Translate

12/18/2013

Anonymous: In the wake of Edward Snowden - The Strange Case of Barrett Lancaster Brown that noone speaks about...

Dallas freelancer, Barrett Brown, 32, spent already over a year in Federal Prison and awaits trial on
17 charges filed in three indictments including accusations of making threats to a federal agent and posting a hyperlink to "stolen information". His case has gotten widespread attention among groups who believe he’s being unfairly prosecuted. It is said, that on December 25th, 2011, Barrett (who received help by third parties) as the FBI files it:
"knowingly trafficked in more than five authentication features, knowing that such features were stolen and produced without lawful authority. Barrett Brown has transferred a hyperlink from an IRC channel to an IRC channel under his own supervision."

This hyperlink has provided access to data stolen from the Global Intelligence Company, Strategic Forecasting Inc. (better known as Stratfor), which included more than 5 thousand credit card account numbers, the card holders’ identification information and the authentication features for the credit cards, known as the
Card Verification Values (Card Security Code).

By posting that hyperlink, Barrett caused the data to be made available to others online, without the knowledge and/or approval of Stratfor and/or the card proprietors.

Another accusation Brown faces, is that he
(from December 2011 until March 2012) possessed at least 15 unauthorized access devices, in that he possessed stolen (Stolen ?...editor's note) credit card account numbers and CVVs without the knowledge of the card holders as well.

The Dallas native Barrett, who has written for Vanity Fair, The Huffington Post and The Guardian, said in 2011 that 75 names of members of the Zetas drug cartel "Los Zetas", would be released, if a member of the Anonymous group who had been kidnapped was not set free.


On March 6th 2012, after receiving information from Hector Xavier Monsegur (also known by the online pseudonym Sabu), the founder of LulzSec, Barretts living place was ransacked by Federal Agents. His arrest took place on September 12th 2012 after allegedly threatening a Federal Bureau of Investigation agent. Brown, who received a Gag-order is in Federal Custody since then.

As there is still no sentencing date for Brown yet, it has value to think that Brown will be sentenced after the upcoming fate of Edward Snowden, whos Asylum in Russia will end in almost half a year, as Snowden surely is Defcon 5, or Priority Number 1 or simply Enemy of the state #1.



Barrett Brown faces up to 105 years of Prison, according to Democracy Now (See the Video). Browns Mother, Karen McCutchin, although was sentenced early November 2013 to six months on probation for hiding her son’s laptops from federal agents executing a search warrant.

Lets wait and see...how this will turn out.


Trojan-Downloader.JS.Agent.fdg - Infected Domain: anatoly.voiz.ru - Russian Federation

       THE DOMAIN anatoly.voiz.ru HAS BEEN RECENTLY DETECTED WITH MALWARE


URL:
anatoly.voiz.ru

  • https://www.virustotal.com/de/url/4d8a635f97aa257213cab84628e8313340eeab2e2d344fee54cd39b9474780ed/analysis/1387358073/

INFECTED WITH:



FIRST DETECTED MARCH 17th 2010

  • https://www.virustotal.com/de/file/b2c3aa974a0ab23ee3f3d3aafc67c6280ca888124e2fd945e14141449d69e886/analysis/1387358326/

---> PATTERN
zragore.info/index2.php

  • https://www.virustotal.com/de/url/eb15297aa6098cc87c651df547b31318e392935c8824a4cbf35d14447d92c0b7/analysis/1387358596/

---->
www.august13.com/index2.php


-----> CVE-2008-2992CVE-2009-0927
qsfgyee.com:3129/js

  • https://www.virustotal.com/de/url/02315217e9b30f9902ee226be14bb5abb02cd2205fc01ea88eb121bbc7492725/analysis/1387358739/
  • http://wepawet.iseclab.org/view.php?hash=1bb25dc6e3144b854ad246c18416e500&t=1387358627&type=js
  • http://wepawet.iseclab.org/view.php?type=js&hash=4d751f2b8633ba754a7994b46290a825&t=1271400874


IP:

anatoly.voiz.ru ---> 90.156.201.112
  • https://www.virustotal.com/de/url/6c535613db365e049f05060b4c234c229f3388a21838bba58e591ee317623bb1/analysis/1387369061/
  • https://www.virustotal.com/de/ip-address/90.156.201.112/information/
Bad Host Appearances: 149

12/17/2013

Video - Conter Question: Did the CHILDREN like it (what they saw ? ? )

There is One Question in this YT-Video remaining: Did the Children like that what have seen (been through ???). Hear that what is said, after 8:00 (but i think he is not gonna like it...with the Camera & so....Who is concerned about the CHILDREN ????? )


Hackers Gift or a Gift for Hackers: A Question to IT company's, why are they making hackers lives easy ?

