


FBI Used Spyware for Online Search 79
juct writes "The FBI has used PC spyware for the first time to reveal the identity of an offender who sent bomb threats to a high school in Washington state. According to heise Security, a declaration from the FBI official who applied for the search warrant describes the mode of operation of the spyware which the FBI is using under the abbreviation CIPAV (Computer and Internet Protocol Address Verifier)."
Are the editors boycotting reading /. again? (Score:4, Informative)
Re: (Score:2)
Re:Are the editors boycotting reading /. again? (Score:4, Funny)
Re: (Score:1)
Oh... oh! And the good guys in 24 too!
Re: (Score:2)
Re: (Score:1)
Please tell me why I should run Windows? (Score:5, Interesting)
I suspect that getting such a tool installed on my Linux box would be much harder.
Re: (Score:2)
With the government, there are NO "accidents".
Re: (Score:1)
Security through obscurity (Score:3, Interesting)
Sure some poor sap will be done over, but hopefully it won't be you.
Re: (Score:3, Insightful)
Something to hide != guilty of a crime.
Re: (Score:2)
I'm not trying to be clever here. There's not a soul that has "nothing to hide". If someone says their life is an open book, ask to see their wallet and start loo
Re: (Score:1)
Re: (Score:1)
Good ! (Score:2)
which Google and MySpace supplied to the FBI therefore referred to the Italian computers. In order to trace the perpetrator, the FBI sent the CIPAV via Google Mail or MySpace after receiving a search warrant from the authorities so that the spyware could install itself as more threats were sent. Use of the CIPAV was granted by the judge with the stipulation that the software was only to transmit its IP data between 6:00 and 22:00. However, it was permitted to log IP addresses round the clock.
Re: (Score:2)
see? you don't need NSLs to catch bad guys!
Re: (Score:3, Interesting)
Re: (Score:1)
Could the defendant actually request the source code for the program? Though, they probably would just label him a terrorist and throw him and the source code in Gitmo...there he could review it all he wants, because in Guantanamo Bay no one can hear you scream
Re: (Score:2)
But yea, your probably right. You would be shove off to the side where they could control how much you can do about the program. It just seems to me that if you could sneak it into the computer, you could almost sneak anything into it, even if you needed evidence to go further into the computer.
How long will it be before... (Score:5, Insightful)
Re: (Score:1)
Hmmm, where have I heard that before? Maybee in this post by "140Mandak262Jamuna" [slashdot.org]
Really, what was the point of ripping off his post?
Re: (Score:3, Funny)
Re: (Score:2)
Do we have to guess the right negative number to win the prize, or is knowing the sign enough?
Re: (Score:2)
Re: (Score:1, Funny)
Re: (Score:2, Informative)
Read "activate"="double-click on attachment". So much for the FBI exploting secret security holes that are otherwise unknown or actually paying OS vendors to install backdoors and security software vendors to not detect
Re: (Score:1)
Gosh this looks familiar... (Score:1, Redundant)
More Firefighters Needed! (Score:5, Insightful)
Re:More Firefighters Needed! (Score:5, Interesting)
It's now our fault in voting up a dupe, not
Now
Re: (Score:1)
Re: (Score:2)
Interesting speculation (Score:5, Insightful)
The problem with either of those options is if they get out in the wild. How many people have access to those tools and how is their deployment managed? Who wouldn't be tempted to do a little sideline testing if they had those goodies in their tool chest.
Re: (Score:1)
d
Re: (Score:2)
The problem with either of those options is if they get out in the wild.
M$ update, and the equivalent on other platforms, is a whopper of a back door. Why doesn't that "get out in the wild"?
---
Commercial software bigots - a dying breed.
Re: (Score:2)
Because it's the kind of back door that the developers know full well is a risk, and so they design around that risk with things like digital signatures and techniques to confirm you're speaking to an authorised server. It's easier and more subtle to attack the weak link in the chain - the human being who's sat at the computer.
It's a bit like how most sysadmins these days know that open por
Re: (Score:2)
Because it's the kind of back door that the developers know full well is a risk, and so they design around that risk with things like digital signatures and techniques to confirm you're speaking to an authorised server.
That's true but my point is that an intelligence agency backdoor could have exactly the same digital signature protections etc. In other words unlike what bconway said [slashdot.org] official backdoors would would be no more a compromisable hole than Update. Keeping in mind that the NSA has two missions
concerned (Score:1)
black security (Score:1)
The Problem (Score:1)
The problem is that technology is getting closer to us all the time. The barrier between man and machine is becoming much narr
Re:The Problem (Score:4, Insightful)
Fuck that. Sorry, but you guys (US citizens) should start to become really concerned about your government violating personal, constitutional-granted rights in order to further the fight against "terrorism". This issue is real NOW, and, from what we read here on the other side of the pond, it's becoming increasingly out of control. Who cares about future artificial limbs when these people decide it's ok to install malware in your PC so they can eavesdrop private, personal files and communications, today?
Re: (Score:2)
I guess that pond is smooth as glass and all you are seeing is your own reflection as you gaze across. How quickly you forget about those traffic congestion cameras [slashdot.org] the police now have real-time access to.
Re: (Score:2)
Re: (Score:2)
Maybe 1984 was a roadmap, not a cautionary tale. Or maybe Orwell was actually a historian from the future.
Re: (Score:1)
Re: (Score:2)
Be grateful that there is a due process which was followed. I'd be more concerned when such due process is considered a hindrance to the "war on terror" and done away with.
Re: (Score:2)
They had a search warrant for the instance the article reports about. So this particular story isn't about an abuse of power (for once!). There's nothing (yet, sigh) to indicate they're going on warrantless fishing expeditions with their spyware, or trying to get it pervasively installed so they can data-mine "in the interest of national security". I agree that either of those cases would be cause for outrage.
Heck, if the FBI wasn't allowed to use spyware, with a warrant, they could just install a hidden
Re: (Score:2)
over the pond? (Score:2)
Re: (Score:1)
Man, they gave you the full package didn't they?
Trivial to defeat? (Score:1)
If the kid was already hopping over three computers (maybe using Tor), he probably had the technical ability to:
1. Put his machine on a private NAT'd network so that 'ipconfig' would show an unroutable address.
2. Use a firewall that alerted him when software was trying to make an outbound connection. Better, drop it using that gateway he's sitting behind.
Granted, if he had just been using something besides Windows (which I
Re: (Score:2)
okay... (Score:2)
Oh! It was there first time? They've lost their spyware virginity? Why do they write bullshit like this? Is it so that one guy won't go "Drat! I had no idea the FBI ever installed keystroke loggers" that articles like this lie to everybody? C'mon.
Re: (Score:2)
Re: (Score:1)
This is an international issue. (Score:2)
It is possible that this particular case has been picked for its public relations value. The U.S. government's spy agencies have for many years been using ANY tool at their disposal to spy ANYWHERE. It is possible that this case is designed to try to get approval from U.S. citizens for this kind of spying, when much of the spying they do is not to prevent
CIA (Score:2, Insightful)
Given that the NSA knows how to crack Windows (Score:2)
In this current posting, however, the issue is
Or maybe the FBI just crac