Enhanced Carnivore To Crack Encryption Via Virus 522
suqur writes: "MSNBC has a story about a new Carnivore feature, dubbed 'Magic Lantern,' which arrives on a victim's computer in the form of a virus through email or well-known vulnerabilities. Magic Lantern uses keylogging to extract keys typed in, and sends them off to the FBI. This is similar to a story reported on previously, but taken one step further, allowing computers to be compromised remotely."
In other news... (Score:5, Funny)
This only works if.... (Score:5, Funny)
b) You always open email with the subject "Snow White and the 7 FBI Agents"
c) You run the attachment called "FBILOVESYOU.VBS" (and you run Windows, Outlook, etc)
Blah, dumb communist FBI
Way to go, FBI! (Score:5, Funny)
Talk about a boon to the Open Source movement! Show the people (not just the bad guys) that Microsoft's numerous vulnerabilities can be used by Big Brother to monitor them. I can't think of a better way to boost Linux distro sales.
DCMA violation? (Score:5, Funny)
How does the government expect to work around this one? There are so many things that can go wrong...
1. Probably OS-dependent. Remember: virii for one platform (i.e., Win) will probably not work for others. That was not hard to get around
2. Human link involved. This virus will presumably be propagated via email, or some other form of trojan. Those who tend to use encryption tend to block this type of thing from happening to their machine anyway. Yet another reason not to open email/attachments from an addresser named "CIA"
3. Network link involved. Those who use encryption are usually savvy enough to detect extra packets flying from their machine to some unknown address, which would easily be identified in a reverse-lookup.
My goodness, they are getting desperate, aren't they.
Virus Email (Score:5, Funny)
From: Bill@Slashdot.org
To: Fred@Slashdot.org
Subject: Magic Lantern.doc.pif
Hi! How are you?
I send you this file in order to have your advice.
See you later. Thanks
Re:Encryption program name (Score:5, Funny)
You have got to be kidding. (Score:5, Funny)
Are there any cases involving damage done to personal property in eavesdropping operations? That is, legal taps? Any lawyers here? I gotta imagine that this would be a very very dangerous thing for the government to get into. Not only could it cause damage to personal property, but if the suspect is smart enough to encrypt their stuff, they're going to be smart enough to know when they've been h4x0red by an email virus.
This story makes a lot more sense if you remove every reference to "our sources" and replace it with "my little brother." I believe *that*.
Just another thing to keep in mind during coding.. (Score:2, Funny)
Re:Encryption Security (Score:1, Funny)
I've got no problem with this... (Score:4, Funny)
Of course, anyone who would be vulnerabe to this is either a moron or doesn't feel that they have anything to hide, so it seems kind of pointless.
Of course, the truely paranoid communicate with their computer using morse code with their space bar and scroll lock LED. I can see it now:
Head of Investigation: "What have we got from the J Random Hacker log file?"
Computer Specialist: "84,365,928 spaces, sir"
Don't rename it Quake! (Score:5, Funny)
Re:AV software. (Score:2, Funny)
Kind of makes one pine for elm.
They sent it to me! (Score:5, Funny)
Re:This only works if.... (Score:2, Funny)
Here are point's of trouble for feds on my box.
1) I get email from them, and not running Windows, and having a client that doesn't display html and thus javascript the bugger withers and dies in
2) They install a hardware keylogger! I notice it later when plugging in my joystick. I melt and crush it.
3) They attempt to install a keyloging program. Screensaver password thwarts them.
4) They reboot my box to bypass screensaver, and meet a BIOS boot password. They bypass it.
5) They meet a LILO password prompt! They get a boot disk.
6) Oh DAMN thier boot disk doesn't support ReiserFS
7) They get a ReiserFS boot disk. Oh darn,
8) Since I've started taking my keyboard to wokr after finding the keylogger they angrily give up on getting at my massive pr0n stash.
/. (Score:2, Funny)
What the E-mail contains ... (Score:2, Funny)
Obviously, speed is of the essence
(Note: for backround info on this net meme - look here [snopes2.com].
Hmmm (Score:2, Funny)
AN 1 Nov 20 agent213@fbi.gov (335) Hot Porn!
[enter]
Attachment: sexypix.htm.exe
Damn, I can't run it.
-Legion
Re:Good luck... (Score:2, Funny)
Install tamper-evident seals all over everything, install a decoy system, and a hidden silent intrusion detection system (all rather trivial to do really).
Then reboot before entering a passphrase to foil network based attacks, and shut down and take all media with you when you leave. When the FBI breaks in to physically install a keylogger, they'll mistakenly bug the decoy system. If they figure that out, they'll find the tamper evident seals, and may have to come back later with duplicates. If they can circumvent those, they'll have tripped the silent intrusion detection system and been caught on hidden video camera, which will page you so you can check your house via the 802.11 link to your neighbors cable modem. If necessary you can then use your bluetooth system to detonate stun gernaids and flood the house with anestetic gas.
Anyway, you'll have been alerted to their poking around.
Re:Legal? (Score:3, Funny)
I like that... (Score:2, Funny)
7.30 get up
8.00 go to work
8.02 check email
8.03 reverse engineer fbi trojan
8.10 spy on everybody an his mother
.
.
.
18.30 be happy to be a l33t FB1 5upp0rt3d ha>0r
nice...
Re:How far will you let them go? (Score:3, Funny)
Just one more! I promise.
And just look at the Version 2.0 features! (Score:1, Funny)
* Data sharing with DMV
* Valutraq - advertising based on what is found on a subject's system.
* Automatic Ministry Of Love dispatch in the event of Thought Crime (TM)
* Tracking in devices attached to mobile phones with GPS support
It's a great time to be alive.