IT companies are failing to secure devices connected to the internet, leaving them open to hackers and Malware. This shocking report reveals how anything from your pins to your passport could be accessed online right now !


"Is this your pin? Is this a letter you received from your bank? Do you have a HP e-Print scanner?"

The young man answers yes to every question, stunned that all of his information was accessible on the internet for anyone who wanted to see it.

And he's not alone: the wealth of information available is staggering. From shop owners whose security cameras can be watched and controlled remotely, to medical records and confidential documents for international companies like Unilever, Orange and KLM, it's a bonanza for any would-be hackers.



While it would be simple for the IT firms who provide printers, scanners and software to make the system more secure, they don't see it as their problem and argue that attending to basic safety protocols is a bit of a marketing nightmare. "There are people who know all about how this works, security-wise, but it's too much trouble to explain all that."

One company went so far as to call consumers who didn't know they had to change their passwords "idiots". As the rate of technological change continues at a frightening pace, do technology companies have a duty to prevent our privacy being eroded ? Find out yourself in the next 30 Minutes.

PHISHING, SCAM, SPAM URL: Plus Dur & Plus Longtemps - newdombos.com - www.500-lovemakingtips.com (FRENCH) - (SLOVENIA IP)

POTENTIALLY MALICIOUS SPAM, SCAM, PHISHING SITE:


DOMAIN:
newdombos.com
  • https://www.virustotal.com/de/url/49508c7c174b37243f4e785dc705c9f496b69f7ccacfc43ae97fa3c14dfe5976/analysis/1387284326/
SPECIFIC URL:
 newdombos.com/link.php?M=254724595&N=11535&L=31183&F=H
  • https://www.virustotal.com/de/url/58009a76f8cae444b4c02962f1309301f24e8a514063564bab11bdea13023466/analysis/1387284311/
DOMAIN IS LISTED AT SURBL !

SEE ALSO:
---> REDIRECTS TO:
www.500-lovemakingtips.com/fr/index.html
  • http://www.virustotal.com/url/48d243588da9ef61023bc4a873da31e005e2300019e5f00db6189b585110e750/analysis/
SEE ALSO:
IPs to DOMAINS:
newdombos.com: 64.88.136.47
  • https://www.virustotal.com/de/url/c159d2feb9f3d1a54dbc8fc5ac540049c71b68fee8ad7ea23c5f9b2c49b64c47/analysis/1387287666/
Email Reputation: Poor
  • http://www.senderbase.org/lookup/?search_string=64.88.136.47
www.500-lovemakingtips.com: 77.234.148.181
  • https://www.virustotal.com/de/url/26db982168fe7851caee64771d58b28047b0b83dffe580bafc2a69e7e0e3c799/analysis/1387288101/

 SCREENSHOT:




Header Analysis Quick Report
Originating IP: 13.11.20.11
Originating ISP: Xerox Corporation
City: Norwalk
Country of Origin: United States
* For a complete report on this email header goto ipTRACKERonline

