Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Privacy

FBI Remotely Installs Spyware to Trace Bomb Threat 325

cnet-declan writes "There have been rumors for years about the FBI remotely installing spyware via e-mail or by exploiting an operating system vulnerability from afar — and now there's confirmation. Last month, the FBI obtained a federal court order to remotely install spyware called CIPAV (Computer and Internet Protocol Address Verifier) to find out who was behind a MySpace account linked to bomb threats sent to a high school near Olympia, Wash. News.com has posted a PDF of the FBI affidavit, which makes for interesting reading, and a summary of the CIPAV results that the FBI submitted to a magistrate judge. It seems as though CIPAV was installed via e-mail, as an article back in 2004 hinted was the case. In addition to reporting the computer's IP address, MAC address, and registry information, it also gave the FBI updates on which IP addresses the user(s) visited. But how did the FBI get the spyware activated and past anti-virus defenses? Two obvious ways are for the Feds to find and exploit their own operating system backdoors, or to compromise security vendors..."
This discussion has been archived. No new comments can be posted.

FBI Remotely Installs Spyware to Trace Bomb Threat

Comments Filter:
  • by 140Mandak262Jamuna ( 970587 ) on Wednesday July 18, 2007 @11:26AM (#19901625) Journal
    ... FBI (and some if-it-will-save-one-child-it-is-worth-it legislators) demand all the OS vendors to install backdoors so that it can come in and install whatever spyware it wants to be installed?
    • by Opportunist ( 166417 ) on Wednesday July 18, 2007 @11:29AM (#19901699)
      "Thank you. You just made hacking a whole lot easier."

      The Germans already proposed something like that. It was retracted when they realized that it pretty much opens the door to any kind of espionage, and that this could quickly turn AGAINST them.

      No backdoor is secure. Word will get out and it will be abused. Worse yet, if you force AV and firewall manufacturers to keep that hole unplugged, you open yourself and all the businesses in your country to industrial sabotage and espionage.

      Think the feds are THAT stupid? Even if, do you think their lobbyists will allow them to?
      • by hpa ( 7948 ) on Wednesday July 18, 2007 @12:00PM (#19902249) Homepage

        Think the feds are THAT stupid?
        Yes.
      • Re: (Score:3, Interesting)

        by Cro Magnon ( 467622 )

        Think the feds are THAT stupid? Even if, do you think their lobbyists will allow them to?


        Yes, to both! The lobbyists aren't exactly rocket scientists themselves.
        • So what if a "solution" to a "problem" today causes more problems tomorrow?

          That just means there's more need for more legislation tomorrow to fix that problem.

          And the cycle never ends.
        • Re: (Score:3, Insightful)

          by Opportunist ( 166417 )
          Lobbyists usually don't care jack about bombs either, though. They might want to sniff through your computers to make sure you don't have files they consider theirs, but they sure as hell would not want that crap on their own machines. Imagine the feds being able to sniff through their files and finding ... teh horrorz!

          So if anything, they'll want this on the PCs of normal people, but certainly not in a system they might use themselves!
      • Think the feds are THAT stupid?
        For future reference, your English compiler can optimise statements of the form 'is/are X that stupid,' where X is any subset of humanity, to the boolean value 'true.'
        • Depends on the size of the subset. The smaller it is, the closer it can get to false. I agree, though, given enough people in a group, the group is dumb. I think the formula was "the IQ of a group equals the lowest IQ of a member of a group divided by the number of people in it".

          Ok, jokes aside. Politicians aren't necessarily dumb. Usually they are not. They may be crooked, bought, influenced and corrupt, but few are really outright dumb. Just because they don't give a rat's rear about the people who voted
      • They don't have to be stupid. They can mandate that the backdoors remain open, and claim immunity for themselves and the compliant companies under the aegis of national security. If it worked for warrantless wiretapping and torture, surely it would work for this. It should work for pretty much any type of surveillance or other government activity. Once those two words are allowed to trump all other concerns, and are allowed to even stifle debate about the programs, then the game is effectively over.
        • Problem is that a hacker in China probably doesn't care about that immunity. Yeah, you have immunity on paper. Niiiiiice for you, btw, I just filed for patent what you wanted to patent next week. Ta-da.
      • by v1 ( 525388 )
        unless of course you install Windows XP Government Edition etc that has the sanctioned back doors covered.

