US Government Checking Up On Vista Users? 291
Paris The Pirate writes "This article at Whitedust displays some very interesting logs from Vista showing connections to the DoD Information Networking Center, United Nations Development program and the Halliburton Company; for no reason other than the machine was running Vista. From the article 'After running Vista for only a few days — with a complete love for the new platform the first sign of trouble erupted. I began noticing latency on my home network connection — so I booted my port sniffing software and networking tools to see what was happening. What I found was foundation shaking. The two images below show graphical depictions of what has and IS trying to connect to my computer even in an idle state'."
I call bullshit. (Score:5, Insightful)
1.The screenshots clearly show WinXP, not Vista. In fact, this guy's ultra-leet "port sniffing software and networking tools" is PeerGuardian 2 [phoenixlabs.org]. Straight from the product's home page: Note: PeerGuardian 2 does not support Windows Vista at the moment. This is a top priority, and we hope to have a Vista download soon.
2. Lame screen shots from some Windows app isn't enough to validate a conspiracy theory. Where's the complete traffic dump? And not from some random guy and his "fanboy" friend; how about a creditable network security organization? Hell, I'd even settle for an intern with his CCNA.
3. Hard to tell because all we have are screen shots, but it looks like nothing more than port scans.
(Guess is this is what I get for spending a beautiful Sunday afternoon indoors, on my computer).
Re:I call bullshit. (Score:5, Insightful)
The screenshots also clearly show another computer is involved, since he is remoting from his Vista PC to his Windows PC. Perhaps they are both on the same network, and he has reason to believe that these connections are being caused by having Vista on the network.
Re:I call bullshit. (Score:5, Insightful)
PeerGuardian is for blocking *incoming* connections, this has nothing to do with Vista *AT ALL*.
The names that show up against the IP are taken from user submitted rule files(In case you didn't know this is so that IP's from RIAA/MPAA employed companies can be blocked-who log all ip's connected to any torrent as seeds/leeches). There is no validation on the name corresponding to the IP. Complete and utter FUD.
Even the IPs DID correspond to DoD etc.. there is a completely plausible reason for that.
Bit torrent clients cache IP addresses so that they can connect to all the seeds/leeches in case the torrent managing host goes down. All this has proven is that the US Government uses Bit torrent.
Re:I call bullshit. (Score:5, Insightful)
Maybe he's got multiple machines hooked up to a hub, with the XP machine sniffing in promiscuous mode. Maybe he's tunneling the connection through the XP machine. Who knows. While I too am inclined to call BS, the XP argument doesn't fly.
Highly Suspicious to me... (Score:5, Insightful)
Also, "Halliburton"? Give me a break.... First, what type of tool is going to return a text output so blunt... Not is not "HA-39214", but instead is just "Haliburton" the evil company.... Also, I am certainly not a fan of the company and its former involvement with the vice president which just smells bad to begin with, but what in the world would a military contracting company that fufills soft drinks, food, oil, and other supplies to military groups want to monitor computers... This is just unrealistic...
FUD (Score:2, Insightful)
Re:PeerGurdian is not a legitimate investigative t (Score:5, Insightful)
Re:I call bullshit. (Score:5, Insightful)
Blah how does this make the front page? There are million of reasons for these connections.
Maybe he is using a dynamic ip based isp and he just got a new ip? Maybe the last person who used that ip was using bittorrent? Botnets trying to reconnect to this ip?
Aside from those "Remote Desktop" xp screenshots, I noticed there are Hei Long Jiang education committee, UN Development program, China Edu and Research Network, and whatever.
I guess the DoD and the "Chinese intelligence agency" are both attacking his computer.
UN probably sent some people to infiltrate his computer as well.
Wait, Hei Long Jiang is right next to Russia? Maybe the KGB is using China's network to go after him as well!*roll eyes*
Even if they are not bt, they might just as well be port scans.
News for nerds, indeed.
I was going to mod you down... (Score:5, Insightful)
As you'll see in one of the follow-up posts to this parent the software is being run on a second systems (since as you point out Vista isn't supported the listener is XP).
As to the credibility of the rest of the story I suppose that's up for grabs. Or rather reproducibility. Sniffing software is easy enough to install/use. Maybe the poster of the original story is being watched via a government trojan. Maybe there is a backdoor for the government to use to monitor potential criminal. I imagine if ALL Vista systems phoned home like this they'd be drown in data so it's either addition software, activated existing feature or hoax/fluke.
