Re: [Spooks] Thank you from the Project Evil team

2006-08-21 Thread Chris Barrus

Visit http://mailman.qth.net/mailman/listinfo/spooks to unsubscribe from this 
list

On Aug 8, 2006, at 10:57 AM, KD7JYK wrote:

Dang, I miss those LA meetings...  I was there from '92 - '96.   
Remember

when 2600 actually had something to do with phones???


Sure do! I remember the '90s-era LA meetings also... Phone talk and  
Agent Steal tooting his own horn about some b.s. prank he was  
involved with. Good times.

__
Spooks mailing list
Home: http://mailman.qth.net/mailman/listinfo/spooks
Help: http://mailman.qth.net/faq.htm
Post: mailto:Spooks@mailman.qth.net
-
Visit http://www.spynumbers.com/ for complete information about Spy Numbers 
Stations


Re: [Spooks] Thank you from the Project Evil team

2006-08-08 Thread Jeff Wilson

Visit http://mailman.qth.net/mailman/listinfo/spooks to unsubscribe from this 
list

Wow. I got pwned by a 2600 guy. hat's off sir!

As far as the shared login to a hotmail type account- I think I
remember reading that al queda or the like have used that method to
coordinate and communicate. I thought it was safer since there's no
SMTP server involved, it's just data stored on a hard drive on a
server somewhere transmitted through http to the viewer's screen. The
user simply pulls up the draft message from the other guy.

It's all become way more complicated. The NSA guys must be going nuts,
especially with the rise of Craigslist, MySpace, forums, you tube, and
other web 2.0 apps that allow virtually anything to be posted.

On 8/7/06, J. Random Entity [EMAIL PROTECTED] wrote:

Visit http://mailman.qth.net/mailman/listinfo/spooks to unsubscribe from this 
list

 Well, while it may be easy to DF a shortwave signal if you have
 adequate resources (like the government's), it's nearly impossible to
 tell who is receiving that transmission.

Point taken, but DFing a signal doesn't require government-level
resources.  I've participated in a few DF events before, none of them
using anything much more complex than a directional antenna for the
band we're working and the signal meter built in to the radio.
Granted, there's much better hardware out there to do it with - but
remember that it was a couple of hams who found Yosemite Sam, not the
FCC (although that's likely another story in and of itself).

 In the web world- however, there's a log for everything.

Yes and no.  Things get logged, assuming that:

a) Logging is enabled.
b) There's space to store the logs.
c) The logs aren't rotated and written over.

 Every person
 who visited that Craigslist link is logged.

We can't say that for certain because we don't know Craigslist's
logging policies.  More:

 The poster himself was
 logged.

While this is likely the case, again, we don't know their policies on
logging.  And, of course, that doesn't cover the logs the VoIP
providers have, or any of the other websites that were following the
experiment.  Further, just because logs exist doesn't mean that access
to them by third parties (such as law enforcement, or the intelligence
community) is automatic.

Following on from that, though, we can probably *assume* (note the
emphasis) that people from the original poster on down were logged.
However, it's important to remember that there are any number of ways
to obfuscate an IP address: use a public access terminal such as in an
Internet cafe or library; use a proxy or similar anonymizing service;
route your traffic through compromised machines.  There are others,
but that should serve to demonstrate the less-than-useful nature of
relying on an IP address when attempting to physically locate someone.

Also, there's one other thing that's probably worth pointing out: in a
real-world scenario, this likely would've been an overly-complex way
of communicating with an agent.  There are two sides to the
communication - one on Craigslist telling the agent to call a
particular number, then the actual communication to the agent recorded
on the VoIP station.  Using Craigslist alone probably would've
sufficed; the messages could've been encrypted steganographically
within posts to, say, the rants  raves section.  I'm specifically
picking rants  raves here because it's a) not uncommon to see long
messages posted there, allowing for a longer encrypted message to be
hidden, and b) there are literally hundreds of posts there on any
given day for any given city, which would again have made finding the
intended recipient extremely difficult.

