1. #1
    Russian Rocket
    Kleptoman
    Russian Rocket's Avatar Become A Pro!
    Join Date: 09-02-12
    Posts: 43,910
    Betpoints: 533

    US govt allows child porn suspect off the hook in bid to protect Tor hack method

    To protect its power to crush dissent, there is no crime the government will not cover up, aid, or abet. The smart criminals know this, and, like weeds, grow in the cracks.

    In the moments like this you really start to question who's the real guilty party here?



    The anonymous nature of the search engine Tor is in question after the Department of Justice (DOJ) dropped charges to protect details of how they hacked the browser.

    IP’s of visitors using the anonymity software to access a child pornography site were identified using the hack.
    “Disclosure is not currently an option,” Federal Prosecutor Annette Hayes wrote in Friday’s court filing for the case United States v. Jay Michaud.
    Hayes said that dismissal without prejudice would allow for future charges when the government might “be in a position to provide the requested discovery."
    <center></center>
    The accused man, Jay Michaud, was arrested in 2015 suspected of visiting the child pornography website Playpen via the Tor browser. Despite the alleged anonymity of Tor, Michaud was identified after the FBI took control of Playpen for nearly two weeks.
    The FBI used a form of malware known as a ‘network investigative technique’ (NIT) to track Michaud and 135 other suspects who are also facing prosecution, reported the IBT Times.
    When users logged into the Playpen website a NIT program would send communications to their computer which would trigger identifying data being relayed back to the FBI.
    How NIT’s operate was not fully disclosed, prompting Michaud’s defence attorney to request access to their source code.
    <center></center>
    Hayes said in the court documents that the decision not to reveal the source code of the NIT was required in order to “protect highly sensitive information from criminal discovery”.
    The source code was originally ordered to be handed over in May 2016, prompting the DOJ to classify it and the court to overlook any evidence obtained using the Tor hack.
    A significant amount of Tor’s funding is provided by the US government, reportedly donating 80 to 90 percent of annual funding.
    Nomination(s):
    This post was nominated 1 time . To view the nominated thread please click here. People who nominated: triplecrown333

  2. #2
    shadymcgrady
    shadymcgrady's Avatar Become A Pro!
    Join Date: 02-27-12
    Posts: 10,036
    Betpoints: 2978

    Nice find RR, what forms of NIT do hackers use to steal information from civilians? This is unnerving stuff

  3. #3
    Russian Rocket
    Kleptoman
    Russian Rocket's Avatar Become A Pro!
    Join Date: 09-02-12
    Posts: 43,910
    Betpoints: 533

    Quote Originally Posted by shadymcgrady View Post
    Nice find RR, what forms of NIT do hackers use to steal information from civilians?
    There are a ton of different types of NIT that can be used. NIT is basically a downloadable piece of code, that is installed on a person's computer without the user needing to first accept or even be made aware of the software installation. It is designed to provide access to a computer, phone, TV, modem or even a fax/scanner, in order to obtain information about the system or data contained on that hardware.
    The information obtained by an NIT can range from simply a computer's name and address at the most basic level to complete files, web history, webcam activity and so on.

  4. #4
    Ballerholic
    Ballerholic's Avatar Become A Pro!
    Join Date: 01-16-13
    Posts: 2,767
    Betpoints: 1806

    government is a joke, that's why Trump is needed
    Points Awarded:

    Russian Rocket gave Ballerholic 2 Betpoint(s) for this post.


  5. #5
    funnyb25
    Go Get Laid Man!
    funnyb25's Avatar SBR PRO
    Join Date: 07-09-09
    Posts: 39,621
    Betpoints: 25244

    It is 7:30am here and too early to read the article...Title doesn't sound good tho

  6. #6
    shadymcgrady
    shadymcgrady's Avatar Become A Pro!
    Join Date: 02-27-12
    Posts: 10,036
    Betpoints: 2978

    Quote Originally Posted by Russian Rocket View Post
    There are a ton of different types of NIT that can be used. NIT is basically a downloadable piece of code, that is installed on a person's computer without the user needing to first accept or even be made aware of the software installation. It is designed to provide access to a computer, phone, TV, modem or even a fax/scanner, in order to obtain information about the system or data contained on that hardware.
    The information obtained by an NIT can range from simply a computer's name and address at the most basic level to complete files, web history, webcam activity and so on.
    More advanced forms of NIT can access previous or past browsing history on the device? Not just Web addresses but the actual screen shot and/or passwords?

  7. #7
    shadymcgrady
    shadymcgrady's Avatar Become A Pro!
    Join Date: 02-27-12
    Posts: 10,036
    Betpoints: 2978

    What I'm getting at RR is that there's the malware to steal info such as emails that say click on this etc. But how did hackers steal account names and passwords for yahoo or Google users to dump on thr black market? Did they setup an NIT to the actual yahoo or Gmail servers? If so then that's game over for most of us

  8. #8
    reigle9
    Paint my casket black with a big ass #3
    reigle9's Avatar Become A Pro!
    Join Date: 10-25-07
    Posts: 17,879
    Betpoints: 1053

    It said the fbi took control of the site. I'd imagine it's very simple to see ip addresses when they have control of the site.

    I don't get the part about the government funding a search engine that is apparently illegal.

