Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Visit the Wrong Website, and the FBI Could End Up in Your Computer
W I R E D ^ | 08.05.14 6:30 am | Kevin Poulsen

Posted on 08/05/2014 10:18:32 PM PDT by Utilizer

Apparently, the feebs have been using malware and the TOR network to snoop on quite a bit more information than one might have suspected.

Use the following link here for more info:

http://www.wired.com/2014/08/operation_torpedo/


TOPICS: Business/Economy; Computers/Internet; Conspiracy
KEYWORDS: beseeingyou; bigbrother; chrome; computer; cultureofcorruption; fbi; hacking; ipaddresses; malware; orwelliannightmare; privacyrights; virtual
Navigation: use the links below to view more comments.
first previous 1-2021-4041-59 next last
To: lee martell

Using a computer separated from the internet to use for the primary machine works well also. Then whatever you wish to send you copy to a dedicated internet machine to transmit and receive and you significantly degarade who can access your machines.

Lots of backups always, as well.

Unfortunately, as noted previously, certain types of proprietary information, especially if you are a small startup, can be devastating if it gets into the hands of competitors.

Personally, I have no faith that democrats, liberals, or muck-wallowing scumsuckers of all types (but I repeat Myself) would not use any information possible obtained from individuals, political groups, or any of many various other companies to their advantage by gleaning such information from the targeted machines.

In fact, they seem to have no problem doing that time and time again.


21 posted on 08/05/2014 11:18:29 PM PDT by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzzle-em's trying to kill them-)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Utilizer

So they caught some pedophiles, huh?

By the same token if they’re able to snoop in peoples computer files, then they are also capable of planting files to incriminate people. What a slippery and dangerous slope.


22 posted on 08/05/2014 11:39:50 PM PDT by Bullish (You ever notice that liberalism really just amounts to anti-morality?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bullish

Too right, and agree totally. See My post #18.


23 posted on 08/05/2014 11:48:08 PM PDT by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzzle-em's trying to kill them-)
[ Post Reply | Private Reply | To 22 | View Replies]

To: lee martell
I do wish they would just list a few of the most poisonous, malware laden websites to stay away from.

Sorry, I meant to reply to you sooner.

The article, while most informative, is not meant to delve into the specific details of which websites, domains, or nodes to stay away from.

Rather, it points out that despite the efforts of many the feebs are casually using methods considered unacceptable to the general public, due to their focus on personal data and confidential information.

Aside from the hypocrisy, and the fact that many of the communications considered to be private between the relevant parties have been snooped upon by them, they have NO problem with casually using whatever means necessary to hack into them.

It bears scrutiny, no?

More about the 'laws for thee and not for me" mentality than anything else.

24 posted on 08/06/2014 12:04:18 AM PDT by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzzle-em's trying to kill them-)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Utilizer

Yes. For anyone sending 3des, the NSA helped design it.

Think they built-in a backdoor. Theydid.

Further, they “invested”, per telcom act of 1996, billions of your dollars in most software and communications equipment out there.

The only to truly have secure comms is if you built a closed network and only transmitted on that medium.

All communications companies must give access to the Feds.


25 posted on 08/06/2014 12:05:10 AM PDT by Vendome (Don't take life so seriously-you won't live through it anyway-Enjoy Yourself ala Louis Prima)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Vendome

Have noticed Google Chrome has been givin me “unusual tracffic activity noted on your computer that is in violation of Google’s terms then gives you a CAPTHA box to sign in on before it will proceed. I have no idea what this is about and I have rub full virus scans, dumped my caches, and cleaned up my registry. Anyone else gettin this message lately?


26 posted on 08/06/2014 12:42:05 AM PDT by jsanders2001
[ Post Reply | Private Reply | To 25 | View Replies]

To: jsanders2001

Running Opera on this end. No worries so far.


27 posted on 08/06/2014 12:45:51 AM PDT by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzzle-em's trying to kill them-)
[ Post Reply | Private Reply | To 26 | View Replies]

To: jsanders2001

Try getting a new IP address. Generally disconnecting the router for 10 minutes or so will do it.


28 posted on 08/06/2014 1:07:41 AM PDT by expat1000 ("If you're explaining, you're losing." Ronald Reagan)
[ Post Reply | Private Reply | To 26 | View Replies]

To: lee martell
As long as I have some way to cleanly erase mistakes with throwing a cupful of white-out per sheet of paper, I would use a manual for ‘certain types’ of correspondence.

