Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - kmfkewm

Pages: 1 ... 180 181 [182] 183 184 ... 249
2716
Security / Re: im under 18, how would i do this?
« on: May 31, 2012, 01:09 pm »
i'm 12 and what is this

2717
Security / Re: flaws to avoid / maximize security
« on: May 31, 2012, 01:03 pm »
Nice break down, you can spoof your MAC address you know

2718
http://www.startribune.com/local/north/154340935.html

Quote
Craig Schmidt was talking about botnets, almost matter-of-factly.

A botnet is a collection of compromised computers connected to the Internet. Schmidt is the senior manager of investigation of Microsoft's digital crimes unit. And, besides the fact that Schmidt grew up in Spring Lake Park, what do botnets have to do with Anoka County?

Quite a bit, actually.

Members of the Anoka County attorney and sheriff's offices -- considered local pioneers in the investigation of cyber crime and the use of computer forensics -- met recently with investigative and crime specialists from Microsoft. The two-day closed conference at Anoka-Ramsey Community College in Coon Rapids offered strategies in fighting modern crimes with modern technology.

Topics included e-mail header analysis, social networking, instant messaging, steganography (writing hidden messages), basic encryption, anonymization techniques, Internet service providers and domain name systems. These are topics that many law enforcement officials might never have approached 10 years ago. But for a video-game-playing, text-messaging generation that has grown up wearing ear buds and considers a cellphone to be the modern-day pocket watch, using all this technology is as natural as breathing.

Check the list

"If somebody claims to have an alibi in a murder case, we check their phone to see where they've been, when and who they were contacting," said County Attorney Tony Palumbo.

"A suspected drug dealer? Check the phone and you've got their customer list."

The answers to crimes often can be found in text messages, on Facebook pages or within e-mail trails. But with new technology come new crimes: identity theft, child pornography, cyber bullying, computer viruses, on-line threats, stalking. But from the GPS on the dashboard to the black box under the hood, there are technical advances that the public now takes for granted but authorities use to solve crime.

"It's almost like organized crime," Schmidt said. "A hacker group took the FBI off the Internet."

Schmidt was a computer geek as a child who became a federal law enforcement agent before moving to Microsoft.

"What drives the creation of a botnet?" Schmidt asked. "What do the bad guys do with it?

"These are crimes that didn't exist for previous generations, but they're capable of immobilizing an entire community. We want to help law enforcement think about these crimes in new ways.

"Instead of throwing them a fish, we're trying to teach them how to fish."

Room to investigate

With its state-of-the-art sheriff's office, which includes a tri-county forensic lab, Anoka County has tools for fighting cyber crime that make other counties envious. There is an entire room, filled with devices costing between $5,000 and $7,000 each, devoted to analyzing cellphones. There is another room for video and computer forensics.

But all these tools are constantly changing.

"For most people, gone are the days of relying on a digital camera and computer at home," said Anoka County Detective Brian Hill. "Everyone has a cellphone now. And that cellphone is used to access the Internet, take pictures, send text messages and store information. Some people actually use their phones to make calls.

"If I go to the store, I can sit in the parking lot and research the product before I consider making a purchase," Hill said. "Or, you saw how the social network could help a small company like Surly Brewery spread its message.

"Unfortunately, cellphones and the Internet can be used by criminals for other reasons."

No more he said-she said

Investigators have traced text-message trails in sexual-assault cases or confiscated computers in child-porn cases. Brooklyn Park and Hennepin County investigators used cellphone records to trace the journey of murder suspect Eddie Matthew Mosley from St. Louis to Brooklyn Park, where DeLois Brown and her elderly parents were shot and killed at Brown's home daycare. Mosley has been charged with second-degree murder in the case.

"Gone are the days of 10 years ago when we had to rely on he said-she said testimony," Hill said. "Now the dialogue can be found in text messages. We still have to put a person behind the keyboard, attach these messages to individuals, but getting at the information is easier.

"There's just so much more of it!"

Detective Scott Schlender is one of a half-dozen members of the Anoka County Sheriff's Office who specialize in computer forensics. As technology changes, so has human nature, he says.

"In the old days, if you were mad at somebody, you'd call them up and let them have it on the phone," Schlender said. "Now, with technology, people sending messages believe it's anonymous because they've removed the personal interaction. They have more courage when they're not face to face. Sometimes they're more hurtful. And sometimes they create a false identity. They create personas to get other people in trouble."

