Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- FBI Network Investigative Techique - exposed
- Do you all remember wikileak's dump of the cia files. Basically, some smart operators watched where the malware was coming from, traced it upstream to the server being used, hacked the server and traced that to the next server in line ... all the way to the agencies back door! Then they blew the whistle.
- Wireshark, yes indeed wireshark! Awesome tool, very awesome tool!
- Now i want to tell you a story, a true story. For you history buffs out there, you will easily figure out the case and the people involved. This story involves the FBI's absolutely totally top secret Network Investigative Technique - NIT for short. After all the corruption (still ongoing, i might add), it's time to level the field by shining some light on the darkness.
- So, let's begin shall we? I'll begin with a cliche ...
- Once upon a time there was a hacker that the bureau was trying to catch. This smart hacker was savvy, he took the usual precautions. Things like software updates and anti virus updates. you know, the usual stuff. Anyway, from memory ...
- The agent in charge could see that our hacker was online. He was being monitored in real time. Now the version of this story that I read, goes on to say the AIC sent out a message. Our hacker ignored it. But fear not, as our intrepid agent in charge sent another message and again our hacker ignored it. Persistance is the byword (or was back in the day) at the bureau, so our persistant AIC sent out a third message and as expected our hacker ignored it ... but our AIC was indeed tenacious and sent out a fouth message. This one our hacker opened and from here, the rest is history. Busted, sent to jail, and finally turned!
- So, just what would a hacker open?
- So, just what would a hacker open? Spam ... no! tittie pics ... maybe but not in this case. this had to have some kind of urgency to trigger our hacker to actually want to open it. What could it be?
- US-Cert notifications, Yup! done in by US-Cert!
- I figured this out years ago and promptly signed up. Then for shits and giggles took to posting on 4 and 8 chan and sure enough, if I hit the right thread in the right forum, a nice US-Cert notification popped into my inbox. Ok, coincidence you say. Next, I took to various torrent sites and sure enough, I'd get a nice fresh US-Cert notification. The same pattern was repeated if I hit an FBI honeypot, up popped a US-Cert, Even still, foreign newspapers, certain ones were accompanied by a nice US-Cert notification.
- Here's how it works, your ip address visits / posts on a site. The FBI issues a US-Cert notification, you open it, it compares your ip address against the site and you get fed a zero day exploit along with the US-Cert notification
- Now, if you are paying attention at all and you have some free time, fire up your virtual machines, fire up wireshark, and follow the stream. it will lead you to the FBI's malware servers and then their back door.
- I look forward to a wikileaks dump in no more than three months. Again, let's level the playing field, shall we?
- DoomedDog
- Shining the light on darkness and corruption ...
- ps
- rosenstein and sessions need to go, along with page and company. all they way to mueller!
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement