Feds use key logger to thwart PGP, Hushmail in MDMA case

erosion

Bluelight Crew
Joined
Oct 16, 2003
Messages
3,182
Feds use key logger to thwart PGP, Hushmail
News.com
July 10, 2007


A recent court case provides a rare glimpse into how some federal agents deal with encryption: by breaking into a suspect's home or office, implanting keystroke-logging software, and spying on what happens from afar.

An agent with the Drug Enforcement Administration persuaded a federal judge to authorize him to sneak into an Escondido, Calif., office believed to be a front for manufacturing the drug MDMA, or Ecstasy. The DEA received permission to copy the hard drives' contents and inject a keystroke logger into the computers.

That was necessary, according to DEA Agent Greg Coffey, because the suspects were using PGP and the encrypted Web e-mail service Hushmail.com. Coffey asserted that the DEA needed "real-time and meaningful access" to "monitor the keystrokes" for PGP and Hushmail passphrases.

The aggressive surveillance techniques employed by the DEA were part of a case that resulted in a ruling on Friday (PDF) by the 9th Circuit Court of Appeals, which primarily dealt with Internet surveillance through a wiretap conducted on a PacBell (now AT&T) business DSL line used by the defendants. More on that below.

The DEA's pursuit of alleged Ecstasy manufacturers Mark Forrester and Dennis Alba differs from the first known police use of key-logging software, which snared reputed mobster Nicodemo Scarfo in 1999. In the Scarfo case, the FBI said in an unclassified affidavit (PDF) at the time, a key logger that also was planted in a black bag job was disabled when the Internet connection became active.
keylogger.1.jpg

Note requirement for 'real-time' access / Excerpt from DEA Agent Greg Coffey affidavit

Not much more is known about the DEA's key logger in the Forrester-Alba case. An affidavit prepared by DEA agent Coffey in July 2001 asks for permission to enter the Escondido office "by breaking and entering, if necessary, for the purpose of installing, maintaining, and removing software tools" that "will enable agents to capture and record all keyboard keystrokes."

Note there's no evidence the DEA used the FBI's keystroke logger known as Magic Lantern, which reportedly can be installed remotely by taking advantage of operating system vulnerabilities without having agents physically break into an office.

Key loggers are hardly unusual nowadays, of course. In 2003, a former Boston College student was indicted for allegedly installing key-logging software on campus computers. More recent surveys indicate that plenty of workplaces are infected by spyware with key-logging abilities.

keylogger.2.jpg

Who created PGP? It was actually Phil Zimmermann. / Excerpt from DEA Agent Greg Coffey affidavit

Key loggers: Unresolved questions
The use of key loggers by police, however, seems to be uncommon: A search on Monday through legal databases for terms such as "key logger" turned up only the Scarfo and Forrester-Alba cases.

When used by police, they raise novel legal issues. That's because it's not entirely clear in what circumstances they're permitted under the U.S. Constitution and wiretap laws (which is why, in the Scarfo case, the FBI cleverly ducked this issue by, according to sworn testimony, disabling the key logger when the modem was in use).

Even so, Scarfo's defense attorney claimed that a key logger is akin to a "general warrant" permitting the DEA to seize "any record, including e-mail, simply because it was typed on a computer." General warrants are prohibited by the Fourth Amendment, which requires that warrants specify the "things to be seized." Another potential legal obstacle is whether wiretap laws apply--including their requirement of minimizing the interception of irrelevant conversations.

A federal judge eventually ruled that the unique design made the Scarfo logger permissible. But in the Forrester-Alba case, because Alba did not challenge the key logger directly, the 9th Circuit never weighed in.

keylogger.3.jpg


DEA claims that alleged Ecstasy/MDMA lab operators use encryption frequently / Excerpt from DEA Agent Greg Coffey affidavit

Eavesdropping without probable cause
Instead, the 9th Circuit spent much of its time evaluating whether government agents can eavesdrop on the Internet addresses Americans visit and the e-mail address of their correspondents without obtaining a search warrant first.

The judges' conclusion: federal agents did not violate the Fourth Amendment when spying on the Escondido DSL line without any evidence of criminal wrongdoing on his behalf, a legal standard known as probable cause. All the feds must do is prove the information is "relevant" to an ongoing investigation.

