Le site Bellaciao: coloré, multiple, ou le meilleur cotoie fort heureusement le pire, mélangé, bizarre, picabien et dadaîste, explorant toutes sortes de registres et de régimes rhétoriques, drole et polémiqueur, surréaliste: rencontre d'un parapluie et d'une machine à coudre sur une table de dissection, têtes de Lénine sur le clavier d'un piano Steinway ou Bosendorfer...
FR
ES
Senal en Vivo
VIDEO
RADIO
FRIENDS SITES
with Bellaciao
Bellaciao hosted by
To rebel is right, to disobey is a duty, to act is necessary !
Bellaciao  mobile version   |   Home  |   About us   |   Donation  |   Links  |   Contact  |   Search
FBI’s search for ‘Mo,’ suspect in bomb threats, highlights use of malware for surveillance

by: Craig Timberg and Ellen Nakashima
Sunday December 8, 2013 - 18:55

The man who called himself “Mo” had dark hair, a foreign accent and — if the pictures he e-mailed to federal investigators could be believed — an Iranian military uniform. When he made a series of threats to detonate bombs at universities and airports across a wide swath of the United States last year, police had to scramble every time.

Mo remained elusive for months, communicating via ­e-mail, video chat and an ­Internet-based phone service without revealing his true identity or location, court documents show. So with no house to search or telephone to tap, investigators turned to a new kind of surveillance tool delivered over the Internet.

The FBI’s elite hacker team designed a piece of malicious software that was to be delivered secretly when Mo signed on to his Yahoo e-mail account, from any computer anywhere in the world, according to the documents. The goal of the software was to gather a range of information — Web sites he had visited and indicators of the location of the computer — that would allow investigators to find Mo and tie him to the bomb threats.

Such high-tech search tools, which the FBI calls “network investigative techniques,” have been used when authorities struggle to track suspects who are adept at covering their tracks online. The most powerful FBI surveillance software can covertly download files, photographs and stored e-mails, or even gather real-time images by activating cameras connected to computers, say court documents and people familiar with this technology.

Online surveillance pushes the boundaries of the constitution’s limits on searches and seizures by gathering a broad range of information, some of it without direct connection to any crime. Critics compare it to a physical search in which the entire contents of a home are seized, not just those items suspected to offer evidence of a particular offense.

A federal magistrate in Denver approved sending surveillance software to Mo’s computer last year. Not all such requests are welcomed by the courts: An FBI plan to send surveillance software to a suspect in a different case — one that involved activating a suspect’s built-in computer camera — was rejected by a federal magistrate in Houston, who ruled that it was “extremely intrusive” and could violate the Fourth Amendment.

“You can’t just go on a fishing expedition,” said Laura K. Donohue, a Georgetown University law professor who reviewed three recent court rulings on FBI surveillance software, including one involving Mo. “There needs to be a nexus between the crime being alleged and the material to be seized. What they are doing here, though, is collecting everything.”

The FBI and Justice Department declined to comment on the case or the surveillance techniques used in pursuit of Mo.

But court documents related to the investigation, created when the FBI requested a search warrant before sending the surveillance software across the Internet to Mo, have offered a rare window into the bureau’s tools for tracking suspects through an online landscape replete with places to hide.

The case also shows the limits of the surveillance software, which have not yielded Mo’s arrest, and the legal complexities created when the location of a subject is unknown.

“The suspect could be down the street or on the other side of the planet,” said Jason M. Weinstein, a former deputy assistant attorney general in the Justice Department’s criminal division who is now a partner at Steptoe & Johnson. He said he had no direct knowledge of the investigation of Mo. The case, however, “raises the broader question of whether the rules that exist now are adequate to address the problem.”

Mystery caller

The first known call from Mo came in July 2012, two days after a troubled man with dyed orange hair had gunned down 12 people in a movie theater in the Denver suburb of Aurora, Colo., court documents show. Mo told the county sheriff’s office there that he was a friend of the alleged killer and wanted him freed. If the sheriff refused, Mo said, he would blow up a building full of potential victims.

