Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

jakeXT

(10,575 posts)
Wed Aug 6, 2014, 04:44 AM Aug 2014

Visit the Wrong Website, and the FBI Could End Up in Your Computer

Security experts call it a “drive-by download”: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes.

Now the technique is being adopted by a different kind of a hacker—the kind with a badge. For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement’s knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system.

The approach has borne fruit—over a dozen alleged users of Tor-based child porn sites are now headed for trial as a result. But it’s also engendering controversy, with charges that the Justice Department has glossed over the bulk-hacking technique when describing it to judges, while concealing its use from defendants. Critics also worry about mission creep, the weakening of a technology relied on by human rights workers and activists, and the potential for innocent parties to wind up infected with government malware because they visited the wrong website. “This is such a big leap, there should have been congressional hearings about this,” says ACLU technologist Chris Soghoian, an expert on law enforcement’s use of hacking tools. “If Congress decides this is a technique that’s perfectly appropriate, maybe that’s OK. But let’s have an informed debate about it.”

The FBI’s use of malware is not new. The bureau calls the method an NIT, for “network investigative technique,” and the FBI has been using it since at least 2002 in cases ranging from computer hacking to bomb threats, child porn to extortion. Depending on the deployment, an NIT can be a bulky full-featured backdoor program that gives the government access to your files, location, web history and webcam for a month at a time, or a slim, fleeting wisp of code that sends the FBI your computer’s name and address, and then evaporates.

http://www.wired.com/2014/08/operation_torpedo/

15 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Visit the Wrong Website, and the FBI Could End Up in Your Computer (Original Post) jakeXT Aug 2014 OP
Long Live - The Surveillance State - Desecration Of The 4th Amendment - And Fascism In America cantbeserious Aug 2014 #1
Exactly newfie11 Aug 2014 #2
Big Brother is now a TV show FiveGoodMen Aug 2014 #13
It started 1-2 years before 9/11 jakeXT Aug 2014 #14
As did the plans for 9/11, most likely FiveGoodMen Aug 2014 #15
I assumed they already were..... DeSwiss Aug 2014 #3
I operate under the assumption that I have no privacy. riqster Aug 2014 #4
Correct. Better just to assume you are being watched, by default. nt bemildred Aug 2014 #5
Inside of my head, it's more like "meh". riqster Aug 2014 #6
That is exactly right. nt bemildred Aug 2014 #7
Damn, we agree? riqster Aug 2014 #8
Who knew? bemildred Aug 2014 #9
Yep. I grew up on Pogo. riqster Aug 2014 #10
Awesome. bemildred Aug 2014 #11
True. And that is sad. riqster Aug 2014 #12

FiveGoodMen

(20,018 posts)
13. Big Brother is now a TV show
Wed Aug 6, 2014, 03:28 PM
Aug 2014

intended to make us comfortable with the term and unresponsive to Orwell's warning.

 

DeSwiss

(27,137 posts)
3. I assumed they already were.....
Wed Aug 6, 2014, 07:45 AM
Aug 2014

...when I bought the machine.

Everything we're using right now to express these ideas had their genesis in the MIC. It was an idea born of a means to connect the intelligentsia, directly with the military. It worked.

So the architecture and hardware was designed with them in mind from the start. The monopolies who created the mainstays of the standard circuit boards, servers, routers and the web itself, all created it all with a military mindset at the bottom of it.

The problem for them is, the human mind can only process so much data at a time. And with the volume of cat pictures we send alone, they can never keep up. The primitive minds at the base of all this, will end up reaching for the bludgeons in the end.

- Just like Orwell said.

''All tyrannies rule through fraud and force, but once the fraud is exposed they must rely exclusively on force.'' ~George Orwell


K&R

riqster

(13,986 posts)
4. I operate under the assumption that I have no privacy.
Wed Aug 6, 2014, 08:09 AM
Aug 2014

I know that is not quite the case, but it keeps things simple.

riqster

(13,986 posts)
6. Inside of my head, it's more like "meh".
Wed Aug 6, 2014, 08:47 AM
Aug 2014

I don't much give a shit what Big Brother knows about my political views. I DO care about my financial information, so I take aggressive steps there to protect that from hackers.

riqster

(13,986 posts)
10. Yep. I grew up on Pogo.
Wed Aug 6, 2014, 09:44 AM
Aug 2014

I still have a plastic Porky Pine figure I got from a box of laundry detergent in the 60's.

bemildred

(90,061 posts)
11. Awesome.
Wed Aug 6, 2014, 09:47 AM
Aug 2014

I have about a dozen old, ratty Pogo books and various pasted up comics from the newspaper. But it is an esoteric interest these days,

riqster

(13,986 posts)
12. True. And that is sad.
Wed Aug 6, 2014, 10:06 AM
Aug 2014

America could learn a lot from Simple J. Malarkey, the Bonfire Boys, and such.

Latest Discussions»Issue Forums»Editorials & Other Articles»Visit the Wrong Website, ...