Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - kmfkewm

Pages: 1 ... 228 229 [230] 231 232 ... 249
3436
If it were not for trying to outsource it multiple times in the first place, it would probably be done by now and it would also have cost a lot less money. The people who have offered to do it for pay so far all entirely lack the skill required. Best bet to do it right is to do it myself imo, and stop wasting money on people who don't know how to do what is requested.

3437
Drug safety / Re: Are Meth Scare Tactics for Real?
« on: February 19, 2012, 12:28 am »
something tells me jewfro is a heavy meth user and takes anything bad said about meth (regardless of how true it is) as a personal attack on him....

telling people weed and meth are equally addictive (not that anyone would believe that) to make yourself feel better about using it isn't good :P

I really have nothing against meth users and have enjoyed a few times myself, but don't deny that meth is serious shit, comparing it to weed is just straight up dishonest

3438
Silk Road discussion / Re: Documented Controlled Deliveries?
« on: February 18, 2012, 05:59 am »
They simply cannot get a warrant just because someone "mailed you drugs" when they can't even prove you paid for them or even wanted them.  That's why they do controlled deliveries with warrants conditional on you signing.  Read the intel around here.  I am also a law professional and know how it works in the USA, more specifically this state.

sure they can
http://www.msnbc.msn.com/id/26079096/ns/us_news-crime_and_courts/t/police-raid-md-mayors-home-kill-his-dogs/

generally they try to get you to sign, but sometimes they just storm the place with guns blazing

3439
Drug safety / Re: Drug Use vs. Age
« on: February 18, 2012, 05:17 am »
It doesn't make a difference unless you let it make a difference. Some people in my highschool let drugs fuck them up pretty bad. Other people were even more responsible than I was and didn't let it effect them at all. I think the biggest downside for drug use at a young age is tendency for young drug users to also (in general) be not the best people to hang out with. The most responsible people, who use drugs imo, tend to start when they are freshmen in college or seniors in highschool. I really think people who start younger are statistically more likely to become involved with other criminal activity, but I really can't say it is just my own little perception of a tiny subset of a tiny part of the world ;). And of course correlation and causation....I actually blame prohibition for a lot of these problems.

3440
Drug safety / Re: Are Meth Scare Tactics for Real?
« on: February 18, 2012, 05:02 am »
k whatever you say. Meth and weed are both just as addictive. You know there is such a thing as degree right? Just because they are both mentally and not physically addictive doesn't mean they are both equally mentally addictive. Anyone who has used meth or seen people who use it versus people who use weed will quickly be able to say which is more addictive. I don't see people holding up stores for their next joint, or giving up their families for weed or sucking dick for weed .. at least not anywhere near as much as for meth.

3441
Drug safety / Re: Are Meth Scare Tactics for Real?
« on: February 18, 2012, 04:15 am »
I think if you are going to argue that meth and weed are equally addictive that sane people can just ignore you from that point on.

And yeah my info is entirely ancedotal re; meth versus amphetamine, but all of the people arguing for meth being no worse than amphetamine are using entirely ancedotal evidence too.

The effects of meth and amphetamine I could tell apart any day, then again I never smoked amphetamine lol.

Meth fucking ruins people, I really just don't see amphetamine as being anywhere near as bad. If you can use meth regularly and be fine great for you but ime you are not in the majority , but I don't see people who use amphetamine regularly getting anywhere as near fucked up as meth users do.

Quote
are.. you kidding? with the EPIC CHEMISTRY KNOWLEDGE  you possess, NOT TO MENTION, you're FUCKING AMAZING ANALOGY THERE. make yourself some phosgene gas and inhale some of that. less damaging than meth. guarantee you.

The point is simply that small changes to a chemical structure can cause insanely different effects.

You really have no room to call people stupid if you think weed and meth are equally addictive. Really I think the only people who would think that, must be addicted to meth and in major denial.

Use whatever the fuck you want and if it works for you great, I have nothing against meth users. I have something against people minimizing the harms of meth to justify their own behavior though. Saying meth and weed are equally addictive is just delusional.

3442
http://www.heraldnews.com/news/x163793297/Drug-arrest-made-in-postal-delivery-sting-in-Fall-River

Quote
FALL RIVER —

Noel Almeyda brightened when he signed for the express mail package — he told the postman he was expecting a package, police said.