Mo and a deputy sheriff ended up speaking by phone for three hours while also communicating for much of that time through e-mail. That left investigators with several leads, including a phone number and a working address on Gmail, the Web-based e-mail service from Google.

Yet Mo’s true identity remained a mystery. The number turned out to be for Google Voice, an Internet-based service that allows users to make phone calls from their computers. When authorities made an emergency request to Google for information from his account with the company, they learned that Mo had used an online tool called a “virtual proxy” to mask identifying information about the computer he was using. The name registered for the Google account, meanwhile, was “Soozan vf.”

There was no obvious reference to Iran, even though a set of pictures Mo later e-mailed to investigators appeared to show an olive-skinned man in his late 20s, wearing what court documents described as an “Iranian tan camouflaged military uniform.”

Over several months, Mo allegedly threatened to detonate bombs at a county jail, a DoubleTree hotel, the University of Denver, the University of Texas, San Antonio International Airport, Washington-Dulles International Airport, Virginia Commonwealth University and other heavily used public facilities across the country, court documents show.

Though no bombs were ever found, during his rash of threats Mo began using an ominous new e-mail address: “texan.slayer puy ­yahoo.com.” He also gave investigators a plausible full name for himself — Mohammed Arian Far — whose initials roughly fit a name he had used when registering his Google account: “mmmmaaaaffff.”

The account information, gathered after the approval of a search warrant in September 2012, listed a birthday that suggested Mo was 27 years old, fitting the estimates investigators made based on the pictures he had sent them. The field for country said “Iran.” The computer IP address used when Mo had signed up for the account in 2009 suggested he was in Tehran, the capital, at the time. But it wasn’t clear where in the city he lived, or even if he was still there.

Phishing for a suspect

The FBI team works much like other hackers, using security weaknesses in computer programs to gain control of users’ machines. The most common delivery mechanism, say people familiar with the technology, is a simple phishing attack — a link slipped into an e-mail, typically labeled in a misleading way.

When the user hits the link, it connects to a computer at FBI offices in Quantico, Va., and downloads the malicious software, often called “malware” because it operates covertly, typically to spy on or otherwise exploit the owner of a computer. As in some traditional searches, subjects typically are notified only after evidence is gathered from their property.

“We have transitioned into a world where law enforcement is hacking into people’s computers, and we have never had public debate,” said Christopher Soghoian, principal technologist for the American Civil Liberties Union. “Judges are having to make up these powers as they go along.”

Former U.S. officials say the FBI uses the technique sparingly, in part to keep public references to its online surveillance tools to a minimum. There was news coverage about them in 2007, when Wired reported that the FBI had sent surveillance software to the owner of a MySpace account linked to bomb threats against a Washington state high school.

The FBI has been able to covertly activate a computer’s camera — without triggering the light that lets users know it is recording — for several years, and has used that technique mainly in terrorism cases or the most serious criminal investigations, said Marcus Thomas, former assistant director of the FBI’s Operational Technology Division in Quantico, now on the advisory board of Subsentio, a firm that helps telecommunications carriers comply with federal wiretap statutes.

The FBI’s technology continues to advance as users move away from traditional computers and become more savvy about disguising their locations and identities. “Because of encryption and because targets are increasingly using mobile devices, law enforcement is realizing that more and more they’re going to have to be on the device — or in the cloud,” Thomas said, referring to remote storage services. “There’s the realization out there that they’re going to have to use these types of tools more and more.”

The ability to remotely activate video feeds was among the issues cited in a case in Houston, where federal magistrate Judge Stephen W. Smith rejected a search warrant request from the FBI in April. In that case, first reported by the Wall Street Journal, Smith ruled that the use of such technology in a bank fraud case was “extremely intrusive” and ran the risk of accidentally capturing information of people not under suspicion of any crime.

Smith also said that a magistrate’s court based in Texas lacked jurisdiction to approve a search of a computer whose location was unknown. He wrote that such surveillance software may violate the Fourth Amendment’s limits on unwarranted searches and seizures.