        I'm sure there's something like that out there already. And each major OS has a government manual on how to 'secure' it for government use. Even OS X's manual is around 100 pages of changes to make to secure it to their standards. I haven't seen the windows one yet, but I bet it comes in a seven volume set. ;)
      • by vertinox ( 846076 ) on Wednesday July 18, 2007 @01:22PM (#19903571)

        The Germans already proposed something like that. It was retracted when they realized that it pretty much opens the door to any kind of espionage, and that this could quickly turn AGAINST them.
        Its already happened to Greece's wiretapping software. Someone broke into the main cell phone company and hacked the software installed for legal wire taps to listen in on government official's cell phone. They didn't notice it until they tried to upgrade the software and realized someone had been using it.

        http://www.spectrum.ieee.org/jul07/5280/1 [ieee.org]
    • Re: (Score:2, Interesting)

      by pubjames ( 468013 )
      I thought it was already public knowledge that there is a backdoor in Windows that the security services can use? At least, the NSA - as I recall an NSA key that was discovered when some windows code was leaked some years ago.
      • NSAKEY (Score:5, Informative)

        by Kadin2048 ( 468275 ) * <.ten.yxox. .ta. .nidak.todhsals.> on Wednesday July 18, 2007 @12:57PM (#19903159) Homepage Journal
        Microsoft denied it, they said that the key's variable name being called "NSAKEY" was just an ... uh, you know ... coincidence.

        http://en.wikipedia.org/wiki/NSAKEY [wikipedia.org] is a good primer.

        It was covered extensively at the time by the likes of Bruce Schneier and others, his comments [schneier.com] said:

        Suddenly there's a flurry of press activity because someone notices that the second key in Microsoft's Crypto API in Windows NT Service Pack 5 is called "NSAKEY" in the code. Ah ha! The NSA can sign crypto suites. They can use this ability to drop a Trojaned crypto suite into your computers. Or so the conspiracy theory goes.

        I don't buy it.

        First, if the NSA wanted to compromise Microsoft's Crypto API, it would be much easier to either 1) convince MS to tell them the secret key for MS's signature key, 2) get MS to sign an NSA-compromised module, or 3) install a module other than Crypto API to break the encryption (no other modules need signatures). It's always easier to break good encryption by attacking the random number generator than it is to brute-force the key.

        Second, NSA doesn't need a key to compromise security in Windows. Programs like Back Orifice can do it without any keys. Attacking the Crypto API still requires that the victim run an executable (even a Word macro) on his computer. If you can convince a victim to run an untrusted macro, there are a zillion smarter ways to compromise security.

        Third, why in the world would anyone call a secret NSA key "NSAKEY"? Lots of people have access to source code within Microsoft; a conspiracy like this would only be known by a few people. Anyone with a debugger could have found this "NSAKEY." If this is a covert mechanism, it's not very covert.
        I think the jury is still out on exactly what was really going on; if it was an NSA backdoor, it was a pretty boneheaded one. Alternately, if it was just Microsoft being redundant, then it shows that they didn't plan very well and don't seem to understand security very well. Given the choice between the two, I think boneheadedness on MS's part is more likely.
    • Re: (Score:3, Insightful)

      Those backdoors would be the biggest targets ever for any malware authors. I'd also envision a series of lawsuits from large companies (Intel, AMD, IBM, AT&T, the big pharmaceutical manufacturers, etc.) against the OS vendors and the government as soon as somebody breaks in via the backdoors and steals confidential information. "We've spent billions of dollars researching drug X, and your backdoors allowed hackers to break in, steal all that research, and sell it to our competitors. Now tell us again
    • NSAKEY (Score:4, Informative)

      by bill_mcgonigle ( 4333 ) * on Wednesday July 18, 2007 @12:08PM (#19902387) Homepage Journal
      ... FBI (and some if-it-will-save-one-child-it-is-worth-it legislators) demand all the OS vendors to install backdoors so that it can come in and install whatever spyware it wants to be installed?

