Advertisement
LegionNET

Anonymous visits US DoJ, FBI, Police & Mil Cybercrime unit

Nov 18th, 2011
285
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.47 KB | None | 0 0
  1.  
  2. _ _ __ __
  3. __| || |__ _____ _____/ |_|__| ______ ____ ____ #antisec
  4. \ __ / \__ \ / \ __\ |/ ___// __ \_/ ___\ #anonops
  5. | || | / __ \| | \ | | |\___ \\ ___/\ \___ #OWS
  6. /_ ~~ _\ (____ /___| /__| |__/____ \ \___ \ \___ | #lulz
  7. |_||_| \/ \/ \/ \/ \/ #security
  8.  
  9. /*******************************************************************************
  10. *** #OCCUPYWALLSTREET CRACKDOWN RETALIATION TASK FORCE ***
  11. *******************************************************************************/
  12. Friday 18thNov - Lulz on Cybercrime Task Forces - US DoJ-FBI-Police-Military
  13.  
  14.  
  15.  
  16.  
  17. '...Subject: Pedobear info
  18.  
  19. Great, now they have a mascot....'
  20.  
  21. -Frank
  22. ^trollolol XD
  23.  
  24.  
  25.  
  26. QUOTES:
  27.  
  28.  
  29.  
  30.  
  31. Voicemail from +191XXXXXXXX
  32. Sep 23, 2011 PM Transcript: Hi, This is Jennifer calling from D. O. J Bureau firearm
  33. and I received your C C W renewal. B. O. F. It's now I'm sure you received the notifying out to France
  34. is not processing the C C W request everything else looks good, however I'm missing page 2 of the
  35. request in D. C. W work with them background disclosure forms. If you could give me a call. I'll be in
  36. the office on Monday at 8 o'clock. My number is (916) 274-6136 and I'm here in the office until 4:30
  37. today, thank you bye.
  38.  
  39. --------------------------------
  40.  
  41.  
  42. Does anyone know if Facebook maintains archives of a persons webpage?
  43.  
  44. Scenario: Person had something on a page, when questioned, it
  45. mysteriously disappeared !!
  46. Is there a time frame for a subpoena to obtain an archive page ???
  47.  
  48. Thanks
  49.  
  50. John W. Yeager
  51. Senior Advanced Specialist 1 - Forensics, Contractor
  52. Defense Computer Forensics Laboratory
  53. (410) 981-0036
  54.  
  55. ^ Lulz
  56. -----------------------------------------
  57.  
  58.  
  59. Is there a Facebook white paper or other document to assist with the interpretation of a Facebook url?
  60.  
  61. I am trying to determine when a specific Facebook account was logged in during a set time.
  62.  
  63. Thanks
  64.  
  65.  
  66. William Oettinger
  67. GySgt USMC
  68. Marine Corps Base Hawaii - Legal
  69.  
  70.  
  71.  
  72. Generally, Facebook does not retain deleted content. If get a preservation
  73. letter to them before they deleted content is removed from their server,
  74. maybe 48 to 72 hours, they will hold the data for you. If not, it's gone.
  75. You may be able to find deleted content on archived web pages using sites
  76. like way back machine but I'm not sure how often that's updated. Hope this
  77. helps.
  78.  
  79.  
  80.  
  81.  
  82. ^ thanks for the tips
  83. --------------------------- -------------------
  84.  
  85.  
  86.  
  87. I have an eDonkey referral - CP - from Germany - I'm attempting to get a
  88. warrant written based on the information I've been provided...
  89.  
  90. I've attached a screenshot regarding my question -
  91.  
  92. Their eDonkey LOG file (text based) gives me my suspect's IP address,
  93.  
  94. date, time etc., with the following value of the file:
  95.  
  96.  
  97. 6BCC76487A3389941ED5248F4F1D7513
  98.  
  99. However, another document they've provided also gives me the MD5 Hash
  100. value of the file (NOT provided from the eDonkey logs) - the MD5 matches
  101. the actual file they sent me from their law enforcement CP library - the
  102. MD5 hash value of the file is this:
  103.  
  104. 857d5bedc3e75397246226c7a3c18bfa
  105.  
  106. My question is - what value is the eDonkey log reporting here ? i.e.,
  107. 6BCC76487A3389941ED5248F4F1D7513 - and how do I "convert" this to show
  108. it "matches" the MD5 hash value of the file itself?
  109.  
  110.  
  111. ****Please note new address*****
  112.  