Malicious Site: kylie4you.nl - Trojan-Downloader.JS.Iframe.cqj

THIS DOMAIN HAS BEEN RECENTLY DETECTED WITH MALWARE:
MALWARE: 
Trojan-Downloader.JS.Iframe.cqj
DOMAIN: kylie4you.nl
https://www.virustotal.com/de/url/61cbdb97281ae79fcdbc6d60ff26996d2cb2e3ae53c088ac1e2c7c7c3c6e7616/analysis/1386611187/
Trojan-Downloader.JS.Iframe.cqj
https://www.virustotal.com/de/file/ca2cdb77d11adf0b522fb9f10c8bc9539a470ecfac1cc4c81ac910e938df0b82/analysis/1386611531/
REFERENCE: http://wepawet.iseclab.org/view.php?hash=f607133470a23168c55f63e2e78fdc0a&t=1386611238&type=js
PATTERN --->
m1.webstats4u.com/m.js
https://www.virustotal.com/de/url/adea2de858bddc0ed598d34c9dc53640ea87dcba08775d838f6fc7e78a4fbf45/analysis/1386612090/
Trojan/JS.Pegel.b
https://www.virustotal.com/de/file/f03e7015d54405db0fa305d4b7d4776b4268e04215bc75019fc6ef17d2726fdb/analysis/1376557240/
--->
m1.webstats.motigo.com/md.js?country=us&id=AD8jJQjwbW4Y6Zfd29VfYmb/rLzA&_t=1386611279214
https://www.virustotal.com/de/url/b3bf51370082f7fcfe5e79b8e90622dddd61b78f234d415814e5017fb26a87a1/analysis/1386612293/
IP: 62.146.88.122
https://www.virustotal.com/de/url/fe86cb52cef409cdfafb87a84514ac8584b039dbbcd9d03006896f2e0b48f979/analysis/1386615606/
https://www.virustotal.com/de/ip-address/62.146.88.122/information/
--->
m1.webstats.motigo.com:80/md.js?id=4137765&r=1&country=us&_t=1386611279&cat=&is=webstats
https://www.virustotal.com/de/url/1d726372306bc5859d9bea86eca7b14b34526943b5c30430d717ce86c8cbfe9a/analysis/1386612454/
https://www.virustotal.com/de/file/ebe41801037df7a354b168593f4545e58fd4a15dc7c2252cf5c0e7f5a799c048/analysis/1381393922/
--->
eas.apm.emediate.eu/eas?cu=9412;ord=0.20129381805877755;cre=mu;js=y;EASInclude2=webstats;EASInclude3=1
https://www.virustotal.com/de/url/91c1fb8b989d07e828fe28978c8bcdd2f0c1601db6169ce16aa5ecc576338e55/analysis/1386612578/
https://www.virustotal.com/de/file/911b1b11624ff135c7d267c511db3bdee31c37d5adaf688a57c2c531f11d3b2d/analysis/1386612582/
IP: 62.146.124.44
https://www.virustotal.com/de/url/f8b5ef7cff074bc51f307a34bd1114d1197ac8c222dfaa87b87ac92c5292a54b/analysis/1386615702/
https://www.virustotal.com/de/ip-address/62.146.124.44/information/
--->
eas.apm.emediate.eu/EAS_tag.1.0.js
https://www.virustotal.com/de/url/55670d7a3bc6fd1e4fd8af0a99997e34d0fb950e8ba5cb9b79c2cbf3f524fd9f/analysis/1386614648/
https://www.virustotal.com/de/file/342841de4ead7c0284df1c9800b4714ffc18758c85b08555550987bcdf115964/analysis/1386614649/
--->
eas.apm.emediate.eu/eas?ord=1386611280;cu=3708;kw1=webstats;kw2=1;cre=mu;js=y
https://www.virustotal.com/de/url/2bd56bc018d93db21888a7b790484dceca8e3dd060abc4c89c8a72b356e3b544/analysis/1386614880/
https://www.virustotal.com/de/file/0a78875f7ffedec5f99f53c1d782097b33eb144db0e3aaf64a7f7d45af1b55fe/analysis/1386614883/
--->
www.012global.com/lp/Hispanic/International_Calls_Latin_America?lang=en&aff=A5_mt_general_unl12_freemonth&utm_source=50&utm_medium=4&utm_campaign=27&pubid=4509&ce_cid=20pDGl1GwxHVVcL.2lPce.1vQ4W6000
https://www.virustotal.com/de/url/f60ef276217b8924b32ea62f1056470e5e69b9a6056f4513c2e565036acc31e4/analysis/1386615383/
https://www.virustotal.com/de/file/35f0a44bfb0f869d07c1a4507ab1b4352a50630e09a671f1db09d50d512fc903/analysis/1386615313/

12/16/2013

Cybercrime Review 2013: Karen 'Gary' Kazaryan - The Hacker Who Allegedly Blackmailed 350 Women With 3,000 Nude Photos Over Skype And Facebook (SENTENCED TO 5 YEARS)

Karen Kazaryan has been arrested on January 29th 2013, without incident by special agents with the FBI. According to the Bureau, Kazaryan gained unauthorized access to - in other words, hacked into - the victims’ accounts and changed the passwords, which locked victims out of their own online accounts.