      Where have you been [wikipedia.org]?
  • User (Score:3, Insightful)

    by kevin_conaway ( 585204 ) on Wednesday July 18, 2007 @11:26AM (#19901627) Homepage

    But how did the FBI get the spyware activated and past anti-virus defenses? Two obvious ways are for the Feds to find and exploit their own operating system backdoors, or to compromise security vendors...

    My guess is that nothing quite so sophisticated was necessary since the user downloaded and ran an unknown attachment from an email message

    • by Opportunist ( 166417 ) on Wednesday July 18, 2007 @11:38AM (#19901855)
      We have: A teenager who used his computer to send bomb threats through myspace.

      Assumption 1: He doesn't know jack about computer security like 99% of the users out there and simply clicks everything sent to him.

      Assumption 2: The FBI keeps a hole open in Windows that only they know about.

      Assumption 3: AV vendors are forced to keep holes open, as well as firewall vendors and everyone else who could technically find it.

      Assumption 2 and 3 bear a heavy load. Assumption 2 implies that EVERY Windows OS can be remotely exploited. Now, it IS possible to reverse Windows. And since there are Windows emulators out there that can handle calls to functions most people don't even know exists, it's safe to assume that quite a few people already reversed some parts of Windows. A hole would have been found by now. More important, such a hole could easily be used against US companies when, say, China finds them and uses it to eavesdrop on confidential data. If such a hole existed, the first thing the FBI would do is make sure that no US company dealing with critical or sensitive information (nuclear, biological, you name it) uses Windows as their main operating system.

      Thus I consider it rather unlikely.

      Assumption 3 includes that every AV vendor on this planet knows about the hole/malware and keeps his mouth shut. Now, a good deal of such AV vendors sit in countries that are not the US, worse, some of those countries are economical competitors to the US. Think they'll keep silent? Or that they would include it into their software? Hardly likely.

      I'd stay with assumption 1: He was careless, clicking on everything and running no AV kit.
      • Re: (Score:2, Funny)

        by dintech ( 998802 )
        implies that EVERY Windows OS can be remotely exploited.

        Who needs the FBI for this? Microsoft have been doing this all by themselves for years...
      • He didn't necessarily need to be running no AV, as most AV software only blocks specific viruses. Even if it is millions of specific viruses, most of which no longer even work, they still miss anything they don't know about.
      • by mpapet ( 761907 )
        Your logic may make you feel better, but it has no application in the real world.

        First, "security" software in win32 is not impermeable.

        Second, let me reassure you if the Feds considered you and I "persons of interest" they have the tools necessary to collect information on your online activities regardless of firewalls and antivirus software.

        This isn't some kind of conspiracy. It's a matter of fact and it has been this way for at least a decade. If that seems implausible, then you need to readjust your b
      • Re: (Score:3, Informative)

        by PPH ( 736903 )

        Assumption 1: He doesn't know jack about computer security like 99% of the users out there and simply clicks everything sent to him.

        Most likely the case.

        However:

        Assumption 2: The FBI keeps a hole open in Windows that only they know about.

        Why is Microsoft's DoJ settlement supervised by a FISA court judge (Kathleen Kotar-Kelly). These judges are the only ones cleared to review cases where espionage techniques may be revealed and there is a need to keep such information out of the public record.

        Assumpti

      • Re: (Score:3, Interesting)

        Comment removed based on user account deletion
  • Hold it, hold it... (Score:4, Interesting)

    by Opportunist ( 166417 ) on Wednesday July 18, 2007 @11:27AM (#19901637)
    ...where does it say that the guy even had any kind of AV software on his computer?
  • by ergo98 ( 9391 ) on Wednesday July 18, 2007 @11:27AM (#19901653) Homepage Journal

    Two obvious ways are for the Feds to find and exploit their own operating system backdoors, or to compromise security vendors...

