Friday, August 11, 2006

Who knows what evil lurks in your system? (Update)

Next week, presuming I still have a roof overhead and food in the fridge, I hope to write at some length about the growing number of reports alleging that pedophile rings service the powerful in various countries. As a prelude to those investigative pieces, I'd like to bring up a related claim made by 9/11 informant Randy Glass in a conversations with writer (and former Soft Skull Press president) Sandor Hicks.

Now, this is not the place to detail my reactions to Hicks; suffice it to say that while I admire much of what he has done, I am not an unalloyed Hicks fan. (He takes Ambrose Evans Pritchard seriously, for chrissakes!)

Neither can I here do justice to the story told by Glass. It is a fascinating story indeed, and it may well be true. Among many other claims, Glass says that, while functioning as an FBI informant, he uncovered a plot to sell nuclear weapons to Al Qaeda. Alas, Glass also has a criminal history; whenever his name crops up, a discussion of credibility must needs ensue.

We will have that discussion later. For now, I would like focus on one minor aside that Glass made in a recorded conversation which was later broadcast. Glass averred that if any government whistleblower sufficiently annoys the powers-that-be, the annoying personage will be set up on kiddie porn charges.

Is that allegation true? I do not know. Offhand, I cannot think of any instance in which a whistleblower was undone by such an allegation.

But let us allow ourselves to speculate for a moment. How might such a sting take place? Here is one possible scenario:

Let us suppose that a virus or trojan places an illegal image on your hard drive. Actually, we need not restrict our discussion to child pornography -- if you have any imagination, you can probably think up other illegal materials which serve the purposes of a sting.

Let us suppose further that the same trojan erases the illegal file the moment it hits your disc. There would be no evidence that the offensive material ever existed -- not in the registry, not in the file directory, not anywhere. Of course, after a while, that sector of your hard drive will probably be overwritten by some other material.

My understanding of computer forensics is very flawed. But I am told that a professional investigator may uncover overwritten material on your drive, much as a documents expert may recover an erased and overwritten text from a palimpsest.

How would the trojan get onto your computer? Here's one excellent method: A company allied with a "friendly" foreign intelligence agency could offer to the public an excellent free firewall program. Such a program, in wide distribution, might conceivably contain a means to provide "back door" access. "Approved" malware could thereby leap onto your system, and you would never know.

Under such circumstances, an FBI or police computer tech could -- while operating in good faith -- discover illegal material on your computer. Who knows? Perhaps such "gotcha" images exist in the majority of PCs around the world.

Yes, I am indulging in dark and irresponsible speculation. Still, I'd like to hear what other people (hopefully people with greater computer savvy) have to say about the technical feasibility of this unnerving scenario.

Until then...pleasant dreams!

UPDATE: A respondent to this post brings up the case of weapons inspector Scott Ritter, who has said things critical of the Bush administration. According to some news reports, misdemeanor charges were brought against him in a New York court for speaking in a chat room to an undercover officer who identified himself or herself as a 16 year-old girl.
"Police and prosecutors have declined to discuss the case, which involved at least one class B misdemeanor, because it was adjourned in contemplation of dismissal and ordered sealed by a Colonie Town Court justice."
Isn't 16 the age of consent in Canada and in some states? The grey area here may explain why the case was dismissed. At any rate, this situation does not quite fulfill the prophecy made by Randy Glass.

Another respondent suggests the use of an open-source firewall because all others may be compromised. I would take those words of advice seriously.

7 comments:

Anonymous said...

A close friend of mine worked for British Telecom, in their firewall software division. His advice was..."only use open source firewall software". Sage advice I think. He knew most of the major brand names out there all had back door channels. For what purpose...one can only guess, but in a firewall, one has to ask "Why?"

Is this being too paranoid? Well from what we already know as fact...there is little that is sacred on this planet by way of privacy, rights, or accountability.

Anonymous said...

Funny... I'm just finishing up "Gentlemen and Players" by Joanne Harris in which computers are used to implicate people in predation and pedophilia. It's a coincidence?

Anonymous said...

Anybody else remember when they tried to smear Scott Ritter with kiddie porn images on his computer? This was before the 2004 election.

Anonymous said...

Can someone please comment on this info?

http://colorado.indymedia.org/newswire/rate/14211/index.php#Article-14211

Anonymous said...

Pardon the obvious but, ahem, "Get a Mac."

For a more secure America.
It's the patriotic thing to do.

http://www.networkworld.com/columnists/2005/052305schwartau.html

P.S. Also, the majority of political donations for Microsoft goes to Republicans. The majority of political donations for Apple goes to Democrats.
BTW - Al Gore is on the board of directors for Apple.

http://www.apple.com/hotnews/articles/2006/05/inconvenienttruth/

http://www.apple.com/pr/library/2003/mar/19gore.html

iLarynx

Anonymous said...

Pardon the obvious but, ahem, "Get a Mac."

For a more secure America.
It's the patriotic thing to do.

Network Security

P.S. Also, the majority of political donations for Microsoft goes to Republicans. The majority of political donations for Apple goes to Democrats.
BTW - Al Gore is on the board of directors for Apple.

Al Gore's Inconvenient Truth Movie

Al Gore Joins Apple Board


iLarynx

DrewL said...

I just finished reading Dan Brown's 1998 novel "Digital Fortress", in which the NSA tries to distribute encryption software with a backdoor. It's ironic how much of the novel's content - though 8+ years old - mirrors some of what has taken place lately regarding the NSA and spying.

Speaking of kiddie porn, the Justice Department seems to have stepped up its high profile efforts to target alleged kiddie pornsters and those who may target underage kids in chat rooms, etc. Perhaps they're trying to take such charges into the mainstream, so that it may not seem so odd when certain individuals are found to have "engaged" in such illicit activities. Pedophilia seems to make for a pretty effective smear campaign against someone who may be seen as a danger to the government's activities. And with the relative technological sophistication of the NSA, they could probably put just about anything they so choose onto one's hard drive. And the more broadband connections that become active, the easier it is.