Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

FOLLOWING DEATH THREAT AGAINST CHRISTIAN WRITER, TERROR SITE MOVES TO CHICAGO
JoyJunction ^ | Feb. 13, 2005 | Jeremy Reynalds

Posted on 02/13/2005 5:01:39 PM PST by JohnathanRGalt

FOLLOWING DEATH THREAT AGAINST CHRISTIAN WRITER, TERROR SITE GETS RUN OUT OF HOUSTON AND MOVES TO CHICAGO

Death Threat Remains on Line

by Jeremy Reynalds
Executive Director

Following extensive media coverage regarding the death threat (http://haganah.org.il/harchives/003608.html) against me posted on a radical Islamic bulletin board service (which remains on line), www.ansarnet.ws has now changed its Internet Service Provider.

After being suspended, it has moved from the Houston-based Everyone's Internet (www.ev1.net) to the Chicago-based www.hostforweb.com


Notice of Suspension of www.ansar.ws by its former Internet Service Provider www.ev1.net

An e-mail to the company asking why they were hosting a well-known terror friendly site was answered by a "Max J" who identified himself as a company vice-president. He wrote, "the website will be removed once we get a request from FBI or Court."


The New Home for www.ansar.ws

However, Host for Web appears to be violating its own terms of service which read in part (www.hostforweb.com/terms.html) "All services provided by HostForWeb, Inc. may be used for lawful purposes only. Transmission, storage, or presentation of any information, data or material in violation of any United States Federal, State or City law is prohibited."

Background information about Al Ansar is available at http://internet-haganah.co.il/harchives/003631.html

HOST FOR WEB

The apparent owners of Host for Web also seem to own a number of other Internet names, all of which are redirected to www.hostforweb.com. Those names are www.forthemusic.net,www.hfw.us, www.hostforweb.com, www.hostforweb.net and www.katanaclub.com

For the Music and Katana Club are registered to Alex Korneyev, with a Chicago street address.

On Feb. 23 2004 Host for Web.com was registered to Alex Korneyev but this time providing a P. O. Box in Chicago. On Feb. 24 Korneyev switched to using an Internet privacy protection service (an increasingly common practice) with a Bellevue WA address.

On Feb. 23 2004 Host for Web.net was registered to a Boris Kofman and G.E.O.S. Corporation of Arlington Heights Ill. Kofman changed to an Internet privacy protection service sometime between Feb. 23 and March 5 2004.

HFW is also registered to a Boris Kofman and G.E.O.S. Corporation. A number listed for Kofman was not working.

There is additional information available on line about Korneyev and his company at http://www.hostsearch.com/interview...m_interview.asp and
http://findmyhost.com/interviews/hostforweb.asp


Alex Korneyev of Host for Web
through www.hostsearch.com


Korneyev's company apparently rents computer space from www.servercentral.net A call to that company was answered with a request to submit a complaint in writing to both the support and abuse departments.

An e- mail to Server Central was answered with an automated response which read in part,"Your ticket has been submitted to our support department. One of the staff members will review it and reply accordingly."

A personal reply was not immediately received, but a status report at Server Central (http://support.servercentral.net/in...ew&_i=JVS-87540) appeared to indicate the company had closed the issue. It was unclear whether that meant the company is still planning to investigate www.ansaw.ws and possibly voluntarily remove it or if it will be allowed to stay on line pending a request from law enforcement to remove it.

However, Server Central's terms of service appear to preclude the company from hosting www.ansar.ws. Those terms read in part (www.servercentral.net/legal/terms.php), "Services provided to the Customer by the Provider may only be used for lawful purposes. Transmission or publication of any information, data or material in violation of any U.S. Federal or state regulation or law is prohibited."

Jeremy Reynalds
P O Box 27693
Alb., NM 87125-7693
Tel: (505) 400-7145
www.joyjunction.org





TOPICS: Business/Economy; Constitution/Conservatism; Crime/Corruption; Culture/Society; Extended News; News/Current Events; US: Illinois; US: New Mexico; War on Terror
KEYWORDS: deaththreat; ev1; ev1net; everyonesinternet; gopusa; internet; islam; isp; jeremyreynalds; jihadinamerica; muslim; religionofpeace
Navigation: use the links below to view more comments.
first previous 1-2021-26 last
To: JohnathanRGalt

"Strangely enough, only Islamist terrorists seem immune to tracing on the internet."

