fun games against skilled adversaries [was: shipment interdiction [was: BadBIOS forensics]]
On 8/16/14, bluelotus@openmailbox.org <bluelotus@openmailbox.org> wrote:
Bryan Starbuck, I apologize for the delay in anwering your question. Your suggestion of keeping profiles is excellent. You are probably familiar with nonprofits being surveilled, harassed and hacked by former NSA trained hackers. ... Before the above article was written, I wrote a discussion thread on this. Readers are reluctant to concede that abusers hire private investigators who hire hackers.
the "security industry" as oriented toward the consumer public is focused on broad threats and general risks. the specialized particulars of targeted exploitation for whatever reason are the realm of nation state espionage, law enforcement technical surveillance, and high power corporate conflicts. individuals facing advanced attackers are left with nearly no avenues of reputable relief. the vagaries of how anyone might encounter "advanced attackers" are as myriad and expansive as the history of human kind itself. jilted lover, bruised ego, psychotic obsession, voyueristic thrills, the list goes well beyond the common corporate investigations and government espionage hijinx...
In these high tech times,private investigators hire black hat hackers who are adept at picking locks, gaining physical access to computers and external hard drives and disassemblying, implanting and infecting computers.
i find it amusing that the largest repository of black hats and malicious tech is employed by the United States Government itself. at least those tax dollars are some of the most effective put to use? ;)
My case is atypical. It was not the defendant's law firm that hired private investigators. The defendant himself hired private investigators who hired hackers. Who he hired are top notch professionals. The type that law firms would hire and refer to other law firms and defendants. The defendant acted on very good referrals.
it is slow going digging into your gear; will report in a few weeks. as mentioned before, due to interdiction of shipment i don't expect much of interest. but never say never... best regards, dokermange; doing mah best to poke bears and burn vulns P.S. if you would like to participate in a weaponized-sploits-for-free program with coderman please provide a cell phone number and physical address in united states for delivery of honey tokens to trigger tips. not responsible for damaged or turned-malicious hardware in your vacinity or possession. special restrictions may apply. LIMITED TIME ONLY! #YOLO #RENDITIONCON #WTFBBQ
"high power corporate conflicts" include litigation, defense law firms and private investigators. My theory is that the categories blend into each other. Former CIA, FBI, NSA, Homeland Security and law enforcement employees can immediately qualified for a private investigator license. They retain their government contacts. Do corporations, defense law firms and/or private investigators request NSA and/or Joint Threat Research Intelligence Group to place their targets on their watch lists? Free hacking and surveillance paid by taxpayers. "Both the Obama and Bush administrations have refused to disclose the criteria for adding a name to one of its terrorist watch lists." http://www.nationaljournal.com/tech/why-the-nsa-keeps-tracking-people-even-a... "It broadens the authority of government officials to “nominate” people to the watchlists based on what is vaguely described as “fragmentary information.” http://www.shtfplan.com/headline-news/frightening-obama-approves-substantial... Glenn Greenwald had promised to provide a list of names of people on National Counterterrorism Center's watch list. If my name was on the list, that would confirm my theory. Glenn Greenwald released numbers but not names. If names are ever released, I will provide an update: "According a report by the Intercept, of the 680,000 people on the terrorist watchlist, the government classifies some 40 percent as having “no recognized terrorist group affiliation.” In other words, the federal government tracks some 280,000 people without any proven links to terrorism. The government also keeps another database, and it takes even less suspicion to get a person place on it and under the gaze of federal snoops. According to the Intercept, most people on the watchlist start out on a classified list know as the Terrorist Identities Datamart Environment (TIDE). The TIDE database actually allows for targeting people based on far less evidence than the already lax standards used for placing people on the watchlist. A more expansive—and invasive—database, TIDE’s information is shared across the U.S. intelligence community, as well as with commando units from the Special Operations Command and with domestic agencies such as the New York City Police Department. According to the released documents, the feds monitor 320,000 additional people under the larger TIDE database. That puts the number of individuals on under the government microscope at over 1 million. The Intercept reports that as of the Summer of 2013, the watchlist included 5,000 Americans, with another 15,800 targeted in TIDE." http://www.offnow.org/documents_reveal_chilling_details_about_terrorist_watc... On 08/16/2014 11:15 pm, coderman wrote:
the "security industry" as oriented toward the consumer public is focused on broad threats and general risks. the specialized particulars of targeted exploitation for whatever reason are the realm of nation state espionage, law enforcement technical surveillance, and high power corporate conflicts.
individuals facing advanced attackers are left with nearly no avenues of reputable relief.
participants (2)
-
bluelotus@openmailbox.org
-
coderman