Yet another federal magistrate judge, in Austin, approved the FBI’s request to conduct a “one-time limited search” — not involving the computer’s camera — by sending surveillance software to the e-mail account of a federal fugitive in December 2012.

In that case, investigators had evidence that the man, who allegedly had taken the identity of a soldier serving in Iraq, was living at a hotel in San Antonio, just more than an hour’s drive from Austin. The FBI’s surveillance software returned a detailed inventory of the fugitive’s computer, including the chips used, the amount of space on his hard drive and a list of dozens of programs loaded onto it. He was later arrested, convicted and sentenced to five years in prison for financial fraud and identity theft.

“Technology is evolving and law enforcement is struggling to keep up,” said Brian L. Owsley, a retired federal magistrate judge from Texas who was not involved in either case. “It’s a cat-and-mouse game.”

Still searching

Even though investigators suspected that Mo was in Iran, the uncertainty around his identity and location complicated the case. Had he turned out to be a U.S. citizen or a foreigner living within the country, a search conducted without a warrant could have jeopardized his prosecution.

Federal magistrate Judge Kathleen M. Tafoya approved the FBI’s search warrant request on Dec. 11, 2012, nearly five months after the first threatening call from Mo. The order gave the FBI two weeks to attempt to activate surveillance software sent to the texan.slayer puy yahoo.com e-mail address. All investigators needed, it seemed, was for Mo to sign on to his account and, almost instantaneously, the software would start reporting information back to Quantico.

The logistical hurdles proved to be even more complex than the legal ones. The first search warrant request botched the Yahoo e-mail address for Mo, mixing up a single letter and prompting the submission of a corrected request. A software update to a program the surveillance software was planning to target, meanwhile, raised fears of a malfunction, forcing the FBI to refashion its malicious software before sending it to Mo’s computer.

The warrant authorizes an “Internet web link” that would download the surveillance software to Mo’s computer when he signed on to his Yahoo account. (Yahoo, when questioned by The Washington Post, issued a statement saying it had no knowledge of the case and did not assist in any way.)

The surveillance software was sent across the Internet on Dec. 14, 2012 — three days after the warrant was issued — but the FBI’s program didn’t function properly, according to a court document submitted in February,

“The program hidden in the link sent to texan.slayer puy ­yahoo.com never actually executed as designed,” a federal agent reported in a handwritten note to the court.

But, it said, Mo’s computer did send a request for information to the FBI computer, revealing two new IP addresses in the process. Both suggested that, as of last December, Mo was still in Tehran.

http://www.washingtonpost.com/busin...



