Luciano A. Ferrer on Mon, 31 Dec 2001 02:35:01 +0100 (CET)


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[nettime-lat] cDc media control ]=------------------------------------------=|


cDc media control ]=------------------------------------------=|

  At Hope2000/NYC cDc leadership announced a new project of building an
infrastructure of tunnels and access points to grant unrestricted access
to the internet to users from foreign countries who are legally not allowed
to surf outside the government applied borders of 'their' internet.
China was one of their targets.

  The very same group announced on the 26th of Nov their cooperation
with the FBI to plan, build and deploy best-of-breed electronic surveillance
software.

   http://cultdeadcow.com/details.php3?listing_id=425

  The story rushed through the newstickers of the world and was soon
picked up by other news agencies...not realizing the excellent work of
satire by cDc.

   http://www.vnunet.com/News/1127639

Amazing how easy it is to bluff big new agencies.....no comment.

FBI's new toy (Magic Lantern, virus-like keystroke logger):
URL: http://www.msnbc.com/news/660096.asp?cp1=1

  Reports are coming in about the new FBI traffic matching device
becoming fully operational. Traffic matching devices are long known to
various agencies but have not been used widely across the internet.
The basic idea is to build a network of drones/sniffers which records
traffic 'waves' for a limited time period. A master can search through
all drones/sniffers and determine the path of a 'wave' (e.g traffic peak)
through the internet. The results are the same for crypted (ssh, ipsec, ..)
or bounced connections - as long as traffic flows from the source to
the destination. Padding the traffic with random data does not fool the
device. This is basic knowledge for anyone familiar with wavelets
transformation (Random padded data would just result in a few more
'wavelet stars' in a visualized wavelet transformation).

SSH in line mode (axssh) is not enough to fool the device. Splitting
the traffic stream into many fake streams may fool the device. The
required amount of traffic is most often not acceptable.

URL: http://hes.iki.fi/pub/ham/unix/utils/
URL: http://www.wavelets.com

 Saludos!  Luciano A. Ferrer,  karmacoma de
 http://mearte.com.ar   cualquier cosa...
 ¿Alguna consulta? Con gusto la responderé a la brevedad
   -----
... la materia se daña en proporción directa a su valor



_______________________________________________
Nettime-lat mailing list
Nettime-lat@nettime.org
http://amsterdam.nettime.org/cgi-bin/mailman/listinfo/nettime-lat