This page permanently redirects to gemini://gemini.techrights.org/2009/04/21/cipav-and-microsoft-windows/.
Posted in Microsoft, Security, Windows at 6:30 am by Dr. Roy Schestowitz
Summary: How (and why) the American secret services rely on Windows
THE back doors in Microsoft Windows are a serious issue that we've already covered, so there is no point doing it again. Adding to what we already know, there is now this report from Wired Magazine and another from IDG:
=> we've already covered | ↺ this report from Wired Magazine | ↺ from IDG
CIPAV spyware helped nab unemployed engineer angry over outsourcing
There is also a discussion at Slashdot and one reader of ours wrote: “A good question to ask is, what is it about Windows that allows CIPAV to be so easily activated? Does it even require visiting a contaminated Web site (see the Slashdot article)? What is it in Windows that allows such features?” Here is some relevant information which this reader sent to us:
=> ↺ discussion at Slashdot | ↺ some relevant information
CIPAV, which stands for “Computer and Internet Protocol Address Verifier,” is secret surveillance software that the FBI used last month to help identify whoever was e-mailing bomb threats almost daily to a Washington high school.[...]The only clue in the affidavit is that the CIPAV would operate as a pen register for up to 60 days after the software had been “activated” by the recipient. In other words, the FBI swore that the monitor would “time out” after 60 days. But not that it would delete itself or not be able to spread in some worm or bot fashion.
This post neither defense nor criticism of malicious and dangerous behaviour that the FBI is rightly intercepting. It is merely recognition of the operation of Microsoft Windows.
It is not news that the FBI uses Windows viruses (there were several articles about it last year) and the DHS, which recently recruited Microsoft after pressure from the BSA, is now recruiting hackers. █ ________ [1] FBI remotely installs spyware to trace bomb threat
=> recently | recruited Microsoft | pressure from the BSA | ↺ is now recruiting hackers | ↺ FBI remotely installs spyware to trace bomb threat
While there’s been plenty of speculation about how the FBI might deliver spyware electronically, this case appears to be the first to reveal how the technique is used in practice. The FBI did confirm in 2001 that it was working on a virus called Magic Lantern but hasn’t said much about it since.
[2] FBI ducks questions about its remotely installed spyware
=> ↺ FBI ducks questions about its remotely installed spyware
There are plenty of unanswered questions about the FBI spyware that, as we reported earlier this week, can be delivered over the Internet and implanted in a suspect’s computer remotely.
[3] FBI to Notify Microsoft Windows Users Who Were Victims of Botnets
=> ↺ FBI to Notify Microsoft Windows Users Who Were Victims of Botnets
The Department of Justice and FBI have announced the results of an ongoing cyber crime initiative to disrupt and dismantle “botherders” and elevate the public’s cyber security awareness of botnets.
[4] FBI: Operation Bot Roast finds over 1 million botnet victims
=> ↺ FBI: Operation Bot Roast finds over 1 million botnet victims
The Department of Justice and FBI Wednesday said ongoing investigations have identified more than 1 million botnet crime victims.
Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
Permalink Send this to a friend
=> Permalink | ↺ Send this to a friend
=> Techrights
➮ Sharing is caring. Content is available under CC-BY-SA.
text/gemini;lang=en-GB
This content has been proxied by September (ba2dc).