  113. Maggi Holbrook, CFCE
  114. Sr. Computer Forensics Investigator
  115. VPD-CCSO Digital Evidence Cybercrime Unit
  116. 2800 NE Stapleton Rd
  117. Vancouver WA 98661
  118. LAB: (360) 487-7489
  119. FAX: (360) 695-3530
  120. Member - Seattle/Pacific Northwest Regional ICAC Task Force
  121.  
  122. ------------------------------------------------
  123.  
  124.  
  125.  
  126.  
  127.  
  128. Actually, if you are using the Vista or Win7 AIK, you can set the Windows Pre-Installation Environment not to
  129. automount any devices on boot, which is what Helix, SPADA and others do with Linux. There are two changes to
  130. make in the registry of the PE system to make what Troy Larson refers to as Windows FE (Forensic Environment).
  131.  
  132. I’ve built and tested several of these using various file systems, both Windows recognized and not, as subject
  133. devices and so far none of the hash values have changed when booted with Windows FE. Windows FE is all
  134. command-line but can run FTK Imager and EnCase. The only function of EnCase I haven’t got working is EnScripts
  135. and Conditions/Filters. I think I need a language pack or something because when I view the code, it’s all
  136. garbed up.
  137.  
  138.  
  139. In regards to this post, at the motion I would want the defense expert to testify to how the Windows PE that he
  140. intends to use is built, if he’s made any modifications to the registry, if he has loaded any drivers and
  141. describe in detail the drivers he has loaded, their function and provide all these details in his testimony. I
  142. read through the Microsoft Technet information on ImageX and I have questions to the forensic integrity of this
  143. tool that would have to be proved through testing and validation. I’ve never used it and haven’t had anyone
  144. else propose using it as a forensic imaging tool. I would expect this expert would be able to provide written
  145. documentation of that testing and validation process for the prosecution’s review at the motion hearing. Those
  146. tests should then be reviewed to see that they are following sound forensic procedures. In the end, the only
  147. way to know if ImageX and the expert’s version of Windows PE are following forensic guidelines and practices is
  148. to review and thoroughly test his proposed procedures. I know this is a last minute thing but that’s why
  149. there’s caffeine in coffee.
  150.  
  151. ----------------------------------------------------------------------------
  152.  
  153. We recently got a file server a 15 TB RAID which we use for cases. We image directly to the server. The case
  154. will remain on this forensic file server for 3 years, at that point it is copied using the tape drive and
  155. archived, however it is purged off the server. Other than that, a case will not be deleted from the sever
  156. without written authorization from the investigator (we may do this for some of the really big cases) as
  157. needed.
  158.  
  159.  
  160. in reply to
  161.  
  162. Question in regard to evidence retention...
  163.  
  164. We submit our case drives and examination result CDs/DVDs as evidence and store them in our unit (the room is
  165. considered an evidence locker).
  166.  
  167. We're curious what other agencies are doing when paperwork is filed for evidence to be released / destroyed.
  168. Are you returning / destroying the computers and associated original evidence but still maintaining the case
  169. drive containing the acquired image files... Or do you destroy the CDs/DVDs and wipe the case drives for reuse?
  170.  
  171. For those imaging to Network Attached Storage, as opposed to case drives, do you retain the image on the NAS or
  172. discard that, as well...
  173.  
  174. Thanks in advance for your replies.
  175.  
  176.  
  177.  
  178. ------------------------------------------------------------------
  179.  
  180. Subject:Processing doctor/lawyer/priest/etc computers
  181.  
  182. Hello,
  183.  
  184.  
  185.  
  186. I was wondering what, if any, additional steps, processes or procedures anyone is using when processing a computer obtained via search warrant from a doctors office and/or criminal law office and/or non-criminal law office, etc. Essentially, any computer where there is a good likelihood that privileged materials on it are co-mingled with materials related to the specific criminal activity which is being conducted on the part of the doctor/lawyer/priest/etc in question.
  187.  
  188.  
  189. REPLY:
  190.  
  191.  
  192. 1> Doctor check for sexual assault videos of unconscious patients.
  193. 2> Lawyer check for fraud offences and other trust account violations.
  194. 3> Priest check for CP.
  195.  
  196.  
  197.  
  198. Peter Kingsley
  199. Ad.Dip.I.T. CFCE
  200. Operation Manager
  201. Forensic Computer Examination Unit
  202. Queensland Police Service, Australia
  203.  
  204.  
  205.  
  206.  
  207.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement