Monday, December 09, 2013

FBI’s search for ‘Mo,’ suspect in bomb threats, highlights use of malware for surveillance --- Phishing for a suspect, The FBI team works much like other hackers, using security weaknesses in computer programs to gain control of users’ machines. The most common delivery mechanism, say people familiar with the technology, is a simple phishing attack — a link slipped into an e-mail, typically labeled in a misleading way. -- When the user hits the link, it connects to a computer at FBI offices in Quantico, Va., and downloads the malicious software, often called “malware” because it operates covertly, typically to spy on or otherwise exploit the owner of a computer. As in some traditional searches, subjects typically are notified only after evidence is gathered from their property. -- “We have transitioned into a world where law enforcement is hacking into people’s computers, and we have never had public debate,” said Christopher Soghoian, principal technologist for the American Civil Liberties Union. “Judges are having to make up these powers as they go along.” - More, Craig Timberg and Ellen Nakashima, Published: December 6 - Washingtonpost

0 Comments:

Post a Comment

<< Home