The Secret History of the FBI's Classified Spyware 133
An anonymous reader writes "A sophisticated FBI-produced spyware program has played a crucial behind-the-scenes role in federal investigations into extortion plots, terrorist threats and hacker attacks in cases stretching back at least seven years, according to newly declassified documents obtained by Wired.com. The so-called 'computer and internet protocol address verifier,' or CIPAV, is delivered through links to websites controlled by the FBI, and it silently reports back to a government server in Virginia. Among other cases, the FBI used it to track a Swedish hacker responsible for cracking thousands of computers at national labs and NASA's JPL in 2005."
The Ends Don't Justify The Means (Score:5, Insightful)
How is this not breaking the law?
Breaking the law to enforce the law.. way to piss on justice.
Re: (Score:1)
Re: (Score:3, Insightful)
In the same way that police regularly assault, kidnap or otherwise harass citizens?
Look, I'm not saying I disagree with you, but you need to refine the ethics of your argument a bit if you want to make a useful point. Unless you were just hoping to bash out something that sounded relevant in order to FP...
Re:The Ends Don't Justify The Means (Score:4, Insightful)
"How is this not breaking the law?
Breaking the law to enforce the law.. way to piss on justice."
I've always been skeptical about this and other tricks used by the FBI and other law enforcement. The Constitution is QUITE clear that a search of private property requires a warrant.
Another thing that has always bothered me is that law enforcement lying to citizens is routine and legal, but lying to law enforcement is a crime (even if you don't know the person you are talking to is law enforcement).
Seems to me that if the government wants us to respect the FAR too many laws on the books that it should start following them itself. And that starts with respecting the Constitution.
Re: (Score:3, Insightful)
It seems that the vast majority of citizens don't understand the concept of Constitutional law, or that by adherence to the supremacy of The Constitution, The People should be protected by the law, from their government. too bad, so sad.
The Comments Don't Match the Article. (Score:5, Informative)
The Constitution is QUITE clear that a search of private property requires a warrant.
From the fine article, emphasis added by me: "But the documents released Thursday under the Freedom of Information Act show the FBI has quietly obtained court authorization to deploy the CIPAV in a wide variety of cases, ranging from major hacker investigations, to someone posing as an FBI agent online."
And from further down in the article: "The FBI obtained a warrant to use the CIPAV on February 10, 2005, and was apparently successful."
Re: (Score:2)
This guy [bash.org] is in trouble.
Re: (Score:3, Insightful)
Read the article. They went through the courts. However the fourth amendment not only requires a court order it requires that the search be limited in scope in duration. That's why AT&Ts indiscriminate monitoring of all users traffic is a violation of the fourth amendment even though it was court ordered.
Re: (Score:3, Insightful)
"How is this not breaking the law?
Breaking the law to enforce the law.. way to piss on justice."
Actually, when you think about it, the police regularly break the law to uphold it. Look at how they catch speeders: They usually have to speed themselves to catch up to the speeder in order to pull him over, or they even might just tail behind a speeder for a while and clock him with their own speedometer - thus breaking the law themselves by speeding themselves.
To a degree, in general, law enforcement has to operate a little outside the law, at times, to do the job. At times. I'm not saying give them
Re: (Score:1, Informative)
Actually, when you think about it, the police regularly break the law to uphold it. Look at how they catch speeders: They usually have to speed themselves to catch up to the speeder in order to pull him over, or they even might just tail behind a speeder for a while and clock him with their own speedometer - thus breaking the law themselves by speeding themselves.
Not to be pedantic, but this isn't a good analogy since many laws are written with specific exemptions for law enforcement during the performance of their official duty.
Re: (Score:2)
Is the furor over this system they deployed, or over the matter of obtaining warrants to use it? Without such a system, they'd be relatively crippled in their ability to catch real net criminals and cyber-terrorists, and if they failed in that endeavor, everyone would just bitch about how useless they are, why aren't they doing something about crime, etc.
OH NOES teh cyber-terrorists are going to get me, what are they going to do?, blow up my computer? Anyone that uses the term cyber-terrorists seriously loses a lot of credibility
Re: (Score:2)
Another thing that has always bothered me is that law enforcement lying to citizens is routine and legal, but lying to law enforcement is a crime (even if you don't know the person you are talking to is law enforcement).
(emphasis added)
I don't think you've got it right. It would violate a fundamental principle of justice to turn a completely innocent act into a criminal offense on the basis of facts that a person could not possibly know.