Karen Kazaryan does surely not look so "cool" anymore
Once he controlled the accounts, Kazaryan searched e-mails or other files for naked or semi-naked pictures of the victims, as well as other information, such as passwords and the names of their friends.

Using that information, Kazaryan posed online as women, sent instant messages to their friends, and persuaded the friends to remove their clothing so that he could view and take pictures of them.

When the victims discovered that they were not speaking with their friends, Kazaryan often extorted them again, using the photos he had fraudulently obtained to again coerce the victims to remove their clothing on camera.

According to a search warrant executed in 2011 and unsealed today, Kazaryan repeatedly contacted victims to demand that they expose their breasts to him on Skype and used their e-mail and Facebook accounts to make contact with other victims. Kazaryan allegedly posted nude photos of some victims on their Facebook pages when they failed to comply with his demands.

Investigators estimate that Kazaryan victimized more than 350 women, but they have not identified all the victims whose accounts were hacked. Authorities found approximately 3,000 pictures of nude or semi-nude women - some of which were taken from their online accounts, and some of which were taken by Kazaryan on Skype - on Kazaryan’s computer.

Now, on December 9th 2013, Kazaryan has been sentenced to the term in prison after pleading guilty to charges that he hacked email accounts to bait women into giving him even more naked pictures.

Who knows how many times he will have to pick up the piece of Soap in Prisons Shower...?

Deutsche Kentucky Fried Chicken Website (HESSEN) infiziert mit Blackhat SEO SPAM (PHISHING inklusive)

KOMPROMITTIERTE URL: 
Blackhat SEO SPAM (VIAGRA, CIALIS & Co.) - TDS URL PFAD - PHISHING


KFC Logo
URL:


www.kfc-hessen.de/viagra-fur-die-frau-online-kaufen

  • https://www.virustotal.com/de/url/fa0ce0aed0980ed05dc97032971980f4536b6c04fd66227e46b0b7605f962906/analysis/1387219444/



TDS URL PFAD
INDICATOR-COMPROMISE Suspicious .pw dns query



  • https://urlquery.net/report.php?id=8404039


---> TDS PFAD

keycollector.pw/got.php?sid=1

  • https://www.virustotal.com/de/url/e16207dfb15b888a78ad46df3e92878d177c415c2667e9e438c34a6c0cc9bd63/analysis/1387220505/
  • https://urlquery.net/report.php?id=8404170

---> LEITET WEITER AN PHISHING DOMAIN

edapotek.eu

  • https://www.virustotal.com/de/url/796f23f603e37c30c96323a5a17e9240452213df055795e53fc2d94b4965c37c/analysis/1387220706/

MALICIOUS IP used for Rogue Meds & Cigarettes etc.:   5.61.42.211

  • https://www.virustotal.com/de/url/14c84d8d823c8a2dd31c0dad9aaecd39a5bc6b183093196acf12ea1f2fb0c7c3/analysis/1387223113/
ENGLISH POST:

German Kentucky Fried Chicken Website Infected with Blackhat SEO SPAM (Phishing included)

MALICIOUS URL: 
Blackhat SEO SPAM (VIAGRA, CIALIS & Co.) - TDS URL pattern - PHISHING


KFC Logo
URL:


www.kfc-hessen.de/viagra-fur-die-frau-online-kaufen

  • https://www.virustotal.com/de/url/fa0ce0aed0980ed05dc97032971980f4536b6c04fd66227e46b0b7605f962906/analysis/1387219444/


TDS URL pattern
INDICATOR-COMPROMISE Suspicious .pw dns query



  • https://urlquery.net/report.php?id=8404039

---> TDS PATH

keycollector.pw/got.php?sid=1

  • https://www.virustotal.com/de/url/e16207dfb15b888a78ad46df3e92878d177c415c2667e9e438c34a6c0cc9bd63/analysis/1387220505/
  • https://urlquery.net/report.php?id=8404170

---> TO PHISHING DOMAIN

edapotek.eu

  • https://www.virustotal.com/de/url/796f23f603e37c30c96323a5a17e9240452213df055795e53fc2d94b4965c37c/analysis/1387220706/

MALICIOUS IP used for Rogue Meds & Cigarettes etc.:   5.61.42.211

  • https://www.virustotal.com/de/url/14c84d8d823c8a2dd31c0dad9aaecd39a5bc6b183093196acf12ea1f2fb0c7c3/analysis/1387223113/

Deutsches POSTING:
http://stayaway2.blogspot.com/2013/12/deutsche-kentucky-fried-chicken-website.html

NSA Files: Decoded ! What the revelations mean for you.