Documents, music and video are pirated. Porn can be sent quickly and in great volume. Internet petitions and rallying make it easier to jump on the bullying bandwagon -- sometimes leading to suicides, Schlender said.

Sometimes, the greatest tool for a detective or prosecutor is common sense.

"You still have to have an understanding of what happened," Schlender said.


2719
Security / Re: Undercover Seller is LE
« on: May 31, 2012, 07:09 am »
I don't underestimate LE at all, I mean think about DarkMarket, operating on a carders market is much more dangerous but no one thought at the time that the admin himself was an FBI agent. They did NOT sell 3rd party dumps themselves though, they have in the past though sold dumps with generated numbers so they could easily identify and nab those trying to use them. That's the difference.

So is it possible some vendors are LE? Yes, probable even. But they aren't going to be slinging dope around the country/world as a cover, they have very strict guidelines they must abide by, they can do controlled sales with approval but no one in the FBI is going to approve to blindly mailing drugs around.

What's more likely is LE being a vendor selling bitcoins or offering bitcoin services, which they can then track their 'customer' using these bitcoins to send to a vendor and then following the trail from there.

It's also more likely buyers are LE than sellers, as it's pretty common for undercover to get approval for controlled buys as they try to move up the ladder to bulk sales. The vendors that stick to the tried and true methods of NEVER giving up anonymity under any circumstances, having a buyers account separate from their vendors account, and shipping their products in a random way from numerous locations will be relatively untouchable.

This is spot on. It is silliness to think that LE can sell drugs to gain convictions, it just doesn't work that way because it runs into entrapment laws. If LE are vendors on here then if they were going to do a controlled sale they would be targeting vendors and offering them bulk quantities, not regular buyers UNLESS they were buying kilo+ amounts. What they are more likely to do is go after vendors through their finances and this is most likely to be done by profiling peoples exchange accounts.

Also the idea that LE would pose as vendors to farm addresses is highly unlikely, why the fuck would they go after a few gram buyers? They don't care about you, they care about the vendors, the mods, the admin and the staff. That's who they are likely to target.

LE sell drugs to get convictions all the time, it is called a reverse sting and entrapment is no defense. For entrapment to work LE would need to offer you drugs, you turn them down and then they continually pressure you into buying them. If they offer drugs and you place an order it is not entrapment. In parts of Europe the law is different but in USA reverse stings are common place.

2720
Almost everyones opinions consist of pure speculation because interceptions are very rare. There are some facts. People buying small amounts of non scheduled research chemicals in the USA are never raided. Some have been visited knock and talk style by feds of various sort including but not limited to postal inspectors, but I have not heard of charges being pressed. Even bulk importers of non scheduled research chemicals have had shipments inspected by customs and sent on their way after they tested negative for anything illegal. Non scheduled research chemicals are safe to buy, and although you should still use security measures to obtain them, it so far has not been very important.

People who sell research chemicals have more to worry about, even if they are not scheduled. There have been several RC vendors arrested and charged under the analog act, and some have received life sentences. It seems like law enforcement only target the blatant RC vendors, who have web shops with advertisements all over the place, or people organizing huge group buys / importing for completely public forums. This may be because law enforcement only cares about blatant RC dealers, or it could be because law enforcement are not very skilled at doing internet investigations against low key RC vendors. In all cases the busted RC vendors were using shit security. In at least some cases bulk research chemical interceptions did not lead to immediate arrest but rather led to the importer being put under surveillance and then arrested later on unrelated drug trafficking charges that were related to being put under surveillance for importing research chemicals, but not for importing research chemicals.

Buyers who have small orders of lowly scheduled drugs such as Xanax intercepted almost always only receive a love letter warning them that if they keep ordering scheduled drugs they may be charged and arrested. Some times people receive multiple letters like this and still nothing happens, but it is likely that if you get enough love letters something will come of it. You shouldn't reuse a box after you get a love letter because it could be flagged, but in practice people have continued to get shipments, including illegal ones, after having previously been sent love letter(s) to the same address. Intercepted non-specifically scheduled research chemicals have also resulted in love letters, so have marijuana seeds. People saying small personal use orders of cocaine or oxy will result in love letters are almost certainly just speculating, I would like to hear from an established person on any forum who obtained a love letter for schedule one substances of any amount because no case of this ever happening comes to mind. I can't even think of any truly personal use interceptions ever happening though. 

In Australia a person had a not quite personal use order of several schedule one drugs intercepted. If I remember correctly it contained MDMA, ketamine and LSD, a few grams for the former two items and half a sheet or so of LSD. This resulted in an armed dawn raid. The person received probation as it was their first offense, but they could have received a prison sentence.

I have heard of ounce orders of marijuana being intercepted leading to knock and talk by postal inspectors and eventual charges being filed, I believe people usually receive probation and mandatory drug rehab for this, but if it was a few eight balls of coke it is more likely jail or prison time would be involved imo.

several people on DZF were arrested for drug orders, it is not clear if the vendors they were working with were LE to begin with or were turned by LE. That forum was an FBI run honeypot. Several of the vendors on it were raided and arrested by FBI and sent to prison, and although I know several of their customers were arrested as well I am not certain the details of the size of orders they were placing or if they were also vendors. I can try to find out more about this, but I was never a part of DZF and only know a few people who were.

operation raw deal targeted the online steroid trafficking scene. They are very similar to the online recreational drug trafficking scene and there is a slight but significant membership overlap. A targeted international operation against them led to hundreds of arrests, but I believe they focused far more on producers and distributors than customers. I am not certain how many, if any , customers were arrested, although law enforcement did say in a press release that they had huge lists of customers and were considering pressing charges. I don't think they ever did against customers though. Someone from the steroid scene can probably go into more detail about the fall out of raw deal.

Obviously TFM is the most recent drug forum bust. Over a dozen vendors were arrested as well a handful of customers, although I think they were large customers. This is only what we know about though, nobody is certain how many other arrests are tied to TFM that were not part of main indictment. At least a few were though. I would imagine if LE really cared about customers a lot they could have busted more customers, and would have been more likely to do an internationally coordinated take down of the entire forum. When CP forums get busted it is common for interpol coordinated task forces around the world to carry out simultaneous raids against thousands of members, the fact that this did not happen for TFM leads me to think that either A. law enforcement was not interested in busting the majority of participants or B. Law enforcement had trouble to target the majority of participants for some reason, for one they couldn't get a vending account apparently (TFM was highly screened for vendors) and for two at least some of them were using GPG (le could only intercept communications that were not GPG encrypted). Of course they could have covertly bugged all of the targets laptops, followed them around recording the addresses on mail they were sending etc, and apparently they did not do this since only a dozen or so vendors are confirmed as busted and even fewer customers. Also, it is entirely possible that we just are unaware of the number of customers who were compromised.

Vendors clearly have much more to worry about, customer arrests are almost always from interceptions but vendors have targeted investigations against them that use technical, human intelligence, and surveillance attacks. So far the technical attacks have not been in the slightest bit impressive and in two cases consisted of Hushmail being a total fraud fed honeypot. The human intelligence attacks and surveillance attacks would also have been entirely preventable if the vendors had been using the proper security protocols.

All that said, it is technical possible for a small time customer to be royally ass fucked by law enforcement. You break a dozen different federal laws by ordering a single gram of weed here and they could try to hit you with a life sentence over it if they really wanted to. You are entirely at their mercy in this aspect. Money laundering, conspiracy, using telecommunications for drug deals, using the postal system illegally, participating in a continuing criminal enterprise, trafficking drugs across state or international lines, obstruction of justice, all of these are things that you are technically doing when you order your gram of weed here. The charges you could have put against you for ordering a gram of weed here are far more severe than you could have put against you for ordering it on the corner. But it is also extremely unlikely for such charges to be filed against you over ordering a gram of weed, and it is extremely unlikely that a domestic package will be intercepted.

At the end of the day, of course vendors have the most to worry about, and more the bigger they are. Customers have the least to worry about, and the smaller they are the less they have to worry about. I think that everyone should at a minimum be using Tor and GPG, plus mixing their bitcoins or obtaining them anonymously. Significant vendors should be using more security than that. And using more security is not going to get you busted, there is no such thing as being too secure but you can certainly not be secure enough.   

2721
Security / Re: im under 18, how would i do this?
« on: May 31, 2012, 06:06 am »
Fucking hell this "age shit" is such a load of crap. Like everyone else wasn't popping pills and doing lines below the age of 18. I know I was, I dropped my first E when I was 14 and was doing Bing/speed etc at that age too.