With respect to the VoIP station, it worked fine as a transmission
medium both from the standpoints of availability and obfuscation:
people recorded it and made it available in many formats from MP3 to
text to radio broadcasts, so knowing the intended recipient .
However, the downfall is that it provides a second level of logging
and if you're trying to avoid leaving an audit trail, multiple levels
of logging can either work in your favour or against you - they can
either serve to baffle an investigator by overwhelming them with data,
or enable correlation of events allowing a list of suspects to be
drawn up and chased down.

 And thanks to a powerful search engine like Google, one could
 search a large chunk of the internet for places where MEIN FREULEIN
 exists.

Sure.  But remember that we were never intending from the get-go for
this to be clandestine; the idea was to put a high level of
signal-to-noise around the stations by having their content spread for
us by unwitting third parties.  In a sense, this is some of the best
obfuscation you could hope for.  People already listen to shortwave
transmissions and discuss them openly; that doesn't necessarily mean
that their intended recipients are any more or less secure in their
comings and goings than if nobody had heard them in the first 

Re: [Spooks] Thank you from the Project Evil team

2006-08-08 Thread Anon
Visit http://mailman.qth.net/mailman/listinfo/spooks to unsubscribe from this 
list

On Mon, 2006-08-07 at 22:04 -0700, Jeff Wilson wrote:
 No the best way to covertly communicate online is to open an anonymous
 email account with Gmail or hotmail or something...then share the
 login/password with the person you intend to communicate with. Simply
 leave messages for each other from within the same account; voila, you
 avoid a lot of the risk online. You could even rot13 your one time
 number pad :) 

There are many ways to achieve online stealth, grasshopper.

Anon


-- 
/**
/  This stealth mailing address was hand-crafted to befuddle the
/  analysts at Homeland Security as to my real identity.   
/   -Anon

__
Spooks mailing list
Home: http://mailman.qth.net/mailman/listinfo/spooks
Help: http://mailman.qth.net/faq.htm
Post: mailto:Spooks@mailman.qth.net
-
Visit http://www.spynumbers.com/ for complete information about Spy Numbers 
Stations


Re: [Spooks] Thank you from the Project Evil team

2006-08-08 Thread Zack Widup
Visit http://mailman.qth.net/mailman/listinfo/spooks to unsubscribe from this 
list

On Mon, 7 Aug 2006, Jeff Wilson wrote:

 
 Well, while it may be easy to DF a shortwave signal if you have
 adequate resources (like the government's), it's nearly impossible to
 tell who is receiving that transmission.
 
 In the web world- however, there's a log for everything. Every person
 who visited that Craigslist link is logged. The poster himself was
 logged. And thanks to a powerful search engine like Google, one could
 search a large chunk of the internet for places where MEIN FREULEIN
 exists. From there, it's just a matter of filtering the data, then a
 quick subpeona of the telco's records for users from a certain area.
 Posting at an internet cafe with an anonymous account isn't safe
 either, due to the prevalence of cameras in such places.
 

I wonder how easy it is to track telephone calls.  I'm assuming it was 
possible to keep track of who called the telephone numbers (whether or not 
that was done, I don't know).  I called the NY number but I used one of 
those cheap calling cards.  People with caller ID tell me that when I call 
them using the card, it always comes up with something like Georgia Call 
or Virginia Call or even once Idaho Call. How easily can those be 
traced down?

 No the best way to covertly communicate online is to open an anonymous
 email account with Gmail or hotmail or something...then share the
 login/password with the person you intend to communicate with. Simply
 leave messages for each other from within the same account; voila, you
 avoid a lot of the risk online. You could even rot13 your one time
 number pad :)
 

That is so simple and yet effective method that it makes me wonder why the 
numbers stations still exist. Maybe the intended audience has no computer?  
I suppose if you were a spy in a foreign country, you might not want to 
have a computer with you.

Zack

__
Spooks mailing list
Home: http://mailman.qth.net/mailman/listinfo/spooks
Help: http://mailman.qth.net/faq.htm
Post: mailto:Spooks@mailman.qth.net
-
Visit http://www.spynumbers.com/ for complete information about Spy Numbers 
Stations


Re: [Spooks] Thank you from the Project Evil team

2006-08-08 Thread KD7JYK
Visit http://mailman.qth.net/mailman/listinfo/spooks to unsubscribe from this 
list

 I'll try to put more acronyms in my next post; this one was definitely
 way too light on them ;)

True, a first-grader could have understood that last post...

Kurt
__
Spooks mailing list
Home: http://mailman.qth.net/mailman/listinfo/spooks
Help: http://mailman.qth.net/faq.htm
Post: mailto:Spooks@mailman.qth.net
-
Visit http://www.spynumbers.com/ for complete information about Spy Numbers 
Stations


Re: [Spooks] Thank you from the Project Evil team

2006-08-07 Thread J. Random Entity

Visit http://mailman.qth.net/mailman/listinfo/spooks to unsubscribe from this 
list

Hi Jeff,


Congrats on a nice little internet based experiment. It would have
been even more impressive if it was an actual shortwave numbers
station. ;)


We actually considered doing it as a real station, but wanted a
certain degree of anonymity.  Of course, shortwave stations are great
for that - but the only way to really do that would to be unlicensed,
and we didn't really want to go down that road.  Besides, licensed or
not, you could still be DFed, and there was some curiosity to see how
people would react when faced with a numbers station running over a
non-traditional medium.


You guys aren't behind Yosemite Sam are you?


Nope, nor are we behind any of the others that might fall into the 'is
it real or is it Memorex?' category.  I will confess to having a
fondness for Yosemite Sam, though, and have a theory (going by the
audio sample it uses) that it's meant to be in direct competition to
WBNY and the Rodent Revolution.  But otherwise, sorry - not us :)

Thanks,

- skroo.
__
Spooks mailing list
Home: http://mailman.qth.net/mailman/listinfo/spooks
Help: http://mailman.qth.net/faq.htm
Post: mailto:Spooks@mailman.qth.net
-
Visit http://www.spynumbers.com/ for complete information about Spy Numbers 
Stations


Re: [Spooks] Thank you from the Project Evil team

2006-08-07 Thread J. Random Entity

Visit http://mailman.qth.net/mailman/listinfo/spooks to unsubscribe from this 
list

Wow...  I didn't expect *that* many messages in my inbox after sending
out this thread...

It looks as though I neglected to send out the link to the Project
Evil website in the original email, so here it is:
http://www.projectevil.org/ .  Anyone with questions may want to check
there first, but I'm still more than happy to answer anything it
doesn't :)

Cheers,

- skroo.
__
Spooks mailing list
Home: http://mailman.qth.net/mailman/listinfo/spooks
Help: http://mailman.qth.net/faq.htm
Post: mailto:Spooks@mailman.qth.net
-
Visit http://www.spynumbers.com/ for complete information about Spy Numbers 
Stations


RE: [Spooks] Thank you from the Project Evil team

2006-08-07 Thread Shutaro Highwind
Visit http://mailman.qth.net/mailman/listinfo/spooks to unsubscribe from this 
list

 You guys aren't behind Yosemite Sam are you?

What about the HELLO WORLD(
http://en.wikipedia.org/wiki/Slashdot_trolling_phenomena#HELLO_WORLD )
messages that popped up on a Slashdot and a few other message boards and
blogs? ^^

-Shutaro

--
http://shutaro.livejournal.com/

__
Spooks mailing list
Home: http://mailman.qth.net/mailman/listinfo/spooks
Help: http://mailman.qth.net/faq.htm
Post: mailto:Spooks@mailman.qth.net
-
Visit http://www.spynumbers.com/ for complete information about Spy Numbers 
Stations


Re: [Spooks] Thank you from the Project Evil team

2006-08-07 Thread J. Random Entity

Visit http://mailman.qth.net/mailman/listinfo/spooks to unsubscribe from this 
list


What about the HELLO WORLD(
http://en.wikipedia.org/wiki/Slashdot_trolling_phenomena#HELLO_WORLD )
messages that popped up on a Slashdot and a few other message boards and
blogs? ^^


Nope, not that one either.  In fact, the only thing that Project Evil
has released so far has been the Mein Fraulein stations.  We're as in
the dark as everyone else as to who's behind the ones showing up on
Slashdot, Wikipedia, et. al.

- skroo.
__
Spooks mailing list
Home: http://mailman.qth.net/mailman/listinfo/spooks
Help: http://mailman.qth.net/faq.htm
Post: mailto:Spooks@mailman.qth.net
-
Visit http://www.spynumbers.com/ for complete information about Spy Numbers 
Stations


Re: [Spooks] Thank you from the Project Evil team

2006-08-07 Thread Zack Widup
Visit http://mailman.qth.net/mailman/listinfo/spooks to unsubscribe from this 
list


Copycats?

On Mon, 7 Aug 2006, J. Random Entity wrote:

 
  What about the HELLO WORLD(
  http://en.wikipedia.org/wiki/Slashdot_trolling_phenomena#HELLO_WORLD )
  messages that popped up on a Slashdot and a few other message boards and
  blogs? ^^
 
 Nope, not that one either.  In fact, the only thing that Project Evil
 has released so far has been the Mein Fraulein stations.  We're as in
 the dark as everyone else as to who's behind the ones showing up on
 Slashdot, Wikipedia, et. al.
 
 - skroo.

__
Spooks mailing list
Home: http://mailman.qth.net/mailman/listinfo/spooks
Help: http://mailman.qth.net/faq.htm
Post: mailto:Spooks@mailman.qth.net
-
Visit http://www.spynumbers.com/ for complete information about Spy Numbers 
Stations


Re: [Spooks] Thank you from the Project Evil team

2006-08-07 Thread Jeff Wilson

Visit http://mailman.qth.net/mailman/listinfo/spooks to unsubscribe from this 
list

Well, while it may be easy to DF a shortwave signal if you have
adequate resources (like the government's), it's nearly impossible to
tell who is receiving that transmission.

In the web world- however, there's a log for everything. Every person
who visited that Craigslist link is logged. The poster himself was
logged. And thanks to a powerful search engine like Google, one could
search a large chunk of the internet for places where MEIN FREULEIN
exists. From there, it's just a matter of filtering the data, then a
quick subpeona of the telco's records for users from a certain area.
Posting at an internet cafe with an anonymous account isn't safe
either, due to the prevalence of cameras in such places.

No the best way to covertly communicate online is to open an anonymous
email account with Gmail or hotmail or something...then share the
login/password with the person you intend to communicate with. Simply
leave messages for each other from within the same account; voila, you
avoid a lot of the risk online. You could even rot13 your one time
number pad :)

On 8/7/06, Zack Widup [EMAIL PROTECTED] wrote:

Visit http://mailman.qth.net/mailman/listinfo/spooks to unsubscribe from this 
list


Copycats?

On Mon, 7 Aug 2006, J. Random Entity wrote:


  What about the HELLO WORLD(
  http://en.wikipedia.org/wiki/Slashdot_trolling_phenomena#HELLO_WORLD )
  messages that popped up on a Slashdot and a few other message boards and
  blogs? ^^

 Nope, not that one either.  In fact, the only thing that Project Evil
 has released so far has been the Mein Fraulein stations.  We're as in
 the dark as everyone else as to who's behind the ones showing up on
 Slashdot, Wikipedia, et. al.

 - skroo.

__
Spooks mailing list
Home: http://mailman.qth.net/mailman/listinfo/spooks
Help: http://mailman.qth.net/faq.htm
Post: mailto:Spooks@mailman.qth.net
-
Visit http://www.spynumbers.com/ for complete information about Spy Numbers 
Stations




--
-
Jeff Wilson
__
Spooks mailing list
Home: http://mailman.qth.net/mailman/listinfo/spooks
Help: http://mailman.qth.net/faq.htm
Post: mailto:Spooks@mailman.qth.net
-
Visit http://www.spynumbers.com/ for complete information about Spy Numbers 
Stations


Re: [Spooks] Thank you from the Project Evil team

2006-08-07 Thread J. Random Entity

Visit http://mailman.qth.net/mailman/listinfo/spooks to unsubscribe from this 
list


Copycats?


Nah.  Whoever's behind the ones on Slashdot, at least, has been at it
for a number of years.  It just appears as though the idea migrated
over to Wikipedia at some more recent point.