Re:Highly Suspicious to me... (Score:3, Insightful)
[Querying whois.arin.net]
[whois.arin.net]
OrgName: Halliburton Company
OrgID: HALLIB-1
Address: 10200 Bellaire Blvd
City: Houston
StateProv: TX
PostalCode: 77072-5299
Country: US
NetRange: 34.0.0.0 - 34.255.255.255
CIDR: 34.0.0.0/8
NetName: HALLIBURTON
NetHandle: NET-34-0-0-0-1
and so on. So, yes, it's in Halliburton's IP range. That still does not mean anything, though. PG as a traffic analysis tool is a joke, as others pointed out already. At least he could have displayed the destination port and check what service is supposed to listen to it, if any. This way it might very well be just a bunch of zombies portscanning away[*] - there are a bunch of University addresses (Purdue, Athens, Rio) and a couple of Chinese IPs. Wow, MS must have really sold out to the barbarian invaders, right?
[*] I'm giving the guy the benefit of the doubt about these not being attempts to connect to his previously-running p2p application, although with the carefully-trimmed destination ports from his screen-captures maybe I shouldn't. After all, he was clever enough to tune this blog entry to the net-herd paranoia and get hits from at least
Connection to or from? (Score:5, Insightful)
Because those are trying to connect TO his computer from the outside, not the other way around.
What a load of bullcrap. Where does
Re:I call bullshit. (Score:2, Insightful)
Statistics (Score:5, Insightful)
Halliburton? (Score:3, Insightful)
He's really grasping, isn't he.
I might've read the article (Score:2, Insightful)
The worst part about stories like these is that it obscures what the government is really doing to invade our privacy.
How about some editorial control, Slashdot?
Highly plausible... (Score:2, Insightful)
Now, I'm not agreeing that the proof is 100% credible, and I'm not completely disregarding the fact that this might really be a sham, but the previous experiences the US has had with any sort of monitoring on the peoples should be enough to regard this with high suspicion.
Monitoring through the internet isn't difficult. You don't need to be a Government agency with vast resources at your disposal. All you need is a terminal, and knowledge. I think the Government has plenty of both. Most people with internet connections don't know how to check the connections going into their computer. They don't know how to "port sniff". This makes for millions upon millions of victims to such an invasion of privacy.
I strongly believe this should be taken more seriously than it is at the moment. If wire tapping is illegal, and is treated with such priority, then I think this should be handled the same way. We have nothing to lose by assuming this is legitimate, and we have so much more to gain by going directly to the facts, by means of thorough investigation. This shouldn't be taken lightly.
Re:I call bullshit. (Score:3, Insightful)
I personally would have done it with a Linux machine myself using Ethereal or something reliable. The fact is you cannot trust Vista to report the packets in an unbiased manner. It could theoretically drop these packets before they make it to your OS.
Either way if you set up a ARP spoofing attack on your own network (or have a managed switch) it would be better means of packet sniffing the network so that you dont even have to remote into Vista to get this going.
Re:I call bullshit. (Score:5, Insightful)
P2P and fast-flux networks is the current cutting edge of botnets, and that fits with all the inbound connections he's seeing.
The explanation that fits best with his experience is that his Vista box has already been owned and has become part of a botnet.
While his conspiracy theory that Microsoft is in bed with DoD, DOHS, and Haliburton (gimme a break!) is clearly anti-MS FUD, there is good reason to draw a bad conclusion about Vista from this. One of Vista's big selling points was better security, yet here we have somebody stepping up front and center with an apparently freshly installed and freshly owned Vista box.
The article doesn't speak well of Vista, but not for the tinfoil hat theory advanced by its author.
The other leading theory, which has been advanced by a number of others, is that he's running bit torrent or another P2P app. This is also plausible, and if the zombie theory is wrong, then the P2P app theory still holds. Bhy far the least likely explanation is the conspiracy theory advanced by the author.
No Destination Ports (Score:5, Insightful)
My guess is that he's running some P2P software. Guess what? The U.S. Government does get 0w3nD and does have problems with viruses, trojans, and P2P software.
Nothing to see here. Move along....
Re:Statistics (Score:5, Insightful)
As I see it, there are two possibilities:
The first is that the story actually had credibility with Zonk and he was more than happy to put it up. Put Halliburton in a story and the truthers soil themselves. The second; Zonk saw through it like any other technically savy grownup and knew it would be ridiculed. In that case it is a sort of April Fools joke.
Anyhow, there are plenty of reasonable explanations already posted for the 'evidence' provided. Here is one I didn't notice; why would 'they' use easily identified domains to spy on people? 'They' run the world so clearly 'they' could arrange for something less obvious, no?
Finally, is there any recourse for a business that has had it's products publicly slandered? I'd hate to see Microsoft get a piece of
Re:I call bullshit. (Score:3, Insightful)
If there's no outgoing requests, but just incoming, this is more likely to be cached P2P entries, where the outside hosts are trying to reach a (now gone) peer, be it bittorrent, edonkey, kademlia or whatever.
It would have been very interesting to see the incoming port numbers that the outside clients are trying to connect to. My bet would be on these being p2p software ports -- quite possibly known because this very same guy was leeching pr0n the night before.
