Ç’kemi Friends. . .

Part of the job of a Navy linguist is gisting. This process involves looking at a paragraph and capturing the meaning. I received the below email from an SEO group.


Do të doja t’ju prezantohesha: emri im është Bora Dervishi,

Meqenëse kam një sërë faqesh cilësore Lojërash dhe Kumari do të doja t’ju sugjeroja
një ofertë shkëmbimi linqesh falas me themellowjihadi.com ose çfarëdo faqeje tjetër që zotëroni.
Me siguri do t’ju pëlqente të mësoni se kam shumë ide për shkëmbime linqesh,
që jam i sigurt se do të jenë përparësia jonë dhe do të na vijnë në ndihmë për klasifikimin tonë në Google.

Ju lutem më thoni nëse do të dini më shumë detaje, ose nëse keni sugjerime të mëtejshme për këtë çështje.

Në pritje për të dëgjuar përgjigjen tuaj,

Bora Dervishi

I can’t really gist it effectively, due to the fact that I don’t speak the language. But I can dig into the meaning and identify the language. It appears to be some sort of Eastern European dialect. It looks like a cross between Russian and Turkish. And this Bora person is seeking customers for Search Engine Optimization or SEO.

Heading over to Google; the language is Albanian. Interesting, close guess. The translation:

What’s up,

I would like to introduce myself: My name is Snow Dervish,

Since I have a number of quality pages and Gambling Games would like to suggest
a tactic offer free exchange or any other page themellowjihadi.com possession.
Surely you would like to learn that I have more ideas for exchanges tactic,
I’m sure it will be our priority and will help us come to our classification into Google.

Please tell me if you know more details or if you have further suggestions on this issue.

Waiting to hear your answer,

snow Dervish

Good luck, Snow. But I’ll pass. . .

9 thoughts on “Ç’kemi Friends. . .”

  1. You certainly do have some very strange communications, Navy One…I’m impressed and most of us don’t get to see what you have to deal with….this was an interesting footnote…k

  2. And I am a Nigerian prince, due a large fortune.
    I wish to communicate with you for a large transaction that could make you very wealthy.
    And so it goes…

  3. The area you speak of is noted for sophisticated ‘trojan horse’ frauds. So sophisticated that the time and effort placed into them passes all credible background checks by the top security software systems.

    Under such circumstances a credible blog is approached to host and advertise what appears to be a genuine company. (Registered in a third world state as most of the big company’s do register in such a way to avoid tax).

    Once the company achieves its aim and appeases the blog’s owner, they advertise their site via a live link on the blog. They even supply monthly revenue to the blog owner, which is simply part of the host ‘leeching’ fraud.

    After several months of collecting data from countless friendly blog sites (secured through pointless interest or ‘nosey hits’ on the live link). The fraudulent company then selects a period when a bank holiday falls on a long weekend; May bank holidays as well as the Christmas period are favourites, as this allows them to use the rip off data to commit fraud on a fantastic scale, which happens in one huge burst of data transfer.

    Generally 40% will be discovered immediately by the banks security software, which means locking down the owners account and cards over the holiday period (great)! Once the Banks sophisticated server systems realise that they are not dealing with individual attempts at fraud, International servers alert each other to what is coming (like a speed train with no brakes downhill)…

    This is the intended diversion created by the fraudster company as it initiates a blocking system within the International banking world; some thing the banks do not want as it creates a huge backlog that sends the International banking servers into meltdown and eventual closure (all within one hour)!

    (Flights cannot be booked, money transfers are blocked, fuel cannot be paid for, food cannot be purchased, cash machines lockdown, gambling on a huge scale is effected, beer cannot be bought, and so it goes on for over three or four days).

    To avoid this the banks simply allow the fraud to happen as it is far cheaper and easier to pick up the pieces after the event. The banks collectively may lose a couple of hundred million worldwide. This is far better than losing their credibility as well as the potential loss of hundreds of Billions, which would also send their stocks and shares into a tail spin. Which in turn effects trading, which effects pension funds, housing, etc, etc and then a countries economy.

