Luciano A. Ferrer on Mon, 31 Dec 2001 02:35:01 +0100 (CET) |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
[nettime-lat] cDc media control ]=------------------------------------------=| |
cDc media control ]=------------------------------------------=| At Hope2000/NYC cDc leadership announced a new project of building an infrastructure of tunnels and access points to grant unrestricted access to the internet to users from foreign countries who are legally not allowed to surf outside the government applied borders of 'their' internet. China was one of their targets. The very same group announced on the 26th of Nov their cooperation with the FBI to plan, build and deploy best-of-breed electronic surveillance software. http://cultdeadcow.com/details.php3?listing_id=425 The story rushed through the newstickers of the world and was soon picked up by other news agencies...not realizing the excellent work of satire by cDc. http://www.vnunet.com/News/1127639 Amazing how easy it is to bluff big new agencies.....no comment. FBI's new toy (Magic Lantern, virus-like keystroke logger): URL: http://www.msnbc.com/news/660096.asp?cp1=1 Reports are coming in about the new FBI traffic matching device becoming fully operational. Traffic matching devices are long known to various agencies but have not been used widely across the internet. The basic idea is to build a network of drones/sniffers which records traffic 'waves' for a limited time period. A master can search through all drones/sniffers and determine the path of a 'wave' (e.g traffic peak) through the internet. The results are the same for crypted (ssh, ipsec, ..) or bounced connections - as long as traffic flows from the source to the destination. Padding the traffic with random data does not fool the device. This is basic knowledge for anyone familiar with wavelets transformation (Random padded data would just result in a few more 'wavelet stars' in a visualized wavelet transformation). SSH in line mode (axssh) is not enough to fool the device. Splitting the traffic stream into many fake streams may fool the device. The required amount of traffic is most often not acceptable. URL: http://hes.iki.fi/pub/ham/unix/utils/ URL: http://www.wavelets.com Saludos! Luciano A. Ferrer, karmacoma de http://mearte.com.ar cualquier cosa... ¿Alguna consulta? Con gusto la responderé a la brevedad ----- ... la materia se daña en proporción directa a su valor _______________________________________________ Nettime-lat mailing list Nettime-lat@nettime.org http://amsterdam.nettime.org/cgi-bin/mailman/listinfo/nettime-lat