The wiretap was done at PacBell's connection facility at 650 Robinson Rd. in San Diego. The DEA obtained what's known as a "mirror port," a feature that many network switches made by companies including Cisco Systems include for troubleshooting purposes.

A mirror port duplicates all the Internet traffic of one user to a second port on the same switch, without the suspect being alerted that electronic surveillance is under way. The scheme is probably easier to accomplish with a static Internet Protocol (IP) address, which is what the Escondido case involved.

According to the DEA, only IP addresses of Web sites (such as 216.239.122.200 instead of cnet.com) and e-mail headers are captured, and not the rest of the communication stream. That, they argue, makes it akin to existing precedent dealing with pen registers, which capture telephone numbers dialed and are permitted without any proof of probable cause of wrongdoing.

The 9th Circuit agreed, ruling on Friday that "e-mail and Internet users have no expectation of privacy in the To/From addresses of their messages or the IP addresses of the websites they visit because they should know that these messages are sent and these IP addresses are accessed through the equipment of their Internet service provider and other third parties." This follows the lead of a Massachusetts judge who said much the same thing in November 2005.

Both Forrester and Alba were sentenced to 30 years in prison (PDF) on charges including conspiracy to manufacture and distribute Ecstasy. In a decision made on unrelated grounds, however, the 9th Circuit reversed Forrester's conviction and partially reversed Alba's. Forrester faces retrial.

Link
 
The DEA is like having a wife that always thinks your sleeping around regardless if you are or not, but will go to the end of the earth to prove you are. .
 
That sucks. No wonder people are all selling coke and heroin...if you sell coke and heroin (it's possible to get life w/o parole...) but most people do 5-15 years tops. And all that money made by selling coke and heroin goes to cartels and all sorts of violent fucks.
But if you manufacture LSD or ecstasy you get 30 years to life in prison.
Thats my jumbled rant...I just get pissed whenever I hear about MDMA or LSD busts...
What the fuck, does the DEA want everyone taking meth bombs and DOx's???
 
Yes, they do, then they can point to the damage done and say "see how DANGEROUS drugs are?!?!"

I didn't believe in it, but Emanuel Sferios, founder of DanceSafe, had a detailed conspiracy theory that the government was behind the proliferation of DXM pills being sold in the US as 'ecstasy' back in the 90's.
 
CloudyHazeD said:
Fucking hardcore.

Wonder if a linux box would have screwed em up? :D
I recall a statement by some feds that stated that they had alot of trouble with Mac OS X.

however I am a fan of http://kaos.to/cms/projects/releases/anonym.os-livecd.html i cant remember if waste is on it though. that would be nice.

however linux is great and if you use some of the NSAs stuff http://www.nsa.gov/selinux/
you can seriously fuck with some dimwitted "oh I can install a keylogger in windows" fed technowennie.
 
This could have easily been avoided. Don't conduct any illegal drug business or discuss it on a computer. What's the big fucking deal? Drug dealers know about phone taps and have compensated for that. This should have been commonsense. More guns less computers.
 
phrozen said:
This could have easily been avoided. Don't conduct any illegal drug business or discuss it on a computer. What's the big fucking deal? Drug dealers know about phone taps and have compensated for that. This should have been commonsense. More guns less computers.
computers are a great way to conduct secret communications. it just takes some effort and knowledge to get a secure channel setup.
 
^
I agree. But on the otherhand some things just need to be done face to face. I guess I'm too much of a traditionalist.
 
There is some kind of recurring image of the feds (probably popularized by hollywood), that they have some kind of superhuman computer scientists working for them that can crack any encryption or work miracles.

Security is my forte, and I have even met a few of these guys. The fact is, they were trained to work in the field, and there are huge gaps in their knowledge. They use documented methods for data recovery. If you know these methods its not too difficult to circumvent them. But for gods sake, don't use windows.
 
n4k33n said:
There is some kind of recurring image of the feds (probably popularized by hollywood), that they have some kind of superhuman computer scientists working for them that can crack any encryption or work miracles.