This has a chilling effect on the innocent act and specifically on the 1st amendment right to tell a lie.
the only reason lying to cops is illegal is because when they ask you something, they aren't asking for your opinions or your creativity, but rather they are trying to solve a crime and
Re:The Ends Don't Justify The Means (Score:5, Informative)
RTFA.
But the documents released Thursday under the Freedom of Information Act show the FBI has quietly obtained court authorization to deploy the CIPAV in a wide variety of cases, ranging from major hacker investigations, to someone posing as an FBI agent online.
Re: (Score:3, Insightful)
Indeed, but they did not obtain court authorization to use it against members of video hosting sites outside of the US 5 years ago. They just used it.
Re: (Score:3, Insightful)
Well, the Constitution doesn't protect people who are not US citizens and in different countries...
Re: (Score:2)
Who said that all of the mods and administrators were in the UK?
Comment removed (Score:5, Insightful)
Re:The Ends Don't Justify The Means (Score:5, Funny)
Wow. You totally sidestepped the Sarin gas question.
You must think it's ok to eat babies too.
Comment removed (Score:5, Funny)
Re: (Score:3, Funny)
Rotisserie style!!!!
Mmmm Baby.... GET IN MY BELLY!
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Wiretaps are just as unconstitutional too.. but that battle has been fought and lost already.
Of course, lately they've decided that rubber stamp court authorization isn't even needed.. and that they should just record everything as they might need it later.
Who says the slippery slope is a logical fallacy.
Re: (Score:2)
Wiretaps are just as unconstitutional too.. but that battle has been fought and lost already.
There are actually limits on wiretaps. They can't just monitor and record ALL phone conversations, for example, they have to break it off when it's not related to what they were authorized to investigate. I seriously doubt that this FBI spyware is as discreet, it probably monitors and records EVERYTHING. This definitely puts this into a legal gray area.
Of course, lately they've decided that rubber stamp court authorization isn't even needed.. and that they should just record everything as they might need it later.
Which is what the Bush administration was doing and clearly there is no "hope" that the Obamessiah is going to "change" in that area.
Who says the slippery slope is a logical fallacy.
Exactly. With Obama'
Re: (Score:2)
How is installing software on someones computer with court authorization to monitor their behavior any different from using the warrant to obtain a wiretap or using it to search their home and possessions?
If the court authorization specifically lists the data to be siezed, it's not. If the court issues blanket authorization "in a wide variety of cases", it's a fishing expedition.
Re: (Score:2)
If the court authorization specifically lists the data to be siezed, it's not. If the court issues blanket authorization "in a wide variety of cases", it's a fishing expedition.
That is correct. Warrants are supposed to only be issued for a specific person, a specific place, and for specific things, based on enough EVIDENCE to show to a judge "probable cause" that the search specified would provide further evidence. They are not supposed to be "carte blanche" permits to conduct fishing expeditions, which sounds to me what this spyware actually does.
Re: (Score:2)
Re:The Ends Don't Justify The Means (Score:4, Insightful)
How is installing software on someones computer with court authorization to monitor their behavior any different from using the warrant to obtain a wiretap or using it to search their home and possessions?
I think the problem is that they posted the monitoring tool to a website where anyone could come across and get infected and get monitored.
In those instances, there was no prior suspicions that is needed for a warrant. You cannot randomly search 100 people's houses hoping to find a criminal the same way you can't put software out there to find out whether or not these people are the criminal.
In fact... TFA says the FBI agent was disappointed when the person they hope to infect was not infected so I'm assuming others were who were not the target of the warrant.
Re: (Score:2)
"So if they obtained court authorization to deploy Sarin gas that'd be ok too right?
Are you saying that when the president does it then it's not a crime?"
Precisely. What is it about the courts that make their actions always sacrosanct even when they are clearly against the letter of the Constitution? By and large we don't get to elect the courts, making it the LEAST democratic institution in government. At the Federal level we don't get to elect ANY of them, and they serve for LIFE and it's practically i
Re: (Score:2)
I'm guessing that you are referring to Operation Tailwind [geocities.com] which has largely been debunked. It hasn't been completely proven that the gas wasn't sarin but it seems improbable that it was.
Re: (Score:2)
Sarin Gas is indiscriminate. The FBI tool is specific.
Re: (Score:2)
So if they obtained court authorization to deploy Sarin gas that'd be ok too right? Are you saying that when the president does it then it's not a crime?