Back in the day of manual typewriters, the KGB might have found you useful. No need to sweat destroying those used Mylar ribbons, and forget the white-out! Kommittee already have everything!

http://www.matthewaid.com/post/31579150245/soviet-cold-war-tapping-of-the-us-embassy-in-moscow-a

29 posted on 08/06/2014 1:20:34 AM PDT by cynwoody
[ Post Reply | Private Reply | To 15 | View Replies]

To: F15Eagle

“They were already spying on manual typing machines way back. They had ways to transmit the data they were typing (no joke).”

I heard about that. Each letter made a slightly different sound when used, so once the letters were cataloged, all you needed was to decode a recording. Amazing.


30 posted on 08/06/2014 4:27:12 AM PDT by BobL
[ Post Reply | Private Reply | To 17 | View Replies]

Comment #31 Removed by Moderator

To: F15Eagle

Brilliant - I’d also like to know how the bugs got there on the typewriters. Knowing the State Department, I suspect the Russian late-night cleaning ladies had something to do with it.


32 posted on 08/06/2014 4:35:50 AM PDT by BobL
[ Post Reply | Private Reply | To 31 | View Replies]

To: rdb3; Calvinist_Dark_Lord; JosephW; Only1choice____Freedom; amigatec; Still Thinking; ...

33 posted on 08/06/2014 4:40:12 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer

Make the feds mad, and they will plant child porn on your computer. This is SOP. Very effective.


34 posted on 08/06/2014 5:01:08 AM PDT by olepap (Your old Pappy)
[ Post Reply | Private Reply | To 1 | View Replies]

To: OneWingedShark
How much do you want to bet that the FBI [et al] can set up timers to vary the download times?

They don't even have to get that fancy. Look how most people and the MSM fall for "hard drive crash" as an explanation for losing all of Lerner's emails at the IRS. Sophisticated evidence planting is not required. Basic run of the mill evidence planting will do just fine. ;-)

35 posted on 08/06/2014 5:20:04 AM PDT by Flick Lives ("I can't believe it's not Fascism!")
[ Post Reply | Private Reply | To 20 | View Replies]

To: Utilizer
But last week U.S. Magistrate Judge Thomas Thalken rejected the defense motion, and any implication that the government acted in bad faith.

Wow. Just wow. So the judge, who admitted to being ignorant of the real methods used to gather the intelligence, just throws out the 4th amendment without ceremony.

The government literally designed and deployed malware. They're no better than a Russian hacker or some Chinese teenager scraping passwords from popular sites with brute force attacks.

This is heartening in one aspect: the government is outright proving their inability to get through security layers meant to obfuscate traffic. Now, if you're browsing child porn sites, you deserve to be thrown in jail, but the fact that they're netting innocent users of Tor is disgusting.

Your best bet is to use virtual machines to browse, apply MAC address spoofing and change your MAC pools on your virtual hardware as often as possible. Oh, and of course, keep your damn software up to date!

36 posted on 08/06/2014 5:53:44 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: olepap

The problem with planting digital evidence is that an astute forensics expert could very easy do a bitwise extrapolation of data to find out if that file existed before the police broke down your door. And since the data on that disk must be made available to the defense lest they want a mistrial, they can’t obfuscate the truth.


37 posted on 08/06/2014 5:55:35 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 34 | View Replies]

To: Ken H

Not exactly. The Feds first tracked down someone who was running a child porn site out of Nebraska. They seized his computer equipment and then created malware to install on that computer equipment which then took a digital fingerprint, if you will, of each visitor to that website.

Funny thing about this is that the Feds gathered this evidence almost by accident. Had the 31 year old webmaster of the Tor end point not stupidly left his administrator password unsecured, the Feds likely would’ve never found him. This was literally a “lucky break” in a case. They’d likely still be searching today.


38 posted on 08/06/2014 5:57:58 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: jsanders2001

Report this to your ISP. They can check their routing tables to find out if the IP address is being spoofed somewhere else. I would also force and IP address update if you’re not using a static IP.

This is usually accomplished by logging into your ISP’s router and finding the router information section. Somewhere on that page should be an IP address renew button or something similar.


39 posted on 08/06/2014 5:59:50 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 26 | View Replies]

To: rarestia

> Report this to your ISP. They can check their routing tables to find out if the IP address is being spoofed somewhere else. I would also force and IP address update if you’re not using a static IP.

This is usually accomplished by logging into your ISP’s router and finding the router information section. Somewhere on that page should be an IP address renew button or something similar.

I will take a look into that. Thanks for that info.


40 posted on 08/06/2014 6:34:10 AM PDT by jsanders2001
[ Post Reply | Private Reply | To 39 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-59 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson