Quoi de neuf ?

Bienvenue sur Psychonaut.fr !

Le forum des amateur.ices de drogues et de l'exploration de l'esprit

FBI search for criminals in the internet

  • Auteur de la discussion Auteur de la discussion GOD
  • Date de début Date de début

GOD

Holofractale de l'hypervérité
Inscrit
14/1/06
Messages
14 944
During the Judiciary Committee of the House of Representatives meeting held on Wednesday, the US Federal Bureau of Investigations has offered a sneak preview of its upcoming actions to fight crime in the cyberspace.During the meeting, the US congressman Darrell Issa tackled the topic of online crimes and of how the FBI could protect civilians, government agencies and military structures from malicious Internet users. More than that, he asked the Bureau whether they needed additional legal privileges to get proof of the attacks and start the attackers’ prosecution."I think legislation has to be developed that balances, on one hand, the privacy rights of the individuals who are receiving the information, but on the other hand, given the technology, the necessity of having some omnibus search capability utilizing filters that would identify the illegal activity as it comes through and give us the ability to preempt that illegal activity where it comes through a choke point as opposed to the point where it is diffuse on the Internet," claimed FBI director Robert Mueller in his testimony.At the moment, the FBI is constantly monitoring some parts of the Internet, including chat rooms, websites and P2P networks, in order to detect and stop illegal activities. However, their power is geographically limited, which leaves other portions of the global infrastructure open to such activities.According to Mueller, criminal activity could be centralized no matter of the attackers’ geographical location by tapping into the Internet backbone. All the Internet activity, be it legal or illegal, passes through backbone hubs located in hosting facilities across the country. FBI wants the legal authorities to rummage through all the traffic using automated software and to search for illegal aspects.It's not a secret anymore that the FBI is currently reading emails, instant messaging conversations or other types of private data, but such a law would give the Bureau the legal foundation to re-place privacy second after security concerns.
 
mhh i dont know why i feel feelings of hate towards FBI... also for me the word illegal doesn't represent bad or harmful actions most often ...

peace.
 
Yeah, funny, that. Instead of helpful agents protecting people from criminals, it conjures up images of inquisitors busting into people's homes and arresting them because they might have a bit of a plant on them that a percentage of society has an uneducated, ignorant moral stance against.
 
well said
 
Web 2.0 is a brand new society... The debate "Does a society need a police-organ?" is an old one.

I can agree with them. People should be aware that they have be careful about internet. If people get busted because of internet crimes they should have educated themselves better about internet.
The article wasn't about drug users/dealers/manufacturers in particular, keep in mind there is still child porn, virusses, phishing sites, identity theft,....

It's just the laws that should be changed. The internet MUST be watched, but the whole idea of "What is a crime and what not" is waaay to messed up with the FBI.
 
Computers Identify Their Owners by the Way Users Type


Computer security company e-Solutions has developed an innovative system based on individual typing behaviors. The new technology is inspired by the fact that humans can tell a friend from another by different clichés and patterns in language. Computers equipped with such identification technologies can analyze different interaction factors, such as typing speed, rhythm and agility. The new algorithms are especially tailored to replace the old biometric authentication technology, as the latter is becoming more and more unsafe, not to mention the false negative authentication issues it might trigger. The e-Solutions authentication system adds an extra layer of security to the regular log-in systems. While fingerprint readers and retinal scanners are problematic as well as extremely expensive, the company's Remote Biometric Authentication system analyses miscellaneous interaction factors, in order to create an individual user profile, also known as a "typing fingerprint". The underlying software application takes note of different aspects while typing, such as pauses, mistakes, speed or hesitations, some features that are believed to be as identifiable as one's handwriting. More than that, the results are not biased by either the working environment or by the keyboard being used, even if the user has never used the respective model before.

"Two-factor authentication has become commonplace in confirming remote worker identity. But it can be cost prohibitive for many organizations," said Angus Stewart, managing director at e-Solutions. "Remote Biometric Authentication requires no additional hardware, management costs or user training and can be built into other applications easily," he continued.

While it may be true that biometric security can be sometimes tricked into granting an unauthorized person access to a computing system, it has the great advantage of being extremely simple to use and almost working out of the box. Despite the fact that there are no additional details about how the Remote Biometric Authentication system works, it is alleged that it would require some "training" before storing the users' profile. Last, but not least, the typing speed and accuracy can be influenced by multiple external factors, such as fatigue or loss of focus, which would have the users fail as they make more typing mistakes than usually.
 
I used to use Hushmail, too....ever hear of 'Carnivore' ?

( I know, the irony...) It is/was a program that the FBI was using ten years ago to snoop on those kinds of accounts. With this 'war on everyone' these GODDAMNED neo-cons are waging, the NSA has a bigger budget than ever, and
they are probably actively cracking all encrypted emails....I think they can crack any encryption if they want to, and you know there are plenty of bored employees with ZEEEEEE-RO oversight who can do whatever they want, then
manufacture a reason if they need to explain later how they came upon the information in the first place.

If cops can't be trusted to use Tasers sanely, and effectively, what makes anyone believe they don't abuse the electronic surveillances?

GOD-
It mite seam, too me, ThaT de-featIng thEESe algorithemsses
wooD be EaZY. Enuff Butt mayy reequIre. Some adjustmentz...
 
To do anything in code in the net one has to meet the people who get the code in private and exchange codes . If the code is kept on you net computer it is not safe and defeats the purpose of the action as it is posible to take over full controll of your computer when you are in the net without you being able to do anything about it or even notice it .
 
no I Never herD of Carnyvore...WHat ees it?
and i Looked UP hashmale.com
aparently seams saFe to mi
 
I just loked at that site......... and i think its total bollocks . They talk around the weaknesses of their system . PGP is much better , as i said you personaly exchange codes and you are much safer . At least as safe as the alogrithme your code program uses and the power of the NSA computers.......
 
Just another small toe on the already fractured foot of individual liberty beginning to writhe itself ino the grave of progressive impedement. Did they happen to mention any trigger termonology or specified interest orientation for their initial justification in regards to our tax dollars hard at work?
 
that's it, i'm out. movin to the wilderness, cya ppl. it was wery nice meeting you all
i've had enough of big brother
 
i'm comin with ya dante! preferably to an island in an area of endless summer! 8)

we can come back when our brains have evolved so they can manipulate automatically every information concerning us stored on any computer which would be used against us with the use of electromagnetic waves. :P so there would be no need to worry about that shit anymore. :D
 
mmmm sorry to disappoint you i was thinking of the endless mists of the Southern Scandinavian alps and the meters high snow to conceal our presence...
but hey if you find the island call on me, k?
 
To do anything in code in the net one has to meet the people who get the code in private and exchange codes . If the code is kept on you net computer it is not safe and defeats the purpose of the action as it is posible to take over full controll of your computer when you are in the net without you being able to do anything about it or even notice it .

Probaly true, but that would be a specific attack against a specific internet user. By that time the user would be fucked anyway. The first defence must aim at countering mass-automated filtering technologies, employed by three letter agencies. Meeting in person is still the best way to do that, as you suggested.

People in the old days used a method called one time pads. The creation of pages of true random letters was cumbersome by hand. Not so anymore; welcome to the information age.

/geek mode on

Even quantum parallel processing cannot decrypt the message. One time pads are inherently safe.

Such a quantum filter would find all possible texts of the same text lenght, if the encryption used true random pads. These texts would also contain every love letter that was ever written in history, but also the post I am writing at this very moment. Think about that.

My gut feelings is that the following should provide a quite safe communication channel:

- Fill half of the space of a USB stick with true-random data. True random generators do not rely on any algorithm, but use noise that is present in optical or electronic circuits. As a cheap alternative, I can imagine that using the static noise from a CCD camera could work as well.

- Use the other half for your secure data.

- Make a copy of the USB stick, and share it with a friend IN PERSON. Do not use some encryption method, and send it over the internet anyway..defeating the whole purpose of the pads.

- Write an application that keeps track of what data blocks are scrambled with what random data. (This is the part where I am painfully reminded of my non-existant programming skills...)

- Let the application send your scrambled data over the internet.

- Never use the same blocks of random data again to prevent statistical decryption.

- Meet in person again (after a few months), to refresh the used blocks of random data.

- Use a dedicated linux computer for this, booted from a CD. This is your best chance to keep out uninvited guests, as god mentioned. No hardisk should be present, hardisks get cluttered with fragments of the RAM contents by the OS.

/geekmode off.
 
Urgh, I use some of those "secure" webmail providers too and only lately started hearing the rumors on the web about their "insecurities.."

I'm not sure what to make of it. But the way I look at it, nothing on the web is really safe. A hacker can break into almost anything given enough time. The only security strength is in numbers... hundreds of millions of internet users.
 
Retour
Haut