Or the FBI, Secret Service, NSA etc. don't publish their tracking methods?


21 posted on 02/14/2005 3:38:06 AM PST by Smartaleck (Tom Delay TX: (Dems have no plan, no agenda, no solutions.))
[ Post Reply | Private Reply | To 18 | View Replies]

To: jocon307
Hubby has pointed out to me that the IP address of posters may be detectable.

Sure, your IP is detectable on a session-by-session basis, and the Web sites you visit collect them as a matter of course. Not for malevolent purposes, but to track statistical use of the site.

But unless your ISP expressly gave you a static (fixed) IP address, your IP address changes whenever you dialup to your ISP or wait for a new IP to be generated on DSL/cable (the "lease" time) or you forcibly get a new IP address from your DSL/cable provider (which you can easily do by simply resetting your DSL/cable modem).

In fact it's non-trivial to link a specific human being with a specific IP address.

22 posted on 02/14/2005 5:45:54 AM PST by angkor
[ Post Reply | Private Reply | To 9 | View Replies]

To: JohnathanRGalt
Strangely enough, only Islamist terrorists seem immune to tracing on the internet.

You could read behind the lines to infer that the Dan Pearl murderers were caught by (quite stupidly) sending threatening Hotmails to the WSJ and other media. Stupid because Hotmail embeds the source IP address in the email header, which in the case of Pearl was traced back to an Internet cafe in Karachi, which was then surveilled until the idiots came back. Simple.

IIRC KSM made a similar error in computer use, and presumably other Islamists have been busted in the same basic manner.

The difference between Islamist sites and, say, child porn sites is that the latter can be ID'd by law enforcement and then used as a "honeypot" to nab other visitors.

To do so, LEOs would simply enlist the ISP to capture source IPs and pages visited (presumably with a warrant, and an absolute no-brainer with Web server software), and then go to the source ISPs and similarly subpoena their DHCP logs to see which user(s) were on those IPs at a specific time and place. Busted.

Islamist sites are known to be very transient - they're hosted by one ISP today and another next week, or on non-US sites, or whatever - so it can be logistically difficult to get things in order to accomplish a sting.

Example, after ID'ing an Islamist site hosted in UAE, you'd need the cooperation of UAE law enforcement, then UAE LEOs would need to gain cooperation of that UAE ISP (probably not difficult at that stage), then get Web logs back to US LEO's, who would then have to subpoena source IPs from all the ISP's involved. That would work with US users, but forget about it if they're from all around the world. Again, sheer logistics.

In the case of state-run ISPs and hosting services which have already agreed to cooperate with US law enforcement, the turnaround would be faster, there might already be procedures in place to set up these kinds of stings.

Sophisticated Islamists who use proxy software at their source PC would be able to mask their source IP address which makes much of this undoable, though again due to logistics, not because it's a technical impossibility.

23 posted on 02/14/2005 6:13:29 AM PST by angkor
[ Post Reply | Private Reply | To 18 | View Replies]

To: Smartaleck

Tracing IP's isn't rocket science to the tens of thousands of network engineers around the world, and it's by no means a secret. Tools and docs are posted all over the Internet, and have been for many years.

Law enforcement agencies (which employ network engineers and computer security folks for precisely these purposes) have the benefit of legal access to ISP logs via warrant or subpoena. Those are key to busting Islamist scum in the act.

Speedy logistics and international reach are the other key factors. One would need to act fast, and often to gain access to foreign ISP logs (one would thus need the cooperation of foreign governments and foreign law enforcement).


24 posted on 02/14/2005 6:22:39 AM PST by angkor
[ Post Reply | Private Reply | To 21 | View Replies]

To: Smartaleck

Watch a (good) homicide detective at work. You'd think he was more interested in the modus operandi of the perpetrator than in the fact that a murder had been committed.


25 posted on 02/14/2005 6:25:50 AM PST by Larry Lucido
[ Post Reply | Private Reply | To 4 | View Replies]

To: Larry Lucido

"You'd think he was more interested in the modus operandi of the perpetrator than in the fact that a murder had been committed."

...and probably get a littel more than peeved if somebody tipped off the the perp to the survallance activity?


26 posted on 02/14/2005 9:05:54 AM PST by Smartaleck (Tom Delay TX: (Dems have no plan, no agenda, no solutions.))
[ Post Reply | Private Reply | To 25 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-26 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson