It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by InSpiteOf Do you know of any way to detect it outside of the firewall rules and virus definitions? Hell would anti-virus software vendors even classify this as a virus considering its use in law enforcement?
such surveillance -- which does not capture the content of the communications -- can be conducted without a wiretap warrant, because internet users have no "reasonable expectation of privacy" in the data when using the internet
Originally posted by brill
My understanding here is that all the collected data is sent back to Quantico so in theory you could use another inline host with an open source sniffer. Watch all traffic leaving your original host and you could determine its destination.
Originally posted by Tom Bedlam
It's sort of an issue of who gets installed first, but if it is among the first tasks, a rootkit can hide from nearly anything, including any user software, and most rootkit detectors.
Originally posted by InSpiteOf
Im sorry i need a little more clarification. From the way im reading this sentence, your saying if my firewall or virus scanner was installed first, it could potentially detect this rootkit?
Can you also recomend a relatively inexpensive hardware firewall?
Originally posted by Tom Bedlam
At any rate, not to make you paranoid or anything, but you could get it from a U2U, I would suppose (don't U2U's support embedded scripts?). So if you post something heinous and MaskedRevolutionary (made that up) sends you a congratulatory U2U, it could contain something 'extra'.
Originally posted by Tom Bedlam
Originally posted by brill
My understanding here is that all the collected data is sent back to Quantico so in theory you could use another inline host with an open source sniffer. Watch all traffic leaving your original host and you could determine its destination.
Which is really why you need a hardware firewall. We've got one here. SW firewalls are great sort of, they're cheap anyway.
We had considered building drive controllers that constantly scanned files for modifications, ones that shouldn't be modified anyway like your OS executables, and for changes to known good programs and their DLLs, like Word or what have you, and the list of executables that load on start up.
Done from a separate hardware platform that doesn't execute any x86 code, it ought to cover a lot of sins. You might also be able to prevent execution of any non-signed executable. That wouldn't prevent you from being tricked into executing data, but most processors and OS's since XP SP2 can refuse to execute data spaces. That would cover a lot of holes right there.
That's not to say you couldn't still do something, OS's are complex and people are clever.
Originally posted by CaptainJailew
Your fear of the government will keep you in check better than any surveillance they may or may not be capable of tracking you with. The sheer manpower needed to facilitate a large-scale cyber-veillance program means its (if nothing else) statistically improbable that any of us will be watched and even less probable that something would come of the surveillance (MYSTERIOUS DEATH! CANCER! SECRET GITMO PRISONS! SACRIFICE TO THE GREYS!)
Just trying to keep it in perspective.
=)
Originally posted by brill
Are you referring to something like a PIX firewall? If so how can you trust the code running on it? A Linux solution (big linux advocate here) certainly has its merits in that most of the code is open source which leads me back to my point in that if you used an open source sniffer you would be able to see every TCP/UDP transaction leaving your network. I'd say we agree here wholeheartedly.
brill
Originally posted by NoobieDoobieDo
Avoid the problem all together : Use Linux or Unix.
Originally posted by brill
I don't believe a lot of man power is required. Perhaps in the initial setup and provisioning, but once in operation it would be mostly run via software and automation. They've been monitoring communications heavily for a while which to me indicates that its far too valuable a source of information to dismiss.
Originally posted by LordBaskettIV
So do these root kits only effect Windows OS's? Or do they do this to MAC and Linux/Unix as well?