    Would it even be necessary to compromise security vendors? While heuristics and malware detection has been something long promised, it is my understanding that the vast majority of security software works purely by comparing against their dictionary of known attacks. If the police have highly specialized, very limited deployment spyware, it seems that most security software wouldn't have any inkling that it's malware in the first place.

    I have no doubt that organized crime and government agencies are aware of and abusing exploits. Given that they don't blast it to the world like a giddy teenager looking for attention, no one knows what to look for.
    • Exactly, I could code up some kind of spyware and deploy it as a standard .exe via email with the subject line "Important security update from your IT department." If I target 5 people the chances of my code being detected by heuristics is very low and the chances of one of these 5 people reporting it to the big AV companies is close to zero.
    • Actually most AV software today works with a mix of signature matching, heuristics and behaviour analysis. At the very least, the latter two would detect something that nests deeply into your system, examines your private information (IP addresses, sites visited...), and reports the findings as something "suspicious".

      In other words, for software doing something like this to be NOT found, it would have to be whitelisted. At least for most AV tools this is the current situation.
  • by Spudtrooper ( 1073512 ) on Wednesday July 18, 2007 @11:28AM (#19901669)
    From: spyware@fbi.gov
    Subject: Click here for free movies!
    Attachment: not_spyware.exe

    Hello! You have been selected to receive free movies at no cost to you! All you have to do is install the attached program to start downloading all the latest Hollywood hits free of charge!
    • Re: (Score:3, Funny)

      by tehcyder ( 746570 )

      From: spyware@fbi.gov

      Subject: Click here for free movies!
      Attachment: not_spyware.exe

      Hello! You have been selected to receive free movies at no cost to you! All you have to do is install the attached program to start downloading all the latest Hollywood hits free of charge!

      Oh, FUCK.
    • Re: (Score:3, Funny)

      by elrous0 ( 869638 ) *
      Headline of a future Washington Post article:

      "Our Investigation Was Going Nowhere Until We Thought of Posing as a Nigerian Prince," Says FBI Agent

  • Two obvious ways are for the Feds to find and exploit their own operating system backdoors, or to compromise security vendors...
    There are other ways:
    -Social engineering (either against the person, or his mother)
    -Breaking into the basement^W house and installing the damn thing
    -Hiding it in porn
    • by john83 ( 923470 )
      There are more than that even. They track down crackers. I'm sure they put some of them to use afterwards.
      • I don't buy it. This is the FBI. These guys can barely tie their own shoelaces but you think they can hack computers? I laugh.
        • by john83 ( 923470 )

          I don't buy it. This is the FBI. These guys can barely tie their own shoelaces but you think they can hack computers? I laugh.
          How hard is it to pay someone who can?
  • by ShaunC ( 203807 ) * on Wednesday July 18, 2007 @11:29AM (#19901703)

    But how did the FBI get the spyware activated and past anti-virus defenses?
    Easy, they sent it to some kid on MySpace. It's a rather large assumption that he had any anti-virus defenses at all, much less that AV vendors are being complicit with the FBI trojan.

    Something seems fishy about the whole story, though. This guy was apparently savvy enough to use a proxy in Italy to send his Gmail bomb threat emails, so he was at least trying to cover his tracks... But he was dumb enough to open a random email attachment? It strikes me as more likely that the CIPAV is deployed through a browser exploit (or perhaps even "legitimately" as an ActiveX control or BHO, people will install anything).
    • by Opportunist ( 166417 ) on Wednesday July 18, 2007 @11:53AM (#19902131)
      Using an onion router is no sign of computer knowledge. Some pal might have pointed him to The Onion Router [eff.org], he saw it, went "wow, they can't track me if I got that", and that's it.

      Just because someone does something the "average Joe" cannot or does not do, doesn't mean that he knows more than said Joe. He might just have gotten some clue from a pal, without said pal telling him the whole story.

      It's simple script-kid style. Yes, some of the malware that circulates is pretty well written, but the people using it are sometimes so dumb that you wonder if they ain't better off serving fries. They're bound to be caught.
  • If this guy will open random e-mail attachments, there is a good chance he already has tons of spyware/adware/viruses on his machine anyways. I doubt he would have noticed one more.
  • I keep re-reading my Constitution, and I don't see where it allows for a police power for the Federal government to go after bomb threats or any similar crime.

    Is a bomb threat considered piracy?

    Is a bomb threat considered treason?

    Is a bomb threat considered counterfeiting?

    If it isn't, there is NO Federal allocation of power to go after bomb threats, period. What the FBI is doing is not just unconstitutional, but any political leader who took an oath to uphold the Constitution is violating the only oath the
    • I'm pretty sure car jacking and armed robbery and even hijacking an airplane aren't covered in the constitution either. There are however laws dealing with mass hysteria which said threat could cause. There is nothing in the constitution keeping me from going to the beach and yelling 'SHARK!!!' either, but guess what, its illegal.
      • by dada21 ( 163177 )
        I'm pretty sure car jacking and armed robbery and even hijacking an airplane aren't covered in the constitution either. There are however laws dealing with mass hysteria which said threat could cause. There is nothing in the constitution keeping me from going to the beach and yelling 'SHARK!!!' either, but guess what, its illegal.

        Car jacking is a local crime. There were horse thefts when the Constitution was written -- and those aren't covered. People stole river boats, too, and those weren't covered. A
        • by mulvane ( 692631 )
          You are wrong about constitutionally protected speech when it can cause harm or mass hysteria. That is NOT protected. I'm curious how the 2nd would protect against airline hijacking though.
          • Re: (Score:3, Insightful)

            by dada21 ( 163177 )
            You are wrong about constitutionally protected speech when it can cause harm or mass hysteria. That is NOT protected.

            At the Federal level it surely is, regardless of what the Supreme Court wrongfully interpreted. Let us read a very simple part of the Constitution, a document written specifically to declare what the Federal Government can do, and what it is restricted from doing:

            Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the fre
            • Re: (Score:3, Insightful)

              by giafly ( 926567 )

              Show me one terrorist who would dare to threaten hijacking on a plane where half the passengers are armed and trained and protecting themselves.
              • You have apparantly never heard of suicide bombers?
              • Also who needs real terrorists if half the passengers are trigger-happy amateurs? Just 'phone in a hoax and hope they panic.
    • Congress does a lot of things that are not authorized in the Constitution..Social Security, Department of Education, and on and on. Many of them are "good" things. Personally, I heard a suggestion a couple of years ago that I think would be a great idea: before Congress can consider any Bill, it must contain a clause which states where in the Constitution Congress is given the authority to legislate on this particular topic. This would eliminate a lot of laws from even being considered and make it easier to
      • by dada21 ( 163177 )
        Congress does a lot of things that are not authorized in the Constitution..Social Security, Department of Education, and on and on. Many of them are "good" things.

        You just named the two of the worst parts of Congress from the beginning of the 20th century. Both of these items are local items per the 9th and 10th Amendments, and since the Federal government got involved, both those items are now much worse for the average citizen today than before those "laws" were enacted.

        Personally, I heard a suggestion a
        • Actually, there is one Congressman who reads EVERY bill before he votes on it along with his staffers . The minute they hit an unconstitutional part of the bill, he immediately decides to vote no. I believe he said he rarely has to get through 2-3 pages of any bill before his decision is made for him.

          Is this Dr. No [wikipedia.org]?

          it does not give you rights, it takes rights away from the State who want to take your natural rights away.

          Actually, the State never had those rights to 'take away'. It's a specific limit on p
      • by LuSiDe ( 755770 )

        Congress does a lot of things that are not authorized in the Constitution..Social Security, Department of Education, and on and on. Many of them are "good" things.
        Matter of viewpoint. Beauty lies in the eye of the beholder. Some argue the IRS does "good" things...
    • I keep re-reading my Constitution

      Oh, that old thing?

      Welcome to a post-9/11 U.S. where people don't stand up for their constitutional rights because they are too busy buying duct tape and plastic sheeting.

      You're right, in a sense, that the FBI probably isn't allowed to do this stuff; but, no one in authority is going to stop them.

      Pretty soon, people in this country are going to have to start exercising their 2nd Amendment rights for the reason it exists: armed revolution.
    • I am an attorney, although neither constitutional no criminal law are my areas of expertise. Most federal laws that govern things like this are under the "Commerce Clause". This clause gives the federal government the power to regulate commerce between the states and it has been interpreted to allow federal regulation of almost anything. In this case the crime is making threats over e-mail. Because of the nature of e-mail that threat travels over interstate communications lines. People pay to pass pack
    • Was the bomb threat made using some national or international infrastructure (e.g. phone network, Internet, or postal service)? Did the bomb threat result in a potential loss of revenue for any national or international business? If the answer to either of those is 'yes,' then Congress can claim it falls under the heading of 'regulating interstate commerce.'

      I'd worry more about the enormous back doors in your constitution before you started worrying about back doors in your OS.

  • The Feds would have the $$$ and be able to hire the skill labor to build some pretty sophisticated spyware tools. On the other hand, I wouldn't be surprised to find out Microsoft included a back door in Windows. That rumor has surfaced before.

    The problem with either of those options is if they get out in the wild. How many people have access to those tools and how is their deployment managed? Who wouldn't be tempted to do a little sideline testing if they had those goodies in their tool chest.

    • Once they stopped honoring and enforcing the Constitution of the United States of America, and violate it arbitararily.
    • Spyware in Windows would be rather dumb. The net does not know who you are and it does not care where you come from, a backdoor usable by the FBI is also usable by a foreign agency to conduct industrial espionage. And if you hardwire it to accept only a handpicked few addresses, it turns from something you can claim as a "bug" into something that is invariably a spying tool. Can you imagine the diplomatic problems that come bundled with that?
      • And if you hardwire it to accept only a handpicked few addresses, it turns from something you can claim as a "bug" into something that is invariably a spying tool

        Not necessarily. The US government owns a fairly large block of IPs. It could be a bug in some optimised packet processing code that 'accidentally' caused packets from a certain /8 with a certain header to be injected into the instruction stream. It's just a 'lucky accident' that the /8 happens to correspond to one containing all of the FBI's computers...

        I'm not saying they do it this way (or at all), but that's probably what I'd do.

  • Woot! (Score:3, Funny)

    by DRAGONWEEZEL ( 125809 ) on Wednesday July 18, 2007 @11:37AM (#19901845) Homepage
    They think this guy really did it! I fooled 'em good!

  • Is that it simply used social engineering to convince the recipient to run the tainted executable, thus infecting himself, rather than relying on being able to exploit a hole that may or may not be present. Male teenager? Offer him free porn, he'll barely be able to double-click the exe fast enough...
  • by mpapet ( 761907 ) on Wednesday July 18, 2007 @11:54AM (#19902141) Homepage
    I know this site is a big echo chamber but the simple fact of the matter is Federal law enforcement coordinates very closely with every computer vendor that has anything of interest to them. The coordination efforts are expressly for purposes like this. I seem to recall photochop will throw an error if you try to scan U.S. currency. It's like that, only everywhere and no error messages.

    Law enforcement is very deep into every aspect of computer activity. It's been this way for more than a decade.

    The /. moral outrage rings very hollow because no one will fight for anything different.
  • The Problem (Score:5, Interesting)

    by Bob9113 ( 14996 ) on Wednesday July 18, 2007 @11:58AM (#19902217) Homepage
    I support surveillance by law enforcement agencies. I also believe in fairly stiff penalties for breaking the law (though I would add that I feel that harsher penalties for real crimes should be balanced with reducing the breadth of behavior that the government restricts). However, I am opposed to the use of spyware on the suspect's property for such surveillance. Why this conundrum?