When Edward Snowden met journalists in his cramped room in Hong Kong's Mira hotel in June, his mission was ambitious. Amid the clutter of laundry, meal trays and his four laptops, he wanted to start a debate about mass surveillance.

He succeeded beyond anything the journalists or Snowden himself ever imagined. His disclosures about the NSA resonated with Americans from day one. But they also exploded round the world.

For some, like Congresswoman Zoe Lofgren, it is a vitally important issue, one of the biggest of our time: nothing less than the defence of democracy in the digital age.

Read all the Rest: Here.

12/15/2013

TPB AFK: The Pirate Bay Away From Keyboard

This documentary is about the most (in)famous p2p filesharing website these days - The Pirate Bay. Fredrik packs a computer into a rusty old Volvo. Along with his Pirate Bay colleagues, he faces a 13 million USD damage claims to Hollywood in a copyright infringement case. Fredrik is on his way to install a new computer in the secret server hall. This is where the world's largest file sharing site is hidden. When the hacker prodigy Gottfrid, the internet activist Peter and the network nerd Fredrik are found guilty, they are confronted with the reality of life offline – away from keyboard. But deep down in the dark data bunkers Servers quietly still continue to duplicate files...86 Minutes


Malicious URL: www.ramada-friedrichroda.de - Rogue Medications
SCAM, SPAM, PHISHING

MALICIOUS URL: 
Blackhat SEO SPAM (VIAGRA, CIALIS & Co.) - TDS URL pattern - PHISHING



URL:

www.ramada-friedrichroda.de/apotheke-niederlande-cialis

  • https://www.virustotal.com/de/url/440d20e3414b328c712cd2b8f239eedcd4384017bb38147ca9892f6d456ce261/analysis/1387125985/

TDS URL pattern
INDICATOR-COMPROMISE Suspicious .pw dns query

  • https://urlquery.net/report.php?id=8396692

---> TDS PATH

keycollector.pw/got.php?sid=1

  • https://www.virustotal.com/de/url/b0059244125b4a42d4ed3fee193cf1c19300c7a4499f5cfe6e1d8b51c833796a/analysis/1387126405/
  • https://urlquery.net/report.php?id=8396782

---> TO PHISHING DOMAIN

edapotek.eu

  • https://www.virustotal.com/de/url/796f23f603e37c30c96323a5a17e9240452213df055795e53fc2d94b4965c37c/analysis/1387126466/

MALICIOUS IP used for Rogue Meds & Cigarettes etc.:   5.152.215.126

  • https://www.virustotal.com/de/url/09f69d67216a170c75e9e24f1ce49a682e2af481d34c54948168b78daf829c85/analysis/1387127170/
  • https://www.virustotal.com/de/ip-address/5.152.215.126/information/

Cybercrime Review 2013: Hacker Student Christopher J. Wright, 23, sentenced to 2 years federal prison in Florida A&M University Hacking Case (FAMU)

In October 2013, Christopher J. Wright, 23, of Fort Lauderdale, Florida, was sentenced to two years in federal prison for aggravated identity theft and access device fraud arising from a scheme to steal financial aid monies from students at the Florida Agricultural and Mechanical University (FAMU).

While students at FAMU in 2010, Wright and his co-defendants, Carliss Pereira, 22, of Tallahassee, and Carl Coutard, 22, of Miami Shores, Florida, discovered a means of accessing the financial aid accounts of other students in FAMU’s iRattler computer system.

The defendants obtained the usernames, passwords, and other personal identifying information of their fellow students by taking paperwork discarded in the trash bins near the FAMU computer help desk, by gathering information from public sources on the internet, and by tricking FAMU employees and the students themselves into providing this information.