Worst /. Story Ever? (Score:3, Insightful)
One, he is sniffing with a crappy piece of software that is barely a sniffer. Secondly, unless he has that XP system he claims is a Vista system, monitoring a HUB, not a switch, that the Vista machine's traffic has to go thru, he isn't sniffing anything relevant. Last, this is pointless paranoia.
You want to see more of your "government conspiracy traffic?" Find someone at an ISP to help you, as you will need a piece of public IP address space. Route it to someplace where you can monitor all the traffic destined to it, and plug nothing into that segment of your network. It just has to exist, and be publicly accessible. It goes nowhere, has no devices in it, it just exists. Then turn your sniffer on, and watch the botnet traffic fly by. Yeah, you will see attacks coming from everywhere, nowhere to go, and still they scan like crazy. And yes, you will see it come from DoD address space too, heaven for-fucking-bid.
Oh, and when do your sniffing, use a real sniffing tool. Then you can tell us what kind attacks the scary US government is mounting against its most paranoid citizens.
Re:I call bullshit. (Score:1, Insightful)
Re:think again (Score:5, Insightful)
Kuwait Ministry of Communications
AAFES/Barracks
Military Medical Academy
And a host of other weird entries. I know I've seen DoD on there before... let's check my older logs:
Federal Electric and Water Authority (WTF?)
Saudi ARAMCO (oil company)
OK, no DoD now, but the point is that weird crap shows up in Peerguardian all the time. DoD entries appear fairly frequently. If this guy's run any P2P software in the last, oh, week or two, that'll cause this to happen.
Re:I call bullshit. (Score:3, Insightful)
If this guy is doing this internally, why is the remote desktop session showing 192.168.0.1, and the PeerGuardian logs showing a destination of 24.247.148.173? Surely if these two machines are on the same network with internal addresses, there's a NAT box somewhere stripping any evidence of the global outside destination in the original IP header. Even if the XP box is sitting at the end of a SPAN port monitoring traffic, why is he delegating global IP addresses to his equipment behind his router?
If the XP box is in a DMZ, is it really any wonder that it's receiving random traffic from large bot infested networks, and even then, why is the traffic so infrequent, and why are there no regular ISP ranges like you'd normally find in a promiscuous scan of incoming traffic?
This just does not look credible at all.
Mods on crack again. (Score:3, Insightful)
Who modded this dweeb insightful.
Metamoderators please spank these mods.
Yawn! (Score:3, Insightful)
Since Windows XP, info from your XP computer is sent out to Microsoft.com - I don't have it, so I can't report much about it, but with a decent firewall installed, many software packages "call home", repeatedly and totally without justification. One does not need to check daily for updates! Adobe on my top list.
And - with the recent court approved installing of a sniffer on a potential suspect's computer - doing non-approved sniffer installs is probably more frequent, not even considering botnets.
It furthers an atmosphere of fear, is not empowering and in short - sucks!
Re:I call bullshit. (Score:4, Insightful)
I'm afraid I have to agree. The misleading article summaries are bad enough, ranging from being irrelevant to actually implying the opposite of what the articles in question say, but I find it hard to believe the Slashdot editors would really believe the sort of claptrap written in this article. I think the sad reality is that they know it's drivel, but also that it will generate traffic, especially from the nutter contingent, and this, in my view, reflects poorly on their integrity.
Not plausible at all (Score:3, Insightful)
Should you trust Vista crypto totally, if you really have something to hide? Probably not.
Would they be as stupid as to let every computer send traffic to DOD computers? Obviously not. Even if most don't know how to monitor traffic, enough do that there would be an immediate uproar.
Possible "hidden features" would either need the system in question (secret keys....) or would be dormant. If turned on by some events, I'm sure their effects would be non-obvious too. Sending network packages to a DOD address isn't.
This story is BS.
Re:I call bullshit. (Score:3, Insightful)
However, we don't know how much user error was involved.There's always the chance that he was running admin and clicked yes when it asked him whether vista_activation_keygen.exe should be allowed to run with full admin rights...
Re:I call bullshit. (Score:3, Insightful)
Re:PeerGurdian is not a legitimate investigative t (Score:3, Insightful)
If this guy wants to actually prove anything ro see what is going on, he needs to first find out what the address is for, and then toss a software firewall or other sniffer on the Vista box to see what process is interacting with it.
I do love the conspiracy theorists that think that someone like MS is smart and sneaky enough to build monitoring like this in, and assume it won't be found (please remember there are a lot of places with the Windows source code http://www.microsoft.com/resources/sharedsource/d
Re:I call bullshit. (Score:4, Insightful)
Re:I call bullshit. (Score:5, Insightful)
Actually, my first reaction to this article was "What! The US doesn't need to make connections to spy on me!" With AT&T's big fat pipe to the NSA, the government get's all the data it wants about me, even though I run Ubuntu.