Press [OK] now to install the "Awesome Toolbar" from fbi.gov
Re: (Score:2)
Yep, it is called the gas chamber and it was last used in 1999 in Arizona. Capital punishment IS still legal in some states. Is it right? Hard question to answer, but it is still legal and that is what matters the most to governments.
"Are you saying that when the president does it then it's not a crime?"
Well, according to "Tricky" Dick Nixon, no when the president does it, it isn't a crime. Look how well that worked
Re: (Score:1)
Law enforcement officers have special rights that other citizens don't have; they're not breaking the law per se, but enforcing the law, and getting a special exception to other laws.
Officers can shoot people. They can steal^H^H^H^H^Hseize shit. They just have to have the right reasons to do it.
Under the patriot act they can sneak and search (warrantless covert search). CIPAV is just an extension of that, perhaps.
It would be disturbing if they do/did drive-by installs in a way that could effect in
Re: (Score:1)
Re: (Score:2)
So far, all the evidence presented indicates that the FBI obtained court authorization as required by law.
So what is your point, exactly?
Re: (Score:2)
Linux version? (Score:5, Funny)
Re:Linux version? (Score:4, Insightful)
In a separate February 2007 Cincinnati -based investigation of hackers who'd successfully targeted an unnamed bank, the documents indicate the FBI's efforts may have been detected. An FBI agent became alarmed when the hacker he was chasing didn't get infected with the spyware after visiting the CIPAV-loaded website. Instead, the hacker "proceeded to visit the site 29 more times," according to a summary of the incident. "In these instances, the CIPAV did not deliver its payload because of system incompatibility."
Seems like the FBI exploits browser vulnerabilities a la the Pwn2Own contest in order to deliver CIPAV, but CIPAV itself might not run in linux. I suspect that the FBI will have written a linux-compatible CIPAV after the quoted incident. Probably a bash or perl script so they don't have to worry about different architectures.
On a side note, there was probably some good porn on that page for the hacker to load it 30 times.
Re: (Score:2)
Reminds me of a certain recent xkdc [xkcd.com] but I know there was one that hit closer to home. Something along the lines of, "Drat! He's running linux! foiled again!"
Re: (Score:2)
Recently I read 'The Uncensored History of the 9/11 Investigation' which noted that 9/11 investigators were shocked how behind the FBI was in terms of technological capabilities when compared to the NSA or the CIA. I was surprised to read that in many FBI offices there was only a single computer per floor!!!. However the next paragraph...
Re: (Score:1)
Apologies about the "hacker" faux pas.
Anyway, you might be right about the cracker coming back with a honeypot. I wish I was a fly on the cracker's wall so I could see how this played out.
As far as gov't grey-hats go, there is definitely a turf war between agencies. Hell, even the Air Force [af.mil] wants a piece of the pie. God help us all!
Re: (Score:2)
Oh, it wasn't directed at you. I mean Wired, you'd think they would know their audience a bit better.
Indeed. Life, liberty and the pursuit of happiness, in carefully monitored and regulated doses. -- Thanks for the link
Re: (Score:2)
Probably. (Score:2)
And a Mac version too.
The really interesting question is, are there OpenBSD versions?
Re: (Score:2)
Linux might come with a Tripwire like software, ie too many unknown, unlike windows, the Feds best friend.
RIAA software (Score:1)
"After sending the information to the FBI, the CIPAV settles into a silent "pen register" mode, in which it lurks on the target computer and monitors its internet use, logging the IP address of every server to which the machine connects. "
Let's hope the RIAA doesn't get it's hands on this.
Re:RIAA software (Score:5, Insightful)
"FTA :
"After sending the information to the FBI, the CIPAV settles into a silent "pen register" mode, in which it lurks on the target computer and monitors its internet use, logging the IP address of every server to which the machine connects. "
Let's hope the RIAA doesn't get it's hands on this."
What I'd like to see is an open source antivirus/antispyware suite that WILL detect this. I own my computer, not the government, therefore I have a right to know what is running on it and to decide what is and isn't going to run on it.
I don't think it is any of the government's business what websites I go to, what blogs I post on, and for that matter, what porn I download.
Given some of the scary things coming out of the "O"ministration lately (such as the recent homeland security advisory painting people who support the right to own firearms and who object to the outrageous spending going on as "rightwing extremists" and "potential terrorists" I think I and others have a legitimate fear that we may be targeted for such spyware for political reasons.
That's why I opposed and still oppose the patriot act... Not because I am against going after the actual JIHADI terrorists who have and are attacking our country, but because government abuse of it and turning it on law abiding citizens was inevitable.