Leave a comment
Print this article





Public Apology to Women of the World from The American Republic (Hypatia of Alex
Monday 31 - 15:21
by Willam Morgan
YES, THERE WILL BE ELECTION FRAUD, AND ON A GRAND SCALE
Sunday 23 - 18:32
by JOHN CHUCKMAN
Hillary Clinton will be first female President 2017
Monday 10 - 17:21
by Willam Morgan
Police Shootings: Law, Policy, and Accountability
Thursday 6 - 14:22
by William John Cox
AMERICA DESERVES BETTER, BUT EVEN MORE IMPORTANTLY, THE WORLD DESERVES BETTER
Thursday 29 - 18:02
by JOHN CHUCKMAN
Back to School for Fascist Dupont-Aignan
Thursday 15 - 11:32
by Nouveau Comité de Vigilance des Intellectuels Antifascistes
The Presidency: Character Matters
Friday 9 - 15:06
by William John Cox
WHY HILLARY IS THE PERFECT PERSON TO SECURE OBAMA’S LEGACY
Tuesday 30 - 18:08
by JOHN CHUCKMAN
Remake of Ben Hur in 2020 planned by new motion picture studio
Friday 26 - 15:50
by Wallace
THE CASE FOR DONALD TRUMP
Monday 22 - 19:32
by JOHN CHUCKMAN
THE CONSTITUTION OF THE UNITED STATES IS DEAD
Thursday 11 - 06:42
by David R. Hoffman, Legal Editor of Pravda.Ru
DONALD TRUMP AND THE GENIUS OF IDIOCY
Friday 5 - 00:47
by David R. Hoffman, Legal Editor of Pravda.Ru
FOOLING MOST OF THE PEOPLE MOST OF THE TIME IS WHAT AMERICAN POLITICS ARE ABOUT,
Friday 29 - 18:13
by JOHN CHUCKMAN
A message of your fellow striking workers from France
Tuesday 12 - 20:49
by Info’Com-CGT
The Right to Vote, Effectively
Friday 8 - 22:20
by William John Cox
Fourth of July Lies
Sunday 3 - 19:41
by June C. Terpstra
Who Should Make Political Policy, the People or the Politicians?
Friday 24 - 15:14
by William John Cox
Hollow Women of the Hegemon Part II: Atrocity Enabling Harpies
Tuesday 21 - 18:49
by Dr. June Terpstra
The American Republic Manifestum book is being made into a Movie
Saturday 11 - 15:54
by William Morgan
Write-in Voting and Political Protest
Wednesday 1 - 15:05
by William John Cox
Yves Bouvier art battle plays out in online and social media arena
Tuesday 31 - 21:12
by Dean Bagley
Damaged Candidate Clinton Can’t Call Out Trump
Friday 27 - 13:53
by Daniel Patrick Welch
PLEDGE OF THE NEW REPUBLICAN PARTY
Tuesday 24 - 21:53
by David R. Hoffman, Legal Editor of Pravda.Ru
LET TEXAS SECEDE
Thursday 19 - 00:53
by David R. Hoffman, Legal Editor of Pravda.Ru
LAS TRES ERRES A LA ENÉSIMA POTENCIA.-
Monday 16 - 15:35
by FREDDY SUBDIAGA
DEMAGOGIA POPULISTA...
Monday 16 - 15:26
by FREDDY SUBDIAGA
Oligarchs Won’t Let You Vote Their Wars Away
Wednesday 11 - 20:24
by Daniel Patrick Welch
AN AMERICAN ORIGINAL: JOHN KERRY - FROM HIS REMARKABLE RECENT COMMENCEMENT ADDR
Monday 9 - 20:40
by JOHN CHUCKMAN
Donald Trump and Hillary Clinton support the American Republic Manifestum
Monday 9 - 16:37
by William Morgan
Transformation: A Student-Led Mass Political Movement
Monday 25 - 19:28
by William John Cox
Algerian Feminists react to ’Hijab Day’ in Paris 2016
Monday 25 - 01:13
THE ILLUSION OF RIGHTS
Friday 22 - 18:45
by JOHN CHUCKMAN
US is real superpredator pretending to be victim
Monday 18 - 22:23
by Daniel Patrick Welch
Gaiacomm International has accidently created a fusion reaction/ignition.
Sunday 17 - 17:01
by William Morgan
Clinton’s Campaign Continues to Highlight Horrible Hillary
Saturday 9 - 00:57
by Daniel Patrick Welch
Armoiries racistes à Harvard : Plaidoyer pour la réflexion socio-historique
Thursday 7 - 18:56
by Samuel Beaudoin Guzzo
THANK YOU MISSISSIPPI FOR YOUR HATE
Wednesday 6 - 02:02
by David R. Hoffman, Legal Editor of Pravda.Ru
The PKK in Iraq: “We are ready to fight ISIS everywhere in the world”
Monday 4 - 14:33
by InfoAut
Clinton Crashes and Burns, Sanders Will Win (But hold off on the applause)
Friday 1 - 22:33
by Daniel Patrick Welch
Confirming Supreme Court Justices and Electing Presidents
Friday 1 - 20:59
by William John Cox

home | webmaster



Follow-up of the site's activity
RSS Bellaciao En


rss FR / rss IT / rss ES



Bellaciao hosted by DRI

It is the responsibility of the intellectual to speak the truth and to expose lies. Noam Chomsky
Facebook Twitter Google+
DAZIBAO
I, European citizen, won’t let refugees be rejected in my name
Thursday 10 March
©Olivier Jobard/Myop I, European citizen, won’t let refugees be rejected in my name THE RIGHT TO ASYLUM IS A RIGHT In the phrase « right to asylum », every word matters. Under the law, every person who is persecuted because of his or her political opinions or because of his or her identity, every person that is endangered by violence, war or misery has a RIGHT to seek asylum in another country The aim of this petition is to collect (...)
read more...
Neo-Nazis and far-right protesters in Ukraine 3 live-stream
Friday 24 January
2 comments
The far-right in Ukraine are acting as the vanguard of a protest movement that is being reported as pro-democracy. The situation on the ground is not as simple as pro-EU and trade versus pro-Putin and Russian hegemony in the region. When US Senator John McCain dined with Ukraine’s opposition leaders in December, he shared a table and later a stage with the leader of the extreme far-right Svoboda party Oleh Tyahnybok. This is Oleh Tyahnybok, he has claimed a "Moscow-Jewish mafia" (...)
read more...
Hugo Chavez is dead (video live)
Wednesday 6 March
by : Collective BELLACIAO
1 comment
President Hugo Chavez companeros venezueliano died after a long battle with cancer.
read more...
International initiative to stop the war in Syria Yes to democracy, no to foreign intervention!
Thursday 13 December
Your support here: http://www.peaceinsyria.org/support.php We, the undersigned, who are part of an international civil society increasingly worried about the awful bloodshed of the Syrian people, are supporting a political initiative based on the results of a fact-finding mission which some of our colleagues undertook to Beirut and Damascus in September 2012. This initiative consists in calling for a delegation of highranking personalities and public figures to go to Syria in order to (...)
read more...
THE KU KLUX KLAN ONCE AGAIN CONTROLS INDIANA
Monday 12 November
by : David R. Hoffman, Legal Editor of Pravda.Ru
7 comments
At first glance, the results of America’s 2012 election appear to be a triumph for social, racial, and economic justice and progress in the United States: California voters passed a proposition requiring the rich to shoulder their fair share of the tax burden; Two states, Colorado and Washington, legalized the recreational use of marijuana, while Massachusetts approved the use of marijuana for medical purposes; Washington and two other states, Maine and Maryland, legalized same-sex (...)
read more...
I’VE DECIDED TO "WASTE" MY VOTE
Sunday 28 October
by : David R. Hoffman, Legal Editor of Pravda.Ru
In a 2004 episode of Comedy Central’s animated series South Park, an election was held to determine whether the new mascot for the town’s elementary school would be a “giant douche” or a “turd sandwich.” Confronted with these two equally unpalatable choices, one child, Stan Marsh, refused to vote at all, which resulted in his ostracization and subsequent banishment from the town. Although this satirical vulgarity was intended as a commentary on the two (...)
read more...
HIGHER EDUCATION IN AMERICA: DREAM OR NIGHTMARE? PART IV
Friday 28 September
by : David R. Hoffman, Legal Editor of Pravda.Ru
PART I PART II PART III If there is one major inconsistency in life, it is that young people who know little more than family, friends and school are suddenly, at the age of eighteen, supposed to decide what they want to do for the rest of their lives. Unfortunately, because of their limited life experiences, the illusions they have about certain occupations do not always comport to the realities. I discovered this the first time I went to college. About a year into my studies, I (...)
read more...
HIGHER EDUCATION IN AMERICA: DREAM OR NIGHTMARE? PART III
Friday 28 September
by : David R. Hoffman, Legal Editor of Pravda.Ru
PART I PART II PART IV Disillusioned with the machinations of so-called “traditional” colleges, I became an adjunct instructor at several “for-profit” colleges. Thanks largely to the power and pervasiveness of the Internet, “for-profit” colleges (hereinafter for-profits) have become a growing phenomenon in America. They have also been the subject of much political debate and the focus of a Frontline special entitled College Inc. Unlike traditional (...)
read more...
HIGHER EDUCATION IN AMERICA: DREAM OR NIGHTMARE? PART II
Friday 28 September
by : David R. Hoffman, Legal Editor of Pravda.Ru
PART I PART III PART IV Several years ago, a young lady came into the college where I was teaching to inquire about a full-time instructor’s position in the sociology department. She was advised that only adjunct positions were available. Her response was, “No thanks. Once an adjunct, always an adjunct.” Her words still echo in my mind. Even as colleges and universities raise their tuition costs, they are relying more and more on adjunct instructors. Adjuncts are (...)
read more...
HIGHER EDUCATION IN AMERICA: DREAM OR NIGHTMARE? PART I
Friday 28 September
by : David R. Hoffman, Legal Editor of Pravda.Ru
PART II PART III PART IV When The Bill of Rights was added to the United States Constitution over two hundred years ago, Americans were blessed with many rights considered to be “fundamental.” One conspicuously missing, however, was the right to an education. This was not surprising given the tenor of the times. America was primarily an agrarian culture, and education, especially higher education, was viewed as a privilege reserved for the children of the rich and (...)
read more...
ONE SOLITARY LIFE, PART TWO
Monday 30 July
by : David R. Hoffman, Legal Editor of Pravda.Ru
3 comments
If there is one universal question that haunts all human beings at some point in their lives, it is, “Why do we die?” Death, after all, is the great illogic. It ultimately claims all, the rich and the poor, the mighty and the small, the good and the evil. Death also has the capability to make most human pursuits—such as the quest for wealth, fame and power—vacuous and fleeting. Given this reality, I have often wondered why so many people are still willing to (...)
read more...
HOW MUCH CORRUPTION CAN DEMOCRACY ENDURE?
Thursday 28 June
by : David R. Hoffman, Legal Editor of Pravda.Ru
6 comments
How much corruption can a “democracy” endure before it ceases to be a democracy? If five venal, mendacious, duplicitous, amoral, biased and (dare I say it) satanic Supreme Court “justices”—John Roberts, Samuel Alito, Antonin Scalia, Clarence Thomas and Anthony Kennedy—have their way, America will soon find out. In several previous articles for Pravda.Ru, I have consistently warned how the Supreme Court’s 2010 Citizens United decision is one of the (...)
read more...
DEMOCRACY IN THE HANDS OF IDIOTS, PART TWO
Tuesday 12 June
by : David R. Hoffman, Legal Editor of Pravda.Ru
1 comment
Imagine, if you will, that the United States government passes a law banning advertisers from sponsoring commercials on Rush Limbaugh’s radio show or Rupert Murdoch’s Fox (Faux) “News” Network. On one hand, there would be two decided advantages to this ban: The National IQ would undoubtedly increase several percentage points, and manipulative pseudo-journalists would no longer be able to appeal to the basest instincts in human nature for ratings and profit while (...)
read more...
DEMOCRACY IN THE HANDS OF IDIOTS
Thursday 7 June
by : David R. Hoffman, Pravda.Ru Legal Editor
4 comments
LIVE, from the State that brought you Senator Joseph McCarthy, Wisconsin voters now proudly present, fresh from his recall election victory, Governor Scott Walker! At first glance, it is almost unfathomable that anyone with a modicum of intelligence would have voted to retain Scott Walker as Wisconsin’s governor. This, after all, is a man who openly declared he is trying to destroy the rights of workers through a “divide and conquer” strategy; who received 61% of the (...)
read more...
PEOPLE WITHOUT SOULS
Tuesday 13 March
by : David R. Hoffman, Legal Editor of Pravda.Ru
2 comments
A question I’ve frequently been asked since I began writing for Pravda.Ru in 2003 is, “Why did you become disillusioned with the practice of law?” This question is understandable, particularly since, in most people’s minds, being an attorney is synonymous with wealth and political power. I’ve always been reluctant to answer this question for fear it will discourage conscientious and ethical people from pursuing careers in the legal profession—a (...)
read more...