  9. #9
    Russian Rocket
    Kleptoman
    Russian Rocket's Avatar Become A Pro!
    Join Date: 09-02-12
    Posts: 43,910
    Betpoints: 533

    Quote Originally Posted by shadymcgrady View Post
    More advanced forms of NIT can access previous or past browsing history on the device? Not just Web addresses but the actual screen shot and/or passwords?
    YES and NO...there’s a chance that it could still be recovered, depending on how much the computer has been used since the delete, and whether or not data has overwritten the space that was previously occupied by the history file.
    Once you "permanently" delete a history file, the space used by that file gets simply marked as now being free. That means that until it’s overwritten by other data, the original data actually remains on the disk and can possibly be recovered with a snippet like NIT.
    Also keep in mind, that your entire internet browsing history is stored somewhere, whether temporarily or permanently, by your ISP.
    So the government can still get those records, but they would need to get a subpoena for that.

    Now there is also a different type of spyware out there, that records every single keystroke that you make on your machine. If something like this gets on your computer - you're pretty much fukked.

  10. #10
    Russian Rocket
    Kleptoman
    Russian Rocket's Avatar Become A Pro!
    Join Date: 09-02-12
    Posts: 43,910
    Betpoints: 533

    Quote Originally Posted by reigle9 View Post
    It said the fbi took control of the site. I'd imagine it's very simple to see ip addresses when they have control of the site.

    I don't get the part about the government funding a search engine that is apparently illegal.
    A lot of people don't know that, but TOR is actually mostly funded by the US government through various grants and donations.
    https://www.theguardian.com/technolo...m-onion-router

  11. #11
    Russian Rocket
    Kleptoman
    Russian Rocket's Avatar Become A Pro!
    Join Date: 09-02-12
    Posts: 43,910
    Betpoints: 533

    Quote Originally Posted by shadymcgrady View Post
    What I'm getting at RR is that there's the malware to steal info such as emails that say click on this etc. But how did hackers steal account names and passwords for yahoo or Google users to dump on thr black market? Did they setup an NIT to the actual yahoo or Gmail servers? If so then that's game over for most of us
    In that latest Yahoo security breach, hackers stole a piece of code from Yahoo's internal servers, which was then used to create fake cookies which could unlock user accounts. Forged cookies could allow an intruder to access users' accounts without a actual password. So general users like you and I had absolutely nothing to do with that.

  12. #12
    shadymcgrady
    shadymcgrady's Avatar Become A Pro!
    Join Date: 02-27-12
    Posts: 10,036
    Betpoints: 2978

    Damn, thanks RR. That must be how old folks feel ab going to the doctor. U want to know but u don't want to know

  13. #13
    Auto Donk
    Diggity man the fort, I'm outta here!
    Auto Donk's Avatar Become A Pro!
    Join Date: 09-03-13
    Posts: 43,564
    Betpoints: 48

    This thread could be re-named simply "The John Podesta Chronicles"
    Nomination(s):
    This post was nominated 1 time . To view the nominated thread please click here. People who nominated: Russian Rocket

  14. #14
    jtoler
    jtoler's Avatar Become A Pro!
    Join Date: 12-17-13
    Posts: 30,967
    Betpoints: 6325

    I see through their bs, still weaponizing pedophilia, entering it into public consciousness, they wont stop. Tor been around forever, "created by military", Im almost sure they knew how to "hack" it ages ago.
    Last edited by jtoler; 03-11-17 at 10:48 AM.

  15. #15
    Russian Rocket
    Kleptoman
    Russian Rocket's Avatar Become A Pro!
    Join Date: 09-02-12
    Posts: 43,910
    Betpoints: 533

    Quote Originally Posted by shadymcgrady View Post
    Damn, thanks RR. That must be how old folks feel ab going to the doctor. U want to know but u don't want to know
    Also not many folks know, but by default Google automatically saves your browsing history.

    You can view yours here: https://myactivity.google.com/myactivity
    To turn it OFF, go to Activity Control page.

    Here is a page that explains what they collect: https://privacy.google.com/your-data.html

  16. #16
    Auto Donk
    Diggity man the fort, I'm outta here!
    Auto Donk's Avatar Become A Pro!
    Join Date: 09-03-13
    Posts: 43,564
    Betpoints: 48

    microsoft was in on it..... sold us out....

    no privacy whatsoever.... just happy i live a clean life and am not a goddam pedophile, etc.

  17. #17
    The Kraken
    The Kraken's Avatar Become A Pro!
    Join Date: 12-24-11
    Posts: 28,917
    Betpoints: 532

    Quote Originally Posted by Auto Donk View Post
    microsoft was in on it..... sold us out....

    no privacy whatsoever.... just happy i live a clean life and am not a goddam pedophile, etc.
    Said every pedophile ever

    You sick fukk

  18. #18
    gauchojake
    Have Some Asthma
    gauchojake's Avatar SBR PRO
    Join Date: 09-17-10
    Posts: 33,694
    Betpoints: 12975

    The good news for Auto is that he now has the playbook for his defense.

  19. #19
    stevek173
    stevek173's Avatar Become A Pro!
    Join Date: 03-29-08
    Posts: 27,587
    Betpoints: 5940


Top