    The collective loss is split evenly and absorbed by each bank, eventually the loss is recovered by placing an additional 1% on hidden charges within customers accounts) Simple 😉

    Believe me this happens, often! The banks will openly blame a problem with their servers that affected account closures for a couple of hours, with cash machines offline for an hour! They will never admit to the flaws within their own security as they could, and would, lose customers over night.

    All of the bulls**t over the years pushed out by the banks with their creation of plastic cards and online banking “to make crime more difficult and banking easier”. was quite the opposite.
    It actually allows the bank easier access to your funds, (which are now stored with them and not under your bed), which they trade within the markets at an incredible % return rate, which you receive ‘zilch’; allowing the banks named shareholders the lions share.

    Guess what the sweetener was to ensure we all adopted the idea of plastic for cash? ATM’s and swipe card machines; which they then charge you for using! A clever gimmick, which we accepted and now cannot live without.

    Incidentally the bulk of such sophisticated frauds initiate from Russia. China is catching up within the banking world, using a totally different type of fraud that catches out European and US banks at a very senior level linked to Bank Guarantees, Bankers Drafts, credit lines and high value assets.

    Nigeria led the field prior to the concept of Internet Banking, by placing ‘sleepers’ within international banks. They started at the bottom as clerks and slowly worked their way to the middle level. Then one friday towards close of play a large sum would be issued to several ‘bounce accounts’, just as the ‘sleeper’ boarded a flight back to Lagos never to return. (This was a slow process that required years of patience to fulfill).

    Cash is King… What’s in your wallet/purse?

    Yours Aye.

  4. Interesting thought, Ex Bootneck….I never realized how complex all of this is and what a scam much of it remains even from the banking side…….I have a security protection from such infiltration with a national company that keeps identity theft at a minimum….it’s worth the fees to have this type of protection….k

    1. Kristen, I have the same; however, what you never hear of is how they have also lost out in the past when their own systems were hacked and infiltrated for several months.

      They only realised they had been ‘leeched’ when certain information was released back to a certain well known corporation of which they had responsibility for (as large as a small country)!

      Take for instance one of the worlds most trusted security agencies, who allowed a trusted allied country to interact with sensitive data. Only for a low paid ‘unauthorised’ low security level worker to copy the same data and offer it for sale to an Arab nation, without any ones knowledge. It was only when it was offered on again at a higher price to the original agency; did they realise the leak had taken place.

      In addition to this; the following link, which has some interesting tales found through additional live links concerning certain Israeli’s.



      1. Would that also include an American company?? Many hackers have tried to get into Lifelock, here in the US, but as far as I know none have succeeded…I don’t know if they have associated companies overseas but this one is exceptional in so many ways….

        1. Kristen;

          Little dit… A close friend of mine attended an International ‘high-level’ presentation, aimed at the certain ‘Security & Compliance’ divisions.
          The ‘Asian’ Group presenting the lecture gave an outstanding brief and lecture that lasted a full morning, with complimentary food breaks.

          Upon conclusion and after the mandatory Q & A session, the ‘Group’ handed out a very elegant, very expensive, slim line digital photo frame, with a slim 15GB memory stick. Every one present were suitably impressed with the mornings venture as well as the freebie.

          That evening my good friend took his digital photo frame to pieces and analysed the interior (part of his analytic training)

          Lo and behold; contained within was a system other than what it was intended for. Later scrutiny of the 15GB stick by an expert, revealed that the combined device was capable of drawing data from PC’s without the users knowledge, which was then scrambled from the digital frame once the stick was entered into it; the user thinking they were just down loading family pics. The data was then tx’d to a friendly satellite service, which pinged the tx back to an ‘unknown source’ (Asian).

          Obviously my good friend managed to get in touch with each person at the seminar and explained the same. Misinformation was then placed into the ‘trojan’ system, which later came back through several Asian company’s.

          Not very well explained, but the gist of it is there.

          Much more sophisticated theft goes on, which is guarded by the big boys within the security data world.


          1. I understood the ‘gist’ of your comment and it remains quite disappointing that human nature can be an avaricious and ugly thing…spying on people and stealing their information is something we should all be on guard against…it is terrible….but not entirely unexpected….not everyone is fine, upstanding, straightforward and honest; we might like them to be but it’s not always the case….k

Comments are closed.