Note that Obama isn't doing anything to repeal the patriot act (which he used to object to). He wants that power just as much as Bush did.
Re: (Score:2)
I think that if it were reported to the antispyware venders that it would be included. The problem is that it's a targeted install, so the infection rate is very low, as such it has probably never been seen by the antispyware venders at all, let alone examined well enough to detect.
Re: (Score:3, Insightful)
Re: (Score:2)
That is a legitimate fear -- which is why we have warrants and a judicial system. But to say that this software can't be used at ALL is a bridge too far, IMHO. Would you complain if the FBI installed this spyware on Tony Soprano's computer?
You are assuming the Obama administration will respect the law OR be held to account to it to any greater degree than previous administrations.
The patriot act is extremely powerful. They can, under this act, by simply declaring the target a "terrorist" (and I believe the homeland security report on "right wing extremists" was no accident, that it was done to set that pretext) act first and get court approval later. They can wiretap, they can install stuff like this, they can force libraries to divulge wha
Re: (Score:2)
Re:RIAA software (Score:4, Interesting)
I don't think you are paranoid and I don't trust them one damn bit not to abuse this neat little toy that the FBI has. My point was meant to respond to all the people who are claiming that the FBI shouldn't even have this toy -- would it really bother if you it was used in conjunction with a warrant to monitor a Tony Soprano?
I'm not saying they shouldn't have it and that it shouldn't be used WHEN proper authorization is obtained in accordance with the Constitution, WITH proper supervision, and LIMITED, as the 4th Amendment requires, to "particularly describing the place to be searched, and the persons or things to be seized". It sounds to me from the article that the FBI is capturing ALL activity with this, even that which is unrelated to their authorized investigation. There is no way that is within the letter or spirit of the 4th Amendment.
The "right wing extremists" report was extremely troubling. It was a whole bunch of "coulds" with no specific information and a warning to watch out for returning veterans and firearm owners. WTF?
Well, the current administration has grabbed more power in 3 months than the government has in 30 years. Clearly, they are afraid that opposition to that (and future planned power grabs) is going to do nothing but grow, and that it's naturally going to come from the people who would be classified as being "from the right" and the people they will naturally have to FEAR (and government fear of the people as an incentive to obey the Constitution's restrictions on their power IS the actual purpose of the 2nd Amendment) are people who own firearms.
I know it sounds crazy, and hopefully is, but when you combine the "perfect storm" of a major economic crisis, single party control of government, and a desire to impose more central control (healthcare, industry, etc) with the patriot act which gives that single party the actual AUTHORITY to investigate and even arrest their opposition on a whim we very well might be the closest we've ever been to a Hugo Chavez type authoritarian coup.
And watching the major media drool over "Dear Leader" to the extent that they do is disgusting. What happened to the skepticism and criticism of the government? Is there not just as much a need for journalists to investigate Obama as they did Bush, especially when he's asking for unprecedented power and control? Or does it matter only when the agenda doesn't suit the personal beliefs of the media?
Re: (Score:2)
Re: (Score:2)
While I agree with the premise, I'm not sure this is as workable in a program which is collecting IP addresses and URLs as it is for a human being listening in. It is quite possible to be visiting an IP address which is hosting both normal and illicit sites at the same time. And URLs can be very deceiving; remember what whitehouse.com was for the longest
Re: (Score:2)
The "right wing extremists" report was extremely troubling. It was a whole bunch of "coulds" with no specific information and a warning to watch out for returning veterans and firearm owners. WTF?
Typically anti-terrorism FUD is all. I expect it came out of one of those "regional anti-terrorism centers" like the report out of the one in Louisiana that said Ron Paul supporters were potential terrorists. I wouldn't give obama's administration credit for anything coming out of those places, it is just a symptom of them having waaaay too much money and not enough real terrorists to spend it on, so they make up bogeymen instead. I've been hoping the economic crisis would reign in all that waste, maybe
Re: (Score:2)
Re: (Score:2)
Actually, all you have to do is respect the constitution if the part you highlighted is right. Libertarian, Republican, Democrat or any other... So long as you agree with what the constituion calls for (limited federal authority in favor of stare or local), you are a mean nasty terrorist.
Re: (Score:2)
Here's the best part of that document for anyone that thinks you are being paranoid:
I ran a search on the text of that "document." All I found were a bunch of right wing political blogs. Do you have a verifiable source?