Security is my forte, and I have even met a few of these guys. The fact is, they were trained to work in the field, and there are huge gaps in their knowledge. They use documented methods for data recovery. If you know these methods its not too difficult to circumvent them. But for gods sake, don't use windows.
I agree. In fact, I'm encouraged by this because it shatters all illusions that "Hushmail isn't safe" or "the feds have a backdoor to encryption algorithms."

The defendants could have easily added other layers to their security such as an encrypted USB drive stored off the premises, and use of a password manager/form-filler such as Roboform, thereby keeping passphrases invisible to a key-logger.

And re Windows: There's little doubt Bill Gates made a deal with the devil so the feds would shoo anti-piracy legislation/enforcement through the door and his little empire wouldn't be threatened by OSS and people who copy software.

strigoi said:
The DEA is like having a wife that always thinks your sleeping around regardless if you are or not, but will go to the end of the earth to prove you are. .
Nice!


EDIT: Anyone know if it's possible to detect a mirror port?
 
Do you think the FBI's keylogger wouldn't keep track of what's being copy and pasted? I doubt that it was a regular run of the mill key logger. If it was, shame on them.
 
phrozen said:
Do you think the FBI's keylogger wouldn't keep track of what's being copy and pasted? I doubt that it was a regular run of the mill key logger. If it was, shame on them.
keyloggers dont by definition log the clipboards contents, but well its not hard to have something like that implemented.
 
I didn't believe in it, but Emanuel Sferios, founder of DanceSafe, had a detailed conspiracy theory that the government was behind the proliferation of DXM pills being sold in the US as 'ecstasy' back in the 90's.

Uh....

In light of his real contributions I hate to say it, but...I'm a mod at Dancesafe and have spent more time than I care to remember dealing with Emanuel...and in my opinion, he is probably a delusional paranoid-type schizophrenic. Among other things, he has claimed that HIV is harmless and the 9-11 attacks were a plot by the Jews.

For what it's worth, I have seen no evidence of governments spiking pills, nor do I believe it's likely they would have done such a thing. All that's needed for crap like DXM and PMA to find their way into the pill supply is a few greedy, irresponsible people and the unregulated black market.
 
TheDEA.org said:
Uh....

All that's needed for crap like DXM and PMA to find their way into the pill supply is a few greedy, irresponsible people and the unregulated black market.

Which the government is propping up, they don't have to be pressing the pills themself maybe they just allow the rogue producers to continue selling to promote fear and doubt in the drug using community. They get a couple media stories about how unsafe E pills are and they have something to justify their existance.
 
And as "the people" get fed up with the "drug war" and its crusaders, expect that kind of low-down shit to become frequent when the narco-cowboys find their backs against the wall.
 
They certainly didn't do anything like that with the Fentdope outbreak a year a go. As soon as it became widespread they issued warnings, stepped up prosecuting dealers, held a conference, and started looking for the source.

Funny how they justify their existence based on unsafe drugs when they're actually the cause of some of the unsafe drugs.
 
Ok the guys did good using PGP and hushmail, now here is where they messed up: Not using Tor on top of of them, and using a desktop PC that is out of their sight for periods of time. It is well known the FBI, CIA, and DEA can get so called sneak and peek warrants allowing them to break in and examine evidence copy and plant listening devices. Here is what you want to do should you be an MDMA lab communicating online.

First buy one of these: http://www.oqo.com/ if you are making MDMA you can easily afford it. NEVER let it leave your sight or pocket.
Now install Truecrypt, Tor, and Eraser which are all freeware. Keep all files on a encrypted partition with Truecrypt, use Eraser on maximum setting to securly overwrite all deleted files and every few days have it overwrite all unused disk space. Never touch the internet without Tor, and even then only through a random open wifi router you will never use twice. For email only use a hushmail account that is created through Tor to other hushmail accounts, if instant messaging is needed install GAIM with encryption plugin and still use Tor.

If you want to get even more secure dump windows for one of the secure linux distros. Remember keyloggers are not only in software, there are keyloggers that install inside the keyboard or between the keyboard and the PC which will work even with full disc encryption and no matter what OS you have.
This setup avoids that as the PC is never out of your sight.

http://www.heidi.ie/eraser/
http://www.truecrypt.org/
http://tor.eff.org/download.html.en
http://sourceforge.net/projects/gaim/
 
Top