He clearly was not expecting what came next.

When police knocked on the front door of his home in Sunset Hill, he threw his awaited package aside and ran out the back door.

But the police were expecting that. Detectives were waiting for him in the backyard.

Almeyda, 31, was ordered held in custody Friday after he was arraigned on a charge of trafficking cocaine. His bail was revoked on an earlier charge of indecent assault and battery on a child.

Bail on the new charge was set at $50,000 cash, or $500,000 surety, 100 times more than the $500 cash defense lawyer Christopher O’Leary said his client could post on Friday.

Prosecutor Amit Singh told District Court Judge Gilbert Nadeau that the case began earlier in the week with a call from postal inspectors in Providence to Massachusetts State Trooper Paul Baker.

Inspectors spotted a box from Aquadilla, Puerto Rico, that made them suspicious. Frankie, a police dog that works with Correctional Officer Anthony Lucca, was used to inspect the package.

Frankie’s reaction left little doubt about the contents of the package, police said, so postal officers got a federal search warrant and opened the box. They allege it contained a kilogram of cocaine.

They called the state police to arrange for a delivery.

“The package was addressed to Noel Valentin,” Singh said. The address was for Noel Almeyda’s home, police report.

“There is evidence, in this new case, of a false name, an alias, being used,” Singh said. “There is a flight risk.”

Singh requested bail of $150,000 cash.

A discrepancy with the name of the person the package was addressed to is a reason to set lower bail, O’Leary argued.

“This was addressed to Noel Valentin, 285 Sunset Hill, Riverfalls,” O’Leary said. “That is not my client.He doesn’t know anything about this package. He wasn’t expecting it. He thought he was signing for a neighbor.”

Given that, O’Leary said, Almeyda should have a chance to secure his release on bail.

“The $150,000 cash is just beyond his reach,” O’Leary said. “He said he thinks he can call family members and come up with $500.”

Nadeau revoked Almeyda’s bail on the indecent assault charge that was filed in July. Almeyda had been free on bail while awaiting trial on that charge.

If Almeyda resolves that case, or if he appeals the bail revocation and gets bail resumed, he would have to post an additional $50,000 in cash to get released on the new charge.

The new charge is a felony that must be prosecuted in Superior Court.

A conviction on the charge of trafficking a kilogram of cocaine carries a penalty of 15 to 20 years in prison.

3443
Security / [inte] postal inspectors seize few ounces of weed
« on: February 18, 2012, 03:26 am »
http://m.lubbockonline.com/crime-and-courts/2012-02-16/marijuana-mail-thats-what-lubbock-police-are-trying-find-out

quote]Law enforcement officials continue to investigate whether a 45-year-old man used the postal system to receive marijuana.

Michael Flemmons was arrested at 11 a.m. Wednesday and charged with felony possession of marijuana, said Sgt. Jonathan Stewart with the Lubbock Police Department.

Flemmons is accused of possessing between 4 ounces and 5 pounds of the drug, said inspector Mona Hernandez, acting public information officer for the U.S. Postal Inspection Service, Fort Worth district.

Hernandez declined to be more specific about the quantity of the marijuana.

If tried and convicted, Flemmons could face up to two years in the state penal system, a $10,000 fine or both, Stewart said.

The Postal Inspection Service is investigating whether Flemmons used the postal system to receive marijuana.

Hernandez also declined to reveal how officials became informed of possible mail involvement in the case.

Flemmons could face additional federal charges, depending on the outcome of the Postal Service’s investigation, Stewart added. [/quote]

3444
http://articles.baltimoresun.com/2010-11-04/news/bs-md-hermann-drugs-post-20101104_1_priority-mail-intercept-drugs-illegal-drugs

Quote
The apartments called Tubman House on Towson Way are part of a new dorm complex for freshmen and sophomores at Towson University, and someone recently sent an occupant there 65 grams of marijuana.

A townhouse on Randallstown's Kenny Green Court is a suburban cookie-cutter home on a cul-de-sac, and someone from West Hollywood, Calif., recently mailed 1,450 grams of marijuana to that address.

Federal agents with the U.S. postal inspector's office intercepted both packages, according to search warrant applications — and subsequent lists of what the searches revealed — unsealed in U.S. District Court in Baltimore this week. These are just two of hundreds, if not thousands, of mailings containing illegal drugs being sent around the country by unsuspecting postal carriers.

Using express or priority mail — a service that is quicker than regular mail but slower than overnight mail — to deliver illegal drugs is not new, but authorities say they are trying to stem the tide against what they concede are overwhelming odds. It's easier and safer to package drugs and put them in a mailbox than to stand on a street corner.

"They're working on statistics," said Special Agent Edward Marcinko, a spokesman for the Baltimore office of the U.S. Drug Enforcement Administration. "How many millions of packages are being shipped? Millions of packages, and maybe a few get intercepted. It's a good gamble."

Postal inspectors all over the country are reporting a surge in investigations and arrests, and a quick scan of files in federal courts around the country show hundreds of recent cases involving packages plucked by authorities from the mail.

Federal authorities say that in 2009, postal inspectors in the U.S. arrested 1,227 suspects on charges of trafficking drugs through the mail and seized $4.9 million in cash and 45,964 pounds of illegal narcotics.

A mail processing plant in Linthicum seems to be a hub for activity in Maryland, with packages passing through en route to the far reaches of Western Maryland, the Eastern Shore and Washington.

Search warrant applications have become boilerplate, and note that drug dealer's use of the mail "is favored because of the reliability, speed and low cost, as well as the perceived minimal chance of detection."

Packages with return addresses in cities and states from which drugs tend to originate — such as Florida, Georgia, California, Arizona, New York and Texas — get extra attention. Some are pulled from circulation and set aside to await a police dog to come along and sniff.

In the latest batch to be made public in Baltimore, Postal Inspector Dennis G. Hall wrote in his search warrant application that on Sept. 10, an Anne Arundel County police dog named Cyrus detected a drug odor from three suspicious packages — one headed to the Towson dorm, another to Randallstown and the third to Washington.

It's unclear what if anything authorities did once they seized the drugs. The names of the recipients are typically false, though the addresses are real. Sometimes, the DEA's Marcinko said police will pretend to be postal carriers, deliver the packages and arrest the person who accepts delivery.

Court records do not indicate any arrests in the three most recent cases in Baltimore. Hall wrote in his search warrant application that all three names on the packages were false. Attempts to reach the owner of the Randallstown home were unsuccessful; his name does not show up in state or federal court records as having been charged with a crime.

The senders are equally hard to track down. The package sent to Towson had a return address. in Santa Cruz, Calif. The package sent to Randallstown purportedly came from an address in West Hollywood. Authorities say neither of the addresses exists.

"These individuals can distance themselves from the contraband should it be intercepted by law enforcement," Hall wrote in his search warrants.

Sometimes, police say, dealers send packages to unsuspecting homeowners, hoping the postal carriers will leave them on front porches for couriers to pick up before the residents return. So it's unclear whether the people at addresses mentioned in court papers at Towson University and in Randallstown were expecting shipments of the illegal herb.

3445
Holy shit this sounds mega tweak o.O how vulnerable do you think we are to this kinda stuff?

are you using a hardened fully patched system?

3446
Product requests / Re: Looking for Encrypted Cellphone
« on: February 18, 2012, 03:10 am »
plus both people need to use a compatible encrypted phone. I would go with android over anything. I don't much trust encrypted streaming voice though. Data leaks in too many places.

3447
Security / Re: Bizarre and Troubling "Love Letter" from Customs(USA)
« on: February 18, 2012, 12:59 am »
someone else had the same thing happen to them maybe you should compare vendors that you ordered from and see if there is some fuckwad sending poorly packed stuff to his customers trying to get them in shit?

3448
Drug safety / Re: Drug Use vs. Age
« on: February 17, 2012, 11:28 pm »
I have been using psychedelics fairly heavily since I was 14 and don't have any real regrets about it :P

I do regret using some drugs at a young age though. And although I was a fairly responsible drug user at a young age (by comparison), I was also pretty reckless in some ways. If I could go back I would have used less of certain drugs, and used other drugs more responsibly, but in the long run I don't think much if any damage was done. I also think it is harder to use drugs responsibly at a younger age because of prohibition.

My main regret is that I didn't have access to some of the drugs I wish I did, and my peer group was largely fairly stupid about drug use and it rubbed off on me to an extent. It is hard to say how much of it is related to the age I started using at, and how much is direct and indirect effects of prohibition...but overall meh I would still use drugs when I started.

I think if kids had access to pure drugs, honest information and drug culture wasn't artificially merged with fucktard culture, that it would be much better.

3449
Security / [intel analysis] SR Security Key Assumptions Check
« on: February 17, 2012, 10:38 pm »
edit: got bored, will add more later, plus go into deeper analysis with potential solutions to some of the identified problems, and citations to documents supporting the probabilities I gave.

I will write one then others can do their own or comment if they disagree. Key assumptions check is technique I just learned from this pdf: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/Tradecraft%20Primer-apr09.pdf

Essentially, you state your assumption, and then you assess it. I will write based on the assumptions of the average SR user. I will try to use Kents Words of Estimative Probability:

Quote
Certain    100%    Give or take 0%
The General Area of Possibility       
Almost Certain    93%    Give or take about 6%
Probable    75%    Give or take about 12%
Chances About Even    50%    Give or take about 10%
Probably Not    30%    Give or take about 10%
Almost Certainly Not    7%    Give or take about 5%
Impossible    0    Give or take 0%

The format will be:

Assumption
       |
     \   /
Assessment

with the probabilty of the assumption being true being represented by the first words of the assessment.
________

Law enforcement will not directly target buyers. (Law enforcement are interested in targeting dealers only. Customers are not big enough targets for them to waste time on, they really are not that interested in personal use amounts, the only reason they target users usually is so they can work their way up to vendors and with SR this isn't really feasible.)

       |
     \   /

Probably not true.

(Due to the inherent weaknesses involved with receiving product, and the relatively strong security techniques being used by vendors, it will be much harder for law enforcement to successfully compromise a vendor. Due to the media attention SR has attracted, as well as calls from high ranking politicial officials to shut it down, it is probable that law enforcement agencies are feeling pressure to make SR related arrests. The easiest way for them to reach this goal will be the targeting of customers. Furthermore, if these arrests are highly public they will serve as a deterrence and will likely cause a chilling effect, reducing the activity levels on SR as well as making many others afraid to participate in the first place.)

________________________

Law enforcement will not use highly technically sophisticated attacks for busting customers. (Technically sophisticated attacks are not what the majority of agencies targeting SR are used to using, they will not spend the relatively high amount of resources and expertise required to use these attacks against personal use drug customers)

       |
     \   /

Probably true. Law enforcement, and particular drug enforcement agencies, traditionally use human intelligence based attacks. They have skill in this area. Additionally, there are software systems that make human intelligence attacks in online anonymous environments particularly potent (persona management software allows a small team of agents to operate a great deal of distinct pseudonyms simultaneously and with little effort). Address harvesting attacks via human intelligence undercover operations will be an effective enough technique for the gathering of significant amounts of customer information, there is no requirement for law enforcement to engage in more sophisticated technical attacks. Human intelligence is almost certainly going to be the weakest link.

________________________

Law enforcement will not use highly technically sophisticated attacks for busting vendors.

       |
     \   /

Almost certainly not true. Pretty much the only way they have to bust vendors is to use some attack that will generally be perceived as an advanced technical attack by the average SR user anyway. (It is also a safe assumption that the feds will try to bust vendors with targeted technical attacks)

___________________________________________________________________


Federal police level attackers will not focus much resources on customers. (They will focus on vendors)

       |
     \   /

Chances about even. From their perspective, they certainly have bigger fish to fry. On the other hand, getting drugs in the mail and money laundering are federal crimes. It is probably most likely that if federal agencies get involved in attacks against personal use customers, that they will refer the cases to local police departments. The feds must be feeling pressure to bust SR users, and they will probably have a much easier time to bust customers than vendors. On the other hand, local law enforcement agencies can focus on customers with federal agencies focusing their resources on vendors, with feds handing off customer cases to the appropriate local law enforcement branches. This is roughly equal to how multi-jurisdictional multi-target-level cyber operations are handeled in the realm of child pornography trading...we may see the same model develop against online drug trafficking.
__________________