Re: (Score:2)
Re: (Score:2)
US News and World Report. [usnews.com]
Washington Post [washingtonpost.com]
Associated Press [google.com]
It took me a while to find as some of the spelling is different than above. No offense, but I need to hear something that inflammatory from a source other than a blog.
Re: (Score:2)
Re: (Score:2)
Now that you've confirmed it, what are your thoughts?
I think she was trying to say that there are people out there like Timothy McVeigh [wikipedia.org] and David Koresh, [wikipedia.org] that we should worry about. This has always been the case. Unfortunately, her description was so broad it ended up describing everyone in the USA.
I also think that when the right wing is in control, there tends to be more left wing extremism, and vise versa. If she explained it that way, more people would understand.
I agree that the document should be redacted. It really serves no purpose, as everyone
Re: (Score:2)
There are a lot of "idiots" out there (Score:1)
Actually if you aren't an idiot about it and have proper security settings/practice this thing would never have gotten installed in the first place......
The right term is "if you aren't ignorant or stupid", not "if you aren't an idiot."
The vast majority of computer users haven't been told or refuse to believe that their OS and web browser are not only insecure, but in practical terms, inherently insecure. Ignorance can be cured.
Maybe, after enough people know someone who has been ripped off by bank or other fraud or had porn dropped on their PC, people will start demanding and using hardened web browsers.
Unfortunately, I have little doubt the US-based comm
Re: (Score:2)
the recent homeland security advisory painting people who support the right to own firearms and who object to the outrageous spending going on as "rightwing extremists" and "potential terrorists"
You wouldn't happen to have a citation for this information, do you?
Re: (Score:2)
http://it.slashdot.org/comments.pl?sid=1202103&cid=27610881 [slashdot.org] provided a citation...
Re: (Score:2)
"What I'd like to see is an open source antivirus/antispyware suite that WILL detect this."
Prevent it being installed in the first place.
If you boot a physical live CD, it cannot write to the disc, nor can any other nasties. Use writable media for storage.
Re: (Score:2)
Oh, bullshit. This report is talking about people like Eric Robert Rudolph, like Timothy McVeigh and like Eric Nichols. It def
Re: (Score:2)
"It defines the term "rightwing extremist" on the second page . . ."
Including the section:
"those that are mainly antigovernment, rejecting federal authority in favor of state or local authority . . . and individuals that are dedicated to a single issue, such as opposition to abortion or immigration."
The idea of rejecting Federal authority in favor of state authority is enshrined in the U.S. Constitution, which is supposed to be the highest law of the land. The Right to Keep and Bear Arms is also explicitly
Re: (Score:2)
Really? It took this report to do that? Where the fuck have you been the last eight years? And why weren't Limbaugh, et al, complaining about the draconian measures when it was the Bush team in control? As much as I understand where you're coming from, I have absolutely no sympathy, because this is what the rest of the count
Re: (Score:2)
I wasn't talking about the last 8 years, I was talking about the recent report from the DOHS. Don't throw me into the same bucket as Limbaugh, Hannity and any of the other mainstream media arse-wipes. They're complete hypocrites, and the "concerns" that they have about this are obviously disingenuous. My principles are genuine and unwavering. I've been vehemently opposed to The Patriot Act, warrantless surveillance, telecom immunity, military commissions, secret prisons, torture, use of violence against
Does it work with dumb browsers? (Score:2, Interesting)
Does it work with browsers that are too dumb to run scripts or active content?
Does it work with browsers that have scripting and active content disabled?
What useful information does it provide if someone is using a proxy-router-boot-cd environment, besides other web sites visited during that session and perhaps traceroute-type information?
What useful information does it provide if someone is using a boot-cd environment behind a router that connects to the proxy? Traceroute-type information won't be helpful
exactly what I thought... (Score:1)
Consider yourself lucky guys... (Score:2, Informative)
All sounds very Windows like (Score:3, Interesting)
"The software's primary utility appears to be in tracking down suspects that use proxy servers or anonymizing websites to cover their tracks."
The feds note your interests as you type, not your proxy for the day 1/2 around the world.
What was once a hardware logger install is now your clicking on a link.
"alarmed when the hacker he was chasing didn't get infected with the spyware after visiting the CIPAV-loaded website."
Seems like someone was using a Mac or Linux/other OS?
What do people think? A deep dark federal/MS approved/AV hidden effort?
Or in house/turned/tame spyware author ?
