Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

FOLLOWING DEATH THREAT AGAINST CHRISTIAN WRITER, TERROR SITE MOVES TO CHICAGO
JoyJunction ^ | Feb. 13, 2005 | Jeremy Reynalds

Posted on 02/13/2005 5:01:39 PM PST by JohnathanRGalt

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-26 last
To: JohnathanRGalt

"Strangely enough, only Islamist terrorists seem immune to tracing on the internet."

Or the FBI, Secret Service, NSA etc. don't publish their tracking methods?


21 posted on 02/14/2005 3:38:06 AM PST by Smartaleck (Tom Delay TX: (Dems have no plan, no agenda, no solutions.))
[ Post Reply | Private Reply | To 18 | View Replies]

To: jocon307
Hubby has pointed out to me that the IP address of posters may be detectable.

Sure, your IP is detectable on a session-by-session basis, and the Web sites you visit collect them as a matter of course. Not for malevolent purposes, but to track statistical use of the site.

But unless your ISP expressly gave you a static (fixed) IP address, your IP address changes whenever you dialup to your ISP or wait for a new IP to be generated on DSL/cable (the "lease" time) or you forcibly get a new IP address from your DSL/cable provider (which you can easily do by simply resetting your DSL/cable modem).

In fact it's non-trivial to link a specific human being with a specific IP address.

22 posted on 02/14/2005 5:45:54 AM PST by angkor
[ Post Reply | Private Reply | To 9 | View Replies]

To: JohnathanRGalt
Strangely enough, only Islamist terrorists seem immune to tracing on the internet.

You could read behind the lines to infer that the Dan Pearl murderers were caught by (quite stupidly) sending threatening Hotmails to the WSJ and other media. Stupid because Hotmail embeds the source IP address in the email header, which in the case of Pearl was traced back to an Internet cafe in Karachi, which was then surveilled until the idiots came back. Simple.

IIRC KSM made a similar error in computer use, and presumably other Islamists have been busted in the same basic manner.

The difference between Islamist sites and, say, child porn sites is that the latter can be ID'd by law enforcement and then used as a "honeypot" to nab other visitors.

To do so, LEOs would simply enlist the ISP to capture source IPs and pages visited (presumably with a warrant, and an absolute no-brainer with Web server software), and then go to the source ISPs and similarly subpoena their DHCP logs to see which user(s) were on those IPs at a specific time and place. Busted.

Islamist sites are known to be very transient - they're hosted by one ISP today and another next week, or on non-US sites, or whatever - so it can be logistically difficult to get things in order to accomplish a sting.

Example, after ID'ing an Islamist site hosted in UAE, you'd need the cooperation of UAE law enforcement, then UAE LEOs would need to gain cooperation of that UAE ISP (probably not difficult at that stage), then get Web logs back to US LEO's, who would then have to subpoena source IPs from all the ISP's involved. That would work with US users, but forget about it if they're from all around the world. Again, sheer logistics.

In the case of state-run ISPs and hosting services which have already agreed to cooperate with US law enforcement, the turnaround would be faster, there might already be procedures in place to set up these kinds of stings.

Sophisticated Islamists who use proxy software at their source PC would be able to mask their source IP address which makes much of this undoable, though again due to logistics, not because it's a technical impossibility.

23 posted on 02/14/2005 6:13:29 AM PST by angkor
[ Post Reply | Private Reply | To 18 | View Replies]

To: Smartaleck

Tracing IP's isn't rocket science to the tens of thousands of network engineers around the world, and it's by no means a secret. Tools and docs are posted all over the Internet, and have been for many years.

Law enforcement agencies (which employ network engineers and computer security folks for precisely these purposes) have the benefit of legal access to ISP logs via warrant or subpoena. Those are key to busting Islamist scum in the act.

Speedy logistics and international reach are the other key factors. One would need to act fast, and often to gain access to foreign ISP logs (one would thus need the cooperation of foreign governments and foreign law enforcement).


24 posted on 02/14/2005 6:22:39 AM PST by angkor
[ Post Reply | Private Reply | To 21 | View Replies]

To: Smartaleck

Watch a (good) homicide detective at work. You'd think he was more interested in the modus operandi of the perpetrator than in the fact that a murder had been committed.


25 posted on 02/14/2005 6:25:50 AM PST by Larry Lucido
[ Post Reply | Private Reply | To 4 | View Replies]

To: Larry Lucido

"You'd think he was more interested in the modus operandi of the perpetrator than in the fact that a murder had been committed."

...and probably get a littel more than peeved if somebody tipped off the the perp to the survallance activity?


26 posted on 02/14/2005 9:05:54 AM PST by Smartaleck (Tom Delay TX: (Dems have no plan, no agenda, no solutions.))
[ Post Reply | Private Reply | To 25 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-26 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson