, guest
books etc. If you are dealing with someone who has used newsgroups,
the google "groups" subcategory search may turn something up. Perhaps
you can judge, to a degree, the person behind the screen name based
on their knowledge and sincerity in this "history." At least trust
your instincts enough at this point to perhaps disclose a web address
or forum name.

So, say you find no immediate history on this screen name.

Using the extreme example fedagent88, this screen name, if it truly
describes who's behind it, will likely never reveal a true personal
name. The screen name/profile was created for intelligence gathering
and does not cross with a real person's online activities. If after
trying the secondary methods described below you still can't come up
with a verifiable personal name or cross up with additional "non-
activist" screen names or emails, this is likely either a well-done
anonymous user (who could make a very good contact) or a hoaxed spy
front.

If you are onto one of these, you should follow up on acquiring an
email address. If you spotted this identity through yahoo, there is a
good chance that a note addressed to fedagent88 at yahoo dot com will
reach them. All the same, with yahoo, before sending an email try
their profile. All yahoo profiles can be viewed at
profiles.yahoo.com/*username* so, in our case
profiles.yahoo.com/fedagent88.

Even if you've never adjusted a profile, if you have a yahoo user
name, this profile exists. Many yahoo profiles are almost completely
blank. Most folks have several and often fill them with total
bullshit.

One thing of value in a yahoo profile that gives a nice clue is
the "last updated" date. If a yahoo profile has been updated to
include interests, favorite quote, photo, news... etc. it doesn't
mean much if you notice the "last updated" date is within the last
couple of weeks. People who complete profiles often do occassionally
update them. However, if the profile is nearly blank, the default so
to speak, this "last updated" date will often reveal when the screen
name was created!

Your typical SHARP or ARA loser will often run one-night stand
disposable screen names which they hardly bother to include much
profile info for or ever update. So, if you find that fedagent88 has
a slim yahoo profile and a "last updated" date of today... it is very
likely bogus... unless of course this personality told you up front
that they are new to this or came clean that they just signed up for
yahoo.

Since we are meeting through yahoo it might be of use to mention
another yahoo profile trick... obvious but useful. If you got hits on
this screen name through www.google.com or yahoo search, look for
indexes to particular yahoo groups in their results. If you look
through a couple of this users yahoo groups posts, you will likely
find a partial email address... fedagent88@y... or fedagent88@h... or
fedagent88@a... yahoo, hotmail or aol dot com 4 out of 5 with these
three initials... hell, I say 9 out of 10 just as easy. Furthermore,
it is possible that a crap profile was set up under a primary yahoo
account (the one which the email account is set up for). You can
usually find this one in yahoo groups posts by looking in the text
of, for instance, fedagent88's message. At the top of the message you
will find a "from" line which includes the partial (or complete)
email the message was relayed through.

So, for the sake of example, let's look at this further scenario...

fedagent88 makes you curious about him/her. You drop the screen name
into google and find the index for a yahoo group "Coon Whoopers." You
follow the engine's link to that result and find a title "Drink More
Schlitz!" by fedagent88. You enter that message and find at the top
of some apparently drunken ramblings "from: crossracebreeder@y..."

So, now you have fedagent88's primary yahoo account name/email
address. If you still want to know more about this character or if
you have turned up nothing as with a well-done anonymous account or
spy front, you might need to try an email. If you use a disposable
email account yourself it is good to set it up with a real name in
the return line, just like you would with your authentic personal
email. Sign any emails from this account to match.

You can use your disposable email account for a lot of snoops. One
way is to verify email addresses... Simply forward a piece of junk
mail to the email address in question. It will most likely be ignored
by the person who receives it if the account is active. If the
account is not active you will receive a "Delivery Failure Notice" of
some sort. Of course, just because you don't receive a "Delivery
Failure Notice" does not mean that all emails to this address are
reaching anyone. It could be a rarely used/nearly abandoned account
that hasn't exceeded its storage limit, for instance. But, this test
still gives you something to go on, as the failure notice will rule
out an email. Dead email accounts associated with online
personalities you've had recent contact with are signs
of "disposable" hoax personalities.

Use a disposable email to fish for a reply... any reply... Write to
the email in question with a very short question about something that
could believeably be associated with that email address... for
instance.

"Hi, I'm looking for my old college roomate Kevin Baird who used to
have the email address crossracebreeder through another email
service. Is this Kevin? Dude! Whasssuuuuuuuup?! Go Zeta! Your bro,
Sid."

Of course you have to come up with a subject for this email that will
stand out from the junk mail so often labelled "Hi" or with incorrect
names. Something like "Did you go to UCLA?" might work... if not the
first time then maybe after the twelfth time you send the exact same
email every day! Good "get read" subject title suggestions welcome!

Anyway, say after the 7th try crossracebreeder@y... answers back:

"I don't know who the f*ck you are! Quite emailing me please!"

Or perhaps something more friendly, maybe even with a name signed to
it... in any case, the email may come back to you with a personal
name in the Sender line, giving you just a bit more background on the
screen name you started with. Sure, there is a good chance this name
is bogus too, just like the one on your disposable account, but it
might lead to something legit.

At this point you may be bored and ready to give up on this identity.
On the other hand, you may find that you are onto a good mystery. In
any case, after putting together just a little bit of intelligence,
an alternate screen name, email, personal name, collection of posts,
guestbook entries etc., you may be getting a feel for this person...
beginning to weigh the evidence of their sincerity. This is what will
ultimately help you decide between a clever anonymous online ally and
a potentially dangerous anti.

If you're feeling optimistic about this person, it's always okay to
contact them with a sincere email or other electronic message from
the get-go before you start snooping them out. Ask simple not-so-
personal questions like "Who are your favorite writers?" or return
their simple question about webpages or online hangouts along with
your answer.

Snoops 14 is not about paranoia. It IS about caution, vigilance and
tactics. It is obvious that a growing number of folks who share our
vision are speaking out online, where their personal security is not
threatened. Respect these folks anonymity before you come off as a
snoop and "expose" something that was never so sinister but only a
matter of privacy to begin with.

For every bad egg and imposter there is at least one person, more
likely several people, who are sincere and you will be glad to get to
know... and hopefully raise a glass with one day. Go easy and
consider any ability you gain in these pursuits as "strength in
reserve" until you perhaps uncover a real threat.

These tactics and additional steps which will be provided here,
hopefully on a specific request basis, have been used to build trust
and respect more often than to uncover trouble. Whatever the result,
knowledge is power. Appreciate what you learn and don't jump to
conclusions. There is always room for more proof if needed.

***If these tactics only reveal more questions on your first try,
share them here and perhaps we can iron them out for you. As always,
your messages will be handled by moderators according to your needs.
Include "private" in the subject line for anonymous reposts. It could
be that others on the list are waiting with an exact answer. Thanks
for joining!***

White Iceland
Saturday, April 2nd, 2005, 07:23 PM
I found a pretty accurate Internet Provider geographical locator.

In any email there are "headers" which provide information about the
origin of the message. There will likely be two or more lines that
begin "Received from..."

Look to the lowest/bottom "received" line for an ISP or IP Internet
Service Provider number which looks something like 12.34.56.789

Take that information to the website
http://www.ip2location.com/free.asp

and look up the number...

There are several out there but this one seems more accurate than
most...

To test the accuracy you can visit:
http://www.ip2location.com/
where your own ip address and location will be displayed.

Practice with emails from people whose location you know until you
learn how to get the most accurate results.