Would Tripwire save you
The MAC address part reminds me of hints about the anti p2p software called "Operation Fairplay"
http://news.cnet.com/8301-10784_3-9920665-7.html [cnet.com]
Re: (Score:2)
Re: (Score:2)
But if it works based on clicking links... (Score:2, Insightful)
CIPAV, is delivered through links to websites controlled by the FBI, and it silently reports back to a government server in Virginia.
But if it works based on clicking links that presumably take you to the installer, how on earth can you guarantee that your target is going to click on it at all? You'd either have to direct it specifically to the Mark, and hope that he responds, or you'd have to put it someplace so completely mainstream that hundreds of other people click on... oh, shit. I think I'm having an OS reinstall party this weekend.
Re: (Score:3, Informative)
One person was sent the URL in a private myspace chat. Another was trying to extort the cable companies and had given them a private URL (presumably something like www.comcast.com/skldflksdf/freemoney4me.html) to post their response to. The FBI then set up that page to use a browser exploit to install the logger.
All instances were done under court order with almost the same restrictions and provisions a normal wiretap would have.
Re: (Score:1)
Re: (Score:2)
People typically assume they're much smarter than they really are. You, reflecting the FBI's technique realize there are several issues that could limit its success. However, that they do it, obviously it has worked, & given the propagation vectors of a typical internet worm, the successes seen by various phishing scams indicates to me that they'd likely have some success even if they sent out an email with the program as an attachment for the person being surveiled to run even if it indicated in the
Re: (Score:2)
*Sigh* Please RTA.
Uhm, did you forget you're posting on Slashdot?
Re: (Score:2)
Get your PC back with a little something extra after staff "fixed" your computer and phoned you in.
The problem is scale. East Germany needed staff to follow up on all the info flowing in.
Many people must just be noted and flagged "of interest".
The USA has the hardware funding, but it still needs the human touch for now.
Nothing essentially wrong here... (Score:3, Informative)
from TFA: (Score:2)
Re: (Score:2)
He returned to the site 29 times? Must have been really...interesting. I wonder, how can I get the FBI to email me that link? For testing purposes, of course. Yeah, that's it...
catch it in the wild (Score:3, Interesting)
It seems strange that no one has managed to catch this in the wild yet, if it has been in use for that long. Would indicate they are using it in a fairly limited scope (perhaps), if for no other reason to keep from defeating their own tool.
Re: (Score:1)
Re: (Score:2)
or at least then be able to send them on a wild good chase.
Re: (Score:2)
I don't think you're understanding how this works.
Becoming infected with this worm does give you the ability to control of the computers that are infected with it.
Think of it like VNC, or Dameware, it lets THEM control YOU, not the other way around.
Good reason for browsing from VMs. (Score:1)
Re: (Score:1)
Agree with that. If you have a machine that is known to be clean then snapshot it, do your browsing/downloading and revert back to snapshot when you are finished.
For the paranoid you could have a machine that has never been attached to the internet and snapshot it at that point in time *then* do your browsing/downloading and revert back when you have finished. Although the problem I see here is (assuming Windows) getting snagged for security updates everytime you bring this snapshot back to life and hook it
Release to the underground? (Score:1)
If CIPAV has been so widely deployed, one might wonder if it has not been released to black hats already and analysed to death...
Laws Can Work Against Innocents (Score:2)
Electronic rebellion is a bad thing when the other guy does it.
But in all seriousness the ability of any government to fight electronic crime and rebellion sound fine at first but think about it. Perhaps there will come a day when our government is not in control of the situation. Other powers may infiltrate and seize control. This happens frequently all over the world. At that time the very same tools that aid us in catching thieves online or other negative
Re: (Score:2)
Moral of the story? (Score:2)
Re: (Score:2)
did you miss the story about the ibotnet full of macs yesterday?
Re: (Score:1)
Hmm.... "Yes, but does it run on Linux?"
"Imagine a Beowulf cluster infected by this!"
"Of course it runs on NetBSD!"
"OpenBSD: only two vulnerabilities (that the FBI lets us talk about) in the default install since the beginning of the project!"
"CIPAV: a security hole bigger than the goatse.cz guy can even comprehend!"
"In Soviet Russia, CIPAV doesn't know it's running YOU!"
" ' "CIPAV Considered Harmful" Considered Harmful' Considered Harmful"
"FBI Spaghetti Monster: Touched by his stealthy appendage"
"I can has
Re: (Score:2)
Now it just sounds like a really good windows tool kit.
The problem I always had with PROMIS is all the 'different' networked systems it would encounter.
Unless international finance was a 'direct' and 'known' sub system?