No, I Think I Won’t Do That


If this person isn’t just an ordinary con-ster, then I hope they get medical attention or other assistance as necessary.

Hello,
CIA of the U.S. Government uses satellite/ remote electromagnetic brain control weapon to furtively read my email to the International Criminal Court. And CIA sent dangerous signals to investigations of the ICC officials by remotely manipulating the brain of Angelica d’Archangelis for CC sending the bellow email to the ICC officials. Please kindly read the following images of the email with red border rectangle of dangerous signals:

If it’s a con, the images are probably carefully crafted JPEGs that exploit various browser and email client decoder bugs; viewing them would open my account to a remote attacker (assuming I had Java or Flash installed on my machine, or read my email with Outlook)

I just want to know what the International Cricket Council’s angle is, in all this. Is there really cause for concern?

Comments

  1. militantagnostic says

    I just want to know what the International Cricket Council’s angle is, in all this. Is there really cause for concern?

    Ask Mano Singham -he would know.

  2. rq says

    I just want to know what the International Cricket Council’s angle is, in all this. Is there really cause for concern?

    Well, obviously. As I know you already know, crickets are pretty darned dangerous these days. It’s not so much your IP address as your resonant frequency they’re after.

  3. voyager says

    The Chinese have been keeping crickets for millennia. Perhaps they’ve trained and/or altered them to be stealth weapons, probably with embedded listening devices. Then, just before deployment, they inject the crickets with some toxin that will kill them in a specified number of days and Bob’s your uncle. The dead crickets desiccate and are swept up or never seen again. The International Cricket Council is investigating.

  4. says

    Dr Sarah@#4:
    Can .jpegs do that? Wow – good to know.

    It’s pretty nasty, actually. Inside JPEGs are fields for things like Copyright, photograper’s name, etc. If someone codes a bug into the decoder/parser routine that ingests that stuff, it may be possible to exploit the bug and cause the decoder to read arbitrary data from the image into its memory. That data can contain machine instructions to jump to another function, or whatever. It’s a technique called ‘stack smashing’ and it’s a huge problem with damn near everything.

    Welcome to my world.

    What the computer-using public remains firmly in denial about is that any data which is downloaded from the internet can contain hostile attack code. The trick is whether the machine downloading it can be tricked into executing that code. When you start looking at things like Java and Flash, which are full-up programming languages, the whole idea of “downloading programs from the internet, but only the safe ones” is pretty laughable.

    There are many many examples like this:
    https://www.cvedetails.com/cve/CVE-2005-2308/

    The JPEG decoder in Microsoft Internet Explorer allows remote attackers to cause a denial of service (CPU consumption or crash) and possibly execute arbitrary code via certain crafted JPEG images, as demonstrated using (1) mov_fencepost.jpg, (2) cmp_fencepost.jpg, (3) oom_dos.jpg, or (4) random.jpg.

Leave a Reply