Suspected sextortionist hiding behind Tor is outed by booby-trapped video

https://arstechnica.com/tech-policy/2017/08/how-the-fbi-used-a-booby-trapped-video-to-id-a-sextortion-suspect-on-tor/

        As set forth in the search warrant application presented to
        Judge Lynch, the FBI was authorized by the Court to add a
        small piece of code (NIT) to a normal video file produced by
        Victim 2, which did not contain any visual depictions of any
        minor engaged in sexually explicit activity. As authorized,
        the FBI then uploaded the video file containing the NIT to the
        Dropbox.com account known only to Kil and Victim 2. When Kil
        viewed the video containing the NIT on a computer, the NIT
        would disclose the true IP address associated with the
        computer used by Kil.

 - - -

--Lauren--
Lauren Weinstein (lau...@vortex.com): https://www.vortex.com/lauren 
Lauren's Blog: https://lauren.vortex.com
Google Issues Mailing List: https://vortex.com/google-issues
Founder: Network Neutrality Squad: https://www.nnsquad.org 
         PRIVACY Forum: https://www.vortex.com/privacy-info
Co-Founder: People For Internet Responsibility: https://www.pfir.org/pfir-info
Member: ACM Committee on Computers and Public Policy
Google+: https://google.com/+LaurenWeinstein
Twitter: https://twitter.com/laurenweinstein
Tel: +1 (818) 225-2800
--- Impeach Trump ---
_______________________________________________
nnsquad mailing list
https://lists.nnsquad.org/mailman/listinfo/nnsquad

Reply via email to