The defendants used the information to log on to the financial aid accounts of students who were scheduled to receive financial aid refunds. The defendants then changed the bank account and routing numbers in the victims’ financial aid accounts to divert the victims’ financial aid refunds to pre-paid debit cards held by the defendants. In all but a few cases, FAMU was able to reverse engineer the fraudulent transfers.

iRattler Logo
Pereira and Coutard pled guilty to access device fraud and aggravated identity theft charges in February 2013. Coutard was sentenced to six months of house arrest and six months of community confinement, and was ordered to perform 80 hours of community service, as conditions of a three-year term of supervised release. Pereira was sentenced to a three-year term of supervised release with conditions that he serve four months of home detention and two months of community confinement. Pereira was also ordered to perform 80 hours of community service and to pay 3.983 USD in restitution to FAMU.

Pamela C. Marsh
In announcing the sentence imposed by the court, United States Attorney Pamela C. Marsh said, “Today’s sentence sends a clear message that engaging in this type of criminal conduct will have serious consequences, including the real possibility of a felony conviction and a prison term. The defendants in this case quite literally breached the security of their university, in an effort to victimize their fellow students.”

Ms. Marsh expressed her deep gratitude to the FBI, the FAMU Police Department, the United States Department of Education – Office of Inspector General, the Florida Department of Law Enforcement, and the United States Secret Service, whose excellent investigative work resulted in these prosecutions. Assistant U.S. Attorney Karen Rhew-Miller prosecuted the case.

Statement from FAMU

Florida A&M University has implemented additional security measures related to students setting up direct deposit accounts since the 2010 incident. The U.S. Attorney's Office involvement in issuing indictments indicates that FAMU is serious about addressing the alleged criminal acts. As a point of clarification, the individuals did not hack into the system, but gained access to student personal information using deceptive tactics and improperly used the information to commit the alleged criminal acts. Since implementing the security measures, FAMU has not had any repeat incidents.
SOURCE:  tallahassee.com

Category MALICIOUS DOMAIN: Singapore Site with TrojWare.JS.Agent.caa - aappb.info



MALICIOUS DOMAIN:

aappb.info

  • https://www.virustotal.com/de/url/72998bae1ed716e2e8c077ff319d75308ba661afc8d19d60e00dd0621fd8fc66/analysis/1387112465/
INFECTED WITH:



  • https://www.virustotal.com/de/file/4ba154b275fbe053a438e957d38a2293edcc4be0331b222ac267d542d52e1d5e/analysis/1387112372/
  • https://www.virustotal.com/de/file/8a18117a9c5eef42e922a1bf8aa30e26b8c7638293ecf4442273c68a3350f573/analysis/1387112048/
  • http://wepawet.iseclab.org/view.php?hash=0777f1de3375fc99568976bcaab97fa2&t=1382420593&type=js
  • https://urlquery.net/report.php?id=8115969
REMOTE DESTINATION(S):

master-style.ru/js/tiny_mce/plugins/emotions/img/1/404.php
  • https://www.virustotal.com/de/url/a8c975f7925a788b981bf947385a56f7b8ef6d351a3232cf9065979f322d5501/analysis/1387112992/
  • http://wepawet.iseclab.org/view.php?type=js&hash=cd15c24a9c1de2dc6bc00ac1fc9e0e52&t=1374237621
adultbiz.in/new/jquery.php
  • https://www.virustotal.com/de/url/b03f7789db1a34fee2476e243b74010c55223066d26b488e1ef36a9816d86458/analysis/1387113078/
www.insead.dk/wp-content/uploads/jquery-update.php
  • https://www.virustotal.com/de/url/8ac7cd6ca798e247c9bc27cbf699fd13858637c19f62032003c32b391974d8af/analysis/1387113153/
imamasim.com/modules/mod_modules/jquery-update.php
  • https://www.virustotal.com/de/url/2203a29def19ea11679d6b4d4e8ba6a553502c71982fbf382dead5df87f5eb38/analysis/1387113242/
www.nldburma.org
  • https://www.virustotal.com/de/url/3f3b601e691be8309384f18a91babb809c197074454a0ab037be4009127c746b/analysis/1387113360/
IP:
aappb.info = 119.81.1.66 
  • https://www.virustotal.com/de/url/46810efc88781a8fc86d0341e04fbdf65ef502ffca2f5445d81f422e4ea5f096/analysis/1387115588/
  • https://www.virustotal.com/de/ip-address/119.81.1.66/information/
Bad Host Appearances: 14
  • https://www.projecthoneypot.org/ip_119.81.1.66