    The problem is that technology is getting closer to us all the time. The barrier between man and machine is becoming much narrower. And that is a good thing. At the far end of the spectrum people have long been getting artificial hearing enhancers, and now we are starting on intelligent artificial eyes and limbs. People with epilepsy are getting electronics embedded in their brains. At the nearer end of the spectrum, a large percentage of the population now carries a small computer with them everywhere (their cell phone). The man/machine split is disappearing.

    So what? Well, we have a problem developing if the government assumes that anything that does not have your genome is fair game for them to crack. Today it is the suspect's computer. This already poses a problem if the suspect is, for example, engaged in legitimate contracting for some corporation - should the government have the right to compromise the security of that corporation because one of their employees is breaking the law?

    But what of the more tightly coupled technology? Should the government be allowed to plant a bug in my hearing aid? Should they be allowed to tap the signals coming from my artificial eyes? Should they be allowed to monitor the same brain activity patterns that my seizure mitigating device monitors?

    The problem is that we are becoming more closely coupled with technology, and that is a good thing. We are the first species in history to actively engage in our own evolution. But if we cannot trust our technology, it creates a barrier to that evolutionary step. I have the right not to self-incriminate. But if a computer is part of me, where does the line get drawn?
  • by Anonymous Coward on Wednesday July 18, 2007 @12:05PM (#19902339)
    Declan not only ripped this story off from Wired without attribution, he got it wrong. There's no way the police could have emailed the tracking software to the kid as an attachment. Myspace doesn't allow attachments. Want to see the real story with real reporting: try the original story here: http://www.wired.com/politics/law/news/2007/07/fbi _spyware [wired.com]
  • Why else do you think they call it 'Spyware'. Geez.
  • by mi ( 197448 )

    I'd be rather upset, if an American government agency were unable to find a way to find a (legal) way to penetrate an American-made operating system with or without cooperation of American computer-security firms to investigate bombs threats against an American school...

    Yes, privacy is very important — unless you are dead, that is...

    To protect a few hundreds of innocents from McCarthy-like harassment, America shackled its intelligence services in the past, which appears to have contributed substan

  • Happening right now. (Score:3, Interesting)

    by Anonymous Coward on Wednesday July 18, 2007 @01:01PM (#19903249)
    Too much info has been released and I can explain what is occurring right now. This is not speculation.

    - E-mail account made at a foreign e-mail hosting site that has an extremely terse address so as not to be hit by spambots (i.e. 4433dakjikk83726jj@somewhere.org)
    - E-mails are sent from a stolen laptop through a public wireless access point that are copycats of this crime to illicit the same FBI response.
    - E-mails are then checked each day from different public access points each day using a different MAC address at each access point. [The only e-mail that should be coming into this account would be the one from the FBI. Probably easy to verify by checking DNS records of the e-mails originating IP or IP block.]
    - E-mail is received and copied to disk.
    - Laptop is destroyed.
    - CD with e-mail is then analyzed on a Linux/Unix machine that has no internet connection.
    - Backdoor/exploit vector is discovered and used for "other" purposes.
  • Grey-market exploits (Score:3, Interesting)

    by athloi ( 1075845 ) on Wednesday July 18, 2007 @02:13PM (#19904371) Homepage Journal
    The answer is right in front of you [securityfocus.com]. Governments and spy shops pay for exploits before they're made public, so they can use them to enter your machine as they need to. In this case, we don't know how CIPAV was delivered, but it might be as simple as an undiscovered exploit in Outlook or a browser-based email system. While none of us trust government, I equally don't trust my fellow citizens, so the "ethics" of this point are moot.

I tell them to turn to the study of mathematics, for it is only there that they might escape the lusts of the flesh. -- Thomas Mann, "The Magic Mountain"

Working...