- skroo.
__
Spooks mailing list
Home: http://mailman.qth.net/mailman/listinfo/spooks
Help: http://mailman.qth.net/faq.htm
Post: mailto:Spooks@mailman.qth.net
-
Visit http://www.spynumbers.com/ for complete information about Spy Numbers 
Stations


RE: [Spooks] Thank you from the Project Evil team

2006-08-07 Thread Shutaro Highwind
Visit http://mailman.qth.net/mailman/listinfo/spooks to unsubscribe from this 
list

Yes, but it's a question of recourses. You could do all of that, to track
down every person who has viewed every anomalous blog and message board
posting. But sooner or later you run into the law of diminishing returns.
How much time do you spend perusing all the fake messages that may or may
not have been seeded out there by spam bot/progams/scripts before you find
the one message that may actually have meaningful content? And it's
recipient? Especially since, as has been demonstrated, people can create
their own numbers stations/postings which only add to the signal to noise
ratio? And what about examining all of the hundreds of thousands of people
to view/listen to it? Yes, there's a log for everything. But how much time
do you want to waste mining all that data? Especially given there's an equal
liklihood of the message being either a) a mein fraulein-style social
experiment, b) a copycat of said experiment, c) a real transmission? Yeah,
everything is logged in the internet. But there's so many people out there
on the net, it might as well be a shortwave signal.

-Shutaro

--
http://shutaro.livejournal.com/

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Jeff Wilson
Sent: Monday, August 07, 2006 10:04 PM
To: Shortwave Spy Numbers Stations
Subject: Re: [Spooks] Thank you from the Project Evil team


Visit http://mailman.qth.net/mailman/listinfo/spooks to unsubscribe from
this list

Well, while it may be easy to DF a shortwave signal if you have
adequate resources (like the government's), it's nearly impossible to
tell who is receiving that transmission.

In the web world- however, there's a log for everything. Every person
who visited that Craigslist link is logged. The poster himself was
logged. And thanks to a powerful search engine like Google, one could
search a large chunk of the internet for places where MEIN FREULEIN
exists. From there, it's just a matter of filtering the data, then a
quick subpeona of the telco's records for users from a certain area.
Posting at an internet cafe with an anonymous account isn't safe
either, due to the prevalence of cameras in such places.

No the best way to covertly communicate online is to open an anonymous
email account with Gmail or hotmail or something...then share the
login/password with the person you intend to communicate with. Simply
leave messages for each other from within the same account; voila, you
avoid a lot of the risk online. You could even rot13 your one time
number pad :)

On 8/7/06, Zack Widup [EMAIL PROTECTED] wrote:
 Visit http://mailman.qth.net/mailman/listinfo/spooks to unsubscribe from
this list


 Copycats?

 On Mon, 7 Aug 2006, J. Random Entity wrote:

 
   What about the HELLO WORLD(
   http://en.wikipedia.org/wiki/Slashdot_trolling_phenomena#HELLO_WORLD )
   messages that popped up on a Slashdot and a few other message boards
and
   blogs? ^^
 
  Nope, not that one either.  In fact, the only thing that Project Evil
  has released so far has been the Mein Fraulein stations.  We're as in
  the dark as everyone else as to who's behind the ones showing up on
  Slashdot, Wikipedia, et. al.
 
  - skroo.

 __
 Spooks mailing list
 Home: http://mailman.qth.net/mailman/listinfo/spooks
 Help: http://mailman.qth.net/faq.htm
 Post: mailto:Spooks@mailman.qth.net
 -
 Visit http://www.spynumbers.com/ for complete information about Spy
Numbers Stations



--
-
Jeff Wilson
__
Spooks mailing list
Home: http://mailman.qth.net/mailman/listinfo/spooks
Help: http://mailman.qth.net/faq.htm
Post: mailto:Spooks@mailman.qth.net
-
Visit http://www.spynumbers.com/ for complete information about Spy Numbers
Stations

__
Spooks mailing list
Home: http://mailman.qth.net/mailman/listinfo/spooks
Help: http://mailman.qth.net/faq.htm
Post: mailto:Spooks@mailman.qth.net
-
Visit http://www.spynumbers.com/ for complete information about Spy Numbers 
Stations


Re: [Spooks] Thank you from the Project Evil team

2006-08-07 Thread J. Random Entity

Visit http://mailman.qth.net/mailman/listinfo/spooks to unsubscribe from this 
list


Well, while it may be easy to DF a shortwave signal if you have
adequate resources (like the government's), it's nearly impossible to
tell who is receiving that transmission.


Point taken, but DFing a signal doesn't require government-level
resources.  I've participated in a few DF events before, none of them
using anything much more complex than a directional antenna for the
band we're working and the signal meter built in to the radio.
Granted, there's much better hardware out there to do it with - but
remember that it was a couple of hams who found Yosemite Sam, not the
FCC (although that's likely another story in and of itself).


In the web world- however, there's a log for everything.


Yes and no.  Things get logged, assuming that:

a) Logging is enabled.
b) There's space to store the logs.
c) The logs aren't rotated and written over.


Every person
who visited that Craigslist link is logged.


We can't say that for certain because we don't know Craigslist's
logging policies.  More:


The poster himself was
logged.


While this is likely the case, again, we don't know their policies on
logging.  And, of course, that doesn't cover the logs the VoIP
providers have, or any of the other websites that were following the
experiment.  Further, just because logs exist doesn't mean that access
to them by third parties (such as law enforcement, or the intelligence
community) is automatic.

Following on from that, though, we can probably *assume* (note the
emphasis) that people from the original poster on down were logged.
However, it's important to remember that there are any number of ways
to obfuscate an IP address: use a public access terminal such as in an
Internet cafe or library; use a proxy or similar anonymizing service;
route your traffic through compromised machines.  There are others,
but that should serve to demonstrate the less-than-useful nature of
relying on an IP address when attempting to physically locate someone.

Also, there's one other thing that's probably worth pointing out: in a
real-world scenario, this likely would've been an overly-complex way
of communicating with an agent.  There are two sides to the
communication - one on Craigslist telling the agent to call a
particular number, then the actual communication to the agent recorded
on the VoIP station.  Using Craigslist alone probably would've
sufficed; the messages could've been encrypted steganographically
within posts to, say, the rants  raves section.  I'm specifically
picking rants  raves here because it's a) not uncommon to see long
messages posted there, allowing for a longer encrypted message to be
hidden, and b) there are literally hundreds of posts there on any
given day for any given city, which would again have made finding the
intended recipient extremely difficult.

With respect to the VoIP station, it worked fine as a transmission
medium both from the standpoints of availability and obfuscation:
people recorded it and made it available in many formats from MP3 to
text to radio broadcasts, so knowing the intended recipient .
However, the downfall is that it provides a second level of logging
and if you're trying to avoid leaving an audit trail, multiple levels
of logging can either work in your favour or against you - they can
either serve to baffle an investigator by overwhelming them with data,
or enable correlation of events allowing a list of suspects to be
drawn up and chased down.


And thanks to a powerful search engine like Google, one could
search a large chunk of the internet for places where MEIN FREULEIN
exists.


Sure.  But remember that we were never intending from the get-go for
this to be clandestine; the idea was to put a high level of
signal-to-noise around the stations by having their content spread for
us by unwitting third parties.  In a sense, this is some of the best
obfuscation you could hope for.  People already listen to shortwave
transmissions and discuss them openly; that doesn't necessarily mean
that their intended recipients are any more or less secure in their
comings and goings than if nobody had heard them in the first place.
As long as the message itself remains uncrackable and can't be tied to
a particular individual, then all it is is a bit of spurious - but
nonetheless interesting - data.


From there, it's just a matter of filtering the data, then a
quick subpeona of the telco's records for users from a certain area.


Believe me, this is nowhere near as easy as it sounds.


Posting at an internet cafe with an anonymous account isn't safe
either, due to the prevalence of cameras in such places.


Sure.  But, as mentioned earlier, that's not the only option.  And
even if one were posting from a location such as an Internet cafe,
there are steps that can be taken to very effectively make it appear
as though this is not the case.


No the best way to covertly communicate online is to open an