Archive for the ‘Law’ Category
Security experts: Don’t blame Internet for JihadJane and other recent terror scares
By Michael Booth, The Denver Post
Published: Saturday, March 13, 2010 11:15 PM ESTIt’s not the Internet. It’s the unstable surfer at the keyboard that constitutes the threat.
Internet terrorism and crime experts hedged their outrage when reacting to the arrest of Leadville’s Jamie Paulin-Ramirez, who was released Saturday without charges. Yes, they said, the Internet provides ample opportunity for disgruntled, lonely or violent people to meet up for criminal ends.
But social media, from chat rooms to Facebook, have become so widespread they are no more or less dangerous than society as a whole, these Internet observers said. And the technology cuts both ways: If alleged plotters like Paulin-Ramirez and “Jihad Jane” are using the Internet to plan crimes, rest assured law enforcement and watchdog groups successfully employ the same tools to foil them.
“Anyone who is trying to use the Internet for crime is falsely under the illusion that they are anonymous and won’t get busted,” said Steve Jones, author of “Virtual Culture” and a professor of communication and technology at the University of Illinois-Chicago. “Consider it an Internet-based `neighborhood watch.’ I’m not more concerned about the Internet than I am about the rest of the world.”
Internet connections can make for notorious nicknames and chilling chat-room transcripts, but the method of communication may not have that much impact on terrorism, said Jeremy Lipschultz, an expert in communications law and culture at the University of Nebraska-Omaha.
The rest HERE
Ummm yeah, Steve, you seem to be misunderstanding the problems faced here. Sure, there are people like me and others out there cruising the boards, but, the “authorities” are kinda behind the curve on this stuff.
Believe me Steve, I know. I have had dealings with the authorities.
So, yes, if you are on the internet and looking to do bad things AND you don’t know how to be stealthy, sure, eventually, you will be caught. However, if you are careful and you know what you are doing, then it may take some time if at all to be caught.
Case in point, look at our whole APT and cyber security debacle ongoing in the US. The CyberShockwave CNN mess is just the tip of the digital iceberg when talking about how inept our government and its minions are in dealing with the problems in cyberspace.
Better yet, lets look at the 559 million dollar haul recently cited by the FBI taken by cyber criminals. Any clues? Suspects? Not like they can round up the usual crew huh? It’s just not that easy with our current infrastructure to capture traffic and catch those who were committing the crime. Nor are the cops, even the Feds up to the task of trying to capture these offenders.
Here’s a quote for you from a recent exchange I had with the FBI:
“I don’t know anything about this stuff.. I do drug cases”
This from a field agent tasked with looking into a cyber oriented incident. What I am saying here is there is a big gap and the criminals and jihadi’s are using that to the most.
So Steve, you obviously don’t have a clue about cyber security issues. The real ones to worry about surely aren’t the guys and gals just using chat groups to talk to Jihadists, these “Jihobbyists” but let me remind you, it was a group of guys who were NOT cops or feds, that caught on to Jane and then reported her. Of course all of this AFTER she had activated and tried to whack a cartoonist. An act in which she failed mind you.
Oh, and Steve, did you know she was doing all this on YouTube? I mean really, just how friggin sooper sekret is that huh?
Duh.
Were Jane and others out there tech savvy or trained to be, they could be much more dangerous. In fact, the moniker “jihobbyist” has taken a turn in meaning. You see, the feds thought of Jane and others as “mostly harmless” but, as you can see they were wrong.
No, worry about the Jihadi’s who are technically savvy and trained in computer skills who know how to use a TOR router, encryption, email dead drops, etc. Those are the ones to worry about because even if one of us non cops are watching, we may not catch on. Never mind the cops/feds who are playing catch up.
CoB
Digital Lipstick on the Collar
There is a question that has crossed the mind recently of anyone who has sent a cellphone text message while cheating on a spouse: What was I thinking?
Text messages are the new lipstick on the collar, the mislaid credit card bill. Instantaneous and seemingly casual, they can be confirmation of a clandestine affair, a record of the not-so-discreet who sometimes forget that everything digital leaves a footprint.
This became painfully obvious a week ago when a woman who claims to have had an affair with Tiger Woods told a celebrity publication that he had sent her flirty text messages, some of which were published. It follows on the heels of politicians who ran afoul of text I.Q., including a former Detroit mayor who went to prison after his steamy text messages to an aide were revealed, and Senator John Ensign of Nevada, whose affair with a former employee was confirmed by an incriminating text message.
Unlike earlier eras when a dalliance might be suspected but not confirmed, nowadays text messages provide proof. Divorce lawyers say they have seen an increase in cases in the past year where a wronged spouse has offered text messages to show that a partner has strayed. The American Bar Association began offering seminars this fall for marital attorneys on how to use electronic evidence — text messages, browsing history and social networks — in proving a case.
Full NYT Story HERE:
It’s always fascinating to see just where Digital Forensics seems to be headed these days. Of course with the laws out there like the one that allows you to sue the “lover” of your partner , I can foresee a whole new cottage industry of cell phone and PDA forensics to determine “if” indeed they were cheating. This too will also spill over into actual testimony by CHFI’s going into court to testify as to the naughty texts that someone has sent back and forth without having to get a federal court order to get the records from AT&T.
Of course there is the trouble of obtaining the cell phone to run a forensic on.. But, sure, I can see wives taking those phones and saying “Oops! It must have gotten lost!” only to turn it over to the local digital forensics huggy bear huh? Maybe… Maybe in fact, these phones will be part of court orders to turn over to the CHFI as discovery huh? Who really knows.
Surely though, it will be a boon to those PDA/Cell trojan makers out there that claim to be able to monitor all the traffic say on an iPhone and report back to you… So far these technologies can work, but I have not heard of too many being used in cases. Would this not also too make the user/implanter of the trojan in fact a criminal by backdooring the phone in the first place?
One wonders…
On another note, isn’t it comforting to know that all of your conversations digitally, are being collected and saved by AT&T etc for varying amounts of time? The voice I am sure is being audited and logged by the NARUS systems in the MAE’s out there, but also too all your digital surfing, texts, etc is being captured.. Who’da thunk it? Heh, if you were sitting there nodding your head, then you just aren’t aware of your surroundings kids. All of this stuff is no private unless you have some damn fine one time pad crypto! You are after all, transmitting all of this through federally mandated “critical infrastructure” you know. All of which is monitored now thanks to the patriot act and the Bush administrations machinations with regard to CALEA and those pesky “secret” wireless warrant taps.
But I digress…
Yes, now you can be caught not only by the government, but also your wives and significant others too. In any case, I foresee perhaps having paying clients for this kind of work in the near future…
Of course, if one were smart,one would buy a burn phone…. But, that’s just me… HINT HINT TIGER!
CoB