The article states that the FBI served subpoenas for specific information from insecure.org, likely after finding evidence that some specific attacker (who, no doubt, did something which deserves to be investigated) retrieved data from insecure.org. It would appear they are simply trying to cross-reference logs to discover an attacker's real IP address. This is pretty legitimate, and Fyodor was apparently very diligent in ensuring all information was retrieved via legal methods.
I don't see any reason to assume that the FBI is actively monitoring insecure.org's HTTP logs. Even if they did have a strangle hold on the logs, there is really nothing to fear as it is a legitimate tool with legitimate purposes. People intending to commit felonies over the internet, obviously, have something to worry about... though I'm not sure why anyone would be sympathetic to their plight. --xtrecate -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Danny Sent: Tuesday, November 30, 2004 2:15 PM To: Ben Nelson Cc: Crehan, Joe (EM, ITS, Contractor); [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] Network Sniffing On Tue, 30 Nov 2004 13:08:12 -0700, Ben Nelson <[EMAIL PROTECTED]> wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Take a look at: > http://www.insecure.org/tools.html [...] Note: The FBI is monitoring HTTP logs from insecure.org. http://slashdot.org/article.pl?sid=04/11/25/1835238&from=rss ...D _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
