Feeds

Bin Laden hackers denounce founder

In their own words

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

Leet German script k1dd13 and would-be investment guru Kim Schmitz aka Kimble, who recently promoted his YIHAT (Young Intelligent Hackers Against Terrorism) Ninja force with loose claims to have hacked a Sudanese bank with /bin/laden accounts, has been denounced by two people claiming to be members of his organization.

We denounced him too a while back. Now two reputed compatriots have rounded on him as well, drawing heavily on an article published by The Standard in January 2001.

In their own words:



YIHAT, the group who was to take the money away from terrorists, caused a big controversy in our world today. Kimble was their mysterious leader. Directly from the inside of the group, I, Splices along with Demannu, tell you the truth of Kimble.

Kim Schmitz is an owner of Kimvestor which is not even registered company yet. For this reason and involvement with Netherlands online dealer Letsbuyit.com, the federation of the capital investors and German state attorney are preparing charges against Kim Schmitz for investment fraud. He's not reach as he appears to be. He sold 80% of his company Data Protect which is Security Company and had until recently about 15 employees.

Most of his money he spend on expensive penthouse in Munich, cars, yacht and expensive trips to Monte Carlo, Caribbean sea and women. His other two companies, Monkeybank and Megacar are only paper tigers, loosing money. Secondly, his is not a hacker. He is banned from the German hacker scene, because he betrayed the hackers who worked with him on credit and calling card fraud. (The reason why he got only six months) Do you know his ten rules? One says: Don't talk too much, obviously not good enough for your Kimble; he's known as biggest mouth of Germany. Why do you think there's almost nothing about business on his website but over 300 pictures of him, not to mention silly flash movies.

Hacker? Yes of course. Bellow you can read what Boris Gröndahl (journalist working for Standard) found out: Kim Schmitz, doesn't make a secret of his past alias of "Kimble", the convicted computer hacker. On the contrary, he makes this one of his selling points. This may appear honest at first glance, but if you compare what stunts he lays claim to, and what his court verdict in 1998 found him guilty of, his past looks a bit less glamorous. However, Schmitz's claims follow a pattern. He takes bits of what he has been found guilty of, bits of other hackers' publicized doings, even tales of hacker movies, and mixes them together to form his "personae".

MYTH: Many papers reported that Schmitz lowered the credit rating of former German chancellor Helmut Kohl to zero.

TRUTH: Credit ratings on individuals in Germany are different from the US. There is no rating of a kind that you could "lower to zero". And the court verdict against Schmitz has nothing to say about this.

THE LINK: According to Schmitz's verdict, he had broken into the computers of the Deutscher Beamtenbund, a public officials' union, and among other documents, copied the union's correspondence with the chancellor. The Masters of Deception, a New York hacker group, lowered the credit rating of cyber-celebrity John Perry Barlow to zero during an online discussion in the early 1990s.

MYTH: Schmitz told the Sunday Telegraph he "got into Citibank's system and transferred $20 million by taking tiny amounts from the accounts of 4 million customers and giving it to Greenpeace".

TRUTH: Nothing like this is in the court records. In fact, there's no link to Citibank or Greenpeace at all. A Greenpeace spokeswoman told The Standard Europe the claim was "just not true", adding that $20 million would have been half the organization's annual budget in the mid-1990s.

THE LINK: In a widely publicized case in 1996, Citibank did indeed fall victim to a group of Russian hackers who caused $10 million in damages. The money didn't go to Greenpeace, though. However, the final scene in the hacker movie "Sneakers" (featuring Robert Redford, Dan Aykroyd and Sidney Poitier) is a TV news speaker announcing that the Republican Party had to declare insolvency while Greenpeace announces an enormous anonymous donation.

MYTH: Schmitz also told the Sunday Telegraph that "he developed the Blue Box, software that would override the phone charging system".

TRUTH: According to the court papers, Schmitz didn't use clever software to "override the phone charging system", but simply stolen calling card numbers he had bought from US hackers.

THE LINK: Blue Box is the name for a hardware device which cheated the phone charging system by simulating its signals. They were widely used in the US, years before Schmitz was born in 1974.

MYTH: In the prospectus of his company Kimvestor, Schmitz claims to have broken into NASA and the Pentagon.

TRUTH: Nothing like this in on the records. The spokesman of the German hacker organization Chaos Computer Club dismisses his claims as "made up".

THE LINK: The hacking into a wide array of computers including those of the NASA made the Chaos Computer Club world-known in 1988. Some of the hackers who had done this were hired by the Soviet intelligence service KGB and broke into computers of military research labs in the US, but not into the Pentagon.

MYTH: Schmitz told the Sunday Telegraph "when he came out of prison he was inundated with offers from companies... Within a week he was working for Lufthansa".

TRUTH: According to his verdict, Schmitz was breaking into systems and used what he found to offer those firms his advice in security matters through an accomplice's consultancy. The accomplice was a former Lufthansa employee and Lufthansa was among their victims. However, the court states that it wasn't Schmitz who broke into Lufthansa's network but another accomplice.

P.S., US Patent and Trademark Office does not have any records on Monkey nor Magacar technology as Kim Schmitz is claiming on his website nor any other patent registered under his name nor names of Kimvestor, Data Protect, Megacar or Monkey AG."

Kimble was a fraud and is a fraud. In fact, call him at +49-172.444.4444, and tell him how you feel. I and Demannu were very devoted to his cause and he lead us into nothing, and in light of everything the very spirited ones who were the brains behind everything have compiled something new to take YIHAT's place. Don't get us wrong -- we are totally different.

Meet ECHO. This is who we are: We are a research group made up of Security Parishioners, Programmers, Mathematicians, and Security Researchists that cover areas from software flaws to encryption and even ranging from viruses and Trojans - we haven't a limit. We will eventually form a security firm, and sell our own line of software that will be aimed toward security. I can't place a limit on our expansiveness - our entrepreneurial eye has released something BIG. Our goals lie to secure the internet in an entire new way not seen before. I am not at liberty at this time to release our ideas, but we will revolutionize the way security is handled among the internet - and prove it.

We are open to all criticism and expect it, but all criticism will be accepted as constructive criticism. We don't wear batman capes and we don't chase terrorists and have suckers in our mouth. We research security and will bring a new light to the Internet.

Related Story

Bin Laden hack-meister in defacement, financial debacles

Next gen security for virtualised datacentres

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.