{"id":210688,"date":"2017-08-09T04:50:19","date_gmt":"2017-08-09T08:50:19","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/the-fbi-booby-trapped-a-video-to-catch-a-suspected-tor-motherboard\/"},"modified":"2017-08-09T04:50:19","modified_gmt":"2017-08-09T08:50:19","slug":"the-fbi-booby-trapped-a-video-to-catch-a-suspected-tor-motherboard","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/the-fbi-booby-trapped-a-video-to-catch-a-suspected-tor-motherboard\/","title":{"rendered":"The FBI Booby-Trapped a Video to Catch a Suspected Tor &#8230; &#8211; Motherboard"},"content":{"rendered":"<p><p>    Malware and hacking tools are established parts of the Federal    Bureau of Investigation's toolkit when it comes to unmasking    criminal suspects on the Tor anonymity network. In a new case    revolving around someone blackmailing children, FBI agents sent    the suspect a digitally-poisoned movie file that obtained the    target's real IP address.  <\/p>\n<p>    Though the FBI has used hacking techniques     in a wide, controversial manner, the tactic used here    highlights how the bureau can identify suspects in a much more    targeted way too.  <\/p>\n<p>    Monday, prosecutors announced charges against    Buster Hernandez, 26, of Bakersfield, California. Hernandez is    charged with threats to use an explosive device and sexual    exploitation of a child. He is suspected of using the moniker    \"Brian Kil.\"  <\/p>\n<p>    Since 2015, Brian Kil has used social media, email, and VoIP to    communicate with a number of underage female victims and extort    sexual photos from them, according to the criminal complaint.    Under duress, some victims sent explicit images and videos to    Kil.  <\/p>\n<p>    When Kil used sites like Facebook to harass victims,    investigators found he was always hidden either behind an    anonymous proxy or the Tor network, meaning authorities could    not simply subpoena relevant companies for the suspect's IP    address.  <\/p>\n<p>    \"Your time is running out. You though [sic] the police    would find me by now but they didn't. They have no clue,\" Kil    wrote to one of the victims. As the harassment, threats, and    publication of sexually explicit photos continued, law    enforcement even held a community forum at Plainfield High    School in January last year to discuss the case. Kil allegedly    forced one of his victims to attend and report back, according    to the complaint.  <\/p>\n<p>    On June 9, Magistrate Judge Debra McVicker Lynch authorized the    use of a Network Investigative Technique (NIT),     an FBI blanket term for malware, exploits, and hacking    tricks. The idea, the complaint adds, was to obtain Kil's real    IP address.  <\/p>\n<p>      The complaint explains how the FBI's tactic worked.    <\/p>\n<p>    In this case, the FBI was authorized to add a small piece of    extra code to a video file produced by one of the victims.    Posing as the victim, the FBI then sent the booby-trapped file    to Kil via Dropbox.  <\/p>\n<p>    \"Uploading now. Did you get it,\" a message from the undercover    FBI agent to Kil reads, according to text messages included in    the complaint. (The video did not include any depictions of a    minor engaged in sexually explicit activity, the complaint    reads).  <\/p>\n<p>    Judging by the complaint, the NIT was successful. \"When Kil    viewed the video containing the NIT on a computer the NIT    disclosed the true IP address associated with the computer used    by Kil,\" the document adds.  <\/p>\n<p>    Armed with the IP address, investigators then filed an    emergency subpoena with the relevant internet service provider    and were given a physical address. After intercepting    communications to and from that IP address, investigators found    someone viewed a photograph of the Columbine killers, according    to the complaint. Kil, it turned out, had posted the same photo    when he threatened the Plainfield School District in 2015.    Physical surveillance showed that resident Buster Hernandez was    always present when Tor was being used in the home.  <\/p>\n<p>    Several recent cases have shown the FBI using hacking tricks in    a targeted manner. In May, Forbes reported on an investigation    in which the FBI used a similar technique but with Word    documents rather than a video file.  <\/p>\n<p>    These stand in stark contrast to the agency's broader use of    malware.     Motherboard found the FBI used a Tor Browser exploit to    hack over 8,000 computers in 120 different countries.  <\/p>\n<p>    Although this latest case doesn't highlight any vulnerabilities    in the Tor network itself, it does act as a reminder that there    are ways of deanonymizing people in a targeted way using novel    or unorthodox law enforcement techniques.  <\/p>\n<p>    Got a tip? You can contact this reporter securely on Signal    at +44 20 8133 5190, OTR chat at <a href=\"mailto:jfcox@jabber.ccc.de\">jfcox@jabber.ccc.de<\/a>, or email    <a href=\"mailto:joseph.cox@vice.com\">joseph.cox@vice.com<\/a>  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post:<br \/>\n<a target=\"_blank\" href=\"https:\/\/motherboard.vice.com\/en_us\/article\/gyyxb3\/the-fbi-booby-trapped-a-video-to-catch-a-suspected-tor-sextortionist\" title=\"The FBI Booby-Trapped a Video to Catch a Suspected Tor ... - Motherboard\">The FBI Booby-Trapped a Video to Catch a Suspected Tor ... - Motherboard<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Malware and hacking tools are established parts of the Federal Bureau of Investigation's toolkit when it comes to unmasking criminal suspects on the Tor anonymity network. In a new case revolving around someone blackmailing children, FBI agents sent the suspect a digitally-poisoned movie file that obtained the target's real IP address.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/the-fbi-booby-trapped-a-video-to-catch-a-suspected-tor-motherboard\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-210688","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/210688"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=210688"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/210688\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=210688"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=210688"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=210688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}