Monday, August 29, 2016
ISIS dead-drop system
I assume what's really going is this.
The terrorist is given a USB drive with the TrueCrypt software and an encrypted partition/file. The first thing the terrorist does is put the USB drive into a computer, run the TrueCrypt program, then mount the file/partition, entering a password. In other words, all you see on the USB drive is the directory "TrueCrypt", and a large file that is the encrypted "container", as you see in the picture of the "F:" drive.
Once the terrorist mounts the container, she then opens that new folder. It'll contain a copy of a PGP program, like gpg4win. The terrorist runs that GUI. You see that on the right with the "G:" drive, with a 'portable' version of GPG installed in the encrypted container.
The terrorist types in the message, then encrypts it. The terrorist chooses one of the many public keys that have been stored inside this encrypted container (G:) within the USB flash drive (F:).
Then the terrorist runs a 'portable' web-browser from the G: drive. These are browsers based on Chrome or Firefox that run completely self-contained from a directory, leaving behind no other trace on the system. In this example, I'm using "Iron Portable", which is based on Chrome. All the settings, like which website to log into, and possibly saved passwords, are stored in this directory. Likewise, any logs will be stored here.
The terrorist then logs onto a forum, such as a typical phpbb one using SSL. The terrorist then create a new message, and copies/pastes the encrypted text from the clipboard. In this example, I'm showing the "Gentoo" forums, which is well-known to be visited by various ne'er-do-wells and sympathizers.
This system works because it's completely contained on the USB drive. The terrorist can walk up to any Windows PC at a cyber-cafe and make this work. All the evidence is on the USB drive, so there's nothing left on the Windows computer that law-enforcement can track down. Likewise, the forum is likely to be something that the NSA is less likely to be monitoring. But if they are, they'll get some metadata, but still won't be able to break the PGP encoding.
This is all guesswork. I built this USB drive in the last hour and installed all the portable versions of the software (TrueCrypt, gpg4win, and IronPortable) on it to create these screenshots. It's a plausibly useful way of doing things such that stupid terrorists can't mess things up (leave unencrypted messages or metadata around). And, it matches (kinda) the garbled news account.
The moral of the story is that news stories ought to talk to experts. We can't figure out from the inaccurate accounts you can tell, and only make guesses like I have here.
http://blog.erratasec.com/2016/03/some-other-comments-on-isis-dead-drop.html#.V8R6oKL_rnk
The terrorist is given a USB drive with the TrueCrypt software and an encrypted partition/file. The first thing the terrorist does is put the USB drive into a computer, run the TrueCrypt program, then mount the file/partition, entering a password. In other words, all you see on the USB drive is the directory "TrueCrypt", and a large file that is the encrypted "container", as you see in the picture of the "F:" drive.
Once the terrorist mounts the container, she then opens that new folder. It'll contain a copy of a PGP program, like gpg4win. The terrorist runs that GUI. You see that on the right with the "G:" drive, with a 'portable' version of GPG installed in the encrypted container.
The terrorist types in the message, then encrypts it. The terrorist chooses one of the many public keys that have been stored inside this encrypted container (G:) within the USB flash drive (F:).
Then the terrorist runs a 'portable' web-browser from the G: drive. These are browsers based on Chrome or Firefox that run completely self-contained from a directory, leaving behind no other trace on the system. In this example, I'm using "Iron Portable", which is based on Chrome. All the settings, like which website to log into, and possibly saved passwords, are stored in this directory. Likewise, any logs will be stored here.
The terrorist then logs onto a forum, such as a typical phpbb one using SSL. The terrorist then create a new message, and copies/pastes the encrypted text from the clipboard. In this example, I'm showing the "Gentoo" forums, which is well-known to be visited by various ne'er-do-wells and sympathizers.
This system works because it's completely contained on the USB drive. The terrorist can walk up to any Windows PC at a cyber-cafe and make this work. All the evidence is on the USB drive, so there's nothing left on the Windows computer that law-enforcement can track down. Likewise, the forum is likely to be something that the NSA is less likely to be monitoring. But if they are, they'll get some metadata, but still won't be able to break the PGP encoding.
This is all guesswork. I built this USB drive in the last hour and installed all the portable versions of the software (TrueCrypt, gpg4win, and IronPortable) on it to create these screenshots. It's a plausibly useful way of doing things such that stupid terrorists can't mess things up (leave unencrypted messages or metadata around). And, it matches (kinda) the garbled news account.
The moral of the story is that news stories ought to talk to experts. We can't figure out from the inaccurate accounts you can tell, and only make guesses like I have here.
http://blog.erratasec.com/2016/03/some-other-comments-on-isis-dead-drop.html#.V8R6oKL_rnk
Imagine you're making a secure boot bypass attack...and you want to get PK
EFI keys...and you already know that..."Prepending a single _ character
to a variables name in Set will cause that variable to be inherited by
channels created by the main channel. eg. when using Dial(Local/...);
once inherited these variables will not be further inherited. Prepending
two _ characters will cause them to be inherited indefinitely.(...) "
however this is now, all depends in Javascript...and ..."
Yes all the class hierarchy(same class and all child classes instances) share the same static variable. As the JAVA doesn't support the global variable but you are able to use the static variable as a Global variable without violation of OOP concepts.
If you changed the value of static variable from one of the class, the same changed value replicated to all the classes that uses this variable." so...
https://maven.reucon.com/projects/public/asterisk-java/1.0.0/apidocs/org/asteriskjava/manager/event/DtmfEvent.html
Yes all the class hierarchy(same class and all child classes instances) share the same static variable. As the JAVA doesn't support the global variable but you are able to use the static variable as a Global variable without violation of OOP concepts.
If you changed the value of static variable from one of the class, the same changed value replicated to all the classes that uses this variable." so...
- java.lang.Object
-
- java.util.EventObject
-
- org.asteriskjava.manager.event.ManagerEvent
-
- org.asteriskjava.manager.event.DtmfEvent
- All Implemented Interfaces:
- Serializable
public class DtmfEvent
extends ManagerEvent
A DtmfEvent is triggered each time a DTMF digit is sent or received on a
channel.https://maven.reucon.com/projects/public/asterisk-java/1.0.0/apidocs/org/asteriskjava/manager/event/DtmfEvent.html
Sunday, August 28, 2016
Subscribe to:
Posts (Atom)
Energy Blackouts total electric outage graphite carbon balls trow 2 ground impact
https://www.alibaba.com/product-detail/Graphite-Carbon-Ball-C80-Instead-of_1601156433008.html?spm=a2700.galleryofferlist.normal_offer.d_ti...