And absolute LOL at the "You are only old enough for pot and shrooms, no hard shit, sorry". Absolutely fucking ridiculous attitude to take. What exactly are we classing as "Hard shit" here? Because cannabis can make you paranoid as fuck (the reason I don't smoke it) and shrooms you can spin the fuck out on and do all sorts of crazy shit on. I know I have. If you are going to allow pot and shrooms you should have absolutely fuck all problem with Bing/MDMA and the other jolly customers. The only ones that should be a massive no-no is Smack, Crack, Meth and the other highly addictive Opiates and probably PCP.

And also, why the fuck are we telling this kid to go elsewhere where he will probably get absolute crap on the streets. Don't get me wrong, I'm not advocate selling to kids, at all. The fact is though the guy/girl/kangaroo is here now and they are clearly going to find out how to buy drugs from SR, you may as well point them in the RIGHT direction so they don't either A. get ripped off or B. buy some bent shit that could land them in A+E.

@ MycoGirl, stop being such a stereotypical hippie retard that thinks that "natural is the safest" because you are so out west you may as well be in Japan. All drugs have risks attached to them which is why you have to be responsible with them.

@BigBill, read the above twice and stop being such a tosser.

I don't know where the fuck the common sense has gone on here but Jesus Christ I wish it would come back.

@ Godzilla1, if you want decent LSD then I suggest you go to 3Jane, she is a very reputable vendor and has quality product. Shrooms I don't know much about or the vendors for them but just make sure you read the vendors history carefully and view their stats etc so you can find the most reliable source. I HIGHLY suggest you read the reviews that are available in the Rumor Mill forum and do some research on them. Regarding how to get BTC if you are an American then getting a MoneyPak and going to CoinBox is probably your most fast and easiest route.

I would plus fifty you if I could :)

2722
Security / Re: im under 18, how would i do this?
« on: May 31, 2012, 06:05 am »
/me used drugs since I was a young teenager

2723
Okay feel free to imagine that it is a kidnapping motivated by money, hate or sadism. It could also be a kidnapping on the orders of a charismatic cult leader.

2724
also feel free to replace kidnapping with cold blooded murder, child rape, execution of innocents by slow torture, or bombing preschools, we don't have as many clear cut examples of people continuing to vote in favor of the third option but in principle it is all the same

2725
Yes, it seems like the majority of people would vote for the third option, as insane as it obviously is

2726
Security / Re: Simple way to make and remember secure passwords
« on: May 30, 2012, 05:09 pm »
salting is a different technique for protecting from rainbow table attacks. If the attacker has precomputed the hashes for a bazillion potential passwords, having the salt "salt" added to you password prior to its hash value being obtained will make their table worthless. Of course you would use some random string for the salt. But salting doesn't slow down the time it takes them to guess passwords like PKCS5 does, it just makes previously generated password => hash databases worthless. Both can be combined :).

2727
just wondering

2728
Security / Re: Federal agnets bust in... USA
« on: May 30, 2012, 04:51 pm »
why would a single bust scare the shit out of anyone, people are busted for drugs all the time, someday someone who orders from SR will be arrested for it there is no doubting that

2729
Security / Re: How important is this PGP?
« on: May 30, 2012, 04:29 pm »
you also may be interested in

echo "vendors public key" | gpg --import

and maybe even

gpg --export -a your-user-name

I suppose that you also might want to check into

echo "ciphertext" | gpg --decrypt

if you start the command with a space it wont be saved in history for some shells, you can also end the commands with && history -c (ie: gpg --export -a your-user-name && history -c) but that clears entire command history

 edit: oh yeah you probably also will need gpg --gen-key

pretty much, fuck GUIs, the following commands are all you need:


echo "message" | gpg -a -e && history -c     to encrypt messages

echo "ciphertext" | gpg --decrypt    to decrypt messages

echo "vendors public key" | gpg --import    to import keys

gpg --export -a your-user-name   to export keys

and

gpg --gen-key   to generate keys






2730
Security / Re: How important is this PGP?
« on: May 30, 2012, 04:19 pm »
echo "message" | gpg -a -e

yayyyyy

Pages: 1 ... 180 181 [182] 183 184 ... 249