Posted on 08/05/2014 10:18:32 PM PDT by Utilizer
Apparently, the feebs have been using malware and the TOR network to snoop on quite a bit more information than one might have suspected.
Use the following link here for more info:
http://www.wired.com/2014/08/operation_torpedo/
Using a computer separated from the internet to use for the primary machine works well also. Then whatever you wish to send you copy to a dedicated internet machine to transmit and receive and you significantly degarade who can access your machines.
Lots of backups always, as well.
Unfortunately, as noted previously, certain types of proprietary information, especially if you are a small startup, can be devastating if it gets into the hands of competitors.
Personally, I have no faith that democrats, liberals, or muck-wallowing scumsuckers of all types (but I repeat Myself) would not use any information possible obtained from individuals, political groups, or any of many various other companies to their advantage by gleaning such information from the targeted machines.
In fact, they seem to have no problem doing that time and time again.
So they caught some pedophiles, huh?
By the same token if they’re able to snoop in peoples computer files, then they are also capable of planting files to incriminate people. What a slippery and dangerous slope.
Too right, and agree totally. See My post #18.
Sorry, I meant to reply to you sooner.
The article, while most informative, is not meant to delve into the specific details of which websites, domains, or nodes to stay away from.
Rather, it points out that despite the efforts of many the feebs are casually using methods considered unacceptable to the general public, due to their focus on personal data and confidential information.
Aside from the hypocrisy, and the fact that many of the communications considered to be private between the relevant parties have been snooped upon by them, they have NO problem with casually using whatever means necessary to hack into them.
It bears scrutiny, no?
More about the 'laws for thee and not for me" mentality than anything else.
Yes. For anyone sending 3des, the NSA helped design it.
Think they built-in a backdoor. Theydid.
Further, they “invested”, per telcom act of 1996, billions of your dollars in most software and communications equipment out there.
The only to truly have secure comms is if you built a closed network and only transmitted on that medium.
All communications companies must give access to the Feds.
Have noticed Google Chrome has been givin me “unusual tracffic activity noted on your computer that is in violation of Google’s terms then gives you a CAPTHA box to sign in on before it will proceed. I have no idea what this is about and I have rub full virus scans, dumped my caches, and cleaned up my registry. Anyone else gettin this message lately?
Running Opera on this end. No worries so far.
Try getting a new IP address. Generally disconnecting the router for 10 minutes or so will do it.
Back in the day of manual typewriters, the KGB might have found you useful. No need to sweat destroying those used Mylar ribbons, and forget the white-out! Kommittee already have everything!
http://www.matthewaid.com/post/31579150245/soviet-cold-war-tapping-of-the-us-embassy-in-moscow-a
“They were already spying on manual typing machines way back. They had ways to transmit the data they were typing (no joke).”
I heard about that. Each letter made a slightly different sound when used, so once the letters were cataloged, all you needed was to decode a recording. Amazing.
Brilliant - I’d also like to know how the bugs got there on the typewriters. Knowing the State Department, I suspect the Russian late-night cleaning ladies had something to do with it.
Make the feds mad, and they will plant child porn on your computer. This is SOP. Very effective.
They don't even have to get that fancy. Look how most people and the MSM fall for "hard drive crash" as an explanation for losing all of Lerner's emails at the IRS. Sophisticated evidence planting is not required. Basic run of the mill evidence planting will do just fine. ;-)
Wow. Just wow. So the judge, who admitted to being ignorant of the real methods used to gather the intelligence, just throws out the 4th amendment without ceremony.
The government literally designed and deployed malware. They're no better than a Russian hacker or some Chinese teenager scraping passwords from popular sites with brute force attacks.
This is heartening in one aspect: the government is outright proving their inability to get through security layers meant to obfuscate traffic. Now, if you're browsing child porn sites, you deserve to be thrown in jail, but the fact that they're netting innocent users of Tor is disgusting.
Your best bet is to use virtual machines to browse, apply MAC address spoofing and change your MAC pools on your virtual hardware as often as possible. Oh, and of course, keep your damn software up to date!
The problem with planting digital evidence is that an astute forensics expert could very easy do a bitwise extrapolation of data to find out if that file existed before the police broke down your door. And since the data on that disk must be made available to the defense lest they want a mistrial, they can’t obfuscate the truth.
Not exactly. The Feds first tracked down someone who was running a child porn site out of Nebraska. They seized his computer equipment and then created malware to install on that computer equipment which then took a digital fingerprint, if you will, of each visitor to that website.
Funny thing about this is that the Feds gathered this evidence almost by accident. Had the 31 year old webmaster of the Tor end point not stupidly left his administrator password unsecured, the Feds likely would’ve never found him. This was literally a “lucky break” in a case. They’d likely still be searching today.
Report this to your ISP. They can check their routing tables to find out if the IP address is being spoofed somewhere else. I would also force and IP address update if you’re not using a static IP.
This is usually accomplished by logging into your ISP’s router and finding the router information section. Somewhere on that page should be an IP address renew button or something similar.
> Report this to your ISP. They can check their routing tables to find out if the IP address is being spoofed somewhere else. I would also force and IP address update if youre not using a static IP.
This is usually accomplished by logging into your ISPs router and finding the router information section. Somewhere on that page should be an IP address renew button or something similar.
I will take a look into that. Thanks for that info.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.