Please Scroll Down to See Forums Below
napsgear
genezapharmateuticals
domestic-supply
puritysourcelabs
UGL OZ
UGFREAK
napsgeargenezapharmateuticals domestic-supplypuritysourcelabsUGL OZUGFREAK

The SS can read your Encrypted Mail.

SOLID

New member
The FBI's 'Magic Lantern'

The government's next-generation electronic surveillance tool can reportedly break encryption. See what experts are saying about Magic Lantern.
By James Hamilton


Its been more than six months since the news broke about the FBI's new high tech spying device named "Magic Lantern." The government,
understandably, wants to keep the Magic Lantern technology under wraps. But that didn't stop "CyberCrime" from getting the inside scoop on this high tech surveillance device from experts, which we'll show you on this week's episode.

The Magic Lantern technology began as part of a broad FBI project called "Cyber Knight" -- the same project that spawned the notorious Carnivore email monitoring device. Magic Lantern goes much farther than Carnivore, though. If initial reports are correct, it will allow investigators to secretly install software that records every keystroke on a person's computer, steal passwords, and
read encrypted messages.

With many encryption programs available on the Internet, the FBI has been frustrated in efforts to break open encrypted messages, and officials are increasingly concerned about their ability to read encrypted messages in
criminal or terrorist investigations.

Magic Lantern also resolves another important problem with the FBI's existing computer monitoring technology -- the "key logger system." In the past, investigators had to break into a target's residence armed with a warrant and physically attach a device to a computer. Magic Lantern, however, can be
installed over the Internet by tricking a person into opening an email attachment. It is unclear whether Magic Lantern would transmit keystrokes it records back to the FBI over the Internet or store the information to be seized later in a raid.

Once up and running, it can reportably records all keystrokes, peer into file,
and even translate encrypted words into readable text.

How it works

Based on media reports, Magic Lantern is essentially a trojan program. This is
a software application that sits on a computer and runs without the user
knowing that it's there. Trojan programs usually come disguised as an email
attachment or an innocuous software download. For example, one popular trojan came hidden in a downloadable game called "Whack a Mole."

Trojans thought to be similar to Magic Lantern include Netbus and Back Orifice. These trojans allow other people to control your computer via the Internet. When you run a program that contains the trojan, it will copy itself to the Windows or WindowsSystem directory and add itself to the system's
Registry.

Once the program is completely installed onto a computer, it tries to hide itself
on the task list. It doesn't show any icon or indication that it is running. The
person who is controlling your computer uses a program that lets them record keystrokes, copy files, or basically do whatever they want.

A threat to civil liberties?

When news of Carnivore first hit, there was an uproar in the privacy community
because the program seemed to scan the emails of many people, not just emails sent by people under suspicion. With Magic Lantern, privacy advocates are concerned for a different reason.

On "CyberCrime," we interview Washington privacy advocate Mikal Condon, who is leading the charge to get more details about Magic Lantern out of the FBI. She believes the secrecy surrounding the technology is a serious threat to public privacy. Here's some commentary from around the Web examining
the privacy concerns prompted by Magic Lantern. Stories supportive of the project are hard to come by as of yet since all the FBI has revealed so far is that Magic Lantern exists and is in development. The FBI repeatedly denied requests for comment by "CyberCrime."
 
I dont know how well that would hold up in court because of the invasion of privacy. Another way to get around that is to use different emails and codenames for everything. They arent out to bust the average user anyway, they are going after the big boys. If your getting stuff for personal use you shouldnt have much of a problem.
 
Its basically a trojan so dont install it on your system.
 
wouldint that be an illegal search and seizure if they used any of the material that was sent buy email before a warent was obtained?
 
I have never used anything except a lap top, and never download anything unless I know exactly what it is and I never give my exact birthdate, address, or any private info that is often asked when creating a profile or signing up for a membership. Just a rule of thumb for me.
 
rochard said:
I have never used anything except a lap top, and never download anything unless I know exactly what it is and I never give my exact birthdate, address, or any private info that is often asked when creating a profile or signing up for a membership. Just a rule of thumb for me.

Yea, never read an email unless you know who its from. Use as much bogus info as you can. Laptops are always better.
 
Worms don't need to be opened as an attachment, plus enough people download stuff off the net that there is risk. I can't say that I believe they can get this to pass though, but then again they lied about Carnivore's abilities and that passed too, the fuckers would not let security experts into the whole deal and it was naturally later discovered the feds are a bunch of fucking liars and thier shit doesn't work right either.

It is IMPOSSIBLE to know if an email is what you want or not, without examining it, and what the FBI told the public was that it would NEVER TOUCH AN EMAIL that it didn't need to look at, when they search for keywords there is no way to know if the keyword exists in your email unless it scans it.
 
Thanks god I live in the great white north, your yankee secret police cant touch me here......
 
Top Bottom