Law enforcement will not be able to use dragnet screening and interception technology to intercept a significant amount of packages sent by SR vendors. (As this method of smuggling becomes more and more mainstream, law enforcement will focus more resources on screening mail and this will lead to significantly higher interception rates)

       |
     \   /

Almost Certainly true. There is simply too much mail going through the system for passive dragnet screening measures to inspect more than a small percentage of it. Proper packaging techniques can further reduce the risk of mail being screened, and of screened mail having contraband detected. Unless there is a break through in drug mail detection scanning technology, physical analysis of mail payload data (drug dogs, electronic sniffers, X-rays, infrared, etc) and manned meta-analysis (manne package profiling) are not likely to result in significant rates of interception.
___________

Law Enforcement will not be able to automatically perform traffic analysis on the mail flow and use the raw intelligence from this to identify addresses involved with drug trafficking, ie: Law enforcement will not be able to use *targeted* screening and interception technology to intercept a significant amount of packages sent by SR vendors.

       |
     \   /

Almost Certainly Not True. Mail sorters have the capability to create computer readable databases of shipping routing information (return address, shipping address, date) and these databases can be queried with algorithms capable of identifying suspicious boxes (and if enough data points are available, specific pseudonyms addresses ). There is nothing advanced about this sort of intelligence gathering and analysis, and on a country by country basis it may or may not be illegal for law enforcement to engage in this sort of intelligence analysis to better target their interception detection technology / human screening-profiling systems.

__________

Law Enforcement will not be able to directly break the encryption algorithms used by Silk Road vendors / customers for communications security and anonymity and financial transfer.

       |
     \   /

Almost certainly / certainly. Although it is technically possible for strong asymmetric encryption algorithms to be directly broken, it is unlikely that any attackers are capable of this. If any attackers are capable of this, they are almost certainly cryptographic intelligence agencies. Unless there is a mathematic break through or an attacker manages to stabilize enough qubits, it will be impossible for anyone to directly break the encryption algorithms Silk Road users are using. If such an attacker exists or comes to be, they will almost certainly not be a police agency.

______________

Law Enforcement will not be able to trace the Silk Road server.

       |
     \   /

Almost certainly not true. There are many purely traffic analysis based attacks for deanonymizing hidden services. These attacks have been carried out against the Tor network in practice. The countermeasures taken by the Tor devs buy time but they are not enough to prevent a trace, particularly by a law enforcement level adversary. It is very probable that law enforcement will be able to trace the Silk Road server within a few weeks of trying, with minimal resources.

_____________
Law Enforcement will not be able to directly break the anonymity solutions being used by a significant percentage of SR users (~10%-20%+)

       |
     \   /

Probably not true. Law enforcement will likely engage in active attacks against the Tor network, where they add nodes and analyze the signals intelligence gathered from them. Even if they do not do this to specifically target Silk Road users, they will to target pedophiles and the intelligence gathered will have an effect on SIlk Road users as well. If LE manage to watch traffic enter the Tor network and reach its destination, they can use timing correlations to link the sender and receiver even if they can not view middle nodes. Since it is very probable that law enforcement can trace and then passively observe the Silk Road server, it is likely they will be able to trace anyone who uses one of their entry guards to connect to Silk Road. Depending on the number of nodes law enforcement agencies interested in SR (or interested in sharing intelligence) have managed to get 'entry guard flags, it is not at all unrealistic for them to be able to deanonymize a significant number of Tor users connecting to SR. As entry guards change on a monthly basis, over time LE will be able to deanonmize SR users who they previously could not. 

Additionally, many Silk Road vendors are not using bridges. Law enforcement can very probably enumerate very large numbers of Tor client IP addresses by passively monitoring a few key directory authority IP addresses. By intersecting the population in a rough radius around where vendors ship from, with the list of all enumerated Tor client IP addresses, law enforcement will likely be able to entirely deanonymize some vendors, and narrow in significantly on other vendors.
_____________________________

Law Enforcement will not be able to directly break the anonymity solutions being used by a large percentage of SR users (50-75%+), in a relatively short period of time

       |
     \   /

Almost certainly true. It does not appear that law enforcement have begun to significantly perform sybil (node flooding) attacks against the Tor network. Had they, some pedophiles who use Tor would probably have been busted by now , in such a way that their arrest is leaked to the news or underground community. Law enforcement generally appear to lack sophisticated traffic analysis knowledge, although this should not be relied upon as the required information can be learned with a few years of study, less if a basic knowledge is already established. Most law enforcement traffic analysis operations are very simplistic and target CP traders. Tor does a good job at preventing LE level attackers from deanonymizing large percentages of users via profiling attacks, but it doesn't prevent LE from deanonymizing some X% of users (with X depending on how long LE run their profiling attacks for and how many entry guard flagged nodes they have). Tor bridges probably do a decent job of preventing LE from doing observability based attacks against some percentage of nodes.

_____________________________

Law enforcement will not be able to by pass the anonymity and encryption solutions of a significant  (5%+) number of SR users via by pass attacks (ie: hacking / social engineering followed by technical exploit).
 
       |
     \   /

Probably not true. Many users are probably not using Tor Button or hardened browsers. Law enforcement will be able to deanonymize them. If LE posts a link to a PDF that connects to a server that they control and encourage SR users to view it, they can probably deanonymize a significant number of the people who download it. If they make a rooted live USB , they can probably get a significant number of people to use it. This sort of social engineering + technical attack alone could probably deanonymize a significant number of SR users (in the case of the live USB it could even deanonymize the people who place orders with them).

Technical attacks without social engineering components can also likely compromise a significant percentage of SR users, although it may be harder to do many of these attacks without being noticed. If LE takes control of the SR server, which they almost certainly can do, they could embed java and flash. This would deanonymize everyone with improperly hardened/configured browsers, but it would likely be noticed fairly quickly.

LE could also engage in more sophisticated technical attacks without drawing attention to themselves. However, it seems improbable to me that many law enforcement agencies are technically capable of pulling off such attacks. Some probably are though. They will not likely be able to compromise many people who practice serious computer security with this sort of attack .

_______________________

Intelligence agencies will not be able to by pass the anonymity and encryption solutions of a very large  (99%+) number of SR users via by pass attacks (ie: hacking / social engineering followed by technical exploit).

       |
     \   /

Almost certainly not true. If NSA wanted to map out the entire SR network by real IP address, they would almost certainly have no trouble doing so with zero day vulnerability combinations. They also would be almost certainly not detected in doing this. They would also be able to spy on all communications between all SR users in the same way.

exception: Users who properly implement physical airgaps could avoid having their  plaintext communications contents intercepted by the NSA in this way, however since they could certainly be traced in this way NSA could get their plaintexts in other covert ways (targeted transient electromagnetic signals analysis etc).

________________________________

Intelligence agencies will not be able to deanonymize large percentages (99%+) of SR users via direct attacks on their anonymity systems.

    |
   \   /

Almost certainly not true. NSA samples traffic at IX's. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries : http://freehaven.net/anonbib/cache/murdoch-pet2007.pdf

_______________

Intelligence agencies will not involve themselves with attacking SR

     |
   \   /

Almost certainly true. Unless SR becomes a serious threat to the political establishmen I don't think any intelligence agencies will think twice about it. This is not likely to happen unless SR starts organizing/funding violent attacks against government, imo (making it a national security risk).

_________________________

Law enforcement will not compromise the SR server and harvest all unencrypted addresses from the server. 
   
     |
   \   /

Almost certainly not true. There are too many attack vectors through which they could do this and SR server is protected from almost none of them. Hardest case they will trace the server, dump keys from RAM into a forensics laptop, root it from there and gather all the unencrypted addresses sent through the server. Simplest case they remotely hack the server through some security bug in the code and get to the E-mails from there. I find it extremely unlikely that LE will not do this and I find it just as unlikely that SR will be able to prevent it unless they majorly rehaul their security. Then again, I don't exactly know the security techniques they are implementing to prevent such a thing. I am almost certain they are not protected from this though.

_________________________

Law enforcement can not deanonymize significant percentages of SR users based off of financial network analysis

     |
   \   /

Probably not true. Most users are not properly unlinking their coins from their identities.


3450
Security / Re: Intelligence analysis
« on: February 17, 2012, 08:28 pm »
awesome find, going to put this to use right now

Pages: 1 ... 228 229 [230] 231 232 ... 249