I beleive they may have gotten the PO Box # you refer to from communications with OSOCA where they were posing as a customer - no?
no this was a po box where he received HIS stuff from the overseas supplier (GLP). OSOCA's buyers just emailed WU info or greendot info, they never got a box number - .
If that's not the case, here's where I am at:
I am still leaning towards a keylogger.
Yup.
Brute force is a possibility, but at that level - I doubt the DEA attempts decryption via brute force. Even a trivial password would take a significant amount of time - and there is no guarantee. You may run that for weeks on end and end up no where. I would think they farm all 'cracks' out to a much more focused group like the NSA, and I sincerly doubt they get involved for such trival nonsense.
As far as a backdoor - if there was and hush was complying and conspiring - then why would the DEA seek a warrant for a break / enter and suripticiously install a keylogger in the much more important MDMA manufacturing case linked earlier? Seems ass backwards if they could simply make a phone call to hush and get the clear text - no?
The only hint that could point otherwise was that in the MDMA case they insisted upon the keylogger because they needed 'realtime' access to clear text emails - which in a hush/backdoor scenario - hush may not be setup to provide real time - they may have to retreive the emails, decrypt, send on a CD to LE.
That was my thought - getting a subpeona, serving, hush preparing and sending takes time - a key logger can transmit in real time or short-delay bursts.
How you would approach countering *ALL* these possibilities would vary depending upon if you were a customer or a distributer.