lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <E1AeFWw-0000Dj-00@smtp03.mrf.mail.rcn.net>
From: rms at computerbytesman.com (Richard M. Smith)
Subject: Is the FBI using email Web bugs?

Hmm, is an "Internet Protocol Address Verifier" just an email Web bug?  If
so, the suspect should have been using Outlook 2003 which blocks 'em. ;-)
 
Richard
 
Feds thwart extortion plot against Best Buy
http://www.startribune.com/stories/535/4304797.html

The federal search warrant was obtained the morning of Oct. 24 and allowed
the FBI, with Best Buy's cooperation, to use an Internet device known as an
Internet Protocol Address Verifier. It contained a program that
automatically sent back a response to Best Buy after the company sent a
message to the e-mail address. The response allowed investigators to
identify Ray as the sender of the e-mail threats, according to the
government.

Assistant U.S. Attorney Paul Luehr said the address verifier was one of
several investigative tools the government used to track Ray down.

"It was a tool that helped us confirm that other leads were moving in the
same direction," said Luehr, who declined to discuss details of the
investigation.

Ray faces a maximum of two years in prison and a $250,000 fine for property
and reputation extortion. He faces a maximum sentence of five years in
prison and a fine of $